Unlock instant, AI-driven research and patent intelligence for your innovation.

Improved high-security big data hiding method

A high-security, big-data technology, applied in the high-security big data hiding field, can solve problems such as big data storage loopholes and illegal loss, and achieve the effect of protecting security

Inactive Publication Date: 2015-03-04
YANCHENG GREATSEC TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] System security is directly related to server data security, but there are certain loopholes in the current method of big data storage, which can easily lead to illegal loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0009] This specific implementation mode adopts the following technical scheme: its hiding method is: after first passing the identity verification, a large amount of data is uploaded to the server database; then the data is randomly divided into N sections, and the data information content of each section is not equal, and then Each segment of data is constructed into an orthogonal matrix, and each segment of data is a matrix. The product of the Mth row and Nth column of each matrix is ​​used as the password of the matrix, and the passwords of each matrix are combined in turn to form the client password.

[0010] All the orthogonal matrices mentioned above are randomly allocated in different partitions of the server data.

[0011] M and N in the Mth row and Nth column of the matrix are randomly generated, and can also be defined by the customer.

[0012] The method of data extraction in this specific embodiment: firstly, after the customer passes the identity identification, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an improved high-security big data hiding method, and relates to the technical field of information security. The improved high-security big data hiding method comprises the steps of firstly, after authentication, uploading mass data into a database of a server; after that, dividing the data into N sections in a random way, wherein the data information contents of all the sections are not equal to one another; enabling all the sections of data to be established into an orthogonal matrix, wherein each section of data is taken as a matrix; taking the product of the M line and the N row of each matrix as the password of the matrix; then, sequentially combining the passwords of all the matrixes to form a client-side password. According to the method, the random assignment way is combined with a matrix algorithm, and the matrix passwords are matched while the big data is divided and stored, so that the safety of the data is effectively protected.

Description

Technical field: [0001] The invention relates to the technical field of information security, in particular to an improved high-security big data hiding method. Background technique: [0002] System security refers to the application of system security engineering and system security management methods in the system life cycle, identifying hazards in the system, and taking effective control measures to minimize the hazards, so that the system can operate within the specified range of performance, time and cost. achieve the best level of safety within. System security is a security theory and method system developed and researched by people to solve the security problems of complex systems. The basic principle of system security is that in the conceptual stage of a new system, its security issues must be considered, and security work plans (system security activities) must be formulated and implemented. And the system security activities run through the entire system life c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6227
Inventor 傅涛傅德胜经正俊孙文静
Owner YANCHENG GREATSEC TECH