Big data message encryption method and device

An encryption method and big data technology, applied in the field of big data information security, can solve the problem that message security is difficult to guarantee

Active Publication Date: 2019-10-15
中电科网络安全科技股份有限公司
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in this process, the security of the message is difficult to be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data message encryption method and device
  • Big data message encryption method and device
  • Big data message encryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] The following will clearly and completely describe the technical solutions in the embodiments of the present disclosure with reference to the accompanying drawings in the embodiments of the present disclosure. Apparently, the described embodiments are only some of the embodiments of the present disclosure, not all of them. Based on the embodiments in the present disclosure, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present disclosure.

[0079] see figure 1 , figure 1 It is a first flow chart of a method for encrypting a big data message according to an exemplary embodiment.

[0080] A big data message encryption method involved in the present disclosure is applied to a message producer of a big data system, and may include the following steps:

[0081] Step S101: Obtain the message of the target topic to be transmitted to the proxy server of the big data system.

[0082...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a big data message encryption method and device which are applied to a message producer of a big data system. The method includes: acquiring a message to be transmitted to a target theme in a proxy server of the big data system; acquiring an encryption attribute of the target theme; and performing encryption and rewriting processing on the message based on the encryption attribute, and sending a processing result to an agent theme corresponding to the target theme in the agent server, so that a physical cipher machine corresponding to the agent theme decrypts the processing result to obtain the message and transmit the message to the target theme. The invention provides a big data message encryption method and device. After acquiring the message and the encryption attribute corresponding to the target theme, the message producer encrypts and rewrites the message based on the encryption attribute, so that the security of the message is improved, the security protection of the message is realized by virtue of a physical cipher machine, and the security of the message in a big data system is improved.

Description

technical field [0001] The present disclosure relates to the technical field of big data information security, and more specifically, to a method and device for encrypting a big data message. Background technique [0002] In the big data system, the KafKa message queue can be used to send messages. KafKa refers to a distributed message queue system using the Pub-Sub (publish-subscribe) mechanism, which consists of three roles: message producer, proxy server and message consumer constitute. The message producer generates the message of the specified topic and transmits it to the proxy server cluster. The proxy server cluster maintains message queues of various topics in the disk storage, and the message consumer who subscribes to a topic pulls the newly generated message from the proxy server cluster. message and process it. However, in this process, the security of the message is difficult to be guaranteed. [0003] To sum up, how to improve the security of messages in bi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04L29/08
CPCH04L9/0869H04L63/045H04L67/56
Inventor 罗俊
Owner 中电科网络安全科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products