Text security segmentation method

A text segmentation, text technology, used in secure communication devices, computer security devices, key distribution

Inactive Publication Date: 2019-10-25
EAST CHINA NORMAL UNIV +2
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

From the perspective of efficiency, the time complexity of the traditional text segmentation method is ()

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Text security segmentation method
  • Text security segmentation method
  • Text security segmentation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0086] In order to verify the method of the present invention, Sogou classified news is analyzed, and it is used as the experimental test corpus. Randomly select 10 different texts from 4000 corpus each time, extract 3-11 sentences highlighting themes from each text to form a paragraph, combine these 10 paragraphs to form a new text, and use this new text as the text to be segmented.

[0087] Segment the new text into 10 paragraphs using a text segmentation method based on the hierarchical Dirichlet model. According to the formula:

[0088]

[0089]Obtain e=5, f=3, represent that 10 paragraphs are mapped to 5 subtexts (P 1 , P 2 , P 3 , P 4 , P 5 ), the text can be restored with 3 of the subtexts. key is k 1 , k 2 ,...,k 10 , corresponding to the divided 10 paragraphs. as P 1 The header of the file is attached image 3 , where parameters e=5, f=3 constitute the segmentation parameter area, P 1 has key k 5 , k 6 , k 7 , k 8 , k 9 , k 10 .

[0090] The di...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a text security segmentation method. The method comprises the following steps: step A, segmenting an original text into paragraphs with different themes by using a text segmentation method based on a layered Dirichlet process model; B, regarding the original text as a secret key in a secret key space, and performing mapping projection on the secret key to a subspace to obtain a subsecret key, namely obtaining a subtext of the subsecret key from the original text; and step C, taking the number of the sub-texts required for recovering the text as input, and obtaining an original text after the steps of extracting parameters, creating a sub-text access table and filling the original text. According to the invention, security assurance is provided for storage and transmission of important texts.

Description

technical field [0001] The invention belongs to the field of text segmentation, in particular to a text security segmentation method. Background technique [0002] With the rapid development of the network, people have gradually stepped into a new network era, and various electronic text information is growing at an explosive rate. While massive information brings convenience, it also brings great challenges to the safe storage of text. Key sharing is an important topic in modern times. It aims to solve such a problem, that is, how to divide the key into several subkeys for distribution, so that only any number of subkeys reaching the specified number can be used to convert the original key. The key replies to decrypt the plaintext. [0003] The task of text segmentation belongs to the category of text processing, so text segmentation is essential for the typical steps of text processing. Traditional text segmentation aims to divide a large-sized text evenly into several ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F17/27H04L9/08
CPCG06F21/602H04L9/0863G06F40/289
Inventor 王剑何欣卢文达周洋陈政波邱兰馨刘秀徐亦白赖晓翰周梦兰包迅格冯烛明魏骁戚浩金王勇王彬栩杨跃平张全邢雅菲于晓蝶潘富城冉清文琚小明
Owner EAST CHINA NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products