CN117992983B - Vector space data encryption and decryption method, computer equipment and storage medium - Google Patents
Vector space data encryption and decryption method, computer equipment and storage mediumInfo
- Publication number
- CN117992983B CN117992983B CN202410180667.8A CN202410180667A CN117992983B CN 117992983 B CN117992983 B CN 117992983B CN 202410180667 A CN202410180667 A CN 202410180667A CN 117992983 B CN117992983 B CN 117992983B
- Authority
- CN
- China
- Prior art keywords
- character
- space data
- vector space
- coordinate point
- character set
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a vector space data encryption and decryption method, which relates to the technical field of space data protection, and comprises the steps of firstly, constructing a group of character combinations representing coordinate points of vector space data and recording a first character set A; a set of character combinations representing the types of vector space data is constructed, and a second character set B is noted. And secondly, randomly scrambling the coordinate point set P of the vector space data, and marking the original correct bit sequence of the coordinate point set P after scrambling as a third character set a by using A, wherein the type of the vector space data is marked as B, and the obtained result is marked as a fourth character set B. The vector space data is encrypted and then converted into p, a third character set a and a fourth character set b. And finally, performing inverse decryption processing on the encrypted vector space data by using the A and the B. The invention also discloses a computer device and a storage medium, which realize the encryption and decryption processing of the vector space data and have higher execution efficiency.
Description
Technical Field
The invention relates to the technical fields of space data protection, city planning, geographic information systems, large data platforms and the like, in particular to a vector space data encryption and decryption method, computer equipment and a storage medium.
Background
Currently, vector space data confidentiality is an important task in the field of urban planning and geographic information, and national security and space data financial protection are related. Currently, it is a very common storage scheme to store spatial data in a coordinate pair manner, and the spatial data can be quickly transmitted and read. However, when such data is transmitted and used, confidentiality of the data is poor, and spatial location information cannot be effectively protected.
Disclosure of Invention
The invention aims to solve the technical problem of overcoming the defects of the prior art and providing a vector space data encryption and decryption method, computer equipment and storage medium.
The invention adopts the following technical scheme for solving the technical problems:
The invention provides a vector space data encryption and decryption method based on coordinate point location confusion, which comprises the following steps:
step 1, constructing a group of character combinations representing the coordinate point sequences of vector space data, and marking the character combinations as a first character set A;
constructing a group of character combinations representing the types of vector space data, and marking the character combinations as a second character set B;
Step2, randomly scrambling the coordinate point set P of the vector space data to obtain a scrambled coordinate point set P, and marking the original correct bit sequence of the P as a third character set a by using a first character set A;
The type of vector space data is represented by a second character set B, and the result is marked as a fourth character set B;
step 3, the encrypted vector space data comprises a coordinate point set p, a third character set a and a fourth character set b which are subjected to scrambling processing;
and 4, performing anti-decryption processing on the encrypted vector space data by using the first character set A and the second character set B.
As a further optimization scheme of the vector space data encryption and decryption method based on coordinate point location confusion, the construction process of the first character set A in the step 1 is specifically as follows:
step 1.1, selecting a group of character elements to form a first character set A;
Step 1.2, randomly arranging character elements in the first character set A when each construction is carried out;
step 1.3, the sequence of the character elements after random arrangement represents the coordinate point sequence of the vector space data.
As a further optimization scheme of the vector space data encryption and decryption method based on coordinate point location confusion, the construction process of the second character set B specifically comprises the following steps:
Step 2.1, selecting a group of character elements to form a second character set B;
Step 2.2, randomly arranging character elements in the second character set B when constructing each time;
Step 2.3, the character element sequence after random arrangement represents the type of vector space data.
As a further optimization scheme of the vector space data encryption and decryption method based on coordinate point location confusion, the character elements are case letters, numbers, special symbols or Chinese characters.
As a further optimization scheme of the vector space data encryption and decryption method based on coordinate point location confusion, the process of obtaining the third character set a is as follows:
firstly, randomly scrambling a coordinate point set P of vector space data to form a scrambled coordinate point set P;
Secondly, for the correct order of original coordinate points in a coordinate point set P of the vector space data, finding out character elements with the character element bit sequence numbers of the correct order in a first character set A, and marking the character elements as character elements f corresponding to each coordinate point in the coordinate point set P of the vector space data;
Finally, sequentially taking out character elements f corresponding to each coordinate point in a coordinate point set P aiming at the vector space data, and sequentially combining the character elements f into a third character set a;
If the vector space data only has one coordinate point, a plurality of character elements which do not belong to the first character set A are randomly added into the third character set a.
As a further optimization scheme of the vector space data encryption and decryption method based on coordinate point location confusion, the method for obtaining the fourth character set b comprises the following steps:
Firstly, selecting a corresponding character element L in a second character set B aiming at vector space data;
Next, a set of character elements not included in the second character set B is configured together with L to form a fourth character set B representing the type of vector space data.
As a further optimization scheme of the vector space data encryption and decryption method based on coordinate point location confusion, the method comprises the following specific steps of:
step 4.1, judging the bit sequence W of each character element in the third character set a by utilizing the first character set A, wherein the character elements not belonging to the third character set a are not processed;
step 4.2, adjusting the bit sequence of the coordinate points in p according to the bit sequence result of W to form a correct vector space data coordinate point set;
And 4.3, extracting characters which are character elements in the second character set B from the fourth character set B, and judging the type of the vector space data according to the type of the vector element represented by each character element in the second character set B.
As a further optimization scheme of the vector space data encryption and decryption method based on coordinate point sequence confusion, the vector space data are vector space data of land parcels for urban planning.
A computer device comprising a memory storing a computer program and a processor implementing a method of vector space data encryption and decryption based on point location confusion of coordinates as claimed in any preceding claim when the computer program is executed.
A computer readable storage medium having stored thereon a computer program which when executed by a processor implements a method of encrypting and decrypting vector space data based on confusion of point locations of coordinates as described in any of the above.
Compared with the prior art, the technical scheme provided by the invention has the following technical effects:
(1) The invention provides a vector space data encryption and decryption method based on coordinate point position confusion, which can quickly encrypt and decrypt vector space data through sequential control of characters;
(2) The invention provides a vector space data encryption and decryption method based on coordinate point sequence confusion based on vector space data.
(3) The invention has higher running speed and can ensure higher execution efficiency when the actual computer is used for calculation and processing.
Drawings
Fig. 1 is a schematic overall flow diagram of the present invention.
Fig. 2 is a schematic diagram of a first character set a.
Fig. 3 is a schematic diagram of a second character set B.
FIG. 4 is an example schematic diagram of a set of coordinate points.
Fig. 5 is an exemplary schematic diagram of a randomly shuffled set of coordinate points.
Fig. 6 is a schematic diagram of a process of converting a coordinate point set into a character set after random scrambling.
Fig. 7 is a schematic diagram of a process of converting to a character set in the case of only a single coordinate point.
Fig. 8 is a schematic diagram of a process of converting types of vector space data into character sets.
Fig. 9 is a schematic diagram of a decryption process for the coordinate point location.
Fig. 10 is a schematic diagram of a decryption process of the type of vector space data.
Detailed Description
The technical scheme of the invention is further described in detail below with reference to the accompanying drawings:
In the technical fields of urban planning management, geographic information and the like, many achievements are vector space data, such as land areas for urban planning, land areas for territorial resource investigation and the like. These data often have strong security requirements to be usable. Therefore, it is necessary to encrypt and decrypt such data for use in a computer network environment.
The vector space data core is composed of a set of coordinate pairs. If the order of these coordinate pairs is randomly disturbed, a certain security treatment of the data can be achieved. Meanwhile, in order to better realize protection of an encrypted file, the file for decryption is divided into 2 parts. The first part is to represent the correct vector space data coordinate pair bit sequence by other character codes, and the other part is a character set capable of analyzing the character code sequence of the first part. When decrypting, only the order of the vector space data coordinate pair is restored to the correct order. An important innovation of the present invention is thus that the encryption and decryption processes are achieved by bit order confusion of vector space data coordinate pairs. Meanwhile, the bit sequence is adjusted and the bit sequence number is identified, so that the operation speed is high during the calculation processing of an actual computer, and the high execution efficiency of the invention can be ensured.
Vector space data are stored and transmitted in a coordinate point set mode at present frequently, so that the application of the space data is convenient and quick, and the vector space data are beneficial to programs of different computer terminals to use because of the unified text format.
Step 1, referring to fig. 1, firstly, constructing a group of character combinations representing coordinate point sequences of vector space data, and marking the character combinations as a first character set A;
step 1.1, selecting a group of character elements to form a first character set A, wherein the character elements are case letters, numbers, special symbols or Chinese characters.
Step 1.2, randomly arranging character elements in the first character set A when each construction is carried out;
step 1.3, the sequence of the character elements after random arrangement represents the coordinate point sequence of the vector space data.
Referring to fig. 2, a character element "a" represents a coordinate point location 1 of vector space data;
Character element "d" represents coordinate point location 2 of vector space data;
character element "c" represents coordinate point location 3 of vector space data;
Character element "f" represents coordinate point location 4 of vector space data;
character element "2" represents coordinate point location 5 of vector space data;
The character element "q" represents the coordinate point location 6 of the vector space data;
character element "×" represents the coordinate point position 7 of the vector space data;
Step2, constructing a group of character combinations representing the types of vector space data, and marking the character combinations as a second character set B;
Step 2.1, selecting a group of character elements to form a second character set B;
Step 2.2, randomly arranging character elements in the second character set B when constructing each time;
Step 2.3, the character element sequence after random arrangement represents the type of vector space data.
Referring to fig. 3, the bit order 1 of the character element "x" represents the point type of the vector space data;
bit sequence 2 of the character element "y" represents the line type of the vector space data;
the bit order 3 of the character element "z" represents the face type of the vector space data;
Step 3, randomly scrambling the coordinate point set P of the vector space data to obtain a scrambled coordinate point set P, and marking the original correct bit sequence of the P as a third character set a by using a first character set A;
Step 3.1, randomly scrambling the coordinate point set P of the vector space data to form a scrambled coordinate point set P;
Referring to fig. 4, vector space data consisting of 6 points, the type of which is a line;
referring to fig. 5, after the random scrambling process, the order of the original 6 points is changed.
Step 3.2, finding out the character element with the character element bit sequence number of the correct bit sequence in the first character set A for the correct bit sequence of the original coordinate point in the coordinate point set P of the vector space data, and marking the character element as a character element f corresponding to each coordinate point in the coordinate point set P of the vector space data;
step 3.3, sequentially taking out character elements f corresponding to each coordinate point in the coordinate point set P of the vector space data, and sequentially combining the character elements f into a third character set a;
Referring to fig. 6, since the character element "2" represents the coordinate point position 5 of the vector space data, and the first point after the random scrambling is originally the point with the position 5, the character element "2" can be used to represent the correct position of the first point after the random scrambling. By analogy, the last character set a is "2cdfaq";
And 3.4, if the vector space data only has one coordinate point, randomly adding a plurality of character elements which do not belong to the first character set A into the third character set a.
Referring to fig. 7, in the case of only one point, 2 character elements "m" and "n" are added to be confused, wherein "m" and "n" are not to belong to the first character set a.
Step 4, the type of vector space data is represented by a second character set B, and the obtained result is marked as a fourth character set B;
step 4.1, selecting a character element L corresponding to the second character set B aiming at the vector space data;
Step 4.2, configuring a group of character element sets which are not contained in the second character set B and L to form a fourth character set B representing the type of vector space data.
Referring to fig. 8, the character element "y" represents the vector element type of the present example. Meanwhile, 2 character elements "s" and "d" are added to be confused, wherein "s" and "d" do not belong to the second character set B.
Step 5, the encrypted vector space data comprises a coordinate point set p, a third character set a and a fourth character set b which are subjected to scrambling processing;
and 6, performing anti-decryption processing on the encrypted vector space data by using the first character set A and the second character set B. Step 6.1, judging the bit sequence W of each character element in the third character set a by utilizing the first character set A, wherein the character elements not belonging to the third character set a are not processed;
Step 6.2, adjusting the bit sequence of the coordinate points in p according to the bit sequence result of W to form a correct vector space data coordinate point set;
Referring to fig. 9, according to the arrangement order of each character element of "2cdfaq" in the third character set a in the first character set a, the actual order of the vector space data coordinate points after the random scrambling processing is judged, and the order is "532416" in sequence. According to the bit sequence, the bit sequence of the vector space data after random scrambling is rearranged, so that the original correct bit sequence of the vector space data can be obtained.
And 6.3, extracting characters which are character elements in the second character set B from the fourth character set B, and judging the type of the vector space data according to the type of the vector element represented by each character element in the second character set B.
Referring to fig. 10, first, for the character elements in the fourth character set b, which are character elements in the character set, it can be found that only the character element is "y" belonging to, and the type of vector space data represented by the character element "y" is a line. Thus, the type of vector space data that can be finally decrypted out of this example is a line.
The foregoing is merely illustrative of the present invention, and the present invention is not limited thereto, and any changes or substitutions easily contemplated by those skilled in the art within the scope of the present invention should be included in the scope of the present invention.
Claims (9)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410180667.8A CN117992983B (en) | 2024-02-18 | 2024-02-18 | Vector space data encryption and decryption method, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410180667.8A CN117992983B (en) | 2024-02-18 | 2024-02-18 | Vector space data encryption and decryption method, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117992983A CN117992983A (en) | 2024-05-07 |
CN117992983B true CN117992983B (en) | 2025-07-29 |
Family
ID=90898795
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410180667.8A Active CN117992983B (en) | 2024-02-18 | 2024-02-18 | Vector space data encryption and decryption method, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117992983B (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113901159A (en) * | 2021-09-29 | 2022-01-07 | 中南大学 | A Local Encryption and Decryption Method for Vector Data Network Transmission Based on Multilevel Spatial Index |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101416537B1 (en) * | 2012-04-18 | 2014-07-09 | 주식회사 로웸 | User authentication method using icon combined with input pattern password input apparatus |
KR101790325B1 (en) * | 2017-07-26 | 2017-10-25 | 주식회사 차칵 | Encryption and Decryption System |
CN112989394B (en) * | 2021-04-28 | 2024-03-01 | 南京吉印信息科技有限公司 | Vector geographic data encryption and decryption method and system |
CN115690242A (en) * | 2022-11-04 | 2023-02-03 | 北京开运平行空间技术有限公司 | Encryption processing system for satellite control data |
CN116415283A (en) * | 2023-06-06 | 2023-07-11 | 南京师范大学 | Vector geographic data encryption method, system, electronic equipment and storage medium |
-
2024
- 2024-02-18 CN CN202410180667.8A patent/CN117992983B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113901159A (en) * | 2021-09-29 | 2022-01-07 | 中南大学 | A Local Encryption and Decryption Method for Vector Data Network Transmission Based on Multilevel Spatial Index |
Also Published As
Publication number | Publication date |
---|---|
CN117992983A (en) | 2024-05-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101324825B1 (en) | Message authentication code pre-computation with applications to secure memory | |
Mandal et al. | Symmetric key image encryption using chaotic Rossler system | |
CN116582246B (en) | Vector geospatial data exchange cipher watermarking method based on chaos and zero watermarking | |
CN105959098A (en) | Format-reserved encryption algorithm based on multi-segmented Feistel network | |
CN103778590A (en) | Method and device for utilizing digital image to store and transmit information | |
CN105635144A (en) | Cloud-platform-server-based data processing method and system | |
CN110704854B (en) | Stream type encryption method aiming at text data reserved format | |
CN110263505B (en) | Picture processing method and device based on block chain | |
CN114221766B (en) | Data encryption method, data decryption method and data encryption device | |
CN101261666A (en) | A method for realizing software copyright protection based on encrypted executable program file | |
Panduranga et al. | Hybrid approach for image encryption using SCAN patterns and Carrier Images | |
CN104202147B (en) | A kind of encryption method based on geo-information product feature | |
CN102480353A (en) | Method for password authentication and key protection | |
KR20160057038A (en) | Apparatus and method for encryption and decryption of qr code | |
Song et al. | A secure image encryption algorithm based on multiple one-dimensional chaotic systems | |
EP3483867B1 (en) | System, device, method, and program for indexing a secret-shared array with secure multiparty computations | |
CN101536401B (en) | Information processing device | |
CN111191272A (en) | Data desensitization method, electronic device and storage medium | |
CN117992983B (en) | Vector space data encryption and decryption method, computer equipment and storage medium | |
CN105872305B (en) | A kind of completely separable encryption area image reversible data concealing method | |
CN114065258B (en) | A geospatial data encryption method for mobile terminals | |
CN108847924A (en) | Encryption method, device, computer equipment and storage medium | |
CN112784943A (en) | Two-dimensional code encryption method, system, equipment and storage medium | |
US20210143978A1 (en) | Method to secure a software code performing accesses to look-up tables | |
Ali et al. | A new approach for expansion the throughput capacity of the quick response code |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |