CN115758471B - Data processing method, device and equipment - Google Patents

Data processing method, device and equipment Download PDF

Info

Publication number
CN115758471B
CN115758471B CN202211591626.5A CN202211591626A CN115758471B CN 115758471 B CN115758471 B CN 115758471B CN 202211591626 A CN202211591626 A CN 202211591626A CN 115758471 B CN115758471 B CN 115758471B
Authority
CN
China
Prior art keywords
target
privacy
code
preset
program code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211591626.5A
Other languages
Chinese (zh)
Other versions
CN115758471A (en
Inventor
刘焱
李丰廷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202211591626.5A priority Critical patent/CN115758471B/en
Publication of CN115758471A publication Critical patent/CN115758471A/en
Application granted granted Critical
Publication of CN115758471B publication Critical patent/CN115758471B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The embodiment of the specification discloses a data processing method, a device and equipment, wherein the method comprises the following steps: acquiring program codes of appointed programs written in an objective privacy calculation layer, and converting the program codes into objective program codes of appointed types, wherein the program codes comprise codes written by using one or more different development languages; detecting a first code in the target program codes of the appointed type to judge whether a privacy protection algorithm in the target privacy calculation layer meets a preset first security condition or not; and/or detecting a second code in the target program code of the specified type to judge whether the related information of the privacy protection protocol in the target privacy calculation layer and the related information of the privacy calculation communication protocol in the target privacy calculation layer meet a preset second security condition; and determining whether the target privacy calculation layer has risk or not based on the obtained detection result.

Description

Data processing method, device and equipment
Technical Field
The present document relates to the field of computer technologies, and in particular, to a data processing method, apparatus, and device.
Background
At present, data becomes an important production element and an important engine for accelerating economic and social development quality change, efficiency change and power change. Under the conditions that data supervision is increasingly strict and private data of people pay more attention to the people, how to promote orderly flow and efficient release of data elements on the premise of ensuring data safety and privacy compliance is a core problem of healthy development of a data market. In this context, privacy calculations are an emerging data flow security technology, market prospect. As a very complex software system, the privacy computing system or the privacy computing function layer has a system-level vulnerability and a Web-level vulnerability, and may have vulnerabilities at other levels. The existing white-box code scanning technology can only cover common system-level vulnerabilities and Web-level vulnerabilities, and lacks discovery capability for other-level vulnerabilities. For this reason, it is required to provide a white-box code scanning technique for a privacy computing system or a privacy computing function layer, thereby protecting privacy data of a user to prevent personal privacy from being leaked.
Disclosure of Invention
It is an object of embodiments of the present specification to provide a white-box code scanning technique for a privacy computing system or privacy computing functional layer to protect privacy data of a user to prevent personal privacy from being compromised.
In order to achieve the above technical solution, the embodiments of the present specification are implemented as follows:
the embodiment of the specification provides a data processing method, which comprises the following steps: program code for writing a specified program in the target privacy calculation layer is obtained, and the program code is converted into target program code of a specified type, wherein the program code comprises codes written in one or more different development languages. Detecting a first code in the target program codes of the appointed type to judge whether a privacy protection algorithm in the target privacy calculation layer meets a preset first security condition or not; and/or detecting a second code in the target program code of the specified type to judge whether the related information of the privacy protection protocol in the target privacy calculation layer and the related information of the privacy calculation communication protocol in the target privacy calculation layer meet a preset second security condition. And determining whether the target privacy calculation layer has risk or not based on the obtained detection result.
The embodiment of the present specification provides a data processing apparatus, including: and the code processing module is used for acquiring program codes of appointed programs written in the target privacy calculation layer and converting the program codes into target program codes of appointed types, wherein the program codes comprise codes written by using one or more different development languages. The code security detection module is used for detecting a first code in the target program code of the appointed type so as to judge whether a privacy protection algorithm in the target privacy calculation layer meets a preset first security condition or not; and/or detecting a second code in the target program code of the specified type to judge whether the related information of the privacy protection protocol in the target privacy calculation layer and the related information of the privacy calculation communication protocol in the target privacy calculation layer meet a preset second security condition. And the risk determining module is used for determining whether the target privacy calculating layer has risk or not based on the obtained detection result.
A data processing apparatus provided in an embodiment of the present specification includes: a processor; and a memory arranged to store computer executable instructions that, when executed, cause the processor to: program code for writing a specified program in the target privacy calculation layer is obtained, and the program code is converted into target program code of a specified type, wherein the program code comprises codes written in one or more different development languages. Detecting a first code in the target program codes of the appointed type to judge whether a privacy protection algorithm in the target privacy calculation layer meets a preset first security condition or not; and/or detecting a second code in the target program code of the specified type to judge whether the related information of the privacy protection protocol in the target privacy calculation layer and the related information of the privacy calculation communication protocol in the target privacy calculation layer meet a preset second security condition. And determining whether the target privacy calculation layer has risk or not based on the obtained detection result.
The present description also provides a storage medium for storing computer-executable instructions that when executed by a processor implement the following: program code for writing a specified program in the target privacy calculation layer is obtained, and the program code is converted into target program code of a specified type, wherein the program code comprises codes written in one or more different development languages. Detecting a first code in the target program codes of the appointed type to judge whether a privacy protection algorithm in the target privacy calculation layer meets a preset first security condition or not; and/or detecting a second code in the target program code of the specified type to judge whether the related information of the privacy protection protocol in the target privacy calculation layer and the related information of the privacy calculation communication protocol in the target privacy calculation layer meet a preset second security condition. And determining whether the target privacy calculation layer has risk or not based on the obtained detection result.
Drawings
In order to more clearly illustrate the embodiments of the present description or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some of the embodiments described in the present description, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a diagram illustrating an embodiment of a data processing method according to the present disclosure;
FIG. 2 is a diagram of another embodiment of a data processing method according to the present disclosure;
FIG. 3 is a schematic diagram of a data processing process according to the present disclosure;
FIG. 4 is a diagram of an embodiment of a data processing apparatus according to the present disclosure;
fig. 5 is a data processing apparatus embodiment of the present specification.
Detailed Description
The embodiment of the specification provides a data processing method, a device and equipment.
In order to make the technical solutions in the present specification better understood by those skilled in the art, the technical solutions in the embodiments of the present specification will be clearly and completely described below with reference to the drawings in the embodiments of the present specification, and it is obvious that the described embodiments are only some embodiments of the present specification, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are intended to be within the scope of the present disclosure.
Example 1
As shown in fig. 1, the embodiment of the present disclosure provides a data processing method, where an execution subject of the method may be a terminal device or may also be a server, where the terminal device may be a mobile terminal device such as a mobile phone, a tablet computer, a computer device such as a notebook computer or a desktop computer, or may also be an IoT device (specifically, a smart watch, an in-vehicle device, etc.). The server may be a single server, a server cluster including a plurality of servers, a background server such as a financial service or an online shopping service, or a background server of an application program. In this embodiment, a server is taken as an example for detailed description, and the following related contents may be referred to for the execution process of the terminal device, which is not described herein. The method specifically comprises the following steps:
In step S102, a program code of a specified program in the writing target privacy calculation layer is acquired, and is converted into a specified type of program code including codes written using one or more different development languages.
The target privacy computing layer may be any functional layer capable of performing privacy computing, the privacy computing may be a technical set for implementing data analysis computing on the premise of protecting data without external disclosure, achieving the purpose of "availability and invisibility" of the data, and implementing conversion and release of data value on the premise of fully protecting data and privacy security, the privacy computing may include cryptography-based privacy computing technology as represented by multiparty security computing, technology derived by fusion of artificial intelligence as represented by federal learning and privacy protection technology, trusted hardware-based privacy computing technology as represented by trusted execution environment, and the like, and may further include multiparty intermediate computing (Multi-PartyIntermediary Computation, MPIC) and the like, wherein multiparty intermediate computing refers to multiparty data in a supervised intermediate computing environment independent of a data party and a user, the target privacy computing layer can be a functional layer or a subsystem in a certain business system, wherein the business system can comprise various types, for example, the business system can be an online transaction business system, a social business system, a financial related business system, a risk prevention and control business system, a recommendation business system and the like, and concretely, the target privacy computing layer can be a functional layer in a financial related business system, and can provide encryption of user identity information (such as encryption of a user face image in user face recognition and the like) for the financial related business system, privacy computing processing before business data transmission (such as differential privacy processing of a user face image in user face recognition and the like), and the like, the user identity authentication process and the like may be specifically set according to actual conditions, and the embodiment of the present specification is not limited to this. The specified program may be any set application program, and in practical application, the specified program may be any program included in the privacy calculating layer or the privacy calculating system, specifically, may be one program, or may include a plurality of different programs, specifically, may be set according to practical situations, and the specification is not limited to this. The specified type may be a preset type, in this embodiment, the specified type may be a certain type, where the type may be determined by a plurality of different manners, for example, may be determined according to a development language of the program code, specifically, such as a c language class or a c++ language class, etc., or may be determined according to a manner, specifically, may be determined according to a specific feature (including a specific character or symbol, etc.) of the program code, and may be specifically set according to an actual situation, which is not limited in this specification. The program code may include code written in one or more different development languages, for example, development languages such as C language, c++, actionScript language, ada, D language, fortran language, GLSL language, hassell language, java bytecode, objective-C language, shift language, python language, ruby language, crystal language, rust language, scala language, and c# language, and the like, and may be specifically set according to the actual situation.
In practice, data is an important production element at present, and becomes an important engine for accelerating economic and social development quality change, efficiency change and power change. Under the conditions that data supervision is increasingly strict and private data of people pay more attention to the people, how to promote orderly flow and efficient release of data elements on the premise of ensuring data safety and privacy compliance is a core problem of healthy development of a data market. In this context, privacy calculations are an emerging data flow security technology, market prospect. As a very complex software system, the privacy computing system or the privacy computing function layer has a system-level vulnerability and a Web-level vulnerability, and may have vulnerabilities at other levels. The existing white-box code scanning technology can only cover common system-level vulnerabilities and Web-level vulnerabilities, and lacks discovery capability for other-level vulnerabilities. For this reason, it is required to provide a white-box code scanning technique for a privacy computing system or a privacy computing function layer, thereby protecting privacy data of a user to prevent personal privacy from being leaked. The embodiment of the present specification provides an achievable technical solution, which may specifically include the following matters.
For some business systems with privacy protection function or privacy calculation function, the privacy calculation layer not only has system-level loopholes and Web-level loopholes, but also may have loopholes on the algorithm level of privacy calculation, so that the privacy calculation layer contained in the business system can be determined, and the determined privacy calculation layer can be used as a target privacy calculation layer. Then, the application program included in the target privacy calculation layer may be acquired, and the program code of the specified program written in the target privacy calculation layer may be acquired, for example, the program code of the specified program written in the C language included in the target privacy calculation layer may be acquired, and further, for example, the program code of the specified program written in the c++ language included in the target privacy calculation layer may be acquired, and the like, and may be specifically set according to the actual asking for money. In practical applications, the program code may include codes written in a plurality of different development languages, for example, the program code may include program code written in C language, or may include program code written in c++ language, which may be specifically set according to practical situations.
The conversion mechanism of the program codes written in the plurality of different development languages may be preset according to the actual situation, the conversion mechanism may convert the program codes written in the plurality of different development languages into the same or the same type of program codes, specifically, the privacy calculating layer may include the program codes written in the C language and further include the program codes written in the c++ language, and then, through the above conversion mechanism, the program codes written in the C language may be converted to obtain the unified program codes of the specified type, and meanwhile, through the above conversion mechanism, the program codes written in the c++ language may be converted to obtain the unified program codes of the specified type, and the like, and may be specifically set according to the actual situation, which is not limited in the embodiment of the present specification. Therefore, through the mode, the program codes written in a plurality of different development languages can be converted into a universal program code, so that the defect that the program codes written in different development languages need to be written in the traditional white box scanning process is avoided, and different rules are written.
In step S104, detecting a first code in the above-mentioned specified type of program code to determine whether the privacy protection algorithm in the target privacy calculation layer meets a preset first security condition; and/or detecting a second code in the program codes of the specified type to judge whether the related information of the privacy protection protocol in the target privacy calculation layer and the related information of the privacy calculation communication protocol in the target privacy calculation layer meet the preset second security condition.
The first security condition may be a condition set to ensure the security of the privacy protection algorithm, and may be set according to an actual situation, specifically, a condition that a password needs to meet (specifically, a range or a minimum threshold of a password length, a password is generated by one or more pre-specified algorithms, etc.), a condition that a private computing environment needs to meet (specifically, a password transmission needs to meet a specified transmission protocol, etc.), etc., which may be specifically set according to an actual situation, and the embodiment of the present disclosure does not limit this. The second security condition may be a condition set to ensure security of the privacy protection protocol and the privacy calculation communication protocol, and the second security condition may be set according to an actual situation, specifically, if information such as a key and a signature needs to be verified, and in addition, whether a generation mode of the key meets a specified generation mode or matches a specified generation algorithm needs to be detected, and the second security condition may be set according to an actual situation, specifically, the embodiment of the present disclosure does not limit the present disclosure. The privacy protection protocol may include a core parameter of the privacy protection protocol and other parameters of the privacy protection protocol, where the core parameter of the privacy protection protocol may include various types, such as a generation mode of a public key or a private key, a model gradient, verification of a secret key and a signature, and the like, and may be specifically set according to an actual situation, which is not limited in the embodiment of the present disclosure. The privacy protection protocol may be a protocol set on how to perform privacy protection on data, the privacy calculation communication protocol may be a protocol set on how to perform privacy protection on data that has been subjected to privacy protection processing or has not been subjected to privacy protection processing in the process of communication, the privacy calculation communication protocol may be set for attack of privacy calculation, and attack on privacy calculation may be effectively avoided through the privacy calculation communication protocol, so that relevant processing of privacy calculation is protected, the privacy calculation communication protocol may include a plurality of types, and may be specifically set according to actual conditions, which is not limited in the embodiment of the present specification.
In implementation, considering that a more important part in the target privacy computing layer is a privacy protection algorithm, the advantages and disadvantages of the privacy protection algorithm directly affect the privacy protection effect of the target privacy computing layer, based on this, a first security condition can be set for the privacy protection algorithm in the target privacy computing layer according to the actual situation in advance, after the program codes in the target privacy computing layer are converted into the program codes of the specified type, the program codes of the specified type can be analyzed, the program codes related to the privacy protection algorithm are determined therefrom, specifically, the program codes related to the core parameters of the privacy protection algorithm can be determined from the program codes of the specified type, the determined program codes can be used as the first codes, then the first codes can be detected by using the first security condition, so as to determine whether the privacy protection algorithm in the target privacy computing layer meets the first security condition, specifically, whether the password meets the corresponding condition or not, if the privacy protection algorithm in the target privacy computing layer meets the first security condition, the privacy protection algorithm in the target privacy computing layer is determined to be higher in security, and otherwise, the privacy protection algorithm in the target privacy computing layer is determined to be worse.
In addition, considering that the privacy protection processing in the target privacy computing layer may be attacked, the second security condition may be set in advance for the privacy protection protocol in the target privacy computing layer and the privacy computing communication protocol in the target privacy computing layer, and related information thereof according to the actual situation, after the program code in the target privacy computing layer is converted into the program code of the specified type, the program code of the specified type may be analyzed, the program code related to the privacy protection protocol in the target privacy computing layer and the privacy computing communication protocol in the target privacy computing layer may be determined therefrom, and then the determined program code may be used as the second code, and then the second security condition may be used to detect the second code, thereby determining whether the related information of the privacy protection protocol in the target privacy computing layer and the related information of the privacy computing communication protocol in the target privacy computing layer meet the second security condition, in particular, such as determining whether the password or signature is verified, the generation mode of the password is the preset generation mode, and the related information of the privacy protection protocol in the target privacy computing layer and the related information of the privacy protection protocol meets the related information of the privacy protection protocol, or the related information of the privacy protection protocol is determined to be worse than the related information of the privacy protection protocol.
It should be noted that, in practical application, the second security condition may also be set according to the privacy protection protocol in the target privacy computing layer or the privacy computing communication protocol in the target privacy computing layer, and based on this, the above processing may further include detecting the second code in the above specified type of program code to determine whether the related information of the privacy protection protocol in the target privacy computing layer or the related information of the privacy computing communication protocol in the target privacy computing layer meets the preset second security condition.
In step S106, it is determined whether the target privacy calculation layer is at risk based on the obtained detection result.
In implementation, if only the first code in the program codes of the specified type is detected, the obtained detection result includes that the privacy protection algorithm in the target privacy calculation layer meets the preset first security condition or the privacy protection algorithm in the target privacy calculation layer does not meet the preset first security condition; if only the second code in the program codes of the specified type is detected, the obtained detection result comprises that the related information of the privacy protection protocol in the target privacy computing layer and the related information of the privacy computation communication protocol in the target privacy computing layer meet the preset second security condition or the related information of the privacy protection protocol in the target privacy computing layer and the related information of the privacy computation communication protocol in the target privacy computing layer do not meet the preset second security condition; if the first code in the program codes of the specified type is detected and the second code in the program codes of the specified type is detected, the obtained detection result comprises whether the privacy protection algorithm in the target privacy calculation layer meets the preset first security condition and whether the related information of the privacy protection protocol in the target privacy calculation layer and the related information of the privacy calculation communication protocol in the target privacy calculation layer meet the preset second security condition. If only the first code in the program codes of the specified types is detected and the obtained detection result is that the privacy protection algorithm in the target privacy calculation layer meets the preset first security condition, the target privacy calculation layer can be determined to have no risk, otherwise, the target privacy calculation layer can be determined to have risk; if only the second code in the program codes of the specified type is detected, and the obtained detection result is that the related information of the privacy protection protocol in the target privacy computing layer and the related information of the privacy computing communication protocol in the target privacy computing layer meet the preset second security condition, the target privacy computing layer can be determined to have no risk, otherwise, the target privacy computing layer can be determined to have risk; if the first code in the program codes of the specified type is detected, the second code in the program codes of the specified type is detected, and the obtained detection result is that the privacy protection algorithm in the target privacy calculation layer meets the preset first security condition, and the related information of the privacy protection protocol in the target privacy calculation layer and the related information of the privacy calculation communication protocol in the target privacy calculation layer meet the preset second security condition, the target privacy calculation layer can be determined to have no risk, otherwise, the target privacy calculation layer can be determined to have risk. If the target privacy calculating layer is determined to have risk, corresponding prompt information can be sent to a preset manager to prompt the manager to process the target privacy calculating layer so as to prevent user privacy disclosure.
The embodiment of the specification provides a data processing method, which is characterized in that a program code of a specified program written in a target privacy calculation layer is obtained and converted into a target program code of a specified type, the program code comprises codes written by one or more different development languages, and then a first code in the target program code can be detected to judge whether a privacy protection algorithm in the target privacy calculation layer meets a preset first security condition; and/or detecting the second code in the target program code to determine whether the related information of the privacy protection protocol in the target privacy computing layer and the related information of the privacy computing communication protocol in the target privacy computing layer meet the preset second security condition, and finally, determining whether the target privacy computing layer has risks based on the obtained detection result.
Example two
As shown in fig. 2, the embodiment of the present disclosure provides a data processing method, where an execution subject of the method may be a terminal device or may also be a server, where the terminal device may be a mobile terminal device such as a mobile phone, a tablet computer, a computer device such as a notebook computer or a desktop computer, or may also be an IoT device (specifically, a smart watch, an in-vehicle device, etc.). The server may be a single server, a server cluster including a plurality of servers, a background server such as a financial service or an online shopping service, or a background server of an application program. In this embodiment, a server is taken as an example for detailed description, and the following related contents may be referred to for the execution process of the terminal device, which is not described herein. The method specifically comprises the following steps:
in step S202, program code of a specified program in the writing target privacy calculation layer, including code written using one or more different development languages, is acquired.
Wherein the program code comprises code written in one or more of the following development languages: c language, c++ language, python language, rust language, etc.
In step S204, the program code is preprocessed to obtain a processed program code, where the preprocessing may include one or more of the following: the method comprises lexical analysis processing, grammar analysis processing and semantic analysis processing, wherein the lexical analysis processing is used for analyzing the content of the program code, the grammar analysis processing is used for detecting grammar errors in the program code, and the semantic analysis processing is used for constructing an abstract grammar tree of a development language corresponding to the program code.
In implementation, the foregoing program code may be subjected to lexical analysis, and specifically, the program code may be split, where each split portion is used as a token, such as a bracket, a number, a string, etc., so as to obtain a token sequence corresponding to the program code. In addition, the above-mentioned program code may be subjected to a syntax analysis process and a semantic analysis process, where the syntax analysis process may verify whether the syntax in the program code is correct, specifically, word sequences may be combined into various lexical phrases, such as a program, a sentence, an expression, etc., and then nodes formed by all the lexical phrases may be combined into an abstract syntax tree (Abstract Syntax Tree, AST), so as to verify whether the syntax in the program code is correct, and perform a semantic analysis, or token sequences may be combined into various lexical phrases based on the lexical analysis process, and then nodes formed by all the lexical phrases may be combined into an abstract syntax tree AST, so as to verify whether the syntax in the program code is correct, and perform a semantic analysis, and may be specifically set according to the actual situation.
For the preprocessing procedure described above, if the preprocessing includes lexical analysis processing, grammatical analysis processing, and semantic analysis processing, the above-described processed program code may be converted into a target program code of a specified type, the specific processing may be various, and reference may be made to the content related to the first embodiment described above, and in addition, an alternative processing manner is provided in this embodiment, in which the program code of the specified type may be an intermediate code generated using a preset encoder, and specifically may include the processing of step S206 below.
In step S206, the abstract syntax tree obtained after the semantic analysis is traversed from top to bottom based on the LLVM compiler, and is compiled step by step to generate the target program code of the specified type.
Wherein LLVM is originally derived from the abbreviation of the underlying virtual machine (Low Level Virtual Machine), provides support related to a compiler, can be used as a background of a multi-language compiler, can perform compiler optimization, link optimization, online compilation optimization, code generation, etc. of a program development language, the LLVM splits a conventional compilation process into three parts of front end, an optimizer and back end, wherein the front end is a process of preprocessing, lexical analysis, grammar analysis, generating an Abstract Syntax Tree (AST), and generating an Intermediate Representation (IR), the back end is a process of generating a machine language of a final target platform according to the Intermediate Representation (IR), and the intermediate optimizer is a process of performing optimization processing on the Intermediate Representation (IR).
In implementation, as shown in fig. 3, based on the foregoing, an LLVM compiler may be used to traverse the abstract syntax tree obtained after the foregoing semantic analysis processing from top to bottom, and perform gradual compiling to generate corresponding intermediate code (i.e., object program code of a specified type).
In step S208, a first code in the above-mentioned target program code of the specified type is detected to determine whether the privacy protection algorithm in the target privacy calculating layer meets a preset first security condition; and/or detecting a second code in the target program code of the specified type to judge whether the related information of the privacy protection protocol in the target privacy calculation layer and the related information of the privacy calculation communication protocol in the target privacy calculation layer meet the preset second security condition.
Wherein the first security condition may include one or more of: a symmetric encryption algorithm and a symmetric decryption algorithm with security lower than a first preset security intensity threshold are not used; an asymmetric encryption algorithm and an asymmetric decryption algorithm with security lower than a second preset security intensity threshold are not used; a post quantum asymmetric encryption algorithm and a post quantum asymmetric decryption algorithm with the security lower than a third preset security intensity threshold are not used; a hash algorithm with the security lower than a fourth preset security intensity threshold value is not used; the key length is greater than a preset length threshold; the configuration of the transport layer security TLS is matched with the preset TLS configuration; the configuration of the secure socket layer SSL is matched with a preset SSL configuration. The first preset security intensity threshold may be set according to practical situations, if the key length is greater than 128, it may be determined that a symmetric encryption algorithm and a symmetric decryption algorithm with security higher than the first preset security intensity threshold are used, specifically, AES algorithm with key length less than 128 cannot be used. The second preset security intensity threshold may be set according to practical situations, if the key length is greater than 1024, it may be determined that an asymmetric encryption algorithm and an asymmetric decryption algorithm with security higher than the second preset security intensity threshold are used, specifically, an RSA algorithm with key intensity less than 1024 cannot be used. The third preset safety intensity threshold may be set according to practical situations, which is not limited in the embodiment of the present specification. The fourth preset security intensity threshold may be set according to practical situations, if the hash value is greater than or equal to 224 bits, it may be determined that a hash algorithm with security higher than the fourth preset security intensity threshold is used, specifically, a hash algorithm such as md54, md5, etc. cannot be used, and a SHA series hash algorithm with hash value > =224 bits may be used, specifically, hash algorithms such as SHA-224, SHA-256, SHA-384, SHA-512, etc. The preset length threshold may be set according to practical situations, such as 2048. The configuration of the transport layer security TLS is matched with the preset TLS configuration and the configuration of the secure socket layer SSL is matched with the preset SSL configuration, for example, the configuration may be generated RSA private key encryption, etc., and may be specifically set according to practical situations.
The second security condition may include one or more of the following: passing a verification process of the key and/or signature; the security of large prime numbers is checked; the model gradient is recorded in a preset log; the private key is recorded in a preset log; the private key is generated by hard coding or pseudo-random.
In implementation, as shown in fig. 3, a cryptographic detection engine and a communication protocol detection engine may be preset, and the cryptographic detection engine may be used to detect a first code in the above-mentioned target program code of the specified type, so as to determine whether the privacy protection algorithm in the target privacy calculation layer meets the preset first security condition, and the specific processing procedure may refer to the relevant content in the first embodiment and is not described herein again. The communication protocol detection engine may detect the second code in the above-mentioned specific type of object program code to determine whether the related information of the privacy protection protocol in the target privacy calculation layer and the related information of the privacy calculation communication protocol in the target privacy calculation layer meet the preset second security condition, and the specific processing procedure may refer to the related content in the first embodiment and will not be described herein.
In step S210, vulnerability detection is performed on the target program code of the specified type to determine whether a system-level vulnerability and/or a Web-level vulnerability exists in the target privacy calculation layer.
In implementation, as shown in fig. 3, a vulnerability detection engine may be preset, and vulnerability detection is performed on the target program code of the specified type by the vulnerability detection engine, so as to determine whether a vulnerability at the system level and/or a vulnerability at the Web level exists in the target privacy calculation layer.
In step S212, it is determined whether the target privacy calculating layer has a risk, based on the detection result obtained above and the vulnerability detection result.
The detection result may be a detection result obtained by detecting the first code and/or the second code, and the vulnerability detection result may be a detection result obtained by performing vulnerability detection on a target program code of a specified type to determine whether a vulnerability at a system level and/or a vulnerability at a Web level exists in the target privacy calculation layer.
In implementation, if the obtained detection result and the vulnerability detection result indicate that the target privacy computing layer does not have a vulnerability at the system level and/or a vulnerability at the Web level, the privacy protection algorithm does not have risks, and the privacy protection protocol and the privacy computing communication protocol do not have related risks, determining that the target privacy computing layer does not have risks, otherwise, determining that the target privacy computing layer has risks.
The embodiment of the specification provides a data processing method, which is characterized in that a program code of a specified program written in a target privacy calculation layer is obtained and converted into a target program code of a specified type, the program code comprises codes written by one or more different development languages, and then a first code in the target program code can be detected to judge whether a privacy protection algorithm in the target privacy calculation layer meets a preset first security condition; and/or detecting the second code in the target program code to determine whether the related information of the privacy protection protocol in the target privacy computing layer and the related information of the privacy computing communication protocol in the target privacy computing layer meet the preset second security condition, and finally, determining whether the target privacy computing layer has risks based on the obtained detection result.
Example III
The data processing method provided in the embodiment of the present disclosure is based on the same concept, and the embodiment of the present disclosure further provides a data processing device, as shown in fig. 4.
The data processing apparatus includes: a code processing module 401, a code security detection module 402, and a risk determination module 403, wherein:
a code processing module 401, which obtains the program code of the appointed program in the target privacy calculation layer, and converts the program code into the appointed type of target program code, wherein the program code comprises codes written by one or more different development languages;
a code security detection module 402, configured to detect a first code in the target program code of the specified type, so as to determine whether a privacy protection algorithm in the target privacy calculation layer meets a preset first security condition; and/or detecting a second code in the target program code of the specified type to judge whether the related information of the privacy protection protocol in the target privacy calculation layer and the related information of the privacy calculation communication protocol in the target privacy calculation layer meet a preset second security condition;
The risk determining module 403 determines whether the target privacy calculating layer has a risk based on the obtained detection result.
In an embodiment of the present disclosure, the apparatus further includes:
the vulnerability detection module is used for carrying out vulnerability detection on the target program codes of the specified types so as to judge whether system-level vulnerabilities and/or Web-level vulnerabilities exist in the target privacy calculation layer;
the risk determining module 403 determines whether the target privacy calculating layer has a risk based on the obtained detection result and the vulnerability detection result.
In an embodiment of the present disclosure, the apparatus further includes:
the preprocessing module is used for preprocessing the program codes to obtain processed program codes, and the preprocessing comprises one or more of the following steps: the method comprises lexical analysis processing, grammar analysis processing and semantic analysis processing, wherein the lexical analysis processing is used for analyzing the content of the program code, the grammar analysis processing is used for detecting grammar errors in the program code, and the semantic analysis processing is used for constructing an abstract grammar tree of a development language corresponding to the program code;
the code processing module 401 converts the processed program code into a target program code of a specified type.
In the embodiment of the present specification, the program code includes code written in one or more of the following development languages: c language, c++ language, python language and Rust language; the specified type of program code is an intermediate code generated using a preset encoder.
In this embodiment of the present disclosure, the preprocessing includes lexical analysis, syntax analysis, and semantic analysis, and the code processing module 401 traverses the abstract syntax tree obtained after the semantic analysis from top to bottom based on an LLVM compiler, and performs gradual compiling to generate the target program code of the specified type.
In this embodiment of the present disclosure, the first security condition includes one or more of the following:
a symmetric encryption algorithm and a symmetric decryption algorithm with security lower than a first preset security intensity threshold are not used;
an asymmetric encryption algorithm and an asymmetric decryption algorithm with security lower than a second preset security intensity threshold are not used;
a post quantum asymmetric encryption algorithm and a post quantum asymmetric decryption algorithm with the security lower than a third preset security intensity threshold are not used;
a hash algorithm with the security lower than a fourth preset security intensity threshold value is not used;
The key length is greater than a preset length threshold;
the configuration of the transport layer security TLS is matched with the preset TLS configuration;
the configuration of the secure socket layer SSL is matched with a preset SSL configuration.
In an embodiment of the present disclosure, the second security condition includes one or more of the following:
passing a verification process of the key and/or signature;
the security of large prime numbers is checked;
the model gradient is recorded in a preset log;
the private key is recorded in a preset log;
the private key is generated by hard coding or pseudo-random.
The embodiment of the present disclosure provides a data processing apparatus, by acquiring a program code for writing a specified program in a target privacy calculation layer, converting the program code into a target program code of a specified type, where the program code includes codes written using one or more different development languages, and then detecting a first code in the target program code to determine whether a privacy protection algorithm in the target privacy calculation layer meets a preset first security condition; and/or detecting the second code in the target program code to determine whether the related information of the privacy protection protocol in the target privacy computing layer and the related information of the privacy computing communication protocol in the target privacy computing layer meet the preset second security condition, and finally, determining whether the target privacy computing layer has risks based on the obtained detection result.
Example IV
The data processing device provided in the embodiment of the present disclosure further provides a data processing apparatus based on the same concept, as shown in fig. 5.
The data processing device may be a terminal device or a server or the like provided in the above embodiment.
The data processing apparatus may vary considerably in configuration or performance and may include one or more processors 501 and memory 502, in which memory 502 may store one or more stored applications or data. Wherein the memory 502 may be transient storage or persistent storage. The application programs stored in memory 502 may include one or more modules (not shown) each of which may include a series of computer executable instructions for use in a data processing apparatus. Still further, the processor 501 may be arranged to communicate with the memory 502 and execute a series of computer executable instructions in the memory 502 on a data processing apparatus. The data processing device may also include one or more power supplies 503, one or more wired or wireless network interfaces 504, one or more input/output interfaces 505, and one or more keyboards 506.
In particular, in this embodiment, the data processing apparatus includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instructions for the data processing apparatus, and the one or more programs configured to be executed by the one or more processors comprise instructions for:
acquiring program codes of appointed programs written in an objective privacy calculation layer, and converting the program codes into objective program codes of appointed types, wherein the program codes comprise codes written by using one or more different development languages;
detecting a first code in the target program codes of the appointed type to judge whether a privacy protection algorithm in the target privacy calculation layer meets a preset first security condition or not; and/or detecting a second code in the target program code of the specified type to judge whether the related information of the privacy protection protocol in the target privacy calculation layer and the related information of the privacy calculation communication protocol in the target privacy calculation layer meet a preset second security condition;
And determining whether the target privacy calculation layer has risk or not based on the obtained detection result.
In this embodiment of the present specification, further includes:
performing vulnerability detection on the target program codes of the specified types to judge whether system-level vulnerabilities and/or Web-level vulnerabilities exist in the target privacy computing layer;
based on the obtained detection result, determining whether the target privacy calculation layer has a risk includes:
and determining whether the target privacy calculating layer has risk or not based on the obtained detection result and the vulnerability detection result.
In this embodiment of the present specification, further includes:
preprocessing the program code to obtain processed program code, wherein the preprocessing comprises one or more of the following steps: the method comprises lexical analysis processing, grammar analysis processing and semantic analysis processing, wherein the lexical analysis processing is used for analyzing the content of the program code, the grammar analysis processing is used for detecting grammar errors in the program code, and the semantic analysis processing is used for constructing an abstract grammar tree of a development language corresponding to the program code;
the converting the program code into the target program code of the specified type comprises:
And converting the processed program code into target program code of a specified type.
In the embodiment of the present specification, the program code includes code written in one or more of the following development languages: c language, c++ language, python language and Rust language; the specified type of program code is an intermediate code generated using a preset encoder.
In an embodiment of the present specification, the preprocessing includes lexical analysis processing, grammatical analysis processing, and semantic analysis processing, and the converting the processed program code into the target program code of the specified type includes:
traversing the abstract syntax tree obtained after semantic analysis processing from top to bottom based on an LLVM compiler, and compiling step by step to generate target program codes of specified types.
In this embodiment of the present disclosure, the first security condition includes one or more of the following:
a symmetric encryption algorithm and a symmetric decryption algorithm with security lower than a first preset security intensity threshold are not used;
an asymmetric encryption algorithm and an asymmetric decryption algorithm with security lower than a second preset security intensity threshold are not used;
a post quantum asymmetric encryption algorithm and a post quantum asymmetric decryption algorithm with the security lower than a third preset security intensity threshold are not used;
A hash algorithm with the security lower than a fourth preset security intensity threshold value is not used;
the key length is greater than a preset length threshold;
the configuration of the transport layer security TLS is matched with the preset TLS configuration;
the configuration of the secure socket layer SSL is matched with a preset SSL configuration.
In an embodiment of the present disclosure, the second security condition includes one or more of the following:
passing a verification process of the key and/or signature;
the security of large prime numbers is checked;
the model gradient is recorded in a preset log;
the private key is recorded in a preset log;
the private key is generated by hard coding or pseudo-random.
The embodiment of the specification provides a data processing device, which converts a program code of a specified program in a target privacy calculation layer into a target program code of a specified type by acquiring the program code, wherein the program code comprises codes written by one or more different development languages, and then, the first code in the target program code can be detected to judge whether a privacy protection algorithm in the target privacy calculation layer meets a preset first security condition; and/or detecting the second code in the target program code to determine whether the related information of the privacy protection protocol in the target privacy computing layer and the related information of the privacy computing communication protocol in the target privacy computing layer meet the preset second security condition, and finally, determining whether the target privacy computing layer has risks based on the obtained detection result.
Example five
Further, based on the method shown in fig. 1 to 3, one or more embodiments of the present disclosure further provide a storage medium, which is used to store computer executable instruction information, and in a specific embodiment, the storage medium may be a U disc, an optical disc, a hard disk, etc., where the computer executable instruction information stored in the storage medium can implement the following flow when executed by a processor:
acquiring program codes of appointed programs written in an objective privacy calculation layer, and converting the program codes into objective program codes of appointed types, wherein the program codes comprise codes written by using one or more different development languages;
detecting a first code in the target program codes of the appointed type to judge whether a privacy protection algorithm in the target privacy calculation layer meets a preset first security condition or not; and/or detecting a second code in the target program code of the specified type to judge whether the related information of the privacy protection protocol in the target privacy calculation layer and the related information of the privacy calculation communication protocol in the target privacy calculation layer meet a preset second security condition;
And determining whether the target privacy calculation layer has risk or not based on the obtained detection result.
In this embodiment of the present specification, further includes:
performing vulnerability detection on the target program codes of the specified types to judge whether system-level vulnerabilities and/or Web-level vulnerabilities exist in the target privacy computing layer;
based on the obtained detection result, determining whether the target privacy calculation layer has a risk includes:
and determining whether the target privacy calculating layer has risk or not based on the obtained detection result and the vulnerability detection result.
In this embodiment of the present specification, further includes:
preprocessing the program code to obtain processed program code, wherein the preprocessing comprises one or more of the following steps: the method comprises lexical analysis processing, grammar analysis processing and semantic analysis processing, wherein the lexical analysis processing is used for analyzing the content of the program code, the grammar analysis processing is used for detecting grammar errors in the program code, and the semantic analysis processing is used for constructing an abstract grammar tree of a development language corresponding to the program code;
the converting the program code into the target program code of the specified type comprises:
And converting the processed program code into target program code of a specified type.
In the embodiment of the present specification, the program code includes code written in one or more of the following development languages: c language, c++ language, python language and Rust language; the specified type of program code is an intermediate code generated using a preset encoder.
In an embodiment of the present specification, the preprocessing includes lexical analysis processing, grammatical analysis processing, and semantic analysis processing, and the converting the processed program code into the target program code of the specified type includes:
traversing the abstract syntax tree obtained after semantic analysis processing from top to bottom based on an LLVM compiler, and compiling step by step to generate target program codes of specified types.
In this embodiment of the present disclosure, the first security condition includes one or more of the following:
a symmetric encryption algorithm and a symmetric decryption algorithm with security lower than a first preset security intensity threshold are not used;
an asymmetric encryption algorithm and an asymmetric decryption algorithm with security lower than a second preset security intensity threshold are not used;
a post quantum asymmetric encryption algorithm and a post quantum asymmetric decryption algorithm with the security lower than a third preset security intensity threshold are not used;
A hash algorithm with the security lower than a fourth preset security intensity threshold value is not used;
the key length is greater than a preset length threshold;
the configuration of the transport layer security TLS is matched with the preset TLS configuration;
the configuration of the secure socket layer SSL is matched with a preset SSL configuration.
In an embodiment of the present disclosure, the second security condition includes one or more of the following:
passing a verification process of the key and/or signature;
the security of large prime numbers is checked;
the model gradient is recorded in a preset log;
the private key is recorded in a preset log;
the private key is generated by hard coding or pseudo-random.
The embodiment of the present disclosure provides a storage medium, by acquiring a program code for writing a specified program in a target privacy calculation layer, converting the program code into a target program code of a specified type, where the program code includes codes written using one or more different development languages, and then detecting a first code in the target program code to determine whether a privacy protection algorithm in the target privacy calculation layer meets a preset first security condition; and/or detecting the second code in the target program code to determine whether the related information of the privacy protection protocol in the target privacy computing layer and the related information of the privacy computing communication protocol in the target privacy computing layer meet the preset second security condition, and finally, determining whether the target privacy computing layer has risks based on the obtained detection result.
The foregoing describes specific embodiments of the present disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
In the 90 s of the 20 th century, improvements to one technology could clearly be distinguished as improvements in hardware (e.g., improvements to circuit structures such as diodes, transistors, switches, etc.) or software (improvements to the process flow). However, with the development of technology, many improvements of the current method flows can be regarded as direct improvements of hardware circuit structures. Designers almost always obtain corresponding hardware circuit structures by programming improved method flows into hardware circuits. Therefore, an improvement of a method flow cannot be said to be realized by a hardware entity module. For example, a programmable logic device (Programmable Logic Device, PLD) (e.g., field programmable gate array (Field Programmable Gate Array, FPGA)) is an integrated circuit whose logic function is determined by the programming of the device by a user. A designer programs to "integrate" a digital system onto a PLD without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Moreover, nowadays, instead of manually manufacturing integrated circuit chips, such programming is mostly implemented by using "logic compiler" software, which is similar to the software compiler used in program development and writing, and the original code before the compiling is also written in a specific programming language, which is called hardware description language (Hardware Description Language, HDL), but not just one of the hdds, but a plurality of kinds, such as ABEL (Advanced Boolean Expression Language), AHDL (Altera Hardware Description Language), confluence, CUPL (Cornell University Programming Language), HDCal, JHDL (Java Hardware Description Language), lava, lola, myHDL, PALASM, RHDL (Ruby Hardware Description Language), etc., VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog are currently most commonly used. It will also be apparent to those skilled in the art that a hardware circuit implementing the logic method flow can be readily obtained by merely slightly programming the method flow into an integrated circuit using several of the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer readable medium storing computer readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, application specific integrated circuits (Application Specific Integrated Circuit, ASIC), programmable logic controllers, and embedded microcontrollers, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, atmel AT91SAM, microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic of the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller in a pure computer readable program code, it is well possible to implement the same functionality by logically programming the method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers, etc. Such a controller may thus be regarded as a kind of hardware component, and means for performing various functions included therein may also be regarded as structures within the hardware component. Or even means for achieving the various functions may be regarded as either software modules implementing the methods or structures within hardware components.
The system, apparatus, module or unit set forth in the above embodiments may be implemented in particular by a computer chip or entity, or by a product having a certain function. One typical implementation is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being functionally divided into various units, respectively. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing one or more embodiments of the present description.
It will be appreciated by those skilled in the art that embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, one or more embodiments of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Moreover, one or more embodiments of the present description can take the form of a computer program product on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
Embodiments of the present description are described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the specification. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable fraud case serial-to-parallel device to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable fraud case serial-to-parallel device, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
It will be appreciated by those skilled in the art that embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, one or more embodiments of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Moreover, one or more embodiments of the present description can take the form of a computer program product on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
One or more embodiments of the present specification may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. One or more embodiments of the present description may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for system embodiments, since they are substantially similar to method embodiments, the description is relatively simple, as relevant to see a section of the description of method embodiments.
The foregoing is merely exemplary of the present disclosure and is not intended to limit the present disclosure. Various modifications and alterations to this specification will become apparent to those skilled in the art. Any modifications, equivalent substitutions, improvements, or the like, which are within the spirit and principles of the present description, are intended to be included within the scope of the claims of the present description.

Claims (10)

1. A method of data processing, the method comprising:
acquiring program codes of appointed programs written in an objective privacy calculation layer, and converting the program codes into objective program codes of appointed types, wherein the program codes comprise codes written by using one or more different development languages;
detecting a first code in the target program codes of the appointed type to judge whether a privacy protection algorithm in the target privacy calculation layer meets a preset first security condition or not; and/or detecting a second code in the target program code of the specified type to judge whether the related information of the privacy protection protocol in the target privacy calculation layer and the related information of the privacy calculation communication protocol in the target privacy calculation layer meet a preset second security condition;
and determining whether the target privacy calculation layer has risk or not based on the obtained detection result.
2. The method of claim 1, the method further comprising:
performing vulnerability detection on the target program codes of the specified types to judge whether system-level vulnerabilities and/or Web-level vulnerabilities exist in the target privacy computing layer;
Based on the obtained detection result, determining whether the target privacy calculation layer has a risk includes:
and determining whether the target privacy calculating layer has risk or not based on the obtained detection result and the vulnerability detection result.
3. The method of claim 1, the method further comprising:
preprocessing the program code to obtain processed program code, wherein the preprocessing comprises one or more of the following steps: the method comprises lexical analysis processing, grammar analysis processing and semantic analysis processing, wherein the lexical analysis processing is used for analyzing the content of the program code, the grammar analysis processing is used for detecting grammar errors in the program code, and the semantic analysis processing is used for constructing an abstract grammar tree of a development language corresponding to the program code;
the converting the program code into the target program code of the specified type comprises:
and converting the processed program code into target program code of a specified type.
4. A method according to claim 3, the program code comprising code written in one or more of the following development languages: c language, c++ language, python language and Rust language; the specified type of program code is an intermediate code generated using a preset encoder.
5. The method of claim 4, the preprocessing comprising lexical analysis processing, grammatical analysis processing, and semantic analysis processing, the converting the processed program code into a specified type of object program code comprising:
traversing the abstract syntax tree obtained after semantic analysis processing from top to bottom based on an LLVM compiler, and compiling step by step to generate target program codes of specified types.
6. The method of claim 1, the first security condition comprising one or more of:
a symmetric encryption algorithm and a symmetric decryption algorithm with security lower than a first preset security intensity threshold are not used;
an asymmetric encryption algorithm and an asymmetric decryption algorithm with security lower than a second preset security intensity threshold are not used;
a post quantum asymmetric encryption algorithm and a post quantum asymmetric decryption algorithm with the security lower than a third preset security intensity threshold are not used;
a hash algorithm with the security lower than a fourth preset security intensity threshold value is not used;
the key length is greater than a preset length threshold;
the configuration of the transport layer security TLS is matched with the preset TLS configuration;
the configuration of the secure socket layer SSL is matched with a preset SSL configuration.
7. The method of claim 1, the second security condition comprising one or more of:
passing a verification process of the key and/or signature;
the security of large prime numbers is checked;
the model gradient is recorded in a preset log;
the private key is recorded in a preset log;
the private key is generated by hard coding or pseudo-random.
8. A data processing apparatus, the apparatus comprising:
the code processing module is used for acquiring program codes of appointed programs written in the target privacy calculation layer, and converting the program codes into target program codes of appointed types, wherein the program codes comprise codes written by using one or more different development languages;
the code security detection module is used for detecting a first code in the target program code of the appointed type so as to judge whether a privacy protection algorithm in the target privacy calculation layer meets a preset first security condition or not; and/or detecting a second code in the target program code of the specified type to judge whether the related information of the privacy protection protocol in the target privacy calculation layer and the related information of the privacy calculation communication protocol in the target privacy calculation layer meet a preset second security condition;
And the risk determining module is used for determining whether the target privacy calculating layer has risk or not based on the obtained detection result.
9. A data processing apparatus, the data processing apparatus comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
acquiring program codes of appointed programs written in an objective privacy calculation layer, and converting the program codes into objective program codes of appointed types, wherein the program codes comprise codes written by using one or more different development languages;
detecting a first code in the target program codes of the appointed type to judge whether a privacy protection algorithm in the target privacy calculation layer meets a preset first security condition or not; and/or detecting a second code in the target program code of the specified type to judge whether the related information of the privacy protection protocol in the target privacy calculation layer and the related information of the privacy calculation communication protocol in the target privacy calculation layer meet a preset second security condition;
and determining whether the target privacy calculation layer has risk or not based on the obtained detection result.
10. A storage medium for storing computer executable instructions that when executed by a processor implement the following:
acquiring program codes of appointed programs written in an objective privacy calculation layer, and converting the program codes into objective program codes of appointed types, wherein the program codes comprise codes written by using one or more different development languages;
detecting a first code in the target program codes of the appointed type to judge whether a privacy protection algorithm in the target privacy calculation layer meets a preset first security condition or not; and/or detecting a second code in the target program code of the specified type to judge whether the related information of the privacy protection protocol in the target privacy calculation layer and the related information of the privacy calculation communication protocol in the target privacy calculation layer meet a preset second security condition;
and determining whether the target privacy calculation layer has risk or not based on the obtained detection result.
CN202211591626.5A 2022-12-12 2022-12-12 Data processing method, device and equipment Active CN115758471B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211591626.5A CN115758471B (en) 2022-12-12 2022-12-12 Data processing method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211591626.5A CN115758471B (en) 2022-12-12 2022-12-12 Data processing method, device and equipment

Publications (2)

Publication Number Publication Date
CN115758471A CN115758471A (en) 2023-03-07
CN115758471B true CN115758471B (en) 2023-06-02

Family

ID=85345554

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211591626.5A Active CN115758471B (en) 2022-12-12 2022-12-12 Data processing method, device and equipment

Country Status (1)

Country Link
CN (1) CN115758471B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106250769A (en) * 2016-07-30 2016-12-21 北京明朝万达科技股份有限公司 The source code data detection method of a kind of multistage filtering and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210192651A1 (en) * 2019-12-20 2021-06-24 Cambrian Designs, Inc. System & Method for Analyzing Privacy Policies

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106250769A (en) * 2016-07-30 2016-12-21 北京明朝万达科技股份有限公司 The source code data detection method of a kind of multistage filtering and device

Also Published As

Publication number Publication date
CN115758471A (en) 2023-03-07

Similar Documents

Publication Publication Date Title
KR102281558B1 (en) Consensus verification method and device
US11288371B2 (en) Blockchain-based data processing method, apparatus, and device
TWI782205B (en) Risk control model training, risk control method, device and equipment for identifying the theft of second-hand door number accounts
CN110457912B (en) Data processing method and device and electronic equipment
CN105453102B (en) The system and method for the private cipher key leaked for identification
US11265174B2 (en) Method, apparatus, and device for processing blockchain data
CN111738900A (en) Image privacy protection method, device and equipment
CN113239853B (en) Biological identification method, device and equipment based on privacy protection
CN113792297A (en) Service processing method, device and equipment
CN111770063A (en) Derivation and verification method, device and equipment of digital identity information
CN111159697A (en) Key detection method and device and electronic equipment
US10956562B2 (en) Developing applications using precise static security analysis
US11349658B2 (en) Blockchain data processing method, apparatus, and device
JP5972181B2 (en) Tamper detection device, tamper detection method, and program
CN115758471B (en) Data processing method, device and equipment
CN111639362A (en) Method, node and storage medium for implementing privacy protection in block chain
US11138319B2 (en) Light-weight context tracking and repair for preventing integrity and confidentiality violations
CN114154123B (en) Encryption protection method applied to Python project
CN111314057A (en) Private key using method and device depending on user input
KR102432775B1 (en) Smart contract programming system and method for privacy preservation support
CN112131612B (en) CF card data tamper-proof method, device, equipment and medium
CN116842569A (en) Method and device for detecting data leakage, storage medium and electronic equipment
CN112182509A (en) Method, device and equipment for detecting abnormity of compliance data
CN117743368A (en) Data query method and device
Barr On FICO-Like Vulnerability Rating of Source Code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant