CN-119449377-B - Method for ensuring information security in data transmission process between programs
Abstract
The invention discloses a method for guaranteeing information security in a data transmission process between programs, which belongs to the field of information transmission security and comprises the following steps of selecting an encryption algorithm, generating a corresponding secret key, managing the generated secret key, encrypting plaintext data by a sender through the selected encryption algorithm and the secret key, selecting a transmission protocol, carrying out data transmission, monitoring the data transmission, decrypting the data by a receiver, and verifying the integrity and the authenticity of the decrypted data. The encryption algorithm includes a symmetric encryption algorithm in which a sender and a receiver use the same key, and an asymmetric encryption algorithm in which a pair of a public key and a private key is generated and the sender uses the public key. According to the invention, by selecting a proper encryption algorithm and transmission protocol, the data can be encrypted quickly and effectively, so that time and labor are saved, and the safety of data transmission can be further improved.
Inventors
- ZHANG QIANG
- YI HONGYU
- Yuan Chaoxi
- LIU ZHICHAO
- SHI JUN
Assignees
- 四川才子软件信息网络有限公司
Dates
- Publication Date
- 20260508
- Application Date
- 20241016
Claims (6)
- 1. The method for ensuring the information security in the process of data transmission between programs is characterized by comprising the following steps: Selecting an encryption algorithm, generating a corresponding key, and managing the generated key; the encryption algorithm comprises a symmetric encryption algorithm and an asymmetric encryption algorithm, wherein in the symmetric encryption algorithm, a sender and a receiver use the same secret key, a pair of public keys and private keys are generated in the asymmetric encryption algorithm, the sender uses the public keys and the receiver uses the private keys, the specific process of the encryption algorithm is that the data type of the data transmission is marked as A, then the data quantity of the data transmission is marked as B, the data transmission record which is the same type as the A is obtained from the large data and marked as ai, i=1. N, wherein n is a positive integer, the data quantity of the data transmission in ai is marked as bi, i=1. N, the absolute value of the difference between B and all bi is smaller than a first preset value, bi is mapped to a first sequence, if the absolute value of the difference between B and bi is larger than or equal to the first preset value, bi is mapped to a second sequence, the data quantity of the data transmission corresponding to bi is obtained from the large data, i=1. N is a positive integer, the data quantity of the data transmission in ai is marked as bi is transmitted to a third sequence, if the data of the data transmission corresponding to bi in the first sequence is not equal to the first sequence, and the data in the C is not equal to C is marked as C, and the C is not equal to C2 is calculated, and the data in the encryption algorithm is not equal to C, and the first sequence is not equal to C, and the C is not equal to the first sequence; The sender encrypts the plaintext data by using the selected encryption algorithm and key; Selecting a transmission protocol and carrying out data transmission, and monitoring the data transmission; The receiver decrypts the data and verifies the integrity and authenticity of the decrypted data.
- 2. The method for ensuring information security in an inter-program data transmission process according to claim 1, wherein the specific process of selecting a transmission protocol is: Dividing a day into twenty-four time periods according to hours, acquiring the time period where the data transmission is located and marking the time period as T; Extracts the data transmission record in the same time period as T from ai, and marking the corresponding transmission protocol in the extracted data transmission record as Ci, i=1· n; planning Ci belonging to the same transmission protocol to the same cluster, calculating the number of Ci in each cluster and marking as X1; Identifying ai corresponding to Ci in the same cluster, planning the ai corresponding to Ci to a fifth sequence if the ai corresponding to Ci has data transmission abnormality, and planning the ai corresponding to Ci to a sixth sequence if the ai corresponding to Ci does not have data transmission abnormality; Counting the number of ai in the fifth sequence and marking as x1; Calculating an application weight value V=60% (X1/X2) -40% (X1/X2) of each cluster, wherein X2 and X2 are preset values; and outputting the transmission protocol corresponding to the cluster with the application weight value Vmax as the selected transmission protocol.
- 3. The method for ensuring information security in the process of data transmission between programs according to claim 2, wherein in the process of monitoring data transmission, if an interrupt occurs in the process of data transmission task, it is indicated that the data transmission task is abnormal and a fault alarm is performed.
- 4. The method for ensuring information security in a data transmission process between programs according to claim 3, wherein the fault alarm adopts two groups of a plurality of LED lamp beads for alarm, one group of LED lamp beads is used for alarm when interruption occurs in the data transmission task process, the other group of LED lamp beads is used for alarm when transmission speed is abnormal in the data transmission task process, and the specific alarm process is as follows: Counting total interruption times in the data transmission task process, wherein the total interruption times are marked as Y, and Y is a positive integer; Each time the data transmission task is interrupted, one LED lamp bead is lightened, and Y LED lamp beads are finally lightened; the time ti used for recovering after each synchronization interruption is counted, i=1· Y; if ti is smaller than a second preset value, the LED lamp beads corresponding to ti turn on green light; if ti is greater than or equal to the second preset value and ti is less than the third preset value, the LED lamp beads corresponding to ti are lighted up to yellow; if ti is greater than or equal to a third preset value and ti is less than a fourth preset value, the LED lamp beads corresponding to ti are lighted to light red lamps; If ti is greater than or equal to a fourth preset value, the LED lamp beads corresponding to ti are lighted up to form a purple lamp; counting total time consumption in the data transmission task process, and marking as Ttotal, wherein the Ttotal unit is minutes and Ttotal is an integer by adopting a first method; each minute passes in the data transmission task process, one LED lamp bead is lightened, and finally T total LED lamp beads are lightened; an average data transfer rate per minute during the data transfer task is collected, the label is denoted as Di and, i=1· Ttotal; Comparing Di with a fifth preset value, if Di is larger than the fifth preset value, the Di corresponding to the LED lamp bead lights a green light, and if Di is smaller than or equal to the fifth preset value, the Di corresponding to the LED lamp bead lights a red light; the data transmission speed of the current time point in the process of collecting the data transmission task is marked as d; Calculating the flicker frequency f= (d/dm) fm of the LED lamp beads corresponding to the current time point, wherein dm is a preset data transmission speed, and fm is a preset flicker frequency.
- 5. The method for ensuring information security in the process of data transmission between programs according to claim 4, wherein the specific process of verifying the integrity and the authenticity of the decrypted data is as follows: Before data transmission, calculating the data by using a hash function, generating a hash value, and adding the hash value into the data to be transmitted together; After receiving the data, re-calculating the hash value of the data by using the same hash function, comparing the hash value with the hash value provided by the sender, if the hash value and the hash value are consistent, indicating that the integrity of the decrypted data is not abnormal, and if the hash value and the hash value are inconsistent, indicating that the integrity of the decrypted data is abnormal; and preprocessing and verifying the data by using a data cleaning and data quality assessment tool, if the verification result is abnormal, indicating that the decrypted data authenticity is abnormal, and if the verification result is not abnormal, indicating that the decrypted data authenticity is not abnormal.
- 6. The method according to claim 5, wherein the key is stored in a physical storage medium or an encrypted cloud storage service when the generated key is managed, and the key is backed up periodically to prevent unexpected loss, and the key is updated periodically, so that the key which is no longer needed is destroyed in time to prevent leakage.
Description
Method for ensuring information security in data transmission process between programs Technical Field The invention relates to the field of information transmission safety, in particular to a method for guaranteeing information safety in the process of data transmission between programs. Background Inter-program data transfer refers to the process of transferring data between different applications or systems for the purpose of enabling the exchange and sharing of information. Such transmissions allow applications to send and receive data between different computers or devices for communications, data exchange, remote access, etc. In computer networks, data transmission is typically accomplished through network protocols. These network protocols define the transmission format of data, communication rules, error handling mechanisms, etc. to ensure reliable and efficient data transmission. The data is encapsulated into data packets during transmission, including the data and control information (e.g., source address, destination address, checksum, etc.) associated therewith. These packets are then transferred from the sender to the receiver through the process of routing and forwarding. In order to ensure the security of information during the data transfer between programs, a series of measures need to be taken to ensure the confidentiality, integrity and availability of the data. These include the use of cryptographic protocols, enhanced authentication, periodic backup and recovery, the use of firewalls and security devices, enhanced cryptographic security, updating and maintenance software, and the like. However, these measures are time-consuming and labor-consuming, and cannot further improve the security of data transmission. Therefore, a method for ensuring information security in the process of data transmission between programs is provided by those skilled in the art to solve the above-mentioned problems in the background art. Disclosure of Invention The invention aims to provide a method for ensuring information security in the process of data transmission among programs, which can encrypt data rapidly and effectively by selecting a proper encryption algorithm and transmission protocol, thereby saving time and labor, and further improving the security of data transmission so as to solve the problems in the prior art. In order to achieve the above purpose, the present invention provides the following technical solutions: a method for ensuring information security in the process of data transmission between programs comprises the following steps: selecting an encryption algorithm, generating a corresponding key, and managing the generated key; The sender encrypts the plaintext data by using the selected encryption algorithm and key; Selecting a transmission protocol and carrying out data transmission, and monitoring the data transmission; The receiver decrypts the data and verifies the integrity and authenticity of the decrypted data. The encryption algorithm comprises a symmetric encryption algorithm and an asymmetric encryption algorithm, wherein in the symmetric encryption algorithm, a sender and a receiver use the same secret key, in the asymmetric encryption algorithm, a pair of public key and private key are generated, the sender uses the public key, and the receiver uses the private key. As a still further proposal of the invention, the specific process of selecting the encryption algorithm is as follows: marking the data type of the data transmission as A, and marking the data quantity of the data transmission as B; The data transmission record of the same type as a is acquired from the big data, and is marked as ai and is indicated by, i=1····n, wherein n is a positive integer; The data amount of the data transmission in ai is marked bi, i=1· n; B is compared with all bi, if the absolute value of the difference between B and bi is smaller than a first preset value, bi is planned to a first sequence, and if the absolute value of the difference between B and bi is larger than or equal to the first preset value, bi is planned to a second sequence; identifying an ai corresponding to bi in the first sequence, planning the ai corresponding to bi to a third sequence if the ai corresponding to bi has data transmission abnormality, and planning the ai corresponding to bi to a fourth sequence if the ai corresponding to bi does not have data transmission abnormality; counting the ai number of all the symmetrical encryption algorithms adopted in the third sequence and marking the ai number as C1, and counting the ai number of all the asymmetrical encryption algorithms adopted in the third sequence and marking the ai number as C2; comparing C1 with C2, if C1 is larger than C2, the selected encryption algorithm is an asymmetric encryption algorithm, and if C1 is smaller than or equal to C2, the selected encryption algorithm is a symmetric encryption algorithm. As a still further proposal of the invention,