CN115438037A - Data processing method, device, system and storage medium thereof - Google Patents

Data processing method, device, system and storage medium thereof Download PDF

Info

Publication number
CN115438037A
CN115438037A CN202110607874.3A CN202110607874A CN115438037A CN 115438037 A CN115438037 A CN 115438037A CN 202110607874 A CN202110607874 A CN 202110607874A CN 115438037 A CN115438037 A CN 115438037A
Authority
CN
China
Prior art keywords
information
data
data processing
access
query result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110607874.3A
Other languages
Chinese (zh)
Inventor
谢东
刘世礁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN202110607874.3A priority Critical patent/CN115438037A/en
Priority to PCT/CN2022/089084 priority patent/WO2022252880A1/en
Publication of CN115438037A publication Critical patent/CN115438037A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2282Tablespace storage structures; Management thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Computational Linguistics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a data processing method, a device, a system and a storage medium thereof. The data processing method is applied to a data processing device and comprises the following steps: receiving first access information, wherein the first access information comprises sensitive data; performing first information processing on the first access information to obtain second access information, wherein the second access information comprises encrypted sensitive data; and sending the second access information to a database, so that the database performs data processing according to the encrypted sensitive data. According to the scheme of the embodiment of the invention, the encryption processing of the sensitive data can be realized under the condition of not depending on a service system and a database, so that the reconstruction cost can be reduced, and the universal applicability is improved.

Description

Data processing method, device, system and storage medium thereof
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a data processing method, an apparatus, a system, and a storage medium.
Background
In the big data era, the data volume in the application system is huge, wherein, for example, identification card information, fingerprint information, iris information, facial recognition feature information, health condition information (medical history, case or inspection report, etc.), personal property information, credit investigation/consumption records, ethnic or national origin, political view, religious belief, membership in the workplace, unpublished criminal record, child information, network identification information (such as account number, password or password protection answer, etc.), personal location information (such as track or accommodation information, etc.), etc., belong to sensitive information, and security protection is required. Encryption is an effective way to secure sensitive data.
In the related art, a scheme of modifying a service system to support encryption and decryption processing in service logic or a scheme of upgrading a database to support encryption and decryption processing on a stored data table is proposed. However, in the scheme of modifying the service system, the modification cost is high, the influence range is large, and from the perspective of the whole application system, the encryption and decryption processing belongs to a common function, and it is not reasonable to couple the encryption and decryption processing to a certain service system. In the scheme for upgrading the database, as the encryption function is still in the development stage in the database technology, the encryption function characteristics of various manufacturers are different, the implementation scheme is not uniform, and the universal applicability is not high.
Disclosure of Invention
The following is a summary of the subject matter described in detail herein. This summary is not intended to limit the scope of the claims.
Embodiments of the present invention provide a data processing method, an apparatus, a system, and a storage medium thereof, which can implement encryption processing on sensitive data without depending on a service system and a database, thereby reducing modification cost and improving universal applicability.
In a first aspect, an embodiment of the present invention provides a data processing method, which is applied to a data processing apparatus, where the data processing method includes:
receiving first access information, wherein the first access information comprises sensitive data;
performing first information processing on the first access information to obtain second access information, wherein the second access information comprises the encrypted sensitive data;
and sending the second access information to a database, so that the database performs data processing according to the encrypted sensitive data.
In a second aspect, an embodiment of the present invention further provides a data processing method, which is applied to a data processing system, where the data processing system includes a service system, a data processing apparatus, and a database, and the method includes:
the business system sends first access information to the data processing device, wherein the first access information comprises sensitive data;
the data processing device carries out first information processing on the first access information to obtain second access information, wherein the second access information comprises the encrypted sensitive data;
the data processing device sends the second access information to the database;
and the database performs data processing according to the encrypted sensitive data.
In a third aspect, an embodiment of the present invention further provides a data processing apparatus, including:
the system comprises an access interface module, a first access module and a second access module, wherein the access interface module is used for receiving first access information, and the first access information comprises sensitive data;
the information processing module is used for carrying out first information processing on the first access information to obtain second access information, wherein the second access information comprises the encrypted sensitive data;
and the database access module is used for sending the second access information to a database so that the database performs data processing according to the encrypted sensitive data.
In a fourth aspect, an embodiment of the present invention further provides a data processing apparatus, including: a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the data processing method as described above in the first aspect when executing the computer program.
In a fifth aspect, an embodiment of the present invention further provides a data processing system, which includes a service system, a data processing apparatus, and a database, where the service system, the data processing apparatus, and the database cooperate with each other to execute the data processing method according to the second aspect.
In a sixth aspect, the embodiment of the present invention further provides a computer-readable storage medium, which stores computer-executable instructions for executing the data processing method described above.
The embodiment of the invention comprises the following steps: the data processing device receives first access information, wherein the first access information comprises sensitive data; then, first information processing is carried out on the first access information to obtain second access information, wherein the second access information comprises encrypted sensitive data; and then sending the second access information to a database, so that the database performs data processing according to the encrypted sensitive data. According to the scheme of the embodiment of the invention, the data processing device is used for receiving the first access information containing the sensitive data, the data processing device is used for carrying out first information processing on the first access information to obtain the second access information containing the encrypted sensitive data, and then the data processing device is used for sending the second access information to the database.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the example serve to explain the principles of the invention and not to limit the invention.
FIG. 1 is a schematic diagram of a system architecture for performing a data processing method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a data processing apparatus according to an embodiment of the present invention;
FIG. 3 is a flow chart of a data processing method provided by an embodiment of the invention;
FIG. 4 is a flowchart of a specific method of step S120 in FIG. 3;
FIG. 5 is a schematic diagram of the structure of the mark information provided by an example of the present invention;
FIG. 6 is a flowchart of a specific method of step S122 in FIG. 4;
FIG. 7 is a flow chart of a data processing method provided by another embodiment of the invention;
FIG. 8 is a flowchart of a specific method of step S150 in FIG. 7;
FIG. 9 is a flowchart of a specific method of step S152 in FIG. 8;
fig. 10 is a flowchart of a data processing method according to a specific example of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and do not limit the invention.
It should be noted that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different from that in the flowcharts. The terms first, second and the like in the description and in the claims, and the drawings described above, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
The invention provides a data processing method, a data processing device, a data processing system and a computer readable storage medium, wherein first access information comprising sensitive data is received by the data processing device, then the first access information is subjected to first information processing by the data processing device to obtain second access information comprising encrypted sensitive data, and then the second access information is sent to a database by the data processing device, so that the database can perform data processing according to the encrypted sensitive data.
The embodiments of the present invention will be further explained with reference to the drawings.
As shown in fig. 1, fig. 1 is a schematic diagram of a system architecture for executing a data processing method according to an embodiment of the present invention. In the example of fig. 1, the system architecture includes a business system 110, a data processing device 120, and a database 130, wherein the data processing device 120 is disposed between the business system 110 and the database 130, and the data processing device 120 is communicatively connected to the business system 110 and the database 130, respectively.
The data processing device 120 can receive the access request information sent by the service system 110, and in a case that the access request information carries sensitive data, the data processing device 120 can encrypt the sensitive data in the access request information to obtain the access request information carrying the encrypted sensitive data, and then the data processing device 120 can send the access request information carrying the encrypted sensitive data to the database 130, so that the database 130 can perform related data processing according to the access request information carrying the encrypted sensitive data. In addition, the data processing apparatus 120 can also receive the execution result information fed back by the database 130, and in the case that the execution result information carries target data in a ciphertext form, the data processing apparatus 120 can decrypt the target data in the ciphertext form to obtain the execution result information carrying the decrypted target data, and then the data processing apparatus 120 can return the execution result information carrying the decrypted target data to the service system 110.
In an alternative embodiment, as shown in fig. 2, the data processing apparatus 120 at least includes an access interface module 121, an information processing module 122, a database access module 123 and a configuration module 124, wherein the access interface module 121, the information processing module 122 and the database access module 123 are connected in sequence, and the configuration module 124 is connected to the information processing module 122.
The access interface module 121 is configured to receive access request information sent by the service system 110, and send the access request information to the information processing module 122; in addition, the access interface module 121 is further configured to receive execution result information carrying decrypted target data sent by the information processing module 122, and return the execution result information carrying decrypted target data to the service system 110.
The configuration module 124 is used for storing configuration information, wherein the configuration information includes encryption algorithm, encryption policy, which tables and which fields need to be encrypted, and the like. Configuration module 124 is capable of providing appropriate configuration information to information processing module 122 in response to a trigger of information processing module 122, so that information processing module 122 can perform encryption processing on sensitive data or perform decryption processing on target data in a ciphertext form by using the configuration information.
The information processing module 122 is configured to receive the access request information sent by the access interface module 121, analyze the access request information, identify components of the access request information, obtain appropriate configuration information from the configuration module 124, encrypt sensitive data in the access request information according to the configuration information, and send the encrypted access request information to the database access module 123; in addition, the information processing module 122 is further configured to receive the execution result information sent by the database access module 123, analyze the execution result information, identify components of the execution result information, obtain appropriate configuration information from the configuration module 124, decrypt target data in a form of ciphertext in the execution result information according to the configuration information, and send the decrypted execution result information to the access interface module 121. The information processing module 122 may include a filtering module and an encrypting/decrypting module, where the filtering module is configured to analyze and identify components of the access request information and components of the execution result information, and the encrypting/decrypting module is configured to encrypt sensitive data in the access request information and decrypt target data in a form of a ciphertext in the execution result information.
The database access module 123 is configured to receive the access request information subjected to the encryption processing and sent by the information processing module 122, and send the access request information subjected to the encryption processing to the database 130; in addition, the database access module 123 is further configured to receive the execution result information sent by the database 130, and send the execution result information to the information processing module 122.
The system architecture and the application scenario described in the embodiment of the present invention are for more clearly illustrating the technical solution of the embodiment of the present invention, and do not constitute a limitation to the technical solution provided in the embodiment of the present invention, and it is known to those skilled in the art that, along with the evolution of the system architecture and the occurrence of a new application scenario, the technical solution provided in the embodiment of the present invention is also applicable to similar technical problems.
Those skilled in the art will appreciate that the system architecture shown in FIG. 1 is not intended to limit embodiments of the present invention and may include more or less components than shown, or some components in combination, or a different arrangement of components.
Based on the above system architecture, various embodiments of the data processing method of the present invention are presented below.
As shown in fig. 3, fig. 3 is a flowchart of a data processing method according to an embodiment of the present invention, which can be applied to a data processing apparatus, such as the data processing apparatus 120 in the system architecture shown in fig. 1. The data processing method may include, but is not limited to, step S110, step S120, and step S130.
Step S110: first access information is received, wherein the first access information includes sensitive data.
In this step, the sensitive data refers to the privacy data that needs to be protected, such as identification card information, fingerprint information, iris information, facial recognition feature information, health condition information (medical history, case or inspection report, etc.), personal property information, credit investigation/consumption records, ethnic or ethnic origin, political views, religious beliefs, membership in the workplace, unpublished criminal records, child information, network identification information (such as account number, password or password protection answer, etc.), personal location information (such as track of whereabouts or lodging information, etc.), and the like.
When the business system initiates a request for accessing the database, the data processing apparatus may receive first access information sent by the business system, where the first access information may include sensitive data and other data, and for example, assuming that the first access information is access information for a message table, the first access information may include a table name of the message table, a database name for storing the message table, various data described in the message table, and the like, and among these data information, various data described in the message table may relate to privacy information of a user, and thus, various data described in the message table may be sensitive data.
It should be noted that the first access information may have a plurality of different information types, for example, the first access information may be data adding access information, data deleting access information, data modifying access information, or data querying access information, and the embodiment is not limited in this respect.
Step S120: and performing first information processing on the first access information to obtain second access information, wherein the second access information comprises encrypted sensitive data.
In this step, since the first access information including the sensitive data is received in step S110, the first access information may be subjected to the first information processing to obtain the second access information including the encrypted sensitive data, so that the subsequent step may send the second access information including the encrypted sensitive data to the database.
It should be noted that, different embodiments may be used to perform the first information processing on the first access information to obtain the second access information, and this embodiment is not limited in this respect. For example, the first access information may be split into data portions according to the components, sensitive data is identified in the data portions, the identified sensitive data is encrypted, and the encrypted sensitive data and other data in the first access information are combined to form second access information; for another example, the sensitive data may be identified in the first access information, then the identified sensitive data is encrypted, and then the sensitive data in the first access information is updated to the encrypted sensitive data to obtain the second access information. The sensitive data is identified in each data portion of the first access information, or the sensitive data is directly identified in the first access information, which may be identified based on a predefined identification rule, or based on an intelligent analysis process, and this embodiment is not limited in this respect. For example, when identifying based on a predefined identification rule, the predefined identification rule defines which fields of which tables belong to sensitive data; when the identification is carried out based on the intelligent analysis process, whether the data belongs to the sensitive data can be automatically judged according to the specific content of the data.
Step S130: and sending the second access information to a database, so that the database performs data processing according to the encrypted sensitive data.
In this step, since the second access information including the encrypted sensitive data is obtained in step S120, the second access information may be sent to the database, so that the database may perform data processing according to the encrypted sensitive data. Because the encryption processing of the sensitive data is not executed in the business system and the database but in the data processing device independent of the business system and the database, the encryption processing of the sensitive data can be realized under the condition of not depending on the business system and the database, thereby reducing the reconstruction cost and improving the universal applicability.
It should be noted that, since the first access information may have a plurality of different information types, the second access information obtained according to the first access information also corresponds to a plurality of different information types, and when the second access information is of different information types, the database correspondingly executes different data processing. For example, when the second access information is added to the data, the database may store the data carried in the second access information after receiving the second access information. After the database completes the storage processing of the data, the database may return execution result status information for indicating to the service system whether the storage processing of the data is completed. It should be noted that, since the sensitive data carried in the second access information is encrypted and belongs to ciphertext data, the sensitive data may be stored in the database in the form of ciphertext data, so as to improve the security of the database for storing the sensitive data. For another example, when the second access information is data deletion access information, after the database receives the second access information, the corresponding data pre-stored in the database may be deleted according to the data carried in the second access information. After the database completes the deletion process of the data, the database may return execution result status information for indicating to the service system whether the deletion process of the data is completed. For another example, when the second access information is data modification access information, after the database receives the second access information, the database may update the corresponding data stored in the database in advance to the data carried in the second access information according to the data carried in the second access information. After the database completes the update processing of the data, the database may return execution result status information for indicating to the service system whether the update processing of the data is completed. It is worth noting that the sensitive data carried in the second access information is encrypted and belongs to ciphertext data, so that after the corresponding data pre-stored in the database is updated to the data carried in the second access information by the database, the sensitive data can be stored in the database in the form of ciphertext data, and the security of the database for storing the sensitive data can be improved. For another example, when the second access information is data query access information, after the database receives the second access information, the database may find out corresponding data stored in the database in advance according to data carried in the second access information, and return found query result information to the data processing apparatus. After the database completes query processing on the data, the database may return execution result status information and query result information, where the execution result status information is used to indicate to the business system whether query processing on the data is completed, and the query result information is result data returned by the database in response to a data query request of the business system.
In this embodiment, by using the data processing method including the above steps S110 to S130, a data processing device independent from the service system and the database is used to receive the first access information including the sensitive data, and then the data processing device is used to perform the first information processing on the first access information to obtain the second access information including the encrypted sensitive data, and then the data processing device is used to send the second access information to the database, so that the database can perform data processing according to the encrypted sensitive data.
It should be noted that, in a big data environment, the amount of data stored in the database is often very large, and if the database stores all data in an encrypted manner, not only a lot of cost is spent, but also a lot of system resources are consumed. In the embodiment, only the sensitive data is encrypted and stored, so that the purposes of saving cost and reducing system resource consumption can be achieved.
In an embodiment, as shown in fig. 4, for further explanation of step S120, the step S120 may include, but is not limited to, step S121, step S122, step S123, and step S124.
Step S121: first configuration information is obtained.
In this step, when the data processing apparatus performs the first information processing on the first access information to obtain the second access information, the data processing apparatus may first perform step S121 to obtain the first configuration information, so that the sensitive data in the first access information may be determined according to the first configuration information in the subsequent step.
It should be noted that the first configuration information may be pre-stored in the data processing apparatus, or may be pre-stored in a memory independent from the data processing apparatus, which is not limited in this embodiment. When the first configuration information is pre-stored in the data processing apparatus, a configuration module (for example, the configuration module 124 in the embodiment shown in fig. 2) for storing the first configuration information may be disposed in the data processing apparatus, so that the data processing apparatus may directly obtain the first configuration information from the configuration module. When the first configuration information is pre-stored in a memory separate from the data processing apparatus, the data processing apparatus is connected to the memory, and thus, the data processing apparatus can acquire the first configuration information through the memory.
It should be noted that the first configuration information may include identification information for indicating which tables and which fields need to be encrypted. Taking the first configuration information stored in the configuration module as an example, referring to fig. 5, fig. 5 is a schematic structural diagram of the flag information in an example. In fig. 5, the identification information may include, but is not limited to, a database identification, a table identification, a field identification, an index value, and an encryption flag.
The database identifier is used for indicating the database where the target object is located, the database identifier may be a database name or a database ID, and the database identifier has uniqueness in the whole system.
The table identifier is used to indicate the data table where the target object is located, the table identifier may be a data table name or a data table ID, and the table identifier has uniqueness in the current database.
The field identification is used for indicating a corresponding data column of the target object in the data table, the field identification can be a data column name or a data column ID, and the field identification has uniqueness in the current data table.
The index value is used for quickly positioning the target object, and the index value has uniqueness in the configuration module. It is found through analysis that data is often stored in a structured or semi-structured manner, and in the system, the data has a specific attribution field definition, and each field stores a specific data type and data range, such as an identification number, a telephone number, and the like. Therefore, by adopting the index value having uniqueness in the configuration module and creating the index based on the index value, the target object can be quickly located through the index, so that the efficiency of locating the target object can be improved.
The encryption flag is used to indicate whether the target object needs to be encrypted, for example, if the value of the encryption flag is 1, it indicates that the target object needs to be encrypted; if the value of the encryption flag is 0, it indicates that the encryption process is not required for the target object.
It should be noted that the identification information is not limited to include database identification, table identification, field identification, index value and encryption flag, for example, in an alternative embodiment, the identification information may include only database identification, table identification, field identification and encryption flag, and in another alternative embodiment, the identification information may include only index value and encryption flag. The specific structure of the identification information and the type of the information contained in the identification information may be appropriately selected according to the actual application, which is not specifically limited in this embodiment.
Step S122: sensitive data in the first access information is determined according to the first configuration information.
In this step, since the first configuration information is obtained in step S121, the sensitive data in the first access information may be determined according to the first configuration information, so that the sensitive data may be encrypted in the subsequent step.
It should be noted that, different implementations are possible for determining the sensitive data in the first access information according to the first configuration information, and this embodiment is not limited in this respect. For example, assuming that the first access information includes a database name, a table name, and a field name, when the first configuration information includes a database identifier, a table identifier, a field identifier, and an encryption flag, the corresponding database identifier, table identifier, and field identifier may be searched in the first configuration information according to the database name, table name, and field name in the first access information, and after the corresponding database identifier, table identifier, and field identifier are found, it is determined whether content corresponding to the field name is sensitive data according to the encryption flag, for example, when the encryption flag is 1, it is determined that content corresponding to the field name is sensitive data, and when the encryption flag is 0, it is determined that content corresponding to the field name is not sensitive data. When the first configuration information includes an index value and an encryption flag, a character string may be formed by a database name, a table name, and a field name in the first access information, then mapping information of the character string is obtained, then an index value corresponding to the mapping information is searched in the first configuration information, and after the corresponding index value is found, whether content corresponding to the field name is sensitive data is determined according to the encryption flag, for example, when the encryption flag is 1, it is determined that content corresponding to the field name is sensitive data, and when the encryption flag is 0, it is determined that content corresponding to the field name is not sensitive data. When the first configuration information includes the database identifier, the table identifier, the field identifier, the index value, and the encryption flag, it may be determined whether the content corresponding to the field name in the first access information is sensitive data according to the database identifier, the table identifier, the field identifier, and the encryption flag in the first configuration information, and the database name, the table name, and the field name in the first access information, or it may be determined whether the content corresponding to the field name in the first access information is sensitive data according to the index value, the encryption flag, and the database name, the table name, and the field name in the first access information, and it may be appropriately selected according to an actual application condition, which is not specifically limited in this embodiment.
Step S123: and encrypting the sensitive data to obtain sensitive ciphertext data.
In this step, since the sensitive data in the first access information is determined in step S122, the sensitive data may be encrypted to obtain sensitive ciphertext data, so that the subsequent step may generate the second access information for sending to the database according to the sensitive ciphertext data.
It should be noted that the encryption algorithm used for encrypting the sensitive data may be a symmetric encryption algorithm, an advanced encryption standard, or another encryption algorithm, and may be appropriately selected according to an actual application, which is not specifically limited in this embodiment. The symmetric encryption algorithm is an encryption algorithm using the same key for encryption and decryption, and a public key needs to be agreed by the transmitting and receiving parties before the secure communication is performed. The advanced encryption standard is also called Rijndael encryption method, is a block encryption standard, and can support a wider range of blocks and key lengths.
It should be noted that, information such as an encryption algorithm or an encryption policy that is used to encrypt the sensitive data may be included in the first configuration information, that is, the first configuration information may include not only identification information indicating which fields of the tables need to be encrypted, but also information such as an encryption algorithm or an encryption policy, so that when the step S121 is executed to obtain the first configuration information, the corresponding encryption algorithm or encryption policy may be obtained, and after the step S122 is executed to determine the sensitive data in the first access information, the sensitive data in the first access information may be encrypted by using the encryption algorithm or the encryption policy.
In addition, the information such as the encryption algorithm or the encryption policy used for encrypting the sensitive data may be obtained by the data processing apparatus from another place, for example, from a database or from the first access information, which is not limited in this embodiment. Assuming that the information such as the encryption algorithm or the encryption policy is obtained by the data processing apparatus from the database, in an optional implementation manner, after determining the sensitive data in the first access information, the data processing apparatus may first negotiate with the database to obtain the information such as the encryption algorithm or the encryption policy, and then perform step S123 to encrypt the sensitive data; assuming that the information such as the encryption algorithm or the encryption policy is obtained by the data processing apparatus from the first access information, in an optional implementation manner, after receiving the first access information, the data processing apparatus may first obtain the information such as the encryption algorithm or the encryption policy carried in the first access information, then determine the sensitive data in the first access information, and then execute step S123 to perform encryption processing on the sensitive data.
Step S124: and updating the sensitive data in the first access information into sensitive ciphertext data to obtain second access information.
In this step, since the sensitive ciphertext data is obtained in step S123, the sensitive data in the first access information may be updated to the sensitive ciphertext data, so as to obtain the second access information, so that the subsequent steps may send the second access information and the sensitive ciphertext data carried thereby to the database, and the database may perform corresponding data processing according to the second access information and the sensitive ciphertext data carried thereby.
In this embodiment, by adopting the steps S121 to S124, after the first configuration information is obtained, the sensitive data in the first access information is determined according to the first configuration information, and then only the sensitive data is encrypted and stored, so that the purposes of saving the system modification cost and reducing the system resource consumption can be achieved.
In an embodiment, as shown in fig. 6, for further explanation of step S122, in the case that the first access information includes the first data information and the second data information, step S122 may include, but is not limited to, step S1221, step S1222, and step S1223.
Step S1221: and obtaining first character string information according to the first data information and the second data information.
In this step, when the first access information includes the first data information and the second data information, and when it is necessary to determine sensitive data in the first access information, the first character string information may be obtained according to the first data information and the second data information, so that the mapping information corresponding to the first character string information may be obtained by using the first character string information in the subsequent step.
It should be noted that, different embodiments may be used to obtain the first character string information according to the first data information and the second data information, for example, the first character string information may be obtained by splicing the first data information and the second data information end to end, or the first character string information may be obtained by connecting the first data information and the second data information based on the special character @% of the database, which is not limited in this embodiment. In addition, the first data information and the second data information may each include a plurality of data, which is not specifically limited in this embodiment. For example, assuming that the first access information includes a database name, a table name, and a field name, the first data information may include the database name and the table name, and the second data information may be the field name.
Step S1222: and acquiring first mapping information corresponding to the first character string information.
In this step, since the first character string information is obtained in step S1221, the first mapping information corresponding to the first character string information may be obtained, so that the subsequent step may perform matching processing using the first mapping information and the first configuration information, thereby determining the sensitive data in the first access information.
It should be noted that the first mapping information corresponding to the first character string information may have different obtaining manners, for example, the first mapping information corresponding to the first character string information may be obtained by looking up a mapping table, or the first mapping information corresponding to the first character string information may be obtained by calculating a hash value of the first character string information, which is not limited in this embodiment.
Step S1223: and when the first mapping information is matched with the first configuration information, determining that the second data information is sensitive data.
In this step, since the first mapping information is obtained in step S1222, the first mapping information and the first configuration information may be subjected to matching processing, so as to determine the sensitive data in the first access information. For example, assuming that the first access information includes a table name and a field name, where the first data information is the table name and the second data information is the field name, when the first mapping information matches the first configuration information, it may be determined that the field name (i.e., the second data information) in the first access information is sensitive data; when the first mapping information does not match the first configuration information, it may be determined that neither the table name (i.e., the first data information) nor the field name (i.e., the second data information) in the first access information is sensitive data.
In an embodiment, as shown in fig. 7, when the first access information is data query request information, the data processing method may further include, but is not limited to, step S140, step S150, and step S160.
Step S140: and receiving first query result information sent by a database, wherein the first query result information comprises target data, and the target data is ciphertext data.
In this step, when the first access information is data query request information, it indicates that the service system needs to query relevant data information from the database, and therefore, after the data processing apparatus performs step S130, the database returns first query result information, so the data processing apparatus may perform step S140 to receive the first query result information sent by the database, so that the subsequent step may return data in the first query result information to the service system. It should be noted that the first query result information may include execution result status information and query result data, where the execution result status information is used to indicate to the business system whether the database completes query processing on the data, and the query result data is result data returned by the database in response to the data query request of the business system.
It should be noted that the first query result information includes target data in the form of ciphertext data, and the query result data in the first query result information may include a plurality of data, at least one of the plurality of data being the target data. The target data refers to privacy data to be protected, such as identification card information, fingerprint information, iris information, facial recognition feature information, health condition information (medical history, case or inspection report, etc.), personal property information, credit investigation/consumption records, ethnic or ethnic origin, political views, religious beliefs, membership in the workplace, unpublished criminal records, child information, network identification information (such as account number, password or password protection answer, etc.), personal location information (such as track or accommodation information, etc.), and the like. Because the target data is the ciphertext data, the target data is stored in the database in the form of the ciphertext data, and therefore the database can effectively protect the target data, so that the safety of data storage can be improved, and the compliance risk of the system can be reduced.
Step S150: and carrying out second information processing on the first query result information to obtain second query result information, wherein the second query result information comprises decrypted target data.
In this step, since the first query result information including the target data is received in step S140, the second information processing may be performed on the first query result information to obtain the second query result information including the decrypted target data, so that the subsequent step may send the second query result information including the decrypted target data to the service system.
It should be noted that, different embodiments may be provided for performing the second information processing on the first query result information to obtain the second query result information, and this embodiment is not limited in this respect. For example, the first query result information may be first split into data portions according to the respective components, then target data is identified in the data portions, then the identified target data is decrypted, and then the decrypted target data and other data in the first query result information are merged to form second query result information; for another example, the target data may be identified in the first query result information, then the identified target data is decrypted, and then the target data in the first query result information is updated to the decrypted target data to obtain the second query result information. The target data is identified in each data portion of the first query result information, or the target data is directly identified in the first query result information, which may be identified based on a predefined identification rule, or based on an intelligent analysis process, which is not specifically limited in this embodiment. For example, when identifying based on a predefined identification rule, the predefined identification rule defines which fields of which tables belong to the target data; when the identification is carried out based on the intelligent analysis process, whether the data belong to the target data can be automatically judged according to the specific content of the data.
Step S160: and returning the second query result information to the initiator of the first access information.
In this step, since the second query result information including the decrypted target data is obtained in step S150, the second query result information may be returned to the initiator (i.e., the service system) of the first access information, and the data query request of the initiator is completed. Since the decryption processing of the target data is not executed in the service system and the database, but executed in the data processing device independent of the service system and the database, the decryption processing of the target data can be realized without depending on the service system and the database, thereby reducing the reconstruction cost and improving the general applicability.
In this embodiment, by using the data processing method including the above-mentioned steps S140 to S160, a data processing device independent from the service system and the database is used to receive the first query result information including the target data, and then the data processing device is used to perform the second information processing on the first query result information to obtain the second query result information including the decrypted target data, and then the data processing device is used to return the second query result information to the initiator of the first access information to complete the data query request of the initiator.
It should be noted that, in a large data environment, the amount of data stored in the database is often very large, and if the database encrypts and stores all data, not only a large amount of cost is spent, but also a large amount of system resources are consumed. In the embodiment, only the target data is encrypted and stored, so that the purposes of saving cost and reducing system resource consumption can be achieved.
In an embodiment, as shown in fig. 8, the step S150 is further described, and the step S150 may include, but is not limited to, a step S151, a step S152, a step S153, and a step S154.
Step S151: and acquiring second configuration information.
In this step, when the data processing apparatus performs the second information processing on the first query result information to obtain the second query result information, the data processing apparatus may first perform step S151 to obtain the second configuration information, so that the target data in the first query result information may be determined according to the second configuration information in the subsequent step.
It should be noted that the second configuration information may be pre-stored in the data processing apparatus, or may be pre-stored in a memory independent from the data processing apparatus, which is not limited in this embodiment. When the second configuration information is pre-stored in the data processing apparatus, a configuration module (for example, the configuration module 124 in the embodiment shown in fig. 2) for storing the second configuration information may be disposed in the data processing apparatus, so that the data processing apparatus may directly obtain the second configuration information from the configuration module. When the second configuration information is prestored in a memory separate from the data processing apparatus, the data processing apparatus is connected to the memory, and thus, the data processing apparatus can acquire the second configuration information through the memory.
It should be noted that the second configuration information may include identification information for indicating which tables and which fields need to be decrypted. In this embodiment, the identification structure of the identification information in the second configuration information is similar to the identification structure of the mark information in the embodiment shown in fig. 5, and the difference between the two is as follows: the tag information in the embodiment shown in fig. 5 includes an encryption tag; the identification information in this embodiment includes a decryption flag. The encryption flag is used to indicate whether decryption processing is required for the target object, for example, if the value of the decryption flag is 1, it indicates that decryption processing is required for the target object; assuming that the value of the decryption flag is 0, it indicates that decryption processing is not required for the target object. In addition, for the types and explanations of other identifiers included in the identifier information of this embodiment, reference may be made to the types and explanations of other identifiers included in the tag information of the embodiment shown in fig. 5, and details are not repeated here in order to avoid redundant contents.
Step S152: and determining target data in the first query result information according to the second configuration information.
In this step, since the second configuration information is obtained in step S151, the target data in the first query result information may be determined according to the second configuration information, so that the target data may be decrypted in the subsequent step.
It should be noted that, different embodiments may be used to determine the target data in the first query result information according to the second configuration information, and this embodiment is not limited in this respect. For example, assuming that the first query result information includes a database name, a table name, and a field name, when the second configuration information includes a database identifier, a table identifier, a field identifier, and a decryption flag, the second configuration information may search for the corresponding database identifier, table identifier, and field identifier according to the database name, table name, and field name in the first query result information, and after finding the corresponding database identifier, table identifier, and field identifier, determine whether the content corresponding to the field name is the target data according to the decryption flag, for example, when the decryption flag is 1, determine that the content corresponding to the field name is the target data, and when the decryption flag is 0, determine that the content corresponding to the field name is not the target data. When the second configuration information includes the index value and the decryption flag, a character string may be formed by a database name, a table name, and a field name in the first query result information, then mapping information of the character string is obtained, then an index value corresponding to the mapping information is searched in the second configuration information, after the corresponding index value is found, whether content corresponding to the field name is target data is determined according to the decryption flag, for example, when the decryption flag is 1, it is determined that content corresponding to the field name is target data, and when the decryption flag is 0, it is determined that content corresponding to the field name is not target data. When the second configuration information includes the database identifier, the table identifier, the field identifier, the index value, and the decryption flag, it may be determined whether the content corresponding to the field name in the first query result information is the target data according to the database identifier, the table identifier, the field identifier, and the decryption flag in the second configuration information, and the database name, the table name, and the field name in the first query result information, or it may be determined whether the content corresponding to the field name in the first query result information is the target data according to the index value, the decryption flag, and the database name, the table name, and the field name in the second configuration information, and it may be appropriately selected according to the actual application conditions, which is not specifically limited in this embodiment.
Step S153: and decrypting the target data to obtain target plaintext data.
In this step, since the target data in the first query result information is determined in step S152, the target data may be decrypted to obtain target plaintext data, so that the subsequent step may generate the second query result information for returning to the service system according to the target plaintext data.
It should be noted that the decryption algorithm used for decrypting the target data corresponds to the encryption algorithm used for encrypting the sensitive data in the embodiment shown in fig. 4.
It should be noted that information such as a decryption algorithm or a decryption policy that is used for decrypting the target data may be included in the second configuration information, that is, the second configuration information may include not only identification information indicating which fields of the tables need to be decrypted, but also information such as a decryption algorithm or a decryption policy, so that when step S151 is executed to obtain the second configuration information, a corresponding decryption algorithm or a decryption policy may be obtained, and after step S152 is executed to determine the target data in the first query result information, the target data in the first query result information may be decrypted by using the decryption algorithm or the decryption policy.
In addition, the information such as the decryption algorithm or the decryption policy used for decrypting the target data may be obtained by the data processing apparatus from another place, for example, from a database or from the first query result information, which is not limited in this embodiment. Assuming that the information such as the decryption algorithm or the decryption policy is obtained by the data processing apparatus from the database, in an optional implementation manner, after determining the target data in the first query result information, the data processing apparatus may first negotiate with the database to obtain the information such as the decryption algorithm or the decryption policy, and then perform step S153 to decrypt the target data; assuming that the information such as the decryption algorithm or the decryption policy is obtained by the data processing apparatus from the first query result information, in an optional implementation manner, after receiving the first query result information, the data processing apparatus may first obtain the information such as the decryption algorithm or the decryption policy carried in the first query result information, then determine the target data in the first query result information, and then execute step S153 to decrypt the target data.
Step S154: and updating the target data in the first query result information into target plaintext data to obtain second query result information.
In this step, since the target plaintext data is obtained in step S153, the target data in the first query result information may be updated to the target plaintext data, so as to obtain the second query result information, so that the subsequent steps may return the second query result information and the target plaintext data carried thereby to the service system, thereby completing the data query request of the service system.
In this embodiment, by adopting the steps S151 to S154, after the second configuration information is obtained, the target data in the first query result information is determined according to the second configuration information, and then only the target data is decrypted, so that the purposes of saving the system modification cost and reducing the system resource consumption can be achieved.
In an embodiment, as shown in fig. 9, to further explain step S152, in the case that the first query result information includes the first result information and the second result information, step S152 may include, but is not limited to, step S1521, step S1522, and step S1523.
Step S1521: and obtaining second character string information according to the first result information and the second result information.
In this step, when the first query result information includes the first result information and the second result information, and when the target data in the first query result information needs to be determined, the second character string information may be obtained according to the first result information and the second result information, so that the mapping information corresponding to the second character string information may be obtained by using the second character string information in the subsequent step.
It should be noted that, different embodiments may be used to obtain the second string information according to the first result information and the second result information, for example, the first result information and the second result information may be spliced end to obtain the second string information, or the first result information and the second result information may be connected based on a special character @% of the database to obtain the second string information, which is not limited in this embodiment. In addition, the first result information and the second result information may each include a plurality of data, which is not specifically limited in this embodiment. For example, assuming that the first query result information includes a database name, a table name, and a field name, the first result information may include the database name and the table name, and the second result information may be the field name.
Step S1522: and acquiring second mapping information corresponding to the second character string information.
In this step, since the second string information is obtained in step S1521, the second mapping information corresponding to the second string information may be obtained, so that the subsequent step may perform matching processing by using the second mapping information and the second configuration information, thereby determining the target data in the first query result information.
It should be noted that the second mapping information corresponding to the second character string information may have different obtaining manners, for example, the second mapping information corresponding to the second character string information may be obtained by looking up a mapping table, or the second mapping information corresponding to the second character string information may be obtained by calculating a hash value of the second character string information, which is not limited in this embodiment.
Step S1523: and when the second mapping information is matched with the second configuration information, determining that the second result information is the target data.
In this step, since the second mapping information is obtained in step S1522, the second mapping information and the second configuration information may be subjected to matching processing, so as to determine the target data in the first query result information. For example, assuming that the first query result information includes a table name and a field name, where the first result information is the table name and the second result information is the field name, when the second mapping information matches the second configuration information, the field name (i.e., the second result information) in the first query result information may be determined as the target data; when the second mapping information does not match the second configuration information, it may be determined that neither the table name (i.e., the first result information) nor the field name (i.e., the second result information) in the first query result information is the target data.
In addition, another embodiment of the present invention further provides a data processing method, where the data processing method in this embodiment may be applied to a data processing system, and the data processing system may include a business system, a data processing apparatus, and a database.
The data processing method may include, but is not limited to, the following steps:
firstly, a business system sends first access information to a data processing device, wherein the first access information comprises sensitive data;
then, the data processing device carries out first information processing on the first access information to obtain second access information, wherein the second access information comprises encrypted sensitive data;
then, the data processing device sends the second access information to the database;
and then, the database performs data processing according to the encrypted sensitive data.
It should be noted that the data processing method of this embodiment, as compared with the data processing method of the embodiment shown in fig. 3, belongs to the same inventive concept, and the difference between the two is that an execution main body is different, where the execution main body of the data processing method of the embodiment shown in fig. 3 is a data processing apparatus, and the execution main body of the data processing method of this embodiment is a data processing system including the data processing apparatus, therefore, the data processing method of this embodiment has the same technical principle and the same technical effect as the data processing method of the embodiment shown in fig. 3, and as to the technical principle and the technical effect of the data processing method of this embodiment, reference may be made to the related description of the data processing method of the embodiment shown in fig. 3, so as to avoid redundant content, and no further description is provided here.
In addition, in an embodiment, the step "the data processing apparatus performs the first information processing on the first access information to obtain the second access information" is further described, which may include, but is not limited to, the following steps:
firstly, a data processing device acquires first configuration information;
then, the data processing device determines sensitive data in the first access information according to the first configuration information;
then, the data processing device encrypts the sensitive data to obtain sensitive ciphertext data;
then, the data processing device updates the sensitive data in the first access information into sensitive ciphertext data to obtain second access information.
It should be noted that the steps in this embodiment have the same technical principle and the same technical effect as the steps S121 to S124 in the embodiment shown in fig. 4, and the difference between the two embodiments is that the execution subject is different, where the execution subject in the embodiment shown in fig. 4 is a data processing apparatus, and the execution subject in this embodiment is a data processing system including the data processing apparatus. With regard to the technical principle and the technical effect of the present embodiment, reference may be made to the above description in the embodiment shown in fig. 4, and details are not repeated here to avoid redundant contents.
In addition, in an embodiment, in the case that the first access information includes first data information and second data information, the step "the data processing apparatus determines sensitive data in the first access information according to the first configuration information" is further described, which may include, but is not limited to, the following steps:
firstly, the data processing device obtains first character string information according to first data information and second data information;
then, the data processing device acquires first mapping information corresponding to the first character string information;
then, when the first mapping information matches the first configuration information, the data processing apparatus determines the second data information as sensitive data.
It should be noted that the steps in this embodiment have the same technical principle and the same technical effect as the steps S1221 to S1223 in the embodiment shown in fig. 6, and the difference between the two embodiments is that the execution subject is different, where the execution subject in the embodiment shown in fig. 6 is a data processing apparatus, and the execution subject in this embodiment is a data processing system including the data processing apparatus. Regarding the technical principle and technical effect of the present embodiment, reference may be made to the description related to the embodiment shown in fig. 6, and details are not repeated here to avoid redundancy of contents.
In addition, in an embodiment, in the case that the first access information is data query request information, the data processing method may further include, but is not limited to, the following steps:
firstly, the database sends first query result information to the data processing device, wherein the first query result information comprises target data, and the target data are ciphertext data;
then, the data processing device carries out second information processing on the first query result information to obtain second query result information, wherein the second query result information comprises decrypted target data;
and then, the data processing device returns the second query result information to the service system.
It should be noted that, the steps in this embodiment have the same technical principle and the same technical effect as those of steps S140 to S160 in the embodiment shown in fig. 7, and the difference between the two embodiments is that the execution subject is different, where the execution subject in the embodiment shown in fig. 7 is a data processing apparatus, and the execution subject in this embodiment is a data processing system including the data processing apparatus. With regard to the technical principle and the technical effect of the present embodiment, reference may be made to the above description in the embodiment shown in fig. 7, and details are not repeated here to avoid redundant contents.
In addition, in an embodiment, the step "the data processing apparatus performs the second information processing on the first query result information to obtain the second query result information" is further described, and the step may include, but is not limited to, the following steps:
firstly, the data processing device acquires second configuration information;
then, the data processing device determines target data in the first query result information according to the second configuration information;
then, the data processing device decrypts the target data to obtain target plaintext data;
and then, the data processing device updates the target data in the first query result information into target plaintext data to obtain second query result information.
It should be noted that the steps in this embodiment have the same technical principle and the same technical effect as the steps S151 to S154 in the embodiment shown in fig. 8, and the difference between the two embodiments is that the execution subject is different, where the execution subject in the embodiment shown in fig. 8 is a data processing apparatus, and the execution subject in this embodiment is a data processing system including the data processing apparatus. Regarding the technical principle and technical effect of the present embodiment, reference may be made to the description related to the embodiment shown in fig. 8, and details are not repeated here to avoid redundancy of contents.
In addition, in an embodiment, in the case that the first query result information includes the first result information and the second result information, the step of "the data processing apparatus determines the target data in the first query result information according to the second configuration information" is further described, which may include, but is not limited to, the following steps
Firstly, the data processing device obtains second character string information according to the first result information and the second result information;
then, the data processing device acquires second mapping information corresponding to the second character string information;
then, when the second mapping information matches the second configuration information, the data processing apparatus determines the second result information as the target data.
It should be noted that the steps in this embodiment have the same technical principle and the same technical effect as the steps S1521 to S1523 in the embodiment shown in fig. 9, and the difference between the two embodiments is that the execution subject is different, where the execution subject in the embodiment shown in fig. 9 is a data processing apparatus, and the execution subject in this embodiment is a data processing system including the data processing apparatus. Regarding the technical principle and technical effect of the present embodiment, reference may be made to the description related to the embodiment shown in fig. 9, and details are not repeated here to avoid redundancy of contents.
In order to more clearly describe the processing flow of the data processing method provided by the embodiment of the present invention, a specific example is described below.
As shown in fig. 10, fig. 10 is a flowchart of a data processing method provided by a specific example. The data processing method is applied to a data processing device and comprises the following steps:
step S101: an access request is received.
Step S102: and filtering the data information in the access request to obtain the sensitive data in the access request.
Step S103: carrying out encryption processing on sensitive data;
step S104: sending an access request carrying the encrypted sensitive data to a database, so that the database executes related operations;
step S105: receiving an execution result returned by the database;
step S106: filtering data information in the execution result to obtain target data in the execution result;
step S107: decrypting the target data;
step S108: and returning the execution result carrying the decrypted target data to the service system.
In step S102, it is assumed that the access request stores a message table as shown in table 1 below for the request database, where the message table includes a database name, a table name, and field information, where the field information includes a serial number, a mailbox number, a sender number, a destination number, and content details.
TABLE 1
Figure BDA0003094707760000151
Suppose that the access request issued by the business system includes the following SQL statement:
insert into
message(fno,boxno,sender,receiver,content)
values(value1,value2,value3,value4,value5)。
then, after receiving the access request, the data processing apparatus may split the SQL statement according to the syntax to identify the following parts:
table name part: a message;
field list part: (fno, boxno, sender, receiver, content);
numerical part: (value 1, value2, value3, value4, value 5).
Then, the data processing device traverses the combination of the database name, the table name and the field name, obtains a character string after connecting each combination of the database name, the table name and the field name by using the special character @% based on the database, calculates the hash value of the character string, and then searches in the configuration information by using the hash value to identify the sensitive field needing to be encrypted. For example, if the combination of the identified sensitive fields is (vms, message, sender), (vms, message, receiver), then the sensitive data in the obtained access request is value3 and value4.
On the basis of executing step S102, step S103 is executed to encrypt the sensitive data, and if the data obtained by respectively encrypting the sensitive data value3 and value4 is value31 and value41, the obtained access request carrying the encrypted sensitive data includes the following SQL statement:
insert into
message(fno,boxno,sender,receiver,content)
values(value1,value2,value31,value41,value5)。
it should be noted that the specific processing procedure in step S106 is similar to the specific processing procedure in step S102, and for the specific processing procedure in step S106, the specific processing procedure in step S102 may be referred to, and is not described herein again. The decryption process in step S107 corresponds to the encryption process in step S103, and for example, both steps perform encryption or decryption processes using the same key.
Further, another embodiment of the present invention also provides a data processing apparatus including:
the access interface module is used for receiving first access information, wherein the first access information comprises sensitive data;
the information processing module is used for carrying out first information processing on the first access information to obtain second access information, wherein the second access information comprises encrypted sensitive data;
and the database access module is used for sending the second access information to the database so that the database performs data processing according to the encrypted sensitive data.
In one embodiment, the data processing apparatus further includes a configuration module, where the configuration module stores first configuration information; the information processing module includes:
the first information acquisition module is used for acquiring first configuration information from the configuration module;
the first filtering module is used for determining sensitive data in the first access information according to the first configuration information;
the encryption module is used for encrypting the sensitive data to obtain sensitive ciphertext data;
and the first updating module is used for updating the sensitive data in the first access information into sensitive ciphertext data to obtain second access information.
In an embodiment, in the case where the first access information includes first data information and second data information, the sensitive data determining module includes:
the first character string acquisition module is used for acquiring first character string information according to the first data information and the second data information;
the first mapping information acquisition module is used for acquiring first mapping information corresponding to the first character string information;
and the first data determining module is used for determining the second data information as sensitive data when the first mapping information is matched with the first configuration information.
In one embodiment, when the first access information is data query request information:
the database access module is further used for receiving first query result information sent by the database, wherein the first query result information comprises target data, and the target data is ciphertext data;
the information processing module is further used for carrying out second information processing on the first query result information to obtain second query result information, wherein the second query result information comprises decrypted target data;
and the access interface module is also used for returning the second query result information to the initiator of the first access information.
In one embodiment, an information processing module includes:
the second information acquisition module is used for acquiring second configuration information;
the second filtering module is used for determining target data in the first query result information according to the second configuration information;
the decryption module is used for decrypting the target data to obtain target plaintext data;
and the second updating module is used for updating the target data in the first query result information into target plaintext data to obtain second query result information.
In an embodiment, in a case where the first query result information includes the first result information and the second result information, the target data determination module includes:
the second character string acquisition module is used for acquiring second character string information according to the first result information and the second result information;
the second mapping information acquisition module is used for acquiring second mapping information corresponding to the second character string information;
and the second data determining module is used for determining the second result information as the target data when the second mapping information is matched with the second configuration information.
It should be noted that, since the data processing apparatus of this embodiment can implement the data processing method according to any of the foregoing embodiments, the data processing apparatus of this embodiment and the data processing method according to any of the foregoing embodiments have the same technical principles and the same technical effects, and are not described herein again to avoid redundant content.
In addition, an embodiment of the present invention also provides a data processing apparatus including: memory, a processor, and a computer program stored on the memory and executable on the processor.
The processor and memory may be connected by a bus or other means.
The memory, which is a non-transitory computer readable storage medium, may be used to store non-transitory software programs as well as non-transitory computer executable programs. Further, the memory may include high speed random access memory, and may also include non-transitory memory, such as at least one disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory optionally includes memory located remotely from the processor, and these remote memories may be connected to the processor through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
It should be noted that the data processing apparatus in this embodiment may be applied to, for example, the data processing apparatus 120 in the embodiment shown in fig. 1, the data processing apparatus in this embodiment can form a part of, for example, the system architecture in the embodiment shown in fig. 1, and these embodiments all belong to the same inventive concept, so these embodiments have the same implementation principle and technical effect, and are not described in detail here.
The non-transitory software programs and instructions required to implement the data processing method of the above-described embodiment are stored in the memory, and when executed by the processor, perform the data processing method of the above-described embodiment, for example, perform the above-described method steps S110 to S130 in fig. 3, method steps S121 to S124 in fig. 4, method steps S1221 to S1223 in fig. 6, method steps S140 to S160 in fig. 7, method steps S151 to S154 in fig. 8, method steps S1521 to S1523 in fig. 9, and method steps S101 to S108 in fig. 10.
In addition, an embodiment of the present invention further provides a data processing system, which includes a business system, a data processing apparatus, and a database, where the business system may be applied as, for example, the business system 110 in the embodiment shown in fig. 1, the data processing apparatus may be applied as, for example, the data processing apparatus 120 in the embodiment shown in fig. 1, and the database may be applied as, for example, the database 130 in the embodiment shown in fig. 1. The data processing system in this embodiment can form a system architecture as in the embodiment shown in fig. 1, and these embodiments all belong to the same inventive concept, so these embodiments have the same implementation principle and technical effect, and will not be described in detail here.
The business system, the data processing apparatus and the database are capable of executing the data processing method as applied to any of the embodiments of the data processing system in cooperation with each other.
The above-described apparatus embodiments or system embodiments are merely illustrative, wherein elements described as separate components may or may not be physically separate, may be located in one place, or may be distributed over multiple network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
Furthermore, an embodiment of the present invention provides a computer-readable storage medium, which stores computer-executable instructions, which are executed by a processor or controller, for example, by a processor in the above-mentioned apparatus embodiment, and which can cause the above-mentioned processor to execute the data processing method in the above-mentioned embodiment, for example, execute the above-mentioned method steps S110 to S130 in fig. 3, method steps S121 to S124 in fig. 4, method steps S1221 to S1223 in fig. 6, method steps S140 to S160 in fig. 7, method steps S151 to S154 in fig. 8, method steps S1 to S1523 in fig. 9, and method steps S101 to S108 in fig. 10.
It will be understood by those of ordinary skill in the art that all or some of the steps, systems, and methods disclosed above may be implemented as software, firmware, hardware, or suitable combinations thereof. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to those skilled in the art.
While the preferred embodiments of the present invention have been described in detail, it will be understood by those skilled in the art that the foregoing and various other changes, omissions and deviations in the form and detail thereof may be made without departing from the scope of this invention.

Claims (21)

1. A data processing method is applied to a data processing device and comprises the following steps:
receiving first access information, wherein the first access information comprises sensitive data;
performing first information processing on the first access information to obtain second access information, wherein the second access information comprises the encrypted sensitive data;
and sending the second access information to a database, so that the database performs data processing according to the encrypted sensitive data.
2. The method according to claim 1, wherein the performing the first information processing on the first access information to obtain second access information comprises:
acquiring first configuration information;
determining the sensitive data in the first access information according to the first configuration information;
encrypting the sensitive data to obtain sensitive ciphertext data;
and updating the sensitive data in the first access information into the sensitive ciphertext data to obtain second access information.
3. The method of claim 2, wherein the first access information comprises first data information and second data information; the determining the sensitive data in the first access information according to the first configuration information includes:
obtaining first character string information according to the first data information and the second data information;
acquiring first mapping information corresponding to the first character string information;
and when the first mapping information is matched with the first configuration information, determining that the second data information is the sensitive data.
4. The method according to any one of claims 1 to 3, wherein when the first access information is data query request information, the method further comprises:
receiving first query result information sent by the database, wherein the first query result information comprises target data, and the target data are ciphertext data;
performing second information processing on the first query result information to obtain second query result information, wherein the second query result information comprises the decrypted target data;
and returning the second query result information to the initiator of the first access information.
5. The method according to claim 4, wherein the performing second information processing on the first query result information to obtain second query result information includes:
acquiring second configuration information;
determining the target data in the first query result information according to the second configuration information;
decrypting the target data to obtain target plaintext data;
and updating the target data in the first query result information into the target plaintext data to obtain second query result information.
6. The method of claim 5, wherein the first query result information comprises first result information and second result information; the determining the target data in the first query result information according to the second configuration information includes:
obtaining second character string information according to the first result information and the second result information;
acquiring second mapping information corresponding to the second character string information;
and when the second mapping information is matched with the second configuration information, determining that the second result information is the target data.
7. A data processing method is applied to a data processing system, the data processing system comprises a service system, a data processing device and a database, and the method comprises the following steps:
the business system sends first access information to the data processing device, wherein the first access information comprises sensitive data;
the data processing device carries out first information processing on the first access information to obtain second access information, wherein the second access information comprises the encrypted sensitive data;
the data processing device sends the second access information to the database;
and the database performs data processing according to the encrypted sensitive data.
8. The method according to claim 7, wherein the data processing apparatus performs a first information processing on the first access information to obtain a second access information, and comprises:
the data processing device acquires first configuration information;
the data processing device determines the sensitive data in the first access information according to the first configuration information;
the data processing device encrypts the sensitive data to obtain sensitive ciphertext data;
and the data processing device updates the sensitive data in the first access information into the sensitive ciphertext data to obtain second access information.
9. The method of claim 8, wherein the first access information comprises first data information and second data information; the data processing device determines the sensitive data in the first access information according to the first configuration information, and includes:
the data processing device obtains first character string information according to the first data information and the second data information;
the data processing device acquires first mapping information corresponding to the first character string information;
when the first mapping information is matched with the first configuration information, the data processing device determines that the second data information is the sensitive data.
10. The method according to any one of claims 7 to 9, wherein the first access information is data query request information; the method further comprises the following steps:
the database sends first query result information to the data processing device, wherein the first query result information comprises target data, and the target data are ciphertext data;
the data processing device carries out second information processing on the first query result information to obtain second query result information, wherein the second query result information comprises the decrypted target data;
and the data processing device returns the second query result information to the service system.
11. The method according to claim 10, wherein the second information processing of the first query result information by the data processing device to obtain second query result information comprises:
the data processing device acquires second configuration information;
the data processing device determines the target data in the first query result information according to the second configuration information;
the data processing device decrypts the target data to obtain target plaintext data;
and the data processing device updates the target data in the first query result information into the target plaintext data to obtain second query result information.
12. The method of claim 11, wherein the first query result information comprises first result information and second result information; the data processing device determines the target data in the first query result information according to the second configuration information, and the method includes:
the data processing device obtains second character string information according to the first result information and the second result information;
the data processing device acquires second mapping information corresponding to the second character string information;
when the second mapping information matches the second configuration information, the data processing apparatus determines that the second result information is the target data.
13. A data processing apparatus, comprising:
the system comprises an access interface module, a first access module and a second access module, wherein the access interface module is used for receiving first access information, and the first access information comprises sensitive data;
the information processing module is used for carrying out first information processing on the first access information to obtain second access information, wherein the second access information comprises the encrypted sensitive data;
and the database access module is used for sending the second access information to a database, so that the database performs data processing according to the encrypted sensitive data.
14. The data processing apparatus of claim 13, further comprising a configuration module, the configuration module storing first configuration information;
the information processing module includes:
a first information obtaining module, configured to obtain the first configuration information from the configuration module;
the first filtering module is used for determining the sensitive data in the first access information according to the first configuration information;
the encryption module is used for encrypting the sensitive data to obtain sensitive ciphertext data;
and the first updating module is used for updating the sensitive data in the first access information into the sensitive ciphertext data to obtain second access information.
15. The data processing apparatus of claim 14, wherein the first access information comprises first data information and second data information;
the sensitive data determination module comprises:
the first character string acquisition module is used for acquiring first character string information according to the first data information and the second data information;
the first mapping information acquisition module is used for acquiring first mapping information corresponding to the first character string information;
and the first data determining module is used for determining that the second data information is the sensitive data when the first mapping information is matched with the first configuration information.
16. The data processing apparatus according to any one of claims 13 to 15, wherein when the first access information is data query request information;
the database access module is further configured to receive first query result information sent by the database, where the first query result information includes target data, and the target data is ciphertext data;
the information processing module is further configured to perform second information processing on the first query result information to obtain second query result information, where the second query result information includes the decrypted target data;
the access interface module is further configured to return the second query result information to the initiator of the first access information.
17. The data processing apparatus of claim 16, wherein the information processing module comprises:
the second information acquisition module is used for acquiring second configuration information;
the second filtering module is used for determining the target data in the first query result information according to the second configuration information;
the decryption module is used for decrypting the target data to obtain target plaintext data;
and the second updating module is used for updating the target data in the first query result information into the target plaintext data to obtain second query result information.
18. The data processing apparatus of claim 17, wherein the first query result information comprises first result information and second result information;
the target data determination module includes:
the second character string acquisition module is used for acquiring second character string information according to the first result information and the second result information;
the second mapping information acquisition module is used for acquiring second mapping information corresponding to the second character string information;
and the second data determining module is used for determining that the second result information is the target data when the second mapping information is matched with the second configuration information.
19. A data processing apparatus comprising: memory, processor and computer program stored on the memory and executable on the processor, characterized in that the processor implements the data processing method according to any one of claims 1 to 6 when executing the computer program.
20. A data processing system comprising a business system, a data processing apparatus and a database, said business system, said data processing apparatus and said database cooperating to perform the data processing method of any one of claims 7 to 12.
21. A computer-readable storage medium storing computer-executable instructions for performing the data processing method of any one of claims 1 to 12.
CN202110607874.3A 2021-06-01 2021-06-01 Data processing method, device, system and storage medium thereof Pending CN115438037A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110607874.3A CN115438037A (en) 2021-06-01 2021-06-01 Data processing method, device, system and storage medium thereof
PCT/CN2022/089084 WO2022252880A1 (en) 2021-06-01 2022-04-25 Data processing method, apparatus and system, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110607874.3A CN115438037A (en) 2021-06-01 2021-06-01 Data processing method, device, system and storage medium thereof

Publications (1)

Publication Number Publication Date
CN115438037A true CN115438037A (en) 2022-12-06

Family

ID=84240253

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110607874.3A Pending CN115438037A (en) 2021-06-01 2021-06-01 Data processing method, device, system and storage medium thereof

Country Status (2)

Country Link
CN (1) CN115438037A (en)
WO (1) WO2022252880A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117195275B (en) * 2023-11-08 2024-02-27 成方金融科技有限公司 Data access method, device, electronic equipment and storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106548085A (en) * 2015-09-17 2017-03-29 中国移动通信集团甘肃有限公司 A kind of processing method and processing device of data
CN106934299A (en) * 2015-12-29 2017-07-07 北京明朝万达科技股份有限公司 A kind of Database Encrypt System and method
CN108595968A (en) * 2018-04-20 2018-09-28 北京数字认证股份有限公司 A kind of data guard method, device and equipment
WO2021009554A1 (en) * 2019-07-18 2021-01-21 Telefonaktiebolaget Lm Ericsson (Publ) Method and system for secured information exchange between intermediate and endpoint nodes in a communications network

Also Published As

Publication number Publication date
WO2022252880A1 (en) 2022-12-08

Similar Documents

Publication Publication Date Title
KR102155462B1 (en) Methods, systems and devices for data access
US11582040B2 (en) Permissions from entities to access information
US9525670B2 (en) Computer product, recording medium, communications apparatus, and communications method
ES2804771T3 (en) Method and system for providing terminal identifiers
US9350726B2 (en) Recovery from rolling security token loss
US20150026462A1 (en) Method and system for access-controlled decryption in big data stores
US11811907B2 (en) Data processing permits system with keys
CN111723385B (en) Data information processing method, device, electronic equipment and storage medium
CN109657492B (en) Database management method, medium, and electronic device
CN106992851B (en) TrustZone-based database file password encryption and decryption method and device and terminal equipment
CN109308421B (en) Information tamper-proofing method and device, server and computer storage medium
CN108268799B (en) Data query system and method, storage medium and terminal
CN111104691A (en) Sensitive information processing method and device, storage medium and equipment
CN104937904A (en) Copy offload for disparate offload providers
CN111737720A (en) Data processing method and device and electronic equipment
CN107395587B (en) Data management method and system based on multipoint cooperation mechanism
CN110516467B (en) Data distribution method and device, storage medium and terminal
CN109325360B (en) Information management method and device
CN115438037A (en) Data processing method, device, system and storage medium thereof
CN114222288B (en) Equipment identifier generation method, equipment identifier verification method and device
CN111414597B (en) Method and device for acquiring device fingerprint and device fingerprint server
CN112929169A (en) Key negotiation method and system
CN113378120A (en) Version authorization control method, device, equipment and storage medium based on block chain
EP4158515A1 (en) Data storage server and client devices for securely storing data
CN113783847B (en) Message interaction method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination