Disclosure of Invention
In view of the above, the present invention provides a data circulation method and apparatus based on data usage control to solve the above-mentioned problems of the related art.
The invention can realize the aim by the following technical scheme that the data circulation method based on the data use control comprises the following steps:
the data provider sends the data to the data storage center, defines the data use strategy, associates the uploaded data with the use strategy after the definition is completed, and stores the data in the data storage center;
the data request is that a data requester sends out a data access request and provides identity verification information of the corresponding requester;
The circulation control, which is to comprehensively analyze the identity verification information and the data access request of the data requester and execute corresponding steps to determine whether the data requester is authorized to access;
The storage center is used for encrypting the data based on a preset encryption rule after the data provider sends the data to the data storage center;
the audit is used for recording access related information of each data access, wherein the access related information comprises access time, requester identity and accessed data.
In some embodiments, a data usage policy is defined, specifically:
extracting the property of the data uploaded by the data provider, classifying the data, and presetting a group of basic strategy template sets corresponding to different types of data respectively;
The method comprises the steps of extracting a policy template with the top three using times from a basic policy template set corresponding to uploaded data, pushing the policy template to a data provider corresponding to the current uploaded data, selecting a group of policy templates from the policy templates with the top three using times as basic templates by the data provider, and carrying out self-defining adjustment on the basic templates to serve as a data using policy of the current uploaded data, wherein the data using policy comprises data access authority, a data sharing range and a data retention period.
In some embodiments, the corresponding steps are performed to determine whether to grant the data requester access, specifically:
S1, verifying the identity verification information provided by the data requester, executing a step S2 if verification is successful, and executing a step S3 if verification is failed;
S2, after verification is successful, a position feedback instruction is sent to the data requester, the data requester receives the position feedback instruction and confirms, so that the position where the data requester sends a data access request currently is obtained, the position is compared with a set safe access range, if the position is in the set safe access range, the data requester is judged to be safe access, the data requester is authorized to access, and if the position is outside the set safe access range, the step S2-201 is executed;
And S3, marking the data access request sent by the data requester for the time as an abnormal access request, and simultaneously limiting the data access request of the requester in a set time period.
In some embodiments, the specific implementation steps of steps S2-201 are:
S2-201, matching the position of the data requester with the historical position information, if the matching is successful, determining that the data requester is safe access, if the matching is failed, determining that the data requester is remote access, and executing the step S2-202;
S2-202, acquiring the stay time of the data requester, counting the stay time from the time when the data requester enters a data storage center, ending counting when a data access request is sent, and taking the time of the time interval as the stay time of the data requester;
Marking a time point when the data requester sends a data access request, matching the marked time point with a set conventional time range, and presetting a group of weight coefficients respectively corresponding to the stay time and the access request times when the matching fails and the matching succeeds;
multiplying the stay time and the access request times of the data requester with the corresponding weight coefficients respectively based on the matching result, and then summing to obtain hidden danger assessment indexes of the data requester;
And comparing the hidden danger assessment index of the data requester with the corresponding reference hidden danger assessment index, if the hidden danger assessment index of the data requester is smaller than the corresponding reference hidden danger assessment index, judging that the data requester is safely accessed, otherwise, executing step S3.
In some embodiments, the data is encrypted based on a preset encryption rule, specifically:
m1, setting different key compositions generated by different classifications based on the property classifications of the uploaded data, and randomly generating a corresponding random key for the data uploaded by a data provider;
m2, after the corresponding random key is generated, extracting numbers in the random key as numbers to be processed, and carrying out digital conversion on letters and symbols in the random key based on a preset conversion rule;
M3, after the conversion in the step M2 is completed, randomly scrambling the sequence after combining the sequence with the digits to be processed to obtain a new series of digit combinations, and constructing an encryption graph I and an encryption graph II of the uploaded data based on the digit combinations;
and M4, scanning the uploaded data, extracting all contents except the text contents from the uploaded data, encrypting by using the first encryption graph, and encrypting the text contents in the uploaded data by using the second encryption graph.
In some embodiments, the conversion of the numbers of the letters and the symbols in the random key is performed based on a preset conversion rule, specifically, the numbers corresponding to the different letters and the symbols are set in the preset conversion rule, and the numbers corresponding to the different letters and the symbols are adjusted when the preset adjustment time interval point is reached according to the preset adjustment time interval.
In some embodiments, based on the digital combination, an encryption graphic of the uploaded data is constructed, specifically:
M3-301, extracting the first three groups of numbers from the number combination, substituting the first three groups of numbers into a preset encryption formula for calculation, so as to obtain three groups of calculated numbers, respectively filling the three groups of calculated numbers into a pre-constructed encryption frame, and obtaining an encryption graph I after filling is completed;
M3-302, extracting the residual numbers in the number combination based on the step M3-301, firstly counting the number of the residual numbers, firstly constructing a plane rectangular coordinate system after counting, drawing position points on the x axis of the plane rectangular coordinate system at the corresponding sorting positions of the residual numbers in the number combination, and continuously drawing corresponding numerical points by taking the specific numbers of the position points as numerical values after drawing;
And after all the numerical points are drawn, connecting two adjacent numerical points by using a linear line segment, drawing a circle by using the length of the linear line segment between the two adjacent numerical points as a diameter, randomly cutting off a semicircle by using the linear line segment as a cutting off boundary, and taking the cut-off graph as an encrypted graph II after all the cutting-off is completed.
In some embodiments, a data flow-through device based on data usage control includes:
The data uploading module is used for transmitting the data to the data storage center by the data provider, defining a data use strategy, associating the uploaded data with the use strategy after the definition is completed, and storing the data in the data storage center;
The data access module is used for sending a data access request by a data requester and providing identity verification information of the corresponding requester;
The control access module is used for comprehensively analyzing the identity verification information and the data access request of the data requester and executing corresponding steps to determine whether the data requester is authorized to access;
the data storage module is used for constructing a data storage center and encrypting data according to a preset encryption rule;
and the data auditing module records access related information of each data access, wherein the access related information comprises access time, requester identity and accessed data.
Compared with the prior art, the invention has the beneficial effects that:
According to the invention, through comprehensively analyzing the identity verification information and the data access request of the data requester, the identity verification information provided by the data requester is verified, after the verification is successful, the identity verification information is compared with the safety access range according to the position information of the requester to determine whether the access is authorized, if the data requester is out of the set safety access range, the position of the data requester is further matched with the history position information, if the matching fails, the data requester is judged to be accessed in different places, if the data requester is judged to be accessed in abnormal, the hidden danger assessment index of the data requester is analyzed, and the hidden danger assessment index is taken as the final basis whether the access is authorized, so that the problems that the data is easy to be accessed in unauthorized and abused in the circulation process and the fineness is lower due to the adoption of fixed data use and access strategies in the prior art are solved;
The invention generates the corresponding random key based on the property classification of the uploaded data, and adopts the preset conversion rule to carry out digital conversion on letters and symbols in the key, thereby constructing an encryption graph I and an encryption graph II, carrying out targeted encryption processing on different parts of the uploaded data, solving the problems that the encryption is usually carried out by adopting a more conventional encryption mode in the prior art, the security is still not fully ensured, and improving the security of data storage and transmission;
According to the method, the quality of the uploaded data of the data provider is extracted to classify the uploaded data, different types of data are preset to respectively correspond to a group of basic strategy template sets, strategy templates with top three using times ranking are extracted from the basic strategy template sets corresponding to the uploaded data and are pushed to the data provider, the data provider selects a group of strategy templates as basic templates, and the basic templates are subjected to self-defining adjustment and then serve as data using strategies of the current uploaded data, so that the data is properly protected according to the sensitivity and the application of the data;
The invention can limit the data access request of the requester in a set time period by aiming at the abnormal access request, thereby avoiding frequent operation of the data requester.
Detailed Description
Several embodiments of the present application will be described in more detail below with reference to the accompanying drawings in order to enable those skilled in the art to practice the application. The present application may be embodied in many different forms and objects and should not be limited to the embodiments set forth herein. These embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the application to those skilled in the art. The examples do not limit the application.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and/or the present specification and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
Example 1
Referring to fig. 1, a data circulation method based on data usage control includes:
The data provider sends the data to the data storage center through a safe data uploading interface, defines a data using strategy, associates the uploaded data with the using strategy after the definition is finished, and stores the data in the data storage center;
the data provider uses a pre-built uploading tool or API to transmit the data file to the data storage center, and simultaneously adopts encryption protocols such as SSL/TLS and the like to ensure the security of data transmission in the data uploading process;
defining a data use strategy, specifically:
extracting the nature of the data uploaded by the data provider to classify the data, such as personal identity information, financial data and the like;
establishing a base strategy template set with different levels according to different types of data, and obtaining the base strategy template set corresponding to the uploaded data based on the classification result of the uploaded data of the current data provider;
extracting a policy template with the top three using times ranking from a basic policy template set corresponding to the uploaded data;
each group of policy templates comprises data access authority setting, data retention deadline range setting and data sharing range setting;
the method comprises the steps of pushing the data to a data provider corresponding to current uploading data, wherein the data provider selects a group of strategy templates from three strategy templates in the ranking as basic templates, and self-defines and adjusts the basic templates to be used as a data use strategy of the current uploading data;
It should be noted that, in summary, the data provider may select the most suitable data usage policy for their uploading data, and may adjust the data usage policy according to the actual situation to ensure the security and compliance of the data.
The data request comprises that a data requester sends a data access request through a request interface and provides identity verification information of the corresponding requester, wherein the identity verification information comprises a user name, a password and an API key;
The circulation control comprises the steps of comprehensively analyzing the identity verification information of the data requester and the data access request, and executing corresponding steps to determine whether the data requester is authorized to access;
The method comprises the following steps:
S1, verifying the identity verification information provided by the data requester, executing a step S2 if verification is successful, and executing a step S3 if verification is failed;
S1-101, receiving a user name, a password and an API key submitted by a data requester, confirming that the submitted user name and password are matched with user credentials stored in a system, and simultaneously, determining whether the authority of the data requester meets the authority range and the sharing range set in the data use policy, wherein the successful matching and the successful verification are judged after the data use policy is met;
S2, after verification is successful, a position feedback instruction is sent to the data requester, the data requester receives the position feedback instruction and confirms, so that the position where the data requester sends a data access request currently is obtained, the position is compared with a set safe access range, if the position is in the set safe access range, the data requester is judged to be safe access, the data requester is authorized to access, and if the position is outside the set safe access range, the step S2-201 is executed;
S2-201, matching the position of the data requester with the historical position information, if the matching is successful, determining that the data requester is safe access, if the matching is failed, determining that the data requester is remote access, and executing the step S2-202;
S2-202, acquiring the residence time of the data requester, wherein the residence time is counted from the time when the data requester enters a data storage center, and the statistics is ended when a data access request is sent, and the time of the time interval is taken as the residence time of the data requester;
Longer dwell times may indicate that they are looking for information or attempting to bypass security measures, the corresponding higher the degree of risk;
counting the access request times of the data requester in a set time period;
Frequent attempts by users to access the system for short periods of time, particularly during non-working hours, may indicate an automated attack or unauthorized access attempt;
Marking a time point when the data requester sends a data access request, matching the marked time point with a set conventional time range, and presetting a group of weight coefficients respectively corresponding to the stay time and the access request times when the matching fails and the matching succeeds;
The retention time length and the weight coefficient of the access request times when the matching is failed are both larger than the retention time length and the weight coefficient of the access request times when the matching is successful;
multiplying the stay time and the access request times of the data requester with the corresponding weight coefficients respectively based on the matching result, and then summing to obtain hidden danger assessment indexes of the data requester;
Comparing the hidden danger assessment index of the data requester with the corresponding reference hidden danger assessment index, if the hidden danger assessment index of the data requester is smaller than the corresponding reference hidden danger assessment index, judging that the data requester is safely accessed, otherwise, executing step S3;
For example, if the access right of the data using policy setting of the access data is higher and the sharing range is smaller, the value setting of the reference hidden danger assessment index representing the data should be lower, so that the safety of the data is improved, and the specific value is set by technicians;
S3, marking the data access request sent by the data requester for the time as an abnormal access request, and simultaneously limiting the data access request of the requester in a set time period;
Limiting the requester from reissuing a data access request to the data for, for example, 60s or 3 minutes;
The storage center is used for encrypting the data based on a preset encryption rule after the data provider sends the data to the data storage center;
The method comprises the following steps:
M1, setting different key compositions generated by different classifications based on the property classification of the uploaded data, and randomly generating a corresponding random key for the data uploaded by a data provider by utilizing a machine learning algorithm, wherein the random key is randomly composed of numbers, symbols and letters;
For example, the personal identity information corresponds to a key composition of numbers plus letters, and the financial data corresponds to a key composition of numbers + letters + symbols;
the length range of the secret key is set to 8-12, and the secret key is randomly generated;
m2, after the corresponding random key is generated, extracting numbers in the random key as numbers to be processed, and carrying out digital conversion on letters and symbols in the random key based on a preset conversion rule;
m2-201, setting numbers corresponding to different letters and symbols in a preset conversion rule, and adjusting the numbers corresponding to the different letters and symbols respectively according to a preset adjustment time interval when the preset adjustment time interval point is reached;
for example, the conversion rule during the last adjustment interval is as follows:
For example, A/a- >1, B/B- > 3, C/C- > 5, etc. # - >14, & gt 15;
The preset adjustment time interval is to adjust the conversion rule once every 24 hours, and after 24 hours, the conversion rule is updated,
For example, A/a- > 7, B/B- >1, C/C- >3, etc., # - >18, & gt 14.
The conversion rule is updated regularly, so that the complexity of the key is increased, and an attacker is difficult to predict and crack;
m3, after the conversion in the step M2 is completed, randomly scrambling the sequence after combining the sequence with the digits to be processed to obtain a new series of digit combinations, and constructing an encryption graph of the uploaded data based on the digit combinations;
M3-301 extracting the first three groups of digits from the digit combination, and substituting the digits into preset encryption formulas to calculate, wherein the preset encryption formulas are set as follows The method comprises the steps of obtaining three groups of calculated numbers, filling the three groups of calculated numbers into a pre-constructed encryption frame respectively, and splicing the encryption frame by three groups of squares;
supplementary instructions, for example,
Extracting the first three groups of numbers in the combination, applying a preset encryption formula and constructing an encryption graph;
extracting the first three digits 5,2,8 and substituting the digits into the encryption formula Calculating to obtain three groups of calculated numbers 12,6,18;
Constructing an encryption frame formed by splicing three groups of squares, wherein the sizes of all squares are consistent, filling 12,6,18 calculated squares into the encryption frame, wherein the first square is filled with numbers 12, the second square is filled with numbers 6, and the third square is filled with numbers 18;
m3-302, based on the step M3-301, extracting the residual numbers in the number combination, firstly counting the number of the residual numbers, after counting, firstly constructing a plane rectangular coordinate system, drawing position points on the x axis of the plane rectangular coordinate system by the corresponding sorting positions of the residual numbers in the number combination, wherein the position points are closer to the original point as the sorting positions are more forward;
Connecting two adjacent numerical points by using a linear line segment after all the numerical points are drawn, drawing a circle by using the length of the linear line segment between the two adjacent numerical points as a diameter, randomly intercepting a semicircle by using the linear line segment as an intercepting boundary line until all the intercepting is finished, and taking the intercepted graph as an encrypted graph II;
supplementary instructions, for example,
Assuming that the remaining digits in the combination of digits are {4,7,2,9,5}, in this example, the number of digits remaining is the total number of digits in the combination, i.e., 5;
Drawing position points on the x-axis according to the ordering position of each digit in the digit combination, wherein the first digit 4 corresponds to the point 1 on the x-axis, the second digit 7 corresponds to the point 2, and so on;
at each position point, the numerical point is plotted on the y-axis according to the actual value of the number, the first number being 4, a point of height 4 is plotted at the position x=1:
A position at x=1, y=4, a position at x=2, y=7, a position at x=3, y=2, a position at 3, 2, a position at x=4, y=9, a position at 4, 9, a position at x=5, y=5, a position at 5;
Connection points (1, 4) and points (2, 7), connection points (2, 7) and points (3, 2), connection points (3, 2) and points (4, 9), connection points (4, 9) and points (5, 5);
drawing a circle by taking the straight line distance between the points (1, 4) and the points (2, 7) as a diameter, and randomly cutting out a semicircle;
Drawing a circle by taking the straight line distance between the points (2, 7) and the points (3, 2) as the diameter, and randomly cutting out a semicircle;
drawing a circle by taking the straight line distance between the points (3, 2) and the points (4, 9) as a diameter, and randomly cutting out a semicircle;
drawing a circle by taking the straight line distance between the points (4, 9) and the points (5, 5) as a diameter, and randomly cutting out a semicircle;
and taking the intercepted graph as an encrypted graph II.
M4, scanning the uploaded data, extracting all contents except text contents from the uploaded data, extracting other contents except text contents from the uploaded data, including digital, picture, video and the like, encrypting by using the first encryption graph, encrypting the text contents in the uploaded data by using the second encryption graph;
recording access related information of each data access, wherein the access related information comprises access time, requester identity and accessed data;
the method is also used for regenerating the encryption graph of the data according to the steps M1-M4 when the corresponding data triggers an abnormal access request, and replacing the old encryption graph for updating;
The method comprises the steps that a data provider is used for receiving a data access request, analyzing the access frequency of uploading data in a set time period, presetting the highest allowed access frequency of the uploading data in the set time period by the data provider, and if the access frequency of the uploading data in a certain set time period is higher than the preset highest allowed access frequency, triggering a strategy adjustment signaling and sending the strategy adjustment signaling to the data provider to adjust a data use strategy;
Example 2
Referring to fig. 2, an embodiment 2 of the present application provides a data flow device based on data usage control according to a data flow method based on data usage control provided in embodiment 1 of the present application. Example 2 is merely a preferred embodiment of example 1, and the implementation of example 2 does not affect the implementation of example 1 alone.
Specifically, the embodiment 2 of the present application provides a data circulation device based on data usage control, which is different in that the device includes a data uploading module, a data accessing module, a control accessing module, a data storage module and a data auditing module;
The data uploading module is used for transmitting the data to the data storage center by the data provider, defining a data use strategy, associating the uploaded data with the use strategy after the definition is completed, and storing the data in the data storage center;
the data access module is used for sending a data access request by a data requester and providing identity verification information of the corresponding requester;
The control access module is used for comprehensively analyzing the identity verification information and the data access request of the data requester and executing corresponding steps to determine whether the data requester is authorized to access;
The data storage module is used for constructing a data storage center and encrypting data according to a preset encryption rule;
the data auditing module is used for recording access related information of each data access, wherein the access related information comprises access time, requester identity and accessed data.
The preferred embodiments of the invention disclosed above are intended only to assist in the explanation of the invention. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. The invention is limited only by the claims and the full scope and equivalents thereof.