CN118153082B - Multi-dimensional data monitoring method based on multi-screen data interaction - Google Patents
Multi-dimensional data monitoring method based on multi-screen data interaction Download PDFInfo
- Publication number
- CN118153082B CN118153082B CN202410582965.XA CN202410582965A CN118153082B CN 118153082 B CN118153082 B CN 118153082B CN 202410582965 A CN202410582965 A CN 202410582965A CN 118153082 B CN118153082 B CN 118153082B
- Authority
- CN
- China
- Prior art keywords
- interaction
- ciphertext
- coefficient
- original
- comprehensive
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a multidimensional data monitoring method based on multi-screen data interaction, which relates to the technical field of data security, and comprises the steps of collecting original interaction data, performing character conversion on the original interaction data to obtain an original interaction character string, setting variation parameters to perform analog-to-digital conversion and combination to obtain a common coefficient set, and performing transmission encryption on the original interaction character string according to the common coefficient set to obtain an original interaction ciphertext; the method comprises the steps of receiving an original interaction ciphertext through an interaction rear end to obtain a transmission interaction ciphertext, performing signal conversion on the original interaction ciphertext and the transmission interaction ciphertext to obtain a comprehensive ciphertext signal, setting an initial monitoring coefficient to perform level extraction on the comprehensive ciphertext signal and generate a comprehensive ciphertext spectrogram, performing dynamic comparison and threshold comparison on the comprehensive ciphertext spectrogram to obtain an isomorphic coefficient difference, sending a decryption instruction to the obtained isomorphic coefficient difference, and performing secure decryption to obtain transmission interaction data; the interaction data is prevented from being tampered and revealed, and the privacy of the interaction data is protected.
Description
Technical Field
The invention relates to the technical field of data security, in particular to a multidimensional data monitoring method based on multi-screen data interaction.
Background
Multi-screen data interaction refers to the process of synchronizing, sharing, and interacting data between multiple screens or display devices. As technology advances, multi-screen data interaction has become an important component in modern work and entertainment environments. Such interaction may improve the efficiency of the work, providing a richer user experience. Multidimensional data monitoring is a technique for analyzing and monitoring multidimensional data that can help organizations better understand their business operations, market trends, and customer behavior. Such monitoring typically involves real-time or near real-time data processing and analysis to quickly respond to market changes and business needs.
In modern business environments, enterprises face challenges of increasing complexity and rapid changes. Along with the fierce market competition and the diversification of demands, enterprises need to know the conditions and the change trend of the business in real time so as to make adjustment and decision in time; at this time, the business developed by the enterprise needs to be interacted through multi-screen data interaction so as to provide convenient communication, and in the multi-screen data interaction process, the unavoidable problem of data security exists, so that the multidimensional data generated in the interaction process needs to be monitored; therefore, the multi-dimensional data is safely monitored in the multi-screen data interaction process, and the method has important theoretical and practical significance.
How to utilize the data security technology to carry out character conversion on the collected original interaction data to obtain an original interaction character string, carrying out transmission encryption on the obtained original interaction character string to obtain an original interaction ciphertext, receiving the original interaction ciphertext through an interaction rear end to obtain a transmission interaction ciphertext, carrying out signal conversion on the original interaction ciphertext and the transmission interaction ciphertext to obtain a comprehensive ciphertext signal, and carrying out dynamic comparison and secure decryption on a comprehensive ciphertext spectrogram generated by the comprehensive ciphertext signal to obtain the transmission interaction data is a problem which needs to be solved by us; for this purpose, a multidimensional data monitoring method based on multi-screen data interaction is provided.
Disclosure of Invention
The aim of the invention can be achieved by the following technical scheme:
the multidimensional data monitoring method based on the multi-screen data interaction comprises the following steps:
Step S1: setting a multi-screen interaction end, setting an interaction front end and an interaction back end based on the multi-screen interaction end, and sending interaction data through the interaction front end to obtain original interaction data;
step S2: performing character conversion on the obtained original interaction data to obtain an original interaction character string, setting a first variation parameter and a second variation parameter to perform analog-to-digital conversion to obtain a base modulus, combining the base modulus to obtain a safety coefficient set and a public coefficient set, and performing transmission encryption on the obtained original interaction character string according to the obtained public coefficient set to obtain an original interaction ciphertext;
step S3: setting an interactive object end, receiving an original interactive ciphertext through an interactive rear end of the interactive object end to obtain a transmission interactive ciphertext, performing signal conversion on the original interactive ciphertext and the transmission interactive ciphertext to obtain a comprehensive ciphertext signal, setting an initial monitoring coefficient, performing discrete classification to obtain a discrete coefficient segment, and performing hierarchical extraction on the comprehensive ciphertext signal according to the discrete coefficient segment to obtain a comprehensive extraction ciphertext coefficient;
Step S4: generating a comprehensive ciphertext spectrogram according to the obtained comprehensive extracted ciphertext coefficient, dynamically comparing the obtained comprehensive ciphertext spectrogram to obtain a dynamic coefficient difference, setting a zero ratio threshold value, obtaining an isomorphic coefficient difference according to the zero ratio threshold value, sending a decryption instruction to the obtained isomorphic coefficient difference, obtaining a safety coefficient set, and safely decrypting the transfer interaction ciphertext according to the safety coefficient set to obtain transfer interaction data.
The process of obtaining the modulus of the substrate comprises the following steps:
performing character conversion on the obtained original interaction data to obtain an original interaction character string;
Setting a first variation parameter and a second variation parameter;
Obtaining a reference base number according to the set first variation parameter and second variation parameter;
obtaining a center coefficient according to the obtained reference base;
setting condition parameters, and obtaining the substrate modulus according to the obtained center coefficient and the condition parameters.
The process of obtaining the original interaction ciphertext comprises the following steps:
Combining the obtained base modulus and the reference base number to obtain a safety coefficient set;
combining the obtained condition parameters and the reference base to obtain a common coefficient set;
Uploading the obtained safety coefficient set to the interaction front end, and respectively uploading the obtained public coefficient set to the interaction front end and the interaction rear end;
and carrying out transmission encryption on the obtained original interaction character string according to the obtained condition parameters and the reference base number to obtain an original interaction ciphertext.
The process of obtaining the integrated ciphertext signal comprises:
Setting an interactive object terminal according to the obtained multi-screen interactive terminal;
Uploading the obtained original interaction ciphertext to an interaction object end, and receiving the original interaction ciphertext through an interaction back end to obtain a transmission interaction ciphertext;
Marking the obtained transmission interaction ciphertext and the original interaction ciphertext as comprehensive interaction ciphertext;
And performing signal conversion on the obtained comprehensive ciphertext data to obtain a comprehensive ciphertext signal.
The process for obtaining the comprehensive extraction ciphertext coefficient comprises the following steps:
setting an initial monitoring coefficient according to the obtained comprehensive ciphertext signal;
setting dynamic parameters, and setting dynamic intervals according to the obtained dynamic parameters and the comprehensive ciphertext signals;
Obtaining a decomposition base number according to the obtained dynamic parameters, dynamic intervals and the comprehensive ciphertext signals;
Performing discrete classification on the initial monitoring coefficient according to the obtained decomposition base number to obtain a discrete coefficient segment;
and carrying out level extraction on the obtained comprehensive ciphertext signal according to the obtained discrete coefficient segments to obtain the comprehensive extracted ciphertext coefficient.
The process of obtaining the isomorphic coefficient difference according to the zero ratio threshold value comprises the following steps:
generating a comprehensive ciphertext spectrogram according to the obtained comprehensive extraction ciphertext coefficient;
Performing frequency spectrum marking on the obtained comprehensive ciphertext spectrogram to obtain an original coefficient curve and a transfer coefficient curve;
Dynamically comparing the obtained comprehensive ciphertext spectrograms to obtain dynamic coefficient differences;
Setting a zero ratio threshold, and performing interactive verification on the obtained dynamic coefficient difference according to the obtained zero ratio threshold to obtain an isomorphic coefficient difference.
The process of obtaining delivery interaction data includes:
acquiring an original coefficient curve corresponding to the equal state coefficient difference, and recording the original coefficient curve as a normal original coefficient;
A decryption instruction is sent out to the normal original coefficient, and a safety coefficient set of the interaction front end is obtained through the decryption instruction;
And safely decrypting the transmission interaction ciphertext corresponding to the normal transmission coefficient according to the obtained safety coefficient set to obtain transmission interaction data.
Compared with the prior art, the invention has the beneficial effects that: performing character conversion on the acquired original interaction data to obtain an original interaction character string, performing analog-to-digital conversion on the set variation parameters, combining the original interaction character string to obtain a public coefficient set and a safety coefficient set, performing transmission encryption on the original interaction character string according to the public coefficient set to obtain an original interaction ciphertext, and receiving the original interaction ciphertext through an interaction rear end to obtain a transmission interaction ciphertext; when interaction is carried out, the interaction data is not directly uploaded, but the interaction data to be uploaded is encrypted, so that the data privacy is protected, the non-interaction party cannot obtain the specific content of the interaction data, and the encrypted interaction data is uploaded to the interaction party, so that the protection of the interaction data privacy is facilitated;
Performing signal conversion on the original interaction ciphertext and the transmission interaction ciphertext to obtain a comprehensive ciphertext signal, setting an initial monitoring coefficient, performing level extraction on the comprehensive ciphertext signal to generate a comprehensive ciphertext spectrogram, performing dynamic comparison on the comprehensive ciphertext spectrogram, and performing safe decryption to obtain transmission interaction data; and comparing the received encrypted interaction data with the encrypted interaction data before uploading, and checking whether the interaction transmission process is tampered and leaked, and only after the complete correct transmission, granting a decryption instruction to decrypt the encrypted interaction data to protect the data integrity.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of the present invention.
Detailed Description
The technical solutions of the present invention will be clearly and completely described in connection with the embodiments, and it is obvious that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
As shown in fig. 1, the multidimensional data monitoring method based on the multi-screen data interaction comprises the following steps:
Step S1: setting a multi-screen interaction end, setting an interaction front end and an interaction back end based on the multi-screen interaction end, and sending interaction data through the interaction front end to obtain original interaction data;
step S2: performing character conversion on the obtained original interaction data to obtain an original interaction character string, setting a first variation parameter and a second variation parameter to perform analog-to-digital conversion to obtain a base modulus, combining the base modulus to obtain a safety coefficient set and a public coefficient set, and performing transmission encryption on the obtained original interaction character string according to the obtained public coefficient set to obtain an original interaction ciphertext;
step S3: setting an interactive object end, receiving an original interactive ciphertext through an interactive rear end of the interactive object end to obtain a transmission interactive ciphertext, performing signal conversion on the original interactive ciphertext and the transmission interactive ciphertext to obtain a comprehensive ciphertext signal, setting an initial monitoring coefficient, performing discrete classification to obtain a discrete coefficient segment, and performing hierarchical extraction on the comprehensive ciphertext signal according to the discrete coefficient segment to obtain a comprehensive extraction ciphertext coefficient;
Step S4: generating a comprehensive ciphertext spectrogram according to the obtained comprehensive extracted ciphertext coefficient, dynamically comparing the obtained comprehensive ciphertext spectrogram to obtain a dynamic coefficient difference, setting a zero ratio threshold value, obtaining an isomorphic coefficient difference according to the zero ratio threshold value, sending a decryption instruction to the obtained isomorphic coefficient difference, obtaining a safety coefficient set, and safely decrypting the transfer interaction ciphertext according to the safety coefficient set to obtain transfer interaction data.
It should be further noted that, in the implementation process, the process of collecting comprehensive resource data includes:
setting a multi-screen interaction end according to multi-screen data interaction, and setting an interaction front end and an interaction rear end based on the multi-screen interaction end;
The interaction front end is used for sending interaction data and marking the sent interaction data as original interaction data;
The interaction back end is used for receiving the encrypted original interaction data;
The original interaction data comprise user behavior data, equipment operation data, network communication data and interaction record data;
It should be further noted that, in the implementation process, the interaction front end and the interaction back end are set on the corresponding multi-screen interaction end, and one multi-screen interaction end corresponds to one interaction front end and one interaction back end, so that the interaction data can be uploaded and received at the same time;
Particularly, the multi-screen interaction end represents a data large-screen page capable of displaying data content and interaction modes, the development of the data large-screen page is that a front-end project is initialized through vue-cli, a G2 chart library under AntV is adopted to construct a data visualization graphic library, a network request module is realized based on Axios, and an Element-UI is adopted to realize the whole UI.
Performing character conversion on the obtained original interaction data to obtain an original interaction character string;
marking the obtained original interaction character string as y;
The expression form of the original interactive character string is formed by a section of randomly combined numbers, and the character conversion protocols of the same multi-source data interaction terminal are the same;
Further, according to user behavior data, equipment operation data, network communication data and interaction record data included in the original interaction data, the obtained original interaction character string comprises a user behavior character string, an equipment operation character string, a network communication character string and an interaction record character string;
Setting a first variation parameter and a second variation parameter, marking the obtained first variation parameter as a1, and marking the obtained second variation parameter as a2;
obtaining a reference base according to the set first variation parameter and second variation parameter, and marking the obtained reference base as c, wherein c=a1×a2;
Obtaining a center coefficient based on the obtained reference cardinal number, and marking the obtained center coefficient as Wherein, the method comprises the steps of, wherein,;
Further, the expression form of the center coefficient is Euler function form;
setting a condition parameter, marking the obtained condition parameter as e, wherein e meets the requirement of And e is equal toA prime positive integer of each other;
obtaining a base modulus based on the obtained center coefficient and the condition parameter, and marking the obtained base modulus as d, wherein, D represents the modulus of eIs a multiplicative inverse of (a);
Combining the obtained base modulus and the reference base to obtain a safety coefficient set, and marking the obtained safety coefficient set as (d, c);
Combining the obtained condition parameters and the reference base to obtain a common coefficient set, and marking the obtained common coefficient set as (e, c);
Uploading the obtained safety coefficient set to the interaction front end, and respectively uploading the obtained public coefficient set to the interaction front end and the interaction rear end;
Particularly, the interaction back end uploaded by the public coefficient set is the interaction back end of the multi-screen interaction end of the interaction object;
carrying out transmission encryption on the obtained original interaction character string according to the obtained condition parameters and the reference base number to obtain an original interaction ciphertext;
the obtained original interaction ciphertext is marked j, wherein, % Is the modulo operator, and y < c.
Setting an interactive object terminal according to the obtained multi-screen interactive terminal;
further, the interactive object end represents another multi-screen interactive end for carrying out interactive information receiving;
Uploading the obtained original interaction ciphertext to an interaction object end, and receiving the original interaction ciphertext through an interaction back end to obtain a transmission interaction ciphertext;
Marking the obtained transmission interaction ciphertext and the original interaction ciphertext as comprehensive interaction ciphertext;
Performing signal conversion on the obtained comprehensive ciphertext data to obtain a comprehensive ciphertext signal;
further, according to the transmission interaction ciphertext and the original interaction ciphertext included in the comprehensive interaction ciphertext, the comprehensive ciphertext signal comprises a transmission ciphertext signal and an original ciphertext signal; specifically, the integrated ciphertext signal is processed later, namely the transmitted ciphertext signal and the original ciphertext signal are processed in the same way;
setting an initial monitoring coefficient according to the obtained comprehensive ciphertext signal;
the expression form of the initial monitoring coefficient is a functional form;
setting dynamic parameters, wherein the dynamic parameters are used for adjusting translation and expansion of the initial monitoring coefficient in the horizontal dimension and the vertical dimension;
setting a dynamic interval according to the obtained dynamic parameters and the comprehensive ciphertext signal;
will be by a means of will be by a means of dynamic spacing marked as ;
The dynamic interval represents the interval between two adjacent dynamic parameters;
obtaining a decomposition base according to the obtained dynamic parameters, dynamic interval and comprehensive ciphertext signal, and marking the obtained decomposition base as FJ, wherein, L represents the length of the comprehensive ciphertext signal, g represents the number of dynamic intervals, and f represents dynamic parameters;
Performing discrete classification on the initial monitoring coefficient according to the obtained decomposition base number to obtain a discrete coefficient segment;
It should be further noted that, in the specific implementation process, the discrete classification is to equally divide the initial monitoring coefficient according to the number of the decomposition base numbers to obtain a plurality of discrete coefficient segments with equal length;
performing level extraction on the obtained comprehensive ciphertext signal according to the obtained discrete coefficient segment to obtain a comprehensive extraction ciphertext coefficient;
The comprehensive extraction ciphertext coefficient comprises a transmission ciphertext coefficient and an original ciphertext coefficient;
It should be further noted that, in the specific implementation process, the level extraction corresponds to the discrete coefficient segment and the comprehensive ciphertext signal, and starts to correspond from the starting point of the comprehensive ciphertext signal, and convolves the discrete coefficient segment and the comprehensive ciphertext signal at the corresponding position to obtain the segmented ciphertext coefficient, until all the comprehensive ciphertext signals and the discrete coefficient segment complete convolution, and sums the obtained segmented ciphertext coefficients to obtain the comprehensive extraction ciphertext coefficient.
Generating a comprehensive ciphertext spectrogram according to the obtained comprehensive extraction ciphertext coefficient;
Performing frequency spectrum marking on the obtained comprehensive ciphertext spectrogram to obtain an original coefficient curve and a transfer coefficient curve;
Further, the original coefficient curve is generated according to the original ciphertext coefficient, and the transfer coefficient curve is generated according to the transfer ciphertext coefficient;
Dynamically comparing the obtained comprehensive ciphertext spectrograms to obtain dynamic coefficient differences;
it should be further noted that in the implementation process, the dynamic comparison is to first mark the original coefficient curve as W (n), mark the transfer coefficient curve as H (n), integrate the original coefficient curve and the transfer coefficient curve in the integrated ciphertext spectrogram to obtain a dynamic coefficient difference, and mark the obtained dynamic coefficient difference as Wherein, the method comprises the steps of, wherein,N represents the sampling point number in the comprehensive ciphertext spectrogram;
setting a zero ratio threshold, and marking the obtained zero ratio threshold as P0;
Further, in this embodiment, the zero ratio threshold is equal to 0;
performing interactive verification on the obtained dynamic coefficient difference according to the obtained zero ratio threshold value to obtain an isomorphic coefficient difference and an abnormal coefficient difference;
It should be further noted that in the specific implementation process, the interactive verification is to compare the zero ratio threshold value with the dynamic coefficient difference, if the dynamic coefficient difference is equal to the zero ratio threshold value, the dynamic coefficient difference is equal to the equal state coefficient difference, that is, the original coefficient curve coincides with the transfer coefficient curve, which indicates that after the encrypted original interactive data is transferred, the transfer interactive ciphertext reaching the interactive rear end of the other multi-screen interactive end is unchanged, and still is the original encrypted original interactive data, so that the information privacy in the interactive transfer process can be ensured, the information privacy is not stolen by illegal personnel, and the quality of the interactive data is enhanced;
If the dynamic coefficient difference is not equal to the zero ratio threshold, the dynamic coefficient difference is an abnormal coefficient difference, namely the original coefficient curve is not coincident with the transfer coefficient curve, and the encrypted original interaction data is transmitted, so that the transmission interaction ciphertext reaching the interaction rear end of the other multi-screen interaction end is changed, and the original encrypted original interaction data is not changed, and at the moment, illegal personnel invasion can be considered and the interaction data is modified, and the interaction process is required to be stopped;
An original coefficient curve and a transfer coefficient curve corresponding to the equal state coefficient difference are obtained, the obtained original coefficient curve is marked as a normal original coefficient, and the obtained transfer coefficient curve is marked as a normal transfer coefficient;
A decryption instruction is sent out to the normal original coefficient, and a safety coefficient set of the interaction front end is obtained through the decryption instruction;
Performing secure decryption on the transmission interaction ciphertext corresponding to the normal transmission coefficient according to the obtained security coefficient set to obtain transmission interaction data;
the obtained delivery interaction data is marked x, wherein, ;
It should be further noted that, in the implementation process, the transmitted interaction data and the original interaction data can be obtained according to the isomorphic coefficient difference, so as to ensure that the interaction data obtained by the two interaction parties are correct;
Specifically, the transmission of the original coefficient curve corresponding to the abnormal coefficient difference is suspended, a security manager is informed to conduct security check on the multi-screen interaction end, the multi-screen interaction end which is qualified in check obtains the original interaction ciphertext corresponding to the original coefficient curve, the original interaction ciphertext is uploaded to the interaction back end of the interaction object end again, the transmission interaction ciphertext is obtained, and the process of conducting security check on the transmission interaction ciphertext is repeated until the isocontrast coefficient difference is obtained.
The preferred embodiments of the invention disclosed above are intended only to assist in the explanation of the invention. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. The invention is limited only by the claims and the full scope and equivalents thereof.
Claims (7)
1. The multidimensional data monitoring method based on the multi-screen data interaction is characterized by comprising the following steps of:
Step S1: setting a multi-screen interaction end, setting an interaction front end and an interaction back end based on the multi-screen interaction end, and sending interaction data through the interaction front end to obtain original interaction data;
step S2: performing character conversion on the obtained original interaction data to obtain an original interaction character string, setting a first variation parameter and a second variation parameter to perform analog-to-digital conversion to obtain a base modulus, combining the base modulus to obtain a safety coefficient set and a public coefficient set, and performing transmission encryption on the obtained original interaction character string according to the obtained public coefficient set to obtain an original interaction ciphertext;
step S3: setting an interactive object end, receiving an original interactive ciphertext through an interactive rear end of the interactive object end to obtain a transmission interactive ciphertext, performing signal conversion on the original interactive ciphertext and the transmission interactive ciphertext to obtain a comprehensive ciphertext signal, setting an initial monitoring coefficient, performing discrete classification to obtain a discrete coefficient segment, and performing hierarchical extraction on the comprehensive ciphertext signal according to the discrete coefficient segment to obtain a comprehensive extraction ciphertext coefficient;
Step S4: generating a comprehensive ciphertext spectrogram according to the obtained comprehensive extracted ciphertext coefficient, dynamically comparing the obtained comprehensive ciphertext spectrogram to obtain a dynamic coefficient difference, setting a zero ratio threshold value, obtaining an isomorphic coefficient difference according to the zero ratio threshold value, sending a decryption instruction to the obtained isomorphic coefficient difference, obtaining a safety coefficient set, and safely decrypting the transfer interaction ciphertext according to the safety coefficient set to obtain transfer interaction data.
2. The multi-dimensional data monitoring method based on multi-screen data interaction of claim 1, wherein the process of obtaining the modulus of the substrate comprises:
performing character conversion on the obtained original interaction data to obtain an original interaction character string;
Setting a first variation parameter and a second variation parameter;
Obtaining a reference base number according to the set first variation parameter and second variation parameter;
obtaining a center coefficient according to the obtained reference base;
setting condition parameters, and obtaining the substrate modulus according to the obtained center coefficient and the condition parameters.
3. The multi-dimensional data monitoring method based on multi-screen data interaction according to claim 2, wherein the process of obtaining the original interaction ciphertext comprises:
Combining the obtained base modulus and the reference base number to obtain a safety coefficient set;
combining the obtained condition parameters and the reference base to obtain a common coefficient set;
Uploading the obtained safety coefficient set to the interaction front end, and respectively uploading the obtained public coefficient set to the interaction front end and the interaction rear end;
and carrying out transmission encryption on the obtained original interaction character string according to the obtained condition parameters and the reference base number to obtain an original interaction ciphertext.
4. A multi-dimensional data monitoring method based on multi-screen data interaction according to claim 3, wherein the process of obtaining the integrated ciphertext signal comprises:
Setting an interactive object terminal according to the obtained multi-screen interactive terminal;
Uploading the obtained original interaction ciphertext to an interaction object end, and receiving the original interaction ciphertext through an interaction back end to obtain a transmission interaction ciphertext;
Marking the obtained transmission interaction ciphertext and the original interaction ciphertext as comprehensive interaction ciphertext;
And performing signal conversion on the obtained comprehensive ciphertext data to obtain a comprehensive ciphertext signal.
5. The multi-dimensional data monitoring method based on multi-screen data interaction according to claim 4, wherein the process of obtaining the comprehensively extracted ciphertext coefficients comprises:
setting an initial monitoring coefficient according to the obtained comprehensive ciphertext signal;
setting dynamic parameters, and setting dynamic intervals according to the obtained dynamic parameters and the comprehensive ciphertext signals;
Obtaining a decomposition base number according to the obtained dynamic parameters, dynamic intervals and the comprehensive ciphertext signals;
Performing discrete classification on the initial monitoring coefficient according to the obtained decomposition base number to obtain a discrete coefficient segment;
and carrying out level extraction on the obtained comprehensive ciphertext signal according to the obtained discrete coefficient segments to obtain the comprehensive extracted ciphertext coefficient.
6. The multi-dimensional data monitoring method based on multi-screen data interaction according to claim 5, wherein the process of obtaining the difference of the isomorphic coefficients according to the zero ratio threshold value comprises:
generating a comprehensive ciphertext spectrogram according to the obtained comprehensive extraction ciphertext coefficient;
Performing frequency spectrum marking on the obtained comprehensive ciphertext spectrogram to obtain an original coefficient curve and a transfer coefficient curve;
Dynamically comparing the obtained comprehensive ciphertext spectrograms to obtain dynamic coefficient differences;
Setting a zero ratio threshold, and performing interactive verification on the obtained dynamic coefficient difference according to the obtained zero ratio threshold to obtain an isomorphic coefficient difference.
7. The multi-dimensional data monitoring method based on multi-screen data interaction of claim 6, wherein the process of obtaining the delivery interaction data comprises:
acquiring an original coefficient curve corresponding to the equal state coefficient difference, and recording the original coefficient curve as a normal original coefficient;
A decryption instruction is sent out to the normal original coefficient, and a safety coefficient set of the interaction front end is obtained through the decryption instruction;
And safely decrypting the transmission interaction ciphertext corresponding to the normal transmission coefficient according to the obtained safety coefficient set to obtain transmission interaction data.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410582965.XA CN118153082B (en) | 2024-05-11 | 2024-05-11 | Multi-dimensional data monitoring method based on multi-screen data interaction |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410582965.XA CN118153082B (en) | 2024-05-11 | 2024-05-11 | Multi-dimensional data monitoring method based on multi-screen data interaction |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN118153082A CN118153082A (en) | 2024-06-07 |
| CN118153082B true CN118153082B (en) | 2024-08-02 |
Family
ID=91293749
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202410582965.XA Active CN118153082B (en) | 2024-05-11 | 2024-05-11 | Multi-dimensional data monitoring method based on multi-screen data interaction |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN118153082B (en) |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN116077943A (en) * | 2022-08-05 | 2023-05-09 | 荣耀终端有限公司 | Method for scheduling system resources and related device |
| CN117093960A (en) * | 2023-08-22 | 2023-11-21 | 北京万里红科技有限公司 | Method, device, medium and equipment for displaying encryption attribute of secret related document |
Family Cites Families (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7313825B2 (en) * | 2000-11-13 | 2007-12-25 | Digital Doors, Inc. | Data security system and method for portable device |
| US9690915B2 (en) * | 2010-11-29 | 2017-06-27 | Biocatch Ltd. | Device, method, and system of detecting remote access users and differentiating among users |
| US9450971B2 (en) * | 2010-11-29 | 2016-09-20 | Biocatch Ltd. | Device, system, and method of visual login and stochastic cryptography |
| US10776476B2 (en) * | 2010-11-29 | 2020-09-15 | Biocatch Ltd. | System, device, and method of visual login |
| US9531733B2 (en) * | 2010-11-29 | 2016-12-27 | Biocatch Ltd. | Device, system, and method of detecting a remote access user |
| AU2013214801B2 (en) * | 2012-02-02 | 2018-06-21 | Visa International Service Association | Multi-source, multi-dimensional, cross-entity, multimedia database platform apparatuses, methods and systems |
| US9553982B2 (en) * | 2013-07-06 | 2017-01-24 | Newvoicemedia, Ltd. | System and methods for tamper proof interaction recording and timestamping |
| CN117375817A (en) * | 2023-10-16 | 2024-01-09 | 北京安天网络安全技术有限公司 | End-to-end encryption method and device for instant messaging data, electronic equipment and medium |
-
2024
- 2024-05-11 CN CN202410582965.XA patent/CN118153082B/en active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN116077943A (en) * | 2022-08-05 | 2023-05-09 | 荣耀终端有限公司 | Method for scheduling system resources and related device |
| CN117093960A (en) * | 2023-08-22 | 2023-11-21 | 北京万里红科技有限公司 | Method, device, medium and equipment for displaying encryption attribute of secret related document |
Also Published As
| Publication number | Publication date |
|---|---|
| CN118153082A (en) | 2024-06-07 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| DE102019000833B4 (en) | Procedures and systems for secure biometric authentication | |
| CN102387343B (en) | Terminal unit, server, data handling system, data processing method | |
| US8712043B2 (en) | Secure provisioning of a portable device using a representation of a key | |
| CN110324143A (en) | Data transmission method, electronic equipment and storage medium | |
| CN110401677B (en) | Method and device for acquiring digital copyright key, storage medium and electronic equipment | |
| CN105072125B (en) | A kind of http communication system and method | |
| CN101529366A (en) | Identification and visualization of trusted user interface objects | |
| US10938789B2 (en) | System and method for trusted presentation of information on untrusted user devices | |
| JP2008269610A (en) | Protecting sensitive data intended for remote application | |
| CN108769027A (en) | Safety communicating method, device, mobile terminal and storage medium | |
| CN112636914A (en) | Identity authentication method, identity authentication device and smart card | |
| CN117375817A (en) | End-to-end encryption method and device for instant messaging data, electronic equipment and medium | |
| Pavlovic et al. | Actor-network procedures | |
| JP2010011109A (en) | Authentication unit, authentication terminal, authentication system, authentication method, and program | |
| CN109510711A (en) | A kind of network communication method, server, client and system | |
| CN116756750A (en) | Medical sensitive data acquisition desensitization method | |
| CN118153082B (en) | Multi-dimensional data monitoring method based on multi-screen data interaction | |
| CN111698253A (en) | Computer network safety system | |
| CN111177748A (en) | Fingerprint storage encryption method, device and system | |
| US12141316B2 (en) | Obfuscation of sensitive information through non-visual feedback | |
| CN119483962A (en) | Data processing method and device | |
| CN107743120B (en) | Detachable encrypted test question data transmission system and method | |
| US20170085371A1 (en) | System and method for an enhanced xor cipher through extensions | |
| CN107292133A (en) | The obfuscation method and device of artificial intelligence | |
| WO2010013121A2 (en) | Method and apparatus for initialising a cryptographic communications system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |