CN117708863B - Equipment data encryption processing method based on Internet of things - Google Patents

Equipment data encryption processing method based on Internet of things Download PDF

Info

Publication number
CN117708863B
CN117708863B CN202410163899.2A CN202410163899A CN117708863B CN 117708863 B CN117708863 B CN 117708863B CN 202410163899 A CN202410163899 A CN 202410163899A CN 117708863 B CN117708863 B CN 117708863B
Authority
CN
China
Prior art keywords
browsing
latest
record
browsing record
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410163899.2A
Other languages
Chinese (zh)
Other versions
CN117708863A (en
Inventor
严松
刘利科
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jixian Information Technology Co ltd
Original Assignee
Beijing Jixian Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jixian Information Technology Co ltd filed Critical Beijing Jixian Information Technology Co ltd
Priority to CN202410163899.2A priority Critical patent/CN117708863B/en
Publication of CN117708863A publication Critical patent/CN117708863A/en
Application granted granted Critical
Publication of CN117708863B publication Critical patent/CN117708863B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a device data encryption processing method based on the Internet of things, which belongs to the technical field of data encryption and comprises the following steps: s1, acquiring the latest browsing records of a user, and acquiring a plurality of historical browsing records of the user and browsing behaviors of each historical browsing record from mobile terminal equipment; s2, determining a browsing heat value of the latest browsing record; and S3, generating an encryption key for the user according to the browsing hotness value of the latest browsing record, and carrying out encryption processing on the latest browsing record of the user by using the encryption key. The invention can comprehensively process the latest browsing record and a plurality of historical browsing records of the user, does not depend on the latest browsing record to determine the encryption key, comprehensively considers the whole browsing trace of the user, combines the browsing times and the browsing duration of the user browsing record, more accurately generates the targeted encryption key and improves the security level of encryption.

Description

Equipment data encryption processing method based on Internet of things
Technical Field
The invention belongs to the technical field of data encryption, and particularly relates to a device data encryption processing method based on the Internet of things.
Background
Searching and browsing by using mobile terminals (such as mobile phones or tablets) are increasingly popular, and people feel worry about safety of browsing traces on the mobile terminals: browsing records stored on a public platform may be compromised by hacking and theft from inside. Encrypting a user's browsing records is an urgent problem to be solved.
Disclosure of Invention
The invention provides a device data encryption processing method based on the Internet of things in order to solve the problems.
The technical scheme of the invention is as follows: the device data encryption processing method based on the Internet of things comprises the following steps:
s1, acquiring the latest browsing records of a user, and acquiring a plurality of historical browsing records of the user and browsing behaviors of each historical browsing record from mobile terminal equipment;
S2, determining a browsing heat value of the latest browsing record according to the latest browsing record of the user, a plurality of historical browsing records and browsing behaviors of each historical browsing record;
And S3, generating an encryption key for the user according to the browsing hotness value of the latest browsing record, and carrying out encryption processing on the latest browsing record of the user by using the encryption key.
Further, in S1, the browsing behavior includes a browsing duration of each history browsing record.
Further, S2 comprises the following sub-steps:
S21, calculating the text similarity between each historical browsing record and the latest browsing record by using a WMD algorithm, and taking all the historical browsing records with the text similarity greater than 0.5 as a reference browsing record set;
s22, determining a time length label value of a reference browsing record set;
S23, constructing a browsing duration matrix according to the duration label value of the reference browsing record set and the browsing duration of the latest browsing record;
S24, determining a browsing heat value of the latest browsing record according to the browsing time length matrix.
The beneficial effects of the above-mentioned further scheme are: in the invention, the WMD algorithm is an algorithm for measuring the similarity of texts by calculating the distance between words between texts on the basis of word2 vec. The method comprises the steps of utilizing a WMD algorithm to obtain historical browsing records related to the latest browsing record content, calculating a time length label value according to the browsing times and the browsing time lengths of the historical browsing records, and integrating the time length label value with the browsing time length of the latest browsing record to construct a browsing time length matrix, wherein the browsing condition of the content related to the latest browsing record can be effectively reflected by the matrix.
Further, in S22, the calculation formula of the time length label value T 0 of the reference browse record set is: ; wherein t n_m represents the M-th browsing duration of the N-th historical browsing record in the reference browsing record set, M represents the browsing times of the historical browsing records in the reference browsing record set, and N represents the number of the historical browsing records in the reference browsing record set.
Further, in S23, the expression of the browsing duration matrix X is:
,/>,/> ; where w 0 represents the weight of the reference browsing record set, w 1 represents the weight of the latest browsing record, T 0 represents the time length tag value of the reference browsing record set, T 1 represents the browsing time length of the latest browsing record, T max represents the maximum browsing time length in the reference browsing record set, and T min represents the minimum browsing time length in the reference browsing record set.
Further, in S24, the specific method for determining the browsing heat value of the latest browsing record is as follows: singular value decomposition is carried out on the browsing duration matrix, and the singular value obtained by the singular value decomposition is used as the browsing heat value of the latest browsing record.
Further, S3 comprises the following sub-steps:
s31, preprocessing the latest browsing record of the user;
s32, extracting keywords of the latest browsing record after pretreatment as a first target field, and extracting words with highest word frequency in the latest browsing record after pretreatment as a second target field;
S33, determining a browsing content preference value according to the first target field and the second target field;
And S34, generating an encryption key for the user according to the browsing content preference value and the browsing heat value of the latest browsing record, and carrying out encryption processing on the latest browsing record of the user by utilizing the encryption key.
The beneficial effects of the above-mentioned further scheme are: in the invention, because the latest browsing record of the user is preprocessed (such as removing stop words, punctuation marks and the like), the keywords of the browsing content in the latest browsing record of the user and the word with the highest word frequency are used as target fields, the two target fields can better reflect the browsing preference of the user, and then the encryption key can be generated in a targeted way by combining the browsing heat value of the user and the identity of the user, so that the encryption grade is improved.
Further, in S33, the calculation formula of the browsing content preference value L is:
; in the formula, S represents the number of words of the latest browsing record after preprocessing, U represents the word vector of the first target field, V represents the word vector of the second target field, and exp (-) represents an exponential function.
Further, in S34, the expression of the encryption key G is:
; in the formula, I represents an identity corresponding to the latest browsing record of the user, L represents a browsing content preference value, hash (·) represents a hash function, and x represents a browsing heat value of the latest browsing record.
The beneficial effects of the invention are as follows: the invention can comprehensively process the latest browsing record and a plurality of historical browsing records of the user, does not depend on the latest browsing record to determine the encryption key, comprehensively considers the whole browsing trace of the user, combines the browsing times and the browsing duration of the user browsing record, more accurately generates the targeted encryption key and improves the security level of encryption.
Drawings
Fig. 1 is a flowchart of a device data encryption processing method based on the internet of things.
Detailed Description
Embodiments of the present invention are further described below with reference to the accompanying drawings.
As shown in fig. 1, the invention provides a device data encryption processing method based on the internet of things, which comprises the following steps:
s1, acquiring the latest browsing records of a user, and acquiring a plurality of historical browsing records of the user and browsing behaviors of each historical browsing record from mobile terminal equipment;
S2, determining a browsing heat value of the latest browsing record according to the latest browsing record of the user, a plurality of historical browsing records and browsing behaviors of each historical browsing record;
And S3, generating an encryption key for the user according to the browsing hotness value of the latest browsing record, and carrying out encryption processing on the latest browsing record of the user by using the encryption key.
In the embodiment of the present invention, in S1, the browsing behavior includes a browsing duration of each history browsing record.
In an embodiment of the present invention, S2 comprises the following sub-steps:
S21, calculating the text similarity between each historical browsing record and the latest browsing record by using a WMD algorithm, and taking all the historical browsing records with the text similarity greater than 0.5 as a reference browsing record set;
s22, determining a time length label value of a reference browsing record set;
S23, constructing a browsing duration matrix according to the duration label value of the reference browsing record set and the browsing duration of the latest browsing record;
S24, determining a browsing heat value of the latest browsing record according to the browsing time length matrix.
In the invention, the WMD algorithm is an algorithm for measuring the similarity of texts by calculating the distance between words between texts on the basis of word2 vec. The method comprises the steps of utilizing a WMD algorithm to obtain historical browsing records related to the latest browsing record content, calculating a time length label value according to the browsing times and the browsing time lengths of the historical browsing records, and integrating the time length label value with the browsing time length of the latest browsing record to construct a browsing time length matrix, wherein the browsing condition of the content related to the latest browsing record can be effectively reflected by the matrix.
In the embodiment of the present invention, in S22, the calculation formula of the duration tag value T 0 of the reference browse record set is:
; wherein t n_m represents the M-th browsing duration of the N-th historical browsing record in the reference browsing record set, M represents the browsing times of the historical browsing records in the reference browsing record set, and N represents the number of the historical browsing records in the reference browsing record set.
In the embodiment of the present invention, in S23, the expression of the browsing duration matrix X is:
,/>,/> ; where w 0 represents the weight of the reference browsing record set, w 1 represents the weight of the latest browsing record, T 0 represents the time length tag value of the reference browsing record set, T 1 represents the browsing time length of the latest browsing record, T max represents the maximum browsing time length in the reference browsing record set, and T min represents the minimum browsing time length in the reference browsing record set.
In the embodiment of the present invention, in S24, a specific method for determining the browsing popularity value of the latest browsing record is as follows: singular value decomposition is carried out on the browsing duration matrix, and the singular value obtained by the singular value decomposition is used as the browsing heat value of the latest browsing record.
In an embodiment of the present invention, S3 comprises the following sub-steps:
s31, preprocessing the latest browsing record of the user;
s32, extracting keywords of the latest browsing record after pretreatment as a first target field, and extracting words with highest word frequency in the latest browsing record after pretreatment as a second target field;
S33, determining a browsing content preference value according to the first target field and the second target field;
And S34, generating an encryption key for the user according to the browsing content preference value and the browsing heat value of the latest browsing record, and carrying out encryption processing on the latest browsing record of the user by utilizing the encryption key.
In the invention, because the latest browsing record of the user is preprocessed (such as removing stop words, punctuation marks and the like), the keywords of the browsing content in the latest browsing record of the user and the word with the highest word frequency are used as target fields, the two target fields can better reflect the browsing preference of the user, and then the encryption key can be generated in a targeted way by combining the browsing heat value of the user and the identity of the user, so that the encryption grade is improved.
In the embodiment of the present invention, in S33, the calculation formula of the browsing content preference value L is:
; in the formula, S represents the number of words of the latest browsing record after preprocessing, U represents the word vector of the first target field, V represents the word vector of the second target field, and exp (-) represents an exponential function.
In the embodiment of the present invention, in S34, the expression of the encryption key G is:
; in the formula, I represents an identity corresponding to the latest browsing record of the user, L represents a browsing content preference value, hash (·) represents a hash function, and x represents a browsing heat value of the latest browsing record.
Those of ordinary skill in the art will recognize that the embodiments described herein are for the purpose of aiding the reader in understanding the principles of the present invention and should be understood that the scope of the invention is not limited to such specific statements and embodiments. Those of ordinary skill in the art can make various other specific modifications and combinations from the teachings of the present disclosure without departing from the spirit thereof, and such modifications and combinations remain within the scope of the present disclosure.

Claims (2)

1. The equipment data encryption processing method based on the Internet of things is characterized by comprising the following steps of:
s1, acquiring the latest browsing records of a user, and acquiring a plurality of historical browsing records of the user and browsing behaviors of each historical browsing record from mobile terminal equipment;
S2, determining a browsing heat value of the latest browsing record according to the latest browsing record of the user, a plurality of historical browsing records and browsing behaviors of each historical browsing record;
S3, generating an encryption key for the user according to the browsing hotness value of the latest browsing record, and carrying out encryption processing on the latest browsing record of the user by using the encryption key;
the step S2 comprises the following substeps:
S21, calculating the text similarity between each historical browsing record and the latest browsing record by using a WMD algorithm, and taking all the historical browsing records with the text similarity greater than 0.5 as a reference browsing record set;
s22, determining a time length label value of a reference browsing record set;
S23, constructing a browsing duration matrix according to the duration label value of the reference browsing record set and the browsing duration of the latest browsing record;
s24, determining a browsing heat value of the latest browsing record according to the browsing time length matrix;
In S22, the calculation formula of the time length label value T 0 of the reference browse record set is as follows: ; wherein t n_m represents the M-th browsing duration of the N-th historical browsing record in the reference browsing record set, M represents the browsing times of the historical browsing records in the reference browsing record set, and N represents the number of the historical browsing records in the reference browsing record set;
in S23, the expression of the browsing duration matrix X is: ,/> ; wherein w 0 represents the weight of the reference browsing record set, w 1 represents the weight of the latest browsing record, T 0 represents the time length label value of the reference browsing record set, T 1 represents the browsing time length of the latest browsing record, T max represents the maximum browsing time length in the reference browsing record set, and T min represents the minimum browsing time length in the reference browsing record set;
in S24, the specific method for determining the browsing heat value of the latest browsing record is as follows: singular value decomposition is carried out on the browsing duration matrix, and a singular value obtained by the singular value decomposition is used as a browsing heat value of the latest browsing record;
The step S3 comprises the following substeps:
s31, preprocessing the latest browsing record of the user;
s32, extracting keywords of the latest browsing record after pretreatment as a first target field, and extracting words with highest word frequency in the latest browsing record after pretreatment as a second target field;
S33, determining a browsing content preference value according to the first target field and the second target field;
S34, generating an encryption key for the user according to the browsing content preference value and the browsing heat value of the latest browsing record, and carrying out encryption processing on the latest browsing record of the user by utilizing the encryption key;
In S33, the calculation formula of the browsing content preference value L is: ; wherein S represents the number of words of the latest browsing record after preprocessing, U represents the word vector of the first target field, V represents the word vector of the second target field, exp (-) represents an exponential function;
In S34, the expression of the encryption key G is: ; in the formula, I represents an identity corresponding to the latest browsing record of the user, L represents a browsing content preference value, hash (·) represents a hash function, and x represents a browsing heat value of the latest browsing record.
2. The method for encrypting device data based on the internet of things according to claim 1, wherein in S1, the browsing behavior includes a browsing duration of each history browsing record.
CN202410163899.2A 2024-02-05 2024-02-05 Equipment data encryption processing method based on Internet of things Active CN117708863B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410163899.2A CN117708863B (en) 2024-02-05 2024-02-05 Equipment data encryption processing method based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410163899.2A CN117708863B (en) 2024-02-05 2024-02-05 Equipment data encryption processing method based on Internet of things

Publications (2)

Publication Number Publication Date
CN117708863A CN117708863A (en) 2024-03-15
CN117708863B true CN117708863B (en) 2024-04-19

Family

ID=90162869

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410163899.2A Active CN117708863B (en) 2024-02-05 2024-02-05 Equipment data encryption processing method based on Internet of things

Country Status (1)

Country Link
CN (1) CN117708863B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101110098A (en) * 2007-08-31 2008-01-23 深圳兆日技术有限公司 Generation and management method for digital content use trace based on reliable computing technology
CN102761573A (en) * 2011-04-28 2012-10-31 北京随视传媒科技有限公司 Media information user browsing behavioral data monitoring method
CN104391974A (en) * 2014-12-05 2015-03-04 北京奇虎科技有限公司 Browser and browser bookmark data processing method
CN105357216A (en) * 2015-11-30 2016-02-24 上海斐讯数据通信技术有限公司 Secure access method and system
CN106845253A (en) * 2016-12-27 2017-06-13 迈普通信技术股份有限公司 Historical operation recording of encrypted method and device
CN109583472A (en) * 2018-10-30 2019-04-05 中国科学院计算技术研究所 A kind of web log user identification method and system
CN113328979A (en) * 2020-02-29 2021-08-31 华为技术有限公司 Method and device for recording access behaviors
CN116541778A (en) * 2023-07-04 2023-08-04 四川集鲜数智供应链科技有限公司 Equipment data processing and caching method based on Internet of things
CN116955833A (en) * 2023-09-20 2023-10-27 四川集鲜数智供应链科技有限公司 User behavior analysis system and method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105589905B (en) * 2014-12-26 2019-06-18 中国银联股份有限公司 The analysis of user interest data and collection system and its method
US10958532B2 (en) * 2018-11-09 2021-03-23 Servicenow, Inc. Machine learning based discovery of software as a service
CN114816179A (en) * 2021-01-18 2022-07-29 腾讯科技(深圳)有限公司 Historical browsing content display method and device, electronic equipment and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101110098A (en) * 2007-08-31 2008-01-23 深圳兆日技术有限公司 Generation and management method for digital content use trace based on reliable computing technology
CN102761573A (en) * 2011-04-28 2012-10-31 北京随视传媒科技有限公司 Media information user browsing behavioral data monitoring method
CN104391974A (en) * 2014-12-05 2015-03-04 北京奇虎科技有限公司 Browser and browser bookmark data processing method
CN105357216A (en) * 2015-11-30 2016-02-24 上海斐讯数据通信技术有限公司 Secure access method and system
CN106845253A (en) * 2016-12-27 2017-06-13 迈普通信技术股份有限公司 Historical operation recording of encrypted method and device
CN109583472A (en) * 2018-10-30 2019-04-05 中国科学院计算技术研究所 A kind of web log user identification method and system
CN113328979A (en) * 2020-02-29 2021-08-31 华为技术有限公司 Method and device for recording access behaviors
CN116541778A (en) * 2023-07-04 2023-08-04 四川集鲜数智供应链科技有限公司 Equipment data processing and caching method based on Internet of things
CN116955833A (en) * 2023-09-20 2023-10-27 四川集鲜数智供应链科技有限公司 User behavior analysis system and method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"BOEW: A Content-Based Image Retrieval Scheme Using Bag-of-Encrypted-Words in Cloud Computing";Z. Xia;IEEE Transactions on Services Computing;20190710;第15卷(第1期);202-214 *
"基于兴趣与保护隐私的在线社区推荐技术研究";李东胜;中国博士学位论文全文数据库 信息科技辑;20130315(第2013 年 第03期);I139-13 *
一种基于用户兴趣模型的可搜索加密方案;叶淑阳;陈勤;李亚龙;朱乾徽;;现代计算机(专业版);20180115(第02期);3-8 *

Also Published As

Publication number Publication date
CN117708863A (en) 2024-03-15

Similar Documents

Publication Publication Date Title
US10645081B2 (en) Method and apparatus for authenticating user
CN109688160B (en) Data encryption transmission control method and device, computer equipment and storage medium
CN107491534A (en) Information processing method and device
US20170351687A1 (en) Method and system for enhanced query term suggestion
CN107346336A (en) Information processing method and device based on artificial intelligence
CN108090351B (en) Method and apparatus for processing request message
CN113761577B (en) Big data desensitization method, device, computer equipment and storage medium
CN115051817B (en) Phishing detection method and system based on multi-mode fusion characteristics
CN111652622A (en) Risk website identification method and device and electronic equipment
CN107943895A (en) Information-pushing method and device
CN111753551A (en) Information generation method and device based on word vector generation model
CN111783132A (en) SQL sentence security detection method, device, equipment and medium based on machine learning
CN104915399A (en) Recommended data processing method based on news headline and recommended data processing method system based on news headline
US20130260722A1 (en) Anti-theft system for mobile electronic device and method thereof
CN110674300A (en) Method and apparatus for generating information
CN117708863B (en) Equipment data encryption processing method based on Internet of things
CN113869063A (en) Data recommendation method and device, electronic equipment and storage medium
CN111859970B (en) Method, apparatus, device and medium for processing information
CN112417874A (en) Named entity recognition method and device, storage medium and electronic device
CN108256078A (en) Information acquisition method and device
CN108319659B (en) Social contact discovery method based on encrypted image quick search
CN116431912A (en) User portrait pushing method and device
CN113780318B (en) Method, device, server and medium for generating prompt information
CN112733645B (en) Handwritten signature verification method, handwritten signature verification device, computer equipment and storage medium
CN115203391A (en) Information retrieval method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant