CN118018336A - Data transmission method, server and storage medium - Google Patents

Data transmission method, server and storage medium Download PDF

Info

Publication number
CN118018336A
CN118018336A CN202410427342.5A CN202410427342A CN118018336A CN 118018336 A CN118018336 A CN 118018336A CN 202410427342 A CN202410427342 A CN 202410427342A CN 118018336 A CN118018336 A CN 118018336A
Authority
CN
China
Prior art keywords
data
data transmission
determining
server
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202410427342.5A
Other languages
Chinese (zh)
Other versions
CN118018336B (en
Inventor
张晨
郁雷
杨晓亮
施凯文
时宗胜
蒋剑
王飞
杨鹏飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Zhongtian Internet Technology Co ltd
Original Assignee
Jiangsu Zhongtian Internet Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Zhongtian Internet Technology Co ltd filed Critical Jiangsu Zhongtian Internet Technology Co ltd
Priority to CN202410427342.5A priority Critical patent/CN118018336B/en
Publication of CN118018336A publication Critical patent/CN118018336A/en
Application granted granted Critical
Publication of CN118018336B publication Critical patent/CN118018336B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Telephonic Communication Services (AREA)
  • Storage Device Security (AREA)

Abstract

The application belongs to the technical field of data processing, and provides a data transmission method, a server and a storage medium. When receiving a data transmission request sent by electronic equipment, the method locks all databases; generating a verification score of the data transmission request, and acquiring a safety threshold value according to a triggering user of the data transmission request; if the verification score is greater than or equal to the safety threshold, determining a decryption key of the data transmission request according to the sending time and the sending mode of the data transmission request, the user identification of the triggering user and the transmission times of the data transmission from the electronic equipment to the server; invoking a decryption key to decrypt the data ciphertext in the data transmission request to obtain transmission data; if the transmission data does not include preset sensitive data, determining a target database from all databases; unlocking the target database, and storing the transmission data into the target database. The method can improve the safety of data transmission.

Description

Data transmission method, server and storage medium
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a data transmission method, a server, and a storage medium.
Background
Currently, as enterprise devices increase, device-related monitoring data also increases substantially. For better storage of such data, such data is typically transmitted to a server for storage. However, since the electronic device cannot normally perform an effective and illegal attack, when the electronic device transmits data to the server, there is a problem that the transmitted data and the data in the server are easily leaked.
Disclosure of Invention
The application provides a data transmission method, a server and a storage medium, which are used for solving the technical problem that when electronic equipment transmits data to the server, the transmitted data and the data in the server are easy to leak.
An embodiment of the present application provides a data transmission method, applied to a server, where the method includes: when a data transmission request sent by electronic equipment is received, all databases in the server are locked; generating a verification score of the data transmission request, and acquiring a safety threshold value according to a trigger user of the data transmission request; if the verification score is greater than or equal to the safety threshold, determining a decryption key of the data transmission request according to the sending time and sending mode of the data transmission request, the user identification of the triggering user and the transmission times of the data transmission from the electronic equipment to the server; invoking the decryption key to decrypt the data ciphertext in the data transmission request to obtain transmission data; if the transmission data does not include preset sensitive data, determining a target database from all databases; unlocking the target database, and storing the transmission data into the target database.
According to an embodiment of the present application, the locking all databases in the server includes: acquiring a preset closing program; acquiring database names of all databases; filling the database names into the preset closing program to obtain a locking program corresponding to each database; and running a locking program corresponding to each database to lock all the databases.
According to an embodiment of the present application, the generating the verification score of the data transmission request includes: determining a channel for the electronic equipment to collect data in the data transmission request, and acquiring a monitoring result of the channel; determining a consensus result of a blockchain where the electronic equipment is located on the electronic equipment, and determining a safe transmission proportion of the electronic equipment; and determining the verification score according to the monitoring result, the consensus result and the safe transmission proportion.
According to an embodiment of the present application, the determining the verification score according to the monitoring result, the consensus result, and the safe transmission ratio includes: if the monitoring result comprises an abnormal result, determining an abnormal duty ratio of the abnormal result in the monitoring result; determining the node number of the nodes in the blockchain for trust of the electronic equipment according to the consensus result, and determining the trust duty ratio of the blockchain to the electronic equipment according to the node number and the total number of all the nodes in the blockchain; based on the obtained first weight group, carrying out weighted sum operation on the abnormal duty ratio, the trust duty ratio and the safe transmission proportion to obtain the verification score; or if the monitoring result does not comprise an abnormal result, carrying out weighted sum operation on the trust duty ratio and the safe transmission proportion based on the acquired second weight group to obtain the verification score.
According to an embodiment of the present application, after storing the transmission data in the target database, the method further includes: acquiring feedback information of the data transmission request by the terminal equipment communicated with the server; identifying mood information of the feedback information; if the emotion information is negative information, determining the feedback quantity of feedback information corresponding to the negative information; and if the feedback quantity is larger than the set quantity, adjusting the safety threshold according to the feedback quantity.
According to an embodiment of the present application, the determining the decryption key of the data transmission request according to the sending time and sending manner of the data transmission request, the user identifier of the triggering user, and the number of times of data transmission from the electronic device to the server includes: obtaining a mode value corresponding to the transmission mode, and obtaining an identification value corresponding to the user identification; determining a time value corresponding to the sending time, and determining a first value according to the mode value, the identification value, the time value and the transmission times; obtaining a second numerical value which is prime with the first numerical value, and inputting the first numerical value and the second numerical value into a first operation layer in a key generation network model to obtain a first operation value; obtaining a third numerical value which is prime with the first operation value, and inputting the third numerical value and the first operation value into a second operation layer in the key generation network model to obtain a second operation value; and determining the decryption key according to the second operation value and the numerical product of the first numerical value and the second numerical value.
According to an embodiment of the present application, the invoking the decryption key to decrypt the data ciphertext in the data transmission request includes: dividing the data ciphertext packet into a plurality of ciphertext fragments; invoking the second operation value, the numerical product and a decryption algorithm corresponding to the key generation network model to decrypt the ciphertext fragments respectively to obtain multi-section output data; and splicing the multiple sections of output data to obtain the transmission data.
According to an embodiment of the present application, the determining the target database from the all databases includes: determining occupied memory of stored data in each database, and determining storage efficiency of each database; predicting the waiting time of each database for executing storage on the transmission data; determining a database score of each database according to the occupied memory, the storage efficiency and the waiting time length; and determining the database with the largest database score as the target database.
A second aspect of an embodiment of the present application provides a data transmission device, which operates in a server, and the device includes: the locking unit is used for locking all databases in the server when receiving a data transmission request sent by the electronic equipment; the generation unit is used for generating the verification score of the data transmission request and acquiring a safety threshold value according to the triggering user of the data transmission request; the determining unit is used for determining a decryption key of the data transmission request according to the sending time and the sending mode of the data transmission request, the user identification of the triggering user and the transmission times of the electronic equipment for transmitting data to the server if the verification score is greater than or equal to the safety threshold; the calling unit is used for calling the decryption key to decrypt the data ciphertext in the data transmission request to obtain transmission data; the determining unit is further configured to determine a target database from the all databases if the transmission data does not include preset sensitive data; and the storage unit is used for unlocking the target database and storing the transmission data into the target database.
A third aspect of an embodiment of the present application provides a server, including: a memory storing computer readable instructions; and a processor executing computer readable instructions stored in the memory to implement the data transmission method.
A fourth aspect of the embodiments of the present application provides a computer-readable storage medium having stored therein computer-readable instructions that are executed by a processor in a server to implement the data transmission method.
According to the technical scheme, when the data transmission request is received, all databases in the server are locked, the leakage risk of the data in the server can be effectively prevented, and when the verification score of the data transmission request is greater than or equal to the corresponding safety threshold, the decryption key of the data transmission request is dynamically generated by combining the sending time, the sending mode, the user identification and the transmission times. According to the embodiment of the application, after the authority of the data transmission request passes verification, the data ciphertext can be decrypted through the dynamically generated decryption key, so that the data ciphertext can be decrypted only by a trigger user with legal authority, the safety of data in a server is improved, meanwhile, the data ciphertext is decrypted through the dynamically generated decryption key, the leakage of transmission data caused by the leakage of the decryption key can be avoided, and the safety of the transmission data is improved. According to the embodiment of the application, the determined target database is unlocked only when the transmission data does not comprise the preset sensitive data, so that the condition that the transmission data comprising the preset sensitive data is leaked can be avoided, and the safety of the transmission data comprising the preset sensitive data is further improved. In addition, the embodiment of the application can realize the rapid storage of the transmission data by storing the transmission data into the target database.
Drawings
Fig. 1 is a schematic structural diagram of a server according to a data transmission method according to an embodiment of the present application.
Fig. 2 is a flowchart of a data transmission method according to an embodiment of the present application.
FIG. 3 is a flow chart of the determination of a validation score provided by an embodiment of the application.
Fig. 4 is a flowchart of a data transmission method according to another embodiment of the present application.
Fig. 5 is a flowchart of a data transmission method according to another embodiment of the present application.
Fig. 6 is a functional block diagram of a data transmission device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described in detail with reference to the accompanying drawings and specific embodiments.
In the present application, "at least one" means one or more, and "a plurality" means two or more. "and/or", describes an association relationship of an association object, and the representation may have three relationships, for example, a and/or B may represent: a alone, a and B together, and B alone, wherein a, B may be singular or plural. The terms "first," "second," "third," "fourth" and the like in the description and in the claims and drawings, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order.
In embodiments of the application, words such as "exemplary" or "such as" are used to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" or "e.g." in an embodiment should not be taken as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete fashion. The following embodiments and features of the embodiments may be combined with each other without conflict.
Fig. 1 is a schematic structural diagram of a server according to a data transmission method according to an embodiment of the present application.
In an embodiment of the present application, the data transmission method is applied to one or more servers 1, and the servers 1 include, but are not limited to, a memory 12, a processor 13, and computer readable instructions, such as a data transmission program, stored in the memory 12 and executable on the processor 13.
It will be appreciated by those skilled in the art that the schematic diagram is merely an example of the server 1 and does not constitute a limitation of the server 1, and may include more or fewer components than shown, or may combine certain components, or different components, e.g. the server 1 may further include input-output devices, network access devices, buses, etc.
The Processor 13 may be a central processing unit (Central Processing Unit, CPU), other general purpose Processor, digital signal Processor (DIGITAL SIGNAL Processor, DSP), application SPECIFIC INTEGRATED Circuit (ASIC), field-Programmable gate array (Field-Programmable GATE ARRAY, FPGA) or other Programmable logic device, discrete gate or transistor logic device, discrete hardware components, etc. The general purpose processor may be a microprocessor or a processor, or any conventional processor, etc., and the processor 13 is an operation core and a control center of the server 1, connects various parts of the entire server 1 using various interfaces and lines, and executes an operating system of the server 1 and various installed applications, program codes, etc.
The memory 12 may be an external memory and/or an internal memory of the server 1. Further, the memory 12 may be a physical memory, such as a memory bank, a TF card (Trans-FLASH CARD), or the like.
In connection with fig. 2-5, the memory 12 in the server 1 stores computer readable instructions that the processor 13 can execute to implement the various processes shown in fig. 2-5 to implement the data transmission method.
Fig. 2 is a flowchart of a data transmission method according to an embodiment of the present application. The order of the steps in the flowchart may be changed and some steps may be omitted according to various needs. The data transmission method provided by the embodiment of the application is applied to the server and comprises the following steps of.
S201, when a data transmission request sent by the electronic equipment is received, all databases in the server are locked.
In at least one embodiment of the present application, the electronic device may be any electronic product that can interact with a user in a human-computer manner, such as a personal computer, a tablet computer, or a smart phone. The data transfer request may be generated by a user triggering on the electronic device, e.g., the user triggering the generation of the data transfer request through a control of the electronic device. The data transmission request may also be automatically triggered and generated after the electronic device collects a certain amount of data, for example, the electronic device accumulates 1G data collected, and the electronic device automatically generates the data transmission request. All databases in the server include, but are not limited to: mySQL database, mongoDB database, hbase database, etc.
In at least one embodiment of the present application, the server obtains a preset shutdown program and obtains database names of all databases. And the server fills the database names into a preset closing program to obtain a locking program corresponding to each database, and operates the locking program corresponding to each database to lock all the databases. The preset closing program comprises a program capable of controlling the preset function to be closed, and correspondingly, the locking program corresponding to the database comprises a program capable of controlling the database function to be closed. According to the embodiment of the application, the locking program is generated through the preset closing program, and the preset closing program is not required to be regenerated, so that the locking program can be generated rapidly, and further, the functions in the database can be closed through running the locking program corresponding to each database, and the leakage of the data in the database is effectively prevented.
S202, generating a verification score of the data transmission request, and acquiring a safety threshold value according to the triggering user of the data transmission request.
In at least one embodiment of the application, the verification score indicates the acceptance of the transmission rights of the server to the electronic device, the higher the verification score, the higher the acceptance of the server to the electronic device; the lower the validation score, the lower the server's acceptance of the electronic device. The server generating a validation score for the data transmission request includes: the server determines a channel for the electronic equipment to collect data in the data transmission request, and acquires a monitoring result of the channel. And the server determines a consensus result of the blockchain where the electronic equipment is located to the electronic equipment and determines the safe transmission proportion of the electronic equipment. And the server determines a verification score according to the monitoring result, the consensus result and the safe transmission proportion. The data in the data transmission request may include, but is not limited to: inventory data of the device; monitoring data of the device, such as status parameters of operation of the device, sensor data of the device, etc. The channel includes a path between the electronic device and the source of the data in the data transfer request, and the monitoring result includes status information of the channel, such as an abnormal alarm of the channel, etc. The consensus result includes a trust node of the electronic device in the blockchain. The safe transmission proportion represents the ratio of the successful times of the electronic equipment for transmitting data to the server to the transmission times, wherein the transmission times represent the total times of the electronic equipment for transmitting data to the server at the historical moment, the transmission times are the sum of the successful times and the failure times of the electronic equipment for transmitting data to the server, the successful times are the times of the electronic equipment for transmitting data to the server successfully, and the failure times are the times of the electronic equipment for not transmitting data to the server successfully. According to the embodiment of the application, the data transmission request can be analyzed from multiple dimensions of the electronic equipment by combining the monitoring result of the channel, the consensus result of the blockchain on the electronic equipment and the safe transmission proportion of the electronic equipment, so that the determination rationality of the verification score is improved.
Specifically, the server determining the secure transmission ratio of the electronic device includes: the server acquires transmission logs from a log library of the electronic equipment according to the preset identification and the identification code of the server, counts the number of the transmission logs as transmission times, counts the number of logs which are successfully executed in the transmission logs as success times, and determines the safe transmission proportion according to the ratio of the success times to the transmission times. The preset identifier is used for indicating a data transmission event. According to the embodiment of the application, the transmission log can be accurately positioned through the preset identification and the identification code of the server, and the safe transmission proportion can be accurately determined through analyzing the relation between the successful times and the transmission times.
In particular, the specific flow of the server to determine the validation score may be described in detail below with respect to the flow shown in FIG. 3.
In at least one embodiment of the present application, the triggering user is a user that triggers the generation of the data transmission request, and if the data transmission request is automatically generated when the electronic device accumulates the collected data to a certain amount, the triggering user may be a binding user of the electronic device. The security threshold may be determined according to the level of the corresponding trigger user, and the level of any user may be predetermined. Different levels of job correspond to different security thresholds, and the higher the level of job triggering the user, the smaller the corresponding security threshold.
And S203, if the verification score is greater than or equal to the safety threshold, determining a decryption key of the data transmission request according to the sending time and the sending mode of the data transmission request, the user identification of the triggering user and the transmission times of the data transmission from the electronic equipment to the server.
In at least one embodiment of the application, the sending time indicates the time at which the electronic device sent the data transmission request to the server. The transmission mode indicates a mode of the electronic device transmitting a data transmission request to the server, and the transmission mode includes a POST mode, a PUT mode, and the like. The user identification is used to uniquely identify the triggering user. The decryption key is used to decrypt the ciphertext of the data in the data transfer request.
In at least one embodiment of the present application, the determining, by the server, the decryption key of the data transmission request according to the sending time and sending manner of the data transmission request, the user identifier of the triggering user, and the number of times of data transmission from the electronic device to the server includes: the server obtains the mode value corresponding to the sending mode and obtains the identification value corresponding to the user identification. The server determines a time value corresponding to the transmission time, and determines a first value according to the mode value, the identification value, the time value and the transmission times. The server obtains a second numerical value which is prime with the first numerical value, and inputs the first numerical value and the second numerical value into a first operation layer in the key generation network model to obtain a first operation value. The server obtains a third numerical value which is prime with the first operation value, and inputs the third numerical value and the first operation value into a second operation layer in the key generation network model to obtain a second operation value. And determining the decryption key according to the second operation value and the numerical product of the first numerical value and the second numerical value.
The mode value, the identification value and the time value can be obtained from different mapping tables, and the mapping tables store the mapping relation between the transmission mode and the mode value, or the mapping relation between the user identification and the identification value, or the mapping relation between the transmission time and the time value. The first numerical value can be obtained by calling a preset formula to calculate the numerical value of the mode, the numerical value of the identifier, the numerical value of the time and the transmission times, wherein the preset formula can be a sum calculation formula, a cumulative calculation formula and the like. The key generation network model comprises a first operation layer and a second operation layer, the first operation layer can be constructed according to a first configuration formula, for example, the first configuration formula can be an Euler formula, and the second operation layer can be constructed according to a second configuration formula.
In this embodiment, by combining the transmission time, the transmission mode, the user identifier and the transmission times, different keys can be generated for different data transmission requests, so as to generate a decryption key that is not easy to crack.
S204, the decryption key is called to decrypt the data ciphertext in the data transmission request, and transmission data is obtained.
In at least one embodiment of the application, the transmitted data includes data that results from successful decryption of the data ciphertext. The server calls a decryption key to decrypt the data ciphertext in the data transmission request, and the obtaining of the transmission data comprises the following steps: the server divides the data ciphertext package into a plurality of ciphertext fragments, and calls a second operation value, a numerical product and a decryption algorithm corresponding to the key generation network model to decrypt the plurality of ciphertext fragments respectively, so as to obtain multi-section output data. The server splices the multi-section output data to obtain transmission data. Wherein different key generation network models correspond to different decryption algorithms. For example, if the key generation network model includes an euler equation and a modulo equation, the decryption algorithm may be the modulo equation. According to the application, the decryption algorithm is invoked to decrypt a plurality of ciphertext fragments in parallel, so that the determination efficiency of output data is improved, and the determination efficiency of transmission data is improved.
S205, if the transmission data does not include preset sensitive data, determining a target database from all databases.
In at least one embodiment of the present application, the preset sensitive data may include privacy data such as yield information of the device. The target database is the database that can complete the transmission data storage most quickly. The server determining the target database from all databases includes: the server determines the occupied memory of the stored data in each database and determines the storage efficiency of each database. The server predicts a waiting time period for each database to perform storage of the transmission data. And the server determines the database score of each database according to the occupied memory, the storage efficiency and the waiting time, and determines the database with the largest database score as the target database.
The storage efficiency may be determined according to the efficiency of storing data at each database history time, for example, when the time spent for storing 10M data in the a database is 10 seconds, the storage efficiency of the a database is 1M/s. The waiting time length is determined according to the total amount of data of the incomplete storage operation in each database and the storage efficiency, for example, the total amount of data of the incomplete storage operation in the A database is 100M, the storage efficiency of the A database is 1M/s, and the waiting time length of the A database is 10 seconds. The formula for determining the database score may include:,/> wherein/> Representing database scores,/>Representing occupied memory,/>Representing storage efficiency,/>Representing the waiting period.
According to the embodiment of the application, the database score of each database can be reasonably determined by combining the occupied memory, the storage efficiency and the waiting time, so that the optimal database is determined as the target database according to the database score, and the storage efficiency of the target database on transmission data is improved.
S206, unlocking the target database and storing the transmission data into the target database.
In at least one embodiment of the present application, the server fills the database name of the target database into a preset enabling program to obtain an unlocking program of the target database, and runs the unlocking program of the target database to unlock the target database. According to the method and the device, the unlocking program can be determined quickly through the preset starting program, so that the unlocking efficiency is improved.
According to the technical scheme, when the data transmission request is received, all databases in the server are locked, the leakage risk of the data in the server can be effectively prevented, and when the verification score of the data transmission request is greater than or equal to the corresponding safety threshold, the decryption key of the data transmission request is dynamically generated by combining the sending time, the sending mode, the user identification and the transmission times. According to the embodiment of the application, after the authority of the data transmission request passes verification, the data ciphertext can be decrypted through the dynamically generated decryption key, so that the data ciphertext can be decrypted only by a trigger user with legal authority, the safety of data in a server is improved, meanwhile, the data ciphertext is decrypted through the dynamically generated decryption key, the leakage of transmission data caused by the leakage of the decryption key can be avoided, and the safety of the transmission data is improved. According to the embodiment of the application, the determined target database is unlocked only when the transmission data does not comprise the preset sensitive data, so that the condition that the transmission data comprising the preset sensitive data is leaked can be avoided, and the safety of the transmission data comprising the preset sensitive data is further improved. In addition, the embodiment of the application can realize the rapid storage of the transmission data by storing the transmission data into the target database.
As shown in fig. 3, a flowchart of determining a verification score is provided in an embodiment of the present application. As shown in fig. 3, the method specifically comprises the following steps: s301 to S304.
S301, determining the node number of nodes of the signaling electronic equipment in the blockchain according to the consensus result, and determining the trust duty ratio of the blockchain to the electronic equipment according to the node number and the total number of all nodes in the blockchain.
In at least one embodiment of the application, the consensus result includes a trust node of the electronic device in the blockchain, the trust node being a node that considers the electronic device to be a secure device. The consensus result can be obtained from a configuration table corresponding to the blockchain, and the configuration table is recorded with consensus information corresponding to each node in the blockchain, and the consensus information corresponding to the electronic equipment is used as the consensus result. The trust duty cycle is determined from the ratio of the number of nodes to the total number.
S302, detecting whether the monitoring result comprises an abnormal result.
In at least one embodiment of the application, the server acquires the abnormal identifier, detects the monitoring result based on the abnormal identifier, and determines that the monitoring result comprises the abnormal result if the monitoring result comprises the abnormal identifier; if the monitoring result does not include the abnormal identifier, it is determined that the monitoring result does not include the abnormal result, where the abnormal identifier may be preset, for example, the abnormal identifier may be error. If the monitoring result includes an abnormal result, the server executes step S303; if the monitoring result does not include the abnormal result, the server executes step S304.
S303, determining an abnormal duty ratio of the abnormal result in the monitoring result, and carrying out weighted sum operation on the abnormal duty ratio, the trust duty ratio and the safe transmission proportion based on the obtained first weight group to obtain a verification score.
In at least one embodiment of the application, the server determines the monitoring quantity of the monitoring result, determines the abnormal quantity of the abnormal result, calculates the ratio of the abnormal quantity to the monitoring quantity, and obtains the abnormal duty ratio. The first weight group comprises an abnormal weight corresponding to the abnormal duty ratio, a trust weight corresponding to the trust duty ratio and a transmission weight corresponding to the safe transmission ratio, and the sum of the abnormal weight, the trust weight and the transmission weight is 1. Different anomaly duty cycles may correspond to different first weight sets, the anomaly weight and the anomaly duty cycle being positively correlated, the greater the anomaly duty cycle, the greater the anomaly weight, e.g., the anomaly duty cycle is 1%, the corresponding first weight values may be: the abnormal weight is 0.1, the trust weight is 0.4, and the transmission weight is 0.5; the anomaly duty cycle is 10%, and the corresponding first weight value may be: the anomaly weight is 0.2, the trust weight is 0.35, and the transmission weight is 0.45. And the server performs weighted sum operation on the abnormal duty ratio, the trust duty ratio and the safe transmission proportion based on the abnormal weight, the trust weight and the transmission weight to obtain a verification score. When the monitoring result comprises an abnormal result, the embodiment of the application determines different first weight groups according to the value of the abnormal duty ratio, and further determines the verification score by using the determined first weight groups, so that the determination rationality of the verification score can be improved.
S304, based on the obtained second weight group, weighting and summing operation is carried out on the trust duty ratio and the safe transmission proportion, and the verification score is obtained.
In at least one embodiment of the present application, the second weight set includes a trust weight corresponding to a trust duty ratio and a transmission weight corresponding to a secure transmission ratio. And the server performs weighted sum operation on the trust duty ratio and the safe transmission proportion according to the trust weight and the transmission weight to obtain a verification score.
According to the technical scheme, the embodiment of the application sets different weight sets according to whether the monitoring result comprises the abnormal result or not, so that the determination rationality of the verification score is improved.
Fig. 4 is a flowchart of a data transmission method according to another embodiment of the present application. The order of the steps in the flowchart may be changed and some steps may be omitted according to various needs. The data transmission method provided by the embodiment of the application is applied to the server and comprises the following steps of.
S401, when a data transmission request sent by the electronic equipment is received, all databases in the server are locked.
S402, generating a verification score of the data transmission request, and acquiring a safety threshold value according to the triggering user of the data transmission request.
S403, judging that the verification score is greater than or equal to the safety threshold.
In at least one embodiment of the present application, if the verification score is less than the security threshold, the server performs S404; if the verification score is greater than or equal to the security threshold, the server performs S405.
S404, generating warning information according to the data transmission request, and sending the warning information to the electronic equipment.
In at least one embodiment of the application, the alert information includes a request identification, a verification score, and a security threshold for the data transmission request. The embodiment generates the warning information by combining the request identifier, the verification score and the safety threshold, and can feed back the warning information to the electronic equipment when the server does not execute data storage.
S405, determining a decryption key of the data transmission request according to the sending time and sending mode of the data transmission request, the user identification of the triggering user and the number of times of data transmission from the electronic equipment to the server.
S406, the decryption key is called to decrypt the data ciphertext in the data transmission request, and transmission data is obtained.
S407, detecting whether the transmission data comprises preset sensitive data.
In at least one embodiment of the present application, the server compares the transmission field of the transmission data with the sensitive field corresponding to the preset sensitive data, and determines that the transmission data includes the preset sensitive data if the transmission field is the same as the sensitive field. If the transmission field is different from the sensitive field, determining that the transmission data does not comprise preset sensitive data. If the transmission data includes preset sensitive data, the server executes S408; if the transmission data does not include the preset sensitive data, the server executes S409.
S408, desensitizing the preset sensitive data in the transmission data to obtain desensitized data.
In at least one embodiment of the present application, the desensitized data is data obtained after desensitizing preset sensitive data in the transmission data.
S409, determining a target database from all databases.
S410, unlocking the target database, and storing the transmission data or the desensitization data into the target database.
The details of steps S401-S402, S405-S406, S409-S410 are referred to the above detailed description of steps S201-S206 in fig. 2, and the description thereof will not be repeated here.
Fig. 5 is a flowchart of a data transmission method according to another embodiment of the present application. The order of the steps in the flowchart may be changed and some steps may be omitted according to various needs. The data transmission method provided by the embodiment of the application is applied to the server and comprises the following steps of.
S501, when a data transmission request sent by the electronic equipment is received, all databases in the server are locked.
S502, generating a verification score of the data transmission request, and acquiring a safety threshold value according to the triggering user of the data transmission request.
S503, if the verification score is greater than or equal to the security threshold, determining a decryption key of the data transmission request according to the sending time and sending mode of the data transmission request, the user identification of the triggering user and the number of times of data transmission from the electronic equipment to the server.
S504, the decryption key is called to decrypt the data ciphertext in the data transmission request, and transmission data is obtained.
S505, if the transmission data does not include preset sensitive data, determining a target database from all databases.
S506, unlocking the target database, and storing the transmission data into the target database.
For details of steps S501-S506, reference is made to the above detailed description of steps S201-S206 in fig. 2, and the description is not repeated here.
S507, obtaining feedback information of the terminal equipment which communicates with the server on the data transmission request.
In at least one embodiment of the present application, the terminal device may include a device that successfully transmits data to the server at a historical time. The feedback information may include evaluation information of the data transmission request.
S508, identifying emotion information of the feedback information.
In at least one embodiment of the present application, the mood information includes positive information and negative information. And the server invokes a pre-trained emotion recognition model to analyze the feedback information to obtain emotion information. The emotion recognition model comprises an encoding network, a decoding network, a semantic analysis network and a classification network.
In at least one embodiment of the present application, the server encodes the feedback information using a configuration vector table of the emotion recognition model to obtain a feedback vector, calls the encoding network to recode the feedback vector to obtain an encoded vector, and calls the decoding network to decode the encoded vector to obtain a conversion vector corresponding to the feedback vector. The server calls a semantic analysis network to perform semantic analysis on the feedback vector to obtain a first semantic matrix, and calls the semantic analysis network to perform semantic analysis on the conversion vector to obtain a second semantic matrix. The server calculates the average value of the elements at the corresponding positions of the first semantic matrix and the second semantic matrix to obtain a final semantic matrix, and calls a classification network to map the final semantic matrix to obtain emotion information.
According to the embodiment of the application, the feedback information is encoded by configuring the vector table, and the length of the generated feedback vector corresponds to the emotion recognition model, so that the network in the emotion recognition model can be ensured to directly analyze the feedback vector, the feedback vector is converted through the encoding network and the decoding network, the analysis dimension of the feedback information can be increased, and the emotion information is determined by combining the analysis results of the semantic analysis network on the feedback vector and the conversion vector, so that the accuracy of the emotion information can be improved.
S509, if the emotion information is negative information, determining the feedback quantity of the feedback information corresponding to the negative information.
In at least one embodiment of the present application, the feedback quantity indicates a quantity of feedback information in which the emotional information is negative information. And if the emotion information is forward information, storing the feedback information into a first configuration database.
S510, if the feedback quantity is larger than the set quantity, adjusting the safety threshold according to the feedback quantity.
In at least one embodiment of the present application, the set number may be set according to actual production requirements. After the safety threshold is adjusted according to the feedback quantity, the server stores feedback information corresponding to the positive information into a first configuration database, and stores feedback information corresponding to the negative information into a second configuration database. The server adjusts the safety threshold according to the preset amplitude proportion and the feedback quantity, and an adjusting formula of the safety threshold is as follows:,/> Wherein, the method comprises the steps of, wherein, Representing an adjusted safety threshold,/>Representing a safety threshold before adjustment,/>Representing a preset amplitude ratio,/>Representing the feedback quantity,/>Representing a maximum threshold. The preset amplitude proportion and the maximum threshold value can be set according to actual requirements. According to the embodiment, the safety threshold is increased according to the feedback quantity and the preset amplitude proportion, the processing authority requirement of the data transmission request can be improved according to the feedback condition, the safety threshold is controlled through the maximum threshold, and the rationality of the safety threshold is improved.
According to the technical scheme, the safety threshold can be more reasonable by analyzing the adjustment of the feedback information to the safety threshold, so that the safety and reliability of data transmission are improved.
Fig. 6 is a functional block diagram of a data transmission device according to an embodiment of the present application. The data transmission device 11 operates on a server. The data transmission device 11 includes a locking unit 110, a generating unit 111, a determining unit 112, a calling unit 113, a storing unit 114, an acquiring unit 115, an identifying unit 116, and an adjusting unit 117. The module/unit referred to herein is a series of computer readable instructions capable of being retrieved by the processor 13 and performing a fixed function and stored in the memory 12.
In one embodiment, the locking unit 110 is configured to lock all databases in the server when receiving a data transmission request sent by the electronic device; a generating unit 111, configured to generate a verification score of the data transmission request, and acquire a security threshold according to a trigger user of the data transmission request; a determining unit 112, configured to determine a decryption key of the data transmission request according to the sending time and sending mode of the data transmission request, the user identifier of the triggering user, and the number of times of data transmission from the electronic device to the server, if the verification score is greater than or equal to the security threshold; a calling unit 113, configured to call a decryption key to decrypt the data ciphertext in the data transmission request, so as to obtain transmission data; the determining unit 112 is further configured to determine a target database from all databases if the transmission data does not include preset sensitive data; and the storage unit 114 is used for unlocking the target database and storing the transmission data into the target database.
In one embodiment, the locking unit 110 is specifically configured to: acquiring a preset closing program; acquiring database names of all databases; filling the database names into a preset closing program to obtain a locking program corresponding to each database; and running a locking program corresponding to each database to lock all the databases.
In one embodiment, the generating unit 111 is specifically configured to: determining a channel for the electronic equipment to collect data in the data transmission request, and acquiring a monitoring result of the channel; determining a consensus result of a block chain where the electronic equipment is located on the electronic equipment, and determining a safe transmission proportion of the electronic equipment; and determining a verification score according to the monitoring result, the consensus result and the safe transmission proportion.
In one embodiment, the determining unit 112 is specifically configured to: if the monitoring result comprises an abnormal result, determining an abnormal duty ratio of the abnormal result in the monitoring result; determining the node number of nodes of the trust electronic equipment in the blockchain according to the consensus result, and determining the trust duty ratio of the blockchain to the electronic equipment according to the node number and the total number of all nodes in the blockchain; based on the obtained first weight group, carrying out weighted sum operation on the abnormal duty ratio, the trust duty ratio and the safe transmission proportion to obtain a verification score; or if the monitoring result does not comprise the abnormal result, carrying out weighted sum operation on the trust duty ratio and the safe transmission proportion based on the acquired second weight group to obtain the verification score.
In one embodiment, after storing the transmission data in the target database, the obtaining unit 115 is configured to obtain feedback information of the data transmission request from the terminal device that communicates with the server; an identification unit 116 for identifying emotion information of the feedback information; the determining unit is further used for determining the feedback quantity of the feedback information corresponding to the negative information if the emotion information is the negative information; and an adjusting unit 117, configured to adjust the safety threshold according to the feedback number if the feedback number is greater than the set number.
In one embodiment, the determining unit 112 is further specifically configured to: obtaining a mode value corresponding to a transmission mode, and obtaining an identification value corresponding to a user identification; determining a time value corresponding to the sending time, and determining a first value according to the mode value, the identification value, the time value and the transmission times; obtaining a second numerical value which is prime with the first numerical value, and inputting the first numerical value and the second numerical value into a first operation layer in a key generation network model to obtain a first operation value; obtaining a third numerical value which is prime with the first operation value, and inputting the third numerical value and the first operation value into a second operation layer in the key generation network model to obtain a second operation value; and determining the decryption key according to the second operation value and the numerical product of the first numerical value and the second numerical value.
In one embodiment, the calling unit 114 is specifically configured to: dividing a data ciphertext packet into a plurality of ciphertext fragments; invoking a second operation value, a numerical product and a decryption algorithm corresponding to the key generation network model to decrypt the ciphertext fragments respectively to obtain multi-section output data; and splicing the multiple sections of output data to obtain transmission data.
In one embodiment, the determining unit 112 is further specifically configured to: determining occupied memory of stored data in each database, and determining storage efficiency of each database; predicting the waiting time of each database for storing transmission data; determining the database score of each database according to the occupied memory, the storage efficiency and the waiting time; and determining the database with the largest database score as a target database.
According to the technical scheme, when the data transmission request is received, all databases in the server are locked, the leakage risk of the data in the server can be effectively prevented, and when the verification score of the data transmission request is greater than or equal to the corresponding safety threshold, the decryption key of the data transmission request is dynamically generated by combining the sending time, the sending mode, the user identification and the transmission times. According to the embodiment of the application, after the authority of the data transmission request passes verification, the data ciphertext can be decrypted through the dynamically generated decryption key, so that the data ciphertext can be decrypted only by a trigger user with legal authority, the safety of data in a server is improved, meanwhile, the data ciphertext is decrypted through the dynamically generated decryption key, the leakage of transmission data caused by the leakage of the decryption key can be avoided, and the safety of the transmission data is improved. According to the embodiment of the application, the determined target database is unlocked only when the transmission data does not comprise the preset sensitive data, so that the condition that the transmission data comprising the preset sensitive data is leaked can be avoided, and the safety of the transmission data comprising the preset sensitive data is further improved. In addition, the embodiment of the application can realize the rapid storage of the transmission data by storing the transmission data into the target database.
The modules/units integrated by the server 1 may be stored in a computer readable storage medium if implemented in the form of software functional units and sold or used as separate products. Based on such understanding, the present application may implement all or part of the flow of the method of the above-described embodiments, or may be implemented by means of computer readable instructions to instruct related hardware, where the computer readable instructions may be stored in a computer readable storage medium, where the computer readable instructions, when executed by a processor, implement the steps of the method embodiments described above.
The computer readable instructions include computer readable instruction code, which may be in the form of source code, object code, executable files, or some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying computer readable instruction code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory).
In particular, the specific implementation method of the processor 13 on the computer readable instructions may refer to the descriptions of the relevant steps in the corresponding embodiments of fig. 2-5, which are not repeated herein.
In the several embodiments provided in the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of modules is merely a logical function division, and other manners of division may be implemented in practice.
The modules illustrated as separate components may or may not be physically separate, and components shown as modules may or may not be physical units, may be located in one place, or may be distributed over multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional module in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units can be realized in a form of hardware or a form of hardware and a form of software functional modules.
The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
Furthermore, it is evident that the word "comprising" does not exclude other elements or steps, and that the singular does not exclude a plurality. Also, the plurality of units or means of (a) may be implemented by one unit or means by software or hardware. The terms first, second, etc. are used to denote a name, but not any particular order.
Finally, it should be noted that the above-mentioned embodiments are merely for illustrating the technical solution of the present application and not for limiting the same, and although the present application has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications and equivalents may be made to the technical solution of the present application without departing from the spirit and scope of the technical solution of the present application.

Claims (10)

1. A data transmission method, characterized in that it is applied to a server, the method comprising:
When a data transmission request sent by electronic equipment is received, all databases in the server are locked;
Generating a verification score of the data transmission request, and acquiring a safety threshold value according to a trigger user of the data transmission request;
If the verification score is greater than or equal to the safety threshold, determining a decryption key of the data transmission request according to the sending time and sending mode of the data transmission request, the user identification of the triggering user and the transmission times of the data transmission from the electronic equipment to the server;
Invoking the decryption key to decrypt the data ciphertext in the data transmission request to obtain transmission data;
if the transmission data does not include preset sensitive data, determining a target database from all databases;
unlocking the target database, and storing the transmission data into the target database.
2. The data transmission method according to claim 1, wherein said locking all databases in said server comprises:
Acquiring a preset closing program;
Acquiring database names of all databases;
filling the database names into the preset closing program to obtain a locking program corresponding to each database;
And running a locking program corresponding to each database to lock all the databases.
3. The data transmission method of claim 1, wherein the generating the validation score of the data transmission request comprises:
determining a channel for the electronic equipment to collect data in the data transmission request, and acquiring a monitoring result of the channel;
Determining a consensus result of a blockchain where the electronic equipment is located on the electronic equipment, and determining a safe transmission proportion of the electronic equipment;
And determining the verification score according to the monitoring result, the consensus result and the safe transmission proportion.
4. The data transmission method according to claim 3, wherein the determining the verification score according to the monitoring result, the consensus result, and the safe transmission ratio comprises:
determining the node number of the nodes in the blockchain for trust of the electronic equipment according to the consensus result, and determining the trust duty ratio of the blockchain to the electronic equipment according to the node number and the total number of all the nodes in the blockchain;
if the monitoring result comprises an abnormal result, determining an abnormal duty ratio of the abnormal result in the monitoring result, and carrying out weighted sum operation on the abnormal duty ratio, the trust duty ratio and the safe transmission proportion based on the obtained first weight group to obtain the verification score; or alternatively
And if the monitoring result does not comprise an abnormal result, carrying out weighted sum operation on the trust duty ratio and the safe transmission proportion based on the acquired second weight group to obtain the verification score.
5. The data transmission method according to claim 1, wherein after storing the transmission data in the target database, the method further comprises:
Acquiring feedback information of the data transmission request by the terminal equipment communicated with the server;
identifying mood information of the feedback information;
If the emotion information is negative information, determining the feedback quantity of feedback information corresponding to the negative information;
and if the feedback quantity is larger than the set quantity, adjusting the safety threshold according to the feedback quantity.
6. The method according to claim 1, wherein the determining the decryption key of the data transmission request according to the transmission time of the data transmission request, the transmission mode, the user identifier of the triggering user, and the number of times the electronic device transmits data to the server includes:
obtaining a mode value corresponding to the transmission mode, and obtaining an identification value corresponding to the user identification;
Determining a time value corresponding to the sending time, and determining a first value according to the mode value, the identification value, the time value and the transmission times;
Obtaining a second numerical value which is prime with the first numerical value, and inputting the first numerical value and the second numerical value into a first operation layer in a key generation network model to obtain a first operation value;
Obtaining a third numerical value which is prime with the first operation value, and inputting the third numerical value and the first operation value into a second operation layer in the key generation network model to obtain a second operation value;
And determining the decryption key according to the second operation value and the numerical product of the first numerical value and the second numerical value.
7. The method of claim 6, wherein the invoking the decryption key to decrypt the ciphertext of the data in the data transmission request comprises:
dividing the data ciphertext packet into a plurality of ciphertext fragments;
invoking the second operation value, the numerical product and a decryption algorithm corresponding to the key generation network model to decrypt the ciphertext fragments respectively to obtain multi-section output data;
And splicing the multiple sections of output data to obtain the transmission data.
8. The data transmission method according to claim 1, wherein said determining a target database from among said all databases comprises:
Determining occupied memory of stored data in each database, and determining storage efficiency of each database;
predicting the waiting time of each database for executing storage on the transmission data;
Determining a database score of each database according to the occupied memory, the storage efficiency and the waiting time length;
And determining the database with the largest database score as the target database.
9. A server, comprising:
a memory storing computer readable instructions; and
A processor executing computer readable instructions stored in the memory to implement the data transmission method of any one of claims 1 to 8.
10. A computer readable storage medium having stored therein computer readable instructions that are executed by a processor in a server to implement the data transmission method of any one of claims 1 to 8.
CN202410427342.5A 2024-04-10 2024-04-10 Data transmission method, server and storage medium Active CN118018336B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410427342.5A CN118018336B (en) 2024-04-10 2024-04-10 Data transmission method, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410427342.5A CN118018336B (en) 2024-04-10 2024-04-10 Data transmission method, server and storage medium

Publications (2)

Publication Number Publication Date
CN118018336A true CN118018336A (en) 2024-05-10
CN118018336B CN118018336B (en) 2024-06-11

Family

ID=90944966

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410427342.5A Active CN118018336B (en) 2024-04-10 2024-04-10 Data transmission method, server and storage medium

Country Status (1)

Country Link
CN (1) CN118018336B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20230071847A1 (en) * 2021-04-02 2023-03-09 Tencent Technology (Shenzhen) Company Limited Information verification method and related apparatus, device, and storage medium
CN116232639A (en) * 2022-12-07 2023-06-06 深圳科盾量子信息科技有限公司 Data transmission method, device, computer equipment and storage medium
CN116527372A (en) * 2023-05-16 2023-08-01 深圳建安润星安全技术有限公司 Internet-based data security interaction system and method
US20230246820A1 (en) * 2020-09-03 2023-08-03 Visa International Service Association Dynamic privacy-preserving application authentication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20230246820A1 (en) * 2020-09-03 2023-08-03 Visa International Service Association Dynamic privacy-preserving application authentication
US20230071847A1 (en) * 2021-04-02 2023-03-09 Tencent Technology (Shenzhen) Company Limited Information verification method and related apparatus, device, and storage medium
CN116232639A (en) * 2022-12-07 2023-06-06 深圳科盾量子信息科技有限公司 Data transmission method, device, computer equipment and storage medium
CN116527372A (en) * 2023-05-16 2023-08-01 深圳建安润星安全技术有限公司 Internet-based data security interaction system and method

Also Published As

Publication number Publication date
CN118018336B (en) 2024-06-11

Similar Documents

Publication Publication Date Title
CN112003838B (en) Network threat detection method, device, electronic device and storage medium
CN110602135B (en) Network attack processing method and device and electronic equipment
CN109617706B (en) Industrial control system protection method and industrial control system protection device
CN107169499A (en) A kind of Risk Identification Method and device
US20120329426A1 (en) System and method for monitoring the security of cellular device communication
US20200151340A1 (en) Monitoring a blockchain
CN112732536A (en) Data monitoring and alarming method and device, computer equipment and storage medium
US20170235960A1 (en) Intelligent system for forecasting threats in a virtual attack domain
CN113722748B (en) Equipment information acquisition method based on block chain and general industrial identification
CN116703304B (en) Goods asset supervision method and system based on Internet of things
CN111651170B (en) Instance dynamic adjustment method and device and related equipment
CN114564757A (en) Data auditing method, device and equipment of block chain and readable storage medium
CN115208604B (en) AMI network intrusion detection method, device and medium
CN116015766A (en) Data safety transmission system for computer
CN114185743A (en) Data processing method and device, computer equipment and storage medium
CN118018336B (en) Data transmission method, server and storage medium
CN114491631B (en) Nursing sensitive index information interaction method and monitoring device
CN114416875B (en) Task processing method, device, equipment and storage medium based on blockchain
CN113868628B (en) Signature verification method, signature verification device, computer equipment and storage medium
EP3174263A1 (en) Apparatus and method for verifying detection rule
CN116305130B (en) Dual-system intelligent switching method, system and medium based on system environment recognition
CN117201195B (en) Process network policy limiting method and device, equipment and storage medium
CN117349869B (en) Method and system for encryption processing of slice data based on model application
CN109150871A (en) Safety detection method, device, electronic equipment and computer readable storage medium
CN117494185B (en) Database access control method, device, system, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant