CN117150530B - Data security control method and system - Google Patents

Data security control method and system Download PDF

Info

Publication number
CN117150530B
CN117150530B CN202311306518.3A CN202311306518A CN117150530B CN 117150530 B CN117150530 B CN 117150530B CN 202311306518 A CN202311306518 A CN 202311306518A CN 117150530 B CN117150530 B CN 117150530B
Authority
CN
China
Prior art keywords
data
terminal
delivery
safety
multimedia data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311306518.3A
Other languages
Chinese (zh)
Other versions
CN117150530A (en
Inventor
黄建伟
张晓梅
沈群峰
李善杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Health Online Information Technology Co ltd
Original Assignee
Hangzhou Health Online Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Health Online Information Technology Co ltd filed Critical Hangzhou Health Online Information Technology Co ltd
Priority to CN202311306518.3A priority Critical patent/CN117150530B/en
Publication of CN117150530A publication Critical patent/CN117150530A/en
Application granted granted Critical
Publication of CN117150530B publication Critical patent/CN117150530B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/20Education
    • G06Q50/205Education administration or guidance

Abstract

The invention relates to a data security control method and a system, wherein the method comprises the steps that a platform server organizes multimedia data based on a delivery template to form delivery data; determining presentable casting data for the casting role; carrying out safe processing on the put-in data to obtain target data aiming at the put-in terminal; the release terminal executes the same safe processing mode on the received target data to obtain release data; the invention provides a certain degree of safety guarantee for the released data on the basis of not increasing the calculation complexity of the released terminal basically, avoids the loss of the basic safety of the released data, and greatly improves the variability of the released data and the controllability of the safety.

Description

Data security control method and system
[ field of technology ]
The invention belongs to the technical field of data security control, and particularly relates to a data security control method and system.
[ background Art ]
With the development of global education informatization and the popularization of mobile internet, online education market shows explosive growth, various online education APP layers are endless, and online education services aiming at different age levels are continuously updated and optimized. On-line education is becoming an important choice for students to participate in learning and training due to its good utilization of fragmentation time and convenience of use. The online education is combined with the education industry through a computer, teaching of teachers and students and teaching are provided through the online video transmission function of a website, and the multimedia teaching content of the online education is different from the conventional school classroom only in learning position.
The rapid development of big data and Internet promotes the sharing of information and knowledge, provides a convenient way for people to acquire and learn knowledge, and especially provides a great deal of Internet online education and teaching ways such as micro lessons, mousse lessons and the like in recent years. Compared with traditional education teaching, the on-line education has the advantages that the regional limit and the time limit are broken, and the teaching resources can be integrated rapidly, so that unbalanced distribution of the teaching resources is improved. Through the services provided in the online education platform, along with the penetration and popularization of computer technology, the education industry gradually adopts various computer technical means to better assist the education, study and life of teachers and students.
With the accompanying security control problems of online educational data; on the one hand, with the continuous expansion of the scale of online education, in order to improve the operation efficiency of online education, it is generally required to share various types of teaching resources in some scenes, and these resource shares are safe shares within a limited scope; on the other hand, the online education resources are aimed at different age levels and different user terminals, and privacy protection of the education delivery terminal during online education is realized while the instantaneity and the interestingness of the online education resources are ensured; in fact, the existing online education mode basically does not perform safety control on the put-in data; this necessarily causes both privacy problems for the delivered resources and uncontrolled spreading of the delivered resources. These two problems are currently a major concern in the development of online education. The invention provides a certain degree of safety guarantee for the released data on the basis of not increasing the calculation complexity of the released terminal basically, avoids the loss of the basic safety of the released data, and greatly improves the variability of the released data and the controllability of the safety.
[ invention ]
In order to solve the above problems in the prior art, the present invention provides a data security control method and system, where the method includes:
step S1: the platform server acquires first multimedia data of a first terminal and second multimedia data of a second terminal; wherein: the user roles of the first terminal and the second terminal are different;
step S2: the platform server acquires third multimedia data; acquiring a delivery template, and organizing multimedia data based on the delivery template to form delivery data; wherein: the multimedia data type includes first multimedia data, second multimedia data, and third multimedia data;
the acquisition and delivery template specifically comprises the following steps: acquiring a corresponding delivery template based on a delivery plan of the delivery terminal; setting a plurality of areas aiming at a putting picture in a putting template, and setting an area presentation mode of each area and a corresponding user role type in the multimedia data type and the organization mode of the multimedia data type to be organized in each area in the plurality of areas;
step S3: acquiring a throwing role of a throwing terminal, and determining presentable throwing data aiming at the throwing role;
step S4: the platform server carries out safety processing on the put-in data based on the obtained first multimedia data sent by the first terminal or the obtained second multimedia data of the second terminal so as to obtain target data aiming at the put-in terminal; the security process for the delivery data is different for different delivery terminals; wherein: the delivery terminal comprises a first terminal or a second terminal;
the step S4: the method specifically comprises the following steps:
step S41: calculating a release safety coefficient of the release; the safety coefficient indicates the safety of data transmission and data delivery between the platform server and the delivery terminal; specific: calculating a safety factor S based on the following formulas (1) - (4); wherein: i n is the access terminal number of the delivering terminal; oa (Oa) in Is the security factor of the i n access terminal; o (O) o Is the safety coefficient of the terminal; TO in Is the access volume of the i n access terminal; pmtS1 is the maximum access amount of the delivery terminal; p1 is the transmission path security level; avT is the average storage time length of the put data in the put terminal; allowable storage duration of pmt put-in data; PT is a transmission path security threshold of p 1; a1 and a2 are weight coefficients; a3, a4, and a5 are equilibrium coefficients; EV is a constant value;
step S42: selecting different safety processing modes based on the release safety coefficient; carrying out safe processing on the put-in data to obtain target data;
step S5: the target data is sent to the delivery terminal; the delivery terminal obtains delivery data by executing the same safe processing mode on the received target data based on the first multimedia data or the second multimedia data sent by the delivery terminal; the same security process is the inverse of the security process as or similar to step S4.
Further, the first terminal and the second terminal are one or more.
Further, the multimedia data includes audio, video, text or/and image data.
Further, the platform server is an online education platform server.
Further, the platform server obtains the third multimedia data from the local.
Further, the access amount is a time length of access or an amount of data transmitted at the time of access.
Further, EV is a preset larger value.
A data security control platform comprising a processor coupled to a memory, the memory storing program instructions that when executed by the processor implement the data security control method.
A computer readable storage medium comprising a program which, when run on a computer, causes the computer to perform the data security control method.
A data security control system configured to perform the data security control method.
The beneficial effects of the invention include:
(1) Carrying out regional safety control on the delivery data through a delivery template, wherein the safety control is based on a data organization mode and meets a delivery plan and a delivery role; the delivery data aiming at different delivery terminals are integral and controllable in area, so that the flexibility of safety control is improved; meanwhile, a foundation is provided for subsequent differentiated security treatment based on an organization mode of putting templates; different from the mode of separately transmitting each multimedia data and organizing at the delivery terminal in the prior art, the variability of the delivery data and the controllability of the safety are greatly improved;
(2) Based on the characteristic that part of multimedia data included in the delivery data is the existing data of the delivery terminal at the local place, the multimedia data become a natural data material for safety control, and the available range of the delivery data is effectively controlled; furthermore, security processing with different complexity is provided for the delivery terminals with different security coefficients through a differentiated security processing mode; on the basis of basically not increasing the computational complexity of the delivery terminal, a certain degree of safety guarantee is provided for delivering data, and the loss of basic safety of the delivering data is avoided;
(3) The release safety conditions of the release terminal and the release link are comprehensively and quantitatively evaluated through the safety coefficient, so that a rapid judgment basis is provided for the subsequent differentiation processing of release data, and a real-time data basis is provided for quantitative calculation through an app buried point mode at the release terminal.
[ description of the drawings ]
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate and together with the description serve to explain the invention, if necessary:
fig. 1 is a schematic diagram of a data security control method according to the present invention.
[ detailed description ] of the invention
The present invention will now be described in detail with reference to the drawings and the specific embodiments thereof, wherein the exemplary embodiments and the description are for the purpose of illustrating the invention only and are not to be construed as limiting the invention.
The invention provides a data security control method and a system, as shown in figure 1, wherein the method comprises the following steps:
step S1: the platform server acquires first multimedia data of a first terminal and second multimedia data of a second terminal; wherein: the user roles of the first terminal and the second terminal are different;
preferably: the first terminal and the second terminal are one or more; for example: the first terminal is a teacher terminal; the second terminal is a student terminal; the first multimedia data corresponds to the input data expected by the teacher; the second multimedia data is the throwing data hoped by the students;
preferably: the multimedia data comprises audio, video, text and image data;
preferably: the platform server is an online education platform server;
preferably: the delivery data for the first terminal and the second terminal are the same;
preferably: before executing the step S1, the platform server determines a delivery terminal according to a delivery plan or delivery requirements; setting an app in a delivery terminal, setting a monitoring configuration item required by delivery in the app, and acquiring monitoring data corresponding to the monitoring configuration item in the delivery terminal through a buried point script in a scripting language app according to the monitoring configuration item; the monitoring data comprise access terminal safety coefficient, access quantity and the like of the release terminal and data related to safety control in the release process; acquiring basic security data such as the access quantity of the put-in terminal and the security coefficient in the access terminal in a scripting language through an operating system or an event script of a communication interface;
step S2: the platform server acquires third multimedia data; acquiring a delivery template, and organizing multimedia data based on the delivery template to form delivery data; wherein: the multimedia data includes first multimedia data, second multimedia data, and third multimedia data;
preferably: the platform server obtains third multimedia data from the local; the third multimedia data is the data which the platform server hopes to put in;
preferably: the delivery plan is set according to the delivery requirement of the delivery terminal, and the corresponding relation between the delivery plan and the delivery template is stored in advance; the delivery template can be obtained by inquiring the corresponding relation;
the acquisition and delivery template specifically comprises the following steps: acquiring a delivery template corresponding to the delivery plan based on the delivery terminal; setting a plurality of areas in a delivery template, setting a region presentation mode of each area and a role type corresponding to the region presentation mode of each area, wherein the multimedia data to be organized and the organization mode of the multimedia data are arranged in each area in the plurality of areas; wherein: the organization mode comprises the positions, the layers and the like of the combination modes such as splicing, embedding, stacking and the like; the area presentation mode is a presentation mode of area put-in data; the presentation mode comprises resolution, definition, visibility and the like; the covered data part in the combined multimedia data is lost because of being covered; that is, the delivery template specifies how data is to be presented on the delivery screen for which the data is to be delivered, which data is to be presented, and how the data is to be presented;
alternatively, the device can be used; the organization method comprises an overlapping mode of overlapping parts of the multimedia data; setting the priority order among the multimedia data so that the multimedia data with higher priority covers the multimedia data with lower priority;
step S3: acquiring a throwing role of a throwing terminal, and determining presentable throwing data aiming at the throwing role; the method comprises the following steps: acquiring a throwing role of a throwing terminal user, and carrying out local processing on throwing data aiming at the throwing role to obtain presentable throwing data; the execution of said step S3 is optional;
the determining the presentable delivery data for the delivery role specifically includes: sequentially acquiring the region presentation mode of each region in the delivery template and the corresponding role type; determining an area presentation mode corresponding to each area according to the putting role; processing the delivery data in each region based on the determined region presentation mode for each region to obtain presentation delivery data corresponding to the delivery role;
preferably: presetting each presentation mode of each region and a corresponding role type set thereof for each delivery template; the presentation effect of each presentable mode is different; when the presentation mode is original presentation, the put-in data in the area is not processed; by the method, the authority management of the delivery data of the delivery terminal can be carried out, so that the safety of the delivery data is controlled in a controllable range, and the presentability of the delivered data of the delivery terminal is in the controllable range even if the data of the delivery terminal is not allowed to be delivered;
preferably: the putting roles comprise an authorization role, an education role, a permission role and the like of an owner of the putting terminal;
according to the invention, the release data is subjected to regional safety control through the release template, wherein the safety control is based on a data organization mode and meets a release plan and a release role; the delivery data aiming at different delivery terminals are integral and controllable in area, so that the flexibility of safety control is improved; meanwhile, a foundation is provided for subsequent differentiated security treatment based on an organization mode of putting templates; meanwhile, the method is different from the mode of separately transmitting each multimedia data and organizing the multimedia data at the delivery terminal in the prior art, and the variability of the delivery data and the controllability of the safety are greatly improved;
step S4: the platform server carries out safe processing on the put-in data based on the acquired first multimedia data sent by the first terminal or the acquired second multimedia data of the second terminal so as to acquire target data; the security process for the delivery data is different for different delivery terminals; wherein: the delivery terminal comprises a first terminal or a second terminal;
the step S4: the method specifically comprises the following steps:
step S41: calculating a release safety coefficient of the release; the safety coefficient indicates the safety of data transmission and data delivery between the platform server and the delivery terminal; specific: calculating a safety factor S based on the following formulas (1) - (4); which is a kind ofIn (a): i n is the access terminal number of the delivering terminal; oa (Oa) in Is the security factor of the i n access terminal; o (O) o Is the safety coefficient of the terminal; TO in Is the access volume of the i n access terminal; pmtS1 is the maximum access amount of the delivery terminal; p1 is the error rate, leakage rate or reliability of the transmission path, etc.; avT is the average storage time length of the put data in the put terminal; allowable storage duration of pmt put-in data; PT is a transmission path security threshold of P1; a1 and a2 are weight coefficients; a3, a4, and a5 are equilibrium coefficients; EV is a constant value;
preferably: a1 =a2=0.5; a3 =0.8, a4=0.2;
preferably: EV is a preset larger value; for example: ev=1;
preferably: the access quantity is the time length of access or the data quantity transmitted during access; the access terminal comprises a mobile terminal, household universal equipment, storage equipment, communication equipment and the like;
preferably: the safety coefficients of the put-in terminal and the access terminal are preset values, and can be preset according to the software and hardware configuration of the terminals; the larger the safety coefficient value is, the more safe and reliable is, and vice versa;
the release safety conditions of the release terminal and the release link are comprehensively and quantitatively evaluated through the safety coefficient, so that a rapid judgment basis is provided for the subsequent differentiation processing of release data, and a real-time data basis is provided for quantitative calculation through an app buried point mode at the release terminal;
step S41 further includes, when S1>1, setting the security coefficient to be a minimum value, or stopping sending the delivery data to the delivery terminal, or delivering the preset advertisement data to the delivery terminal;
step S42: selecting different safety processing modes based on the release safety coefficient; carrying out safe processing on the put-in data to obtain target data;
step S421, when the put-in terminal is the first terminal, acquiring the same part of the put-in data as the first media data; when the delivery terminal is a second terminal, acquiring the same part of the delivery data as the second media data;
step S422, taking the non-identical part in the first media data or the second media data as a safe material part;
step S423: when the release safety coefficient is greater than the high safety threshold, adopting a first safety processing mode, and entering step S424; when the input safety coefficient is smaller than the low safety threshold, adopting a third safety processing mode, and entering a step S425, otherwise adopting a second safety processing mode, and entering a step S426; wherein: the calculation cost of the first safety processing mode is smaller than that of the second safety processing mode, and the calculation cost of the second safety processing mode is smaller than that of the third safety processing mode;
preferably: the low safety threshold and the high safety threshold are preset values; the low safety threshold is less than the high safety threshold;
step S424: carrying out safety processing on the put-in data by adopting a first safety processing mode; the method comprises the following steps: supplementing the safety material part into the put data in a supplementing mode to obtain target data; step S427 is entered;
the method comprises the steps of supplementing the safety material part into the put data in a supplementing mode to obtain target data, wherein the method comprises the following steps of: supplementing the safety material part to a specific position of the put-in data to obtain target data;
preferably: the specific location is a put data header;
step S425: the second safety processing mode carries out safety processing on the put-in data; the method comprises the following steps: supplementing the safety material part into the partitioned throwing data by adopting a partitioned supplementing mode to obtain target data; step S427 is entered;
the method adopts a block supplementing mode to supplement the safety material part into the partitioned input data to obtain target data, and specifically comprises the following steps: acquiring a current block mode, wherein the number of the block modes and the size of the block modes are set in the block mode; dividing the put data into blocks with the number of the modes based on the current block mode, and supplementing the safety material part to a specific position in the blocks according to the mode size;
preferably: the current blocking mode is a blocking mode agreed with the delivery terminal, the blocking mode can be changed along with the progress of time, and the changing mode can be agreed, for example: sequentially changing among a plurality of block modes, etc.;
the method comprises the steps of supplementing the safety material part to a specific position in the block according to the mode size, specifically: when the block size is smaller than the mode size, acquiring a part which is smaller than the mode size from the head part of the safety material part, and supplementing the part into the block from a specific position so that the supplemented block size meets the mode size; skipping the portion of security material that was replenished so that the next block replenishment is taken from the portion of security material that was not replenished; returning the head of the safety material part to circularly acquire the safety material part after the safety material part is used; when the block size is equal to or exceeds the mode size, the next block is directly carried out with the supplementing process without supplementing;
preferably: the specific position is a block data tail;
step S426: the third safety processing mode carries out safety processing on the put-in data; the method comprises the following steps: supplementing the safety material part into the partitioned input data by adopting a dynamic block supplementing mode to obtain target data; step S427 is entered;
the method comprises the steps of supplementing a safety material part into the partitioned input data by adopting a dynamic block supplementing mode to obtain target data, wherein the method comprises the following specific steps: determining a number of tiles based on a size of the secure material portion and a size of the put data; dividing the put material into put data blocks and safe material blocks with the block number based on the block number; alternately connecting the put-in data blocks and the safety material blocks in sequence to form target data;
preferably: dividing into uniform divisions based on the amount of data of the block;
the block quantity bl is determined based on the size Sz1 of the safety material part and the size Sz2 of the put data, and specifically: setting upOf course, the corresponding relation can be determined by setting default;
step S427: combining the partitioned and supplemented delivery data to obtain target data; the combination mode is to combine according to the division mode; for example: combining according to the original organization sequence of the put-in data; the same is true of the partitioning;
step S5: the target data is sent to the delivery terminal; the delivery terminal obtains delivery data by executing the same safe processing mode based on the first multimedia data or the second multimedia data sent by the delivery terminal; the same security process is the inverse process of the security process identical or similar to the step S4; specific: the target data is sent to the delivery terminal; the release terminal determines a safety processing mode based on the release safety coefficient, and obtains release data by executing the same safety processing mode; the same security process is the same or similar security process inverse process as step S4; since the delivery terminal itself holds own media data, after acquiring the delivery data, it can acquire the security material part according to the acquired target data; other terminals than the delivery target cannot analyze the delivery data; therefore, the safety control of the put-in data is ensured;
preferably: the release safety coefficient is calculated in the same way as the step S41 or sent along with the target data;
based on the characteristic that part of multimedia data included in the delivery data is the existing data of the delivery terminal at the local, the multimedia data becomes a natural safety control data material, and safety treatment with different complexity is provided for the delivery terminal with different safety coefficients through a differentiated safety treatment mode; on the basis of basically not increasing the computational complexity of the delivery terminal, a certain degree of safety guarantee is provided for delivering data, and the loss of basic safety of the delivering data is avoided;
based on the same inventive concept, the invention also provides a data security control system, the system comprising: a delivery terminal and a platform server; the system is used for realizing the data security control method;
preferably: the plurality of delivery terminals are in wireless or wired communication connection with the platform server;
preferably: the delivery terminal comprises a first terminal and a second terminal;
a computer program (also known as a program, software application, script, or code) can be written in any form of programming language, including compiled or interpreted languages, declarative or procedural languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, object or other unit suitable for use in a computing environment. The computer program may, but need not, correspond to a file in a file system. A program can be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program, or in multiple coordinated files (e.g., files that store one or more modules, subroutines, or portions of code). A computer program can be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a communication network.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that: the above embodiments are only for illustrating the technical aspects of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the above embodiments, it should be understood by those of ordinary skill in the art that: modifications and equivalents may be made to the specific embodiments of the invention without departing from the spirit and scope of the invention, which is intended to be covered by the claims.

Claims (9)

1. A method of data security control, the method comprising:
step S1: the platform server acquires first multimedia data of a first terminal and second multimedia data of a second terminal; wherein: the user roles of the first terminal and the second terminal are different;
step S2: the platform server acquires third multimedia data; acquiring a delivery template, and organizing multimedia data based on the delivery template to form delivery data; wherein: the multimedia data type includes first multimedia data, second multimedia data, and third multimedia data;
the acquisition and delivery template specifically comprises the following steps: acquiring a corresponding delivery template based on a delivery plan of the delivery terminal; setting a plurality of areas aiming at a putting picture in a putting template, and setting an area presentation mode of each area and a corresponding user role type in the multimedia data type and the organization mode of the multimedia data type to be organized in each area in the plurality of areas;
step S3: acquiring a throwing role of a throwing terminal, and determining presentable throwing data aiming at the throwing role;
step S4: the platform server carries out safety processing on the put-in data based on the obtained first multimedia data sent by the first terminal or the obtained second multimedia data of the second terminal so as to obtain target data aiming at the put-in terminal; the security process for the delivery data is different for different delivery terminals; wherein: the delivery terminal comprises a first terminal or a second terminal;
the step S4: the method specifically comprises the following steps:
step S41: calculating a release safety coefficient of the release; the safety coefficient indicates the platform serverAnd the safety of data transmission and data delivery between delivery terminals; specific: calculating a safety factor S based on the following formulas (1) - (4); wherein: in is the access terminal number of the delivering terminal; oa (Oa) in Is the security coefficient of the in-th access terminal; o (O) o Is the safety coefficient of the terminal; TO in Is the access amount of the in-th access terminal; pmtS1 is the maximum access amount of the delivery terminal; p1 is the transmission path security level; avT is the average storage time length of the put data in the put terminal; allowable storage duration of pmt put-in data; PT is a transmission path security threshold of p 1; a1 and a2 are weight coefficients; a3, a4, and a5 are equilibrium coefficients; EV is a constant value;
step S42: selecting different safety processing modes based on the release safety coefficient; carrying out safe processing on the put-in data to obtain target data;
step S5: the target data is sent to the delivery terminal; the delivery terminal obtains delivery data by executing the same safe processing mode on the received target data based on the first multimedia data or the second multimedia data sent by the delivery terminal; the same security process is the inverse of the security process as or similar to step S4.
2. The data security control method of claim 1, wherein the first terminal or the second terminal is one or more.
3. The data security control method of claim 2, wherein the multimedia data comprises audio, video, text or/and image data.
4. A data security control method according to claim 3, wherein the platform server is an online education platform server.
5. The data security control method of claim 4, wherein the platform server obtains the third multimedia data locally.
6. The data security control method according to claim 5, wherein the access amount is a time length of access or an amount of data transmitted at the time of access.
7. A data security control platform comprising a processor coupled to a memory, the memory storing program instructions that when executed by the processor implement the data security control method of any of claims 1-6.
8. A computer readable storage medium comprising a program which, when run on a computer, causes the computer to perform the data security control method according to any one of claims 1 to 6.
9. A data security control system, characterized in that the system is configured to perform the data security control method according to any of claims 1-6.
CN202311306518.3A 2023-10-10 2023-10-10 Data security control method and system Active CN117150530B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311306518.3A CN117150530B (en) 2023-10-10 2023-10-10 Data security control method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311306518.3A CN117150530B (en) 2023-10-10 2023-10-10 Data security control method and system

Publications (2)

Publication Number Publication Date
CN117150530A CN117150530A (en) 2023-12-01
CN117150530B true CN117150530B (en) 2024-03-22

Family

ID=88908203

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311306518.3A Active CN117150530B (en) 2023-10-10 2023-10-10 Data security control method and system

Country Status (1)

Country Link
CN (1) CN117150530B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8739234B1 (en) * 2007-03-13 2014-05-27 At&T Intellectual Property Ii, L.P. Process and method of providing a shared experience with multimedia content
CN107808295A (en) * 2016-09-09 2018-03-16 腾讯科技(深圳)有限公司 Multi-medium data put-on method and device
CN108540828A (en) * 2018-04-11 2018-09-14 西安万像电子科技有限公司 The processing method and system of multi-medium data, storage medium, processor

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150324370A1 (en) * 2014-05-11 2015-11-12 Laura Penrod Stock Multimedia portfolio management system and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8739234B1 (en) * 2007-03-13 2014-05-27 At&T Intellectual Property Ii, L.P. Process and method of providing a shared experience with multimedia content
CN107808295A (en) * 2016-09-09 2018-03-16 腾讯科技(深圳)有限公司 Multi-medium data put-on method and device
CN108540828A (en) * 2018-04-11 2018-09-14 西安万像电子科技有限公司 The processing method and system of multi-medium data, storage medium, processor

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
大数据下学习流访问控制安全模型及算法研究;黄河清;;闽南师范大学学报(自然科学版);20180629(02);全文 *

Also Published As

Publication number Publication date
CN117150530A (en) 2023-12-01

Similar Documents

Publication Publication Date Title
CA2802683C (en) Open and interactive e-learning system and method
KR101615171B1 (en) system and method for providing collaborative contents service based on augmented reality
WO2015062205A1 (en) Teaching method and system
CN107018191A (en) A kind of method and apparatus for controlling game
CN111596852B (en) Content editing method, system, computer readable storage medium and terminal device
EP3095105A1 (en) Computer-implemented frameworks and methodologies for enabling adaptive functionality based on a knowledge model
KR20180070131A (en) Apparatus and method for simulation trainning for guidance weapons
CN110148331A (en) A kind of teaching, training platform based on virtual reality
DE102021124862A1 (en) Verification of trustworthy communication using established communication channels
CN114596746A (en) Simulation education training system and learning method based on simulation education training system
KR20190100538A (en) Method, system and non-transitory computer-readable recording medium for supporting learning
CN117150530B (en) Data security control method and system
CN112492327A (en) Online education double-live-broadcast-room user migration method and device and storage medium
Al-Shehri Mobile learning in the Arab world: Contemporary and future implications
US20150364050A1 (en) Computer-implemented content repository and delivery system for online learning
Saraubon et al. System Design of Mobile Augmented Book.
CN106658208B (en) A kind of method and device of living broadcast interactive
KR20130100813A (en) On-line broadcasting learning system based on e-book and on-line broadcasting learning method
KR20210109850A (en) Apparatus for providing choreography content service
Skalka et al. Proposal of Artificial Intelligence Educational Model Using Active Learning in a Virtual Learning Environment
CN112561276A (en) Operation risk demonstration method and device, storage medium and electronic device
CN117422239A (en) Data rapid processing method and system
CN104104685B (en) A kind of picture retransmission method and device
Mishra et al. Ubiquitous learning: Future of e-Learning
CN109388498A (en) A kind of processing method of mutual exclusion, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant