CN104899522B - A kind of data processing method and device - Google Patents
A kind of data processing method and device Download PDFInfo
- Publication number
- CN104899522B CN104899522B CN201510313189.4A CN201510313189A CN104899522B CN 104899522 B CN104899522 B CN 104899522B CN 201510313189 A CN201510313189 A CN 201510313189A CN 104899522 B CN104899522 B CN 104899522B
- Authority
- CN
- China
- Prior art keywords
- memory space
- variable
- read
- data
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
Abstract
The invention discloses a kind of data processing method and device.The data processing method includes:M memory space is configured for N number of variable to be stored;M≥N≥1;A fixed memory space is specified to carry out numerical value storage for each variable;According to default first shifting algorithm, shifting function is carried out to the bit of the M memory space.Using the embodiment of the present invention, the data in internal memory can be effectively protected not by malicious modification;The embodiment of the present invention can be applied in single-play game, can ensure the safety of game data.
Description
Technical field
The present invention relates to communication technical field, more particularly to a kind of data processing method and device.
Background technology
With the rapid development of mobile phone, application program of mobile phone is widely popularized and applied.Common applications, including
Single-play game, it can be modified by directly changing the form of internal storage data come logarithm value, such as the money in single-play game
Quantity, vital values etc..And the irrational modification of logarithm value, life-span of a application program can be greatly shortened, so as to cause business revenue
Reduction.
In the prior art, in order to prevent that internal storage data from being changed, only with real to specifying the method that numerical value is encrypted
It is existing.When writing the numerical value of specifying variable, by numerical value by being stored again after assignment algorithm computing, specifying variable is being read
During numerical value, read again after the numerical value of storage is carried out into corresponding inverse operation.But this method is to the specified data of each encryption
Being required for, which increases code, is handled, and is also not easy to change the logic of code after processing.Moreover, specify the storage location of numerical value can
To be analyzed by low order to obtain, it can equally reach the purpose of modification numerical value.
Prior art can also prevent that critical data from being changed by network transmission critical data.But this method
Network must be constantly connected, the critical data if desired protected is more, then can consume various flow.Moreover, by intercepting network
Package obtains the data of transmission, and then forges server and network package and can also reach the purpose of modification data.
The content of the invention
The embodiment of the present invention proposes a kind of data processing method and device, can effectively protect the data in internal memory not disliked
Meaning modification.
The embodiment of the present invention provides a kind of data processing method, including:
M memory space is configured for N number of variable to be stored;M≥N≥1;
A fixed memory space is specified to carry out numerical value storage for each variable;
According to default first shifting algorithm, shifting function is carried out to the bit of the M memory space.
Further, all bits of the M memory space are entered according to default first shifting algorithm described
After row shifting function, in addition to:
Receive the data write request that request of data side is sent;The data write request includes the title of variable to be written
And numerical value;
Judge that the title of the variable to be written whether there is in default chained list;The chained list is the name of each variable
Claim the mapping table with its memory space;
If in the presence of, according to the title of the variable to be written, from the chained list inquiry obtain the variable to be written
Memory space;If being not present, an idle memory space in the M memory space is allocated to described to be written
Variable, and the corresponding relation of the title of the variable to be written and its memory space is stored in the chained list;
According to first shifting algorithm, shift-reduce is carried out to all bits of the M memory space;
The numerical value of the variable to be written is write in the memory space of the variable to be written;
According to default second shifting algorithm, shifting function is carried out to all bits of the M memory space.
Further, all bits of the M memory space are entered according to default first shifting algorithm described
After row shifting function, in addition to:
Receive the data read request that request of data side is sent;The data read request includes the name of variable to be read
Claim;
Judge that the title of the variable to be read whether there is in default chained list;
If in the presence of, according to the title of the variable to be read, from the chained list inquiry obtain the variable to be read
Memory space;If being not present, return to read and unsuccessfully prompt;
According to first shifting algorithm, shift-reduce is carried out to all bits of the M memory space;
The numerical value of the variable to be read is read from the memory space of the variable to be read, and feeds back to the data
Requesting party;
According to default second shifting algorithm, shifting function is carried out to all bits of the M memory space.
It is preferably carried out at one in mode, specifies a fixed memory space to carry out numerical value for each variable described
After storage, in addition to:
According to default first XOR algorithm, XOR encryption is carried out respectively to the numerical value in each memory space, obtain every
First secret value of individual numerical value, and by first secret value write-in corresponding to memory space.
Further, all bits of the M memory space are entered according to default first shifting algorithm described
After row shifting function, in addition to:
Receive the data write request that request of data side is sent;The data write request includes the title of variable to be written
And numerical value;
Judge that the title of the variable to be written whether there is in default chained list;
If in the presence of, according to the title of the variable to be written, from the chained list inquiry obtain the variable to be written
Memory space;If being not present, an idle memory space in the M memory space is allocated to described to be written
Variable, and the corresponding relation of the title of the variable to be written and its memory space is stored in the chained list;
According to first shifting algorithm, shift-reduce is carried out to all bits of the M memory space;
According to the first XOR algorithm, XOR behaviour is carried out respectively to each first secret value in the M memory space
Make, each first secret value is reduced into numerical value;
The numerical value of the variable to be written is write in the memory space of the variable to be written;
According to default second XOR algorithm, XOR encryption is carried out respectively to the numerical value in each memory space, obtain every
Second secret value of individual numerical value, and by second secret value write-in corresponding to memory space;
According to default second shifting algorithm, shifting function is carried out to all bits of the M memory space.
Further, all bits of the M memory space are entered according to default first shifting algorithm described
After row shifting function, in addition to:
Receive the data read request that request of data side is sent;The data read request includes the name of variable to be read
Claim;
Judge that the title of the variable to be read whether there is in default chained list;
If in the presence of, according to the title of the variable to be read, from the chained list inquiry obtain the variable to be read
Memory space;If being not present, return to read and unsuccessfully prompt;
According to first shifting algorithm, shift-reduce is carried out to all bits of the M memory space;
According to the first XOR algorithm, XOR behaviour is carried out respectively to each first secret value in the M memory space
Make, each first secret value is reduced into numerical value;
The numerical value of the variable to be read is read from the memory space of the variable to be read, and feeds back to the data
Requesting party;
According to default second XOR algorithm, XOR encryption is carried out respectively to the numerical value in each memory space, obtain every
Second secret value of individual numerical value, and by second secret value write-in corresponding to memory space;
According to default second shifting algorithm, shifting function is carried out to all bits of the M memory space.
It is preferably carried out at another in mode, it is empty to described M storage described according to default first shifting algorithm
Between all bits carry out shifting function after, in addition to:
Using hash algorithm, the value of all bits in the M memory space is calculated, obtains the first Hash
Value.
Further, hash algorithm is used described, the value of all bits in the M memory space is counted
Calculate, after obtaining the first cryptographic Hash, in addition to:
Receive the request of data that request of data side is sent;
Using the hash algorithm, the value of all bits in the M memory space is calculated, obtains second
Cryptographic Hash;
Judge whether second cryptographic Hash and first cryptographic Hash are identical;
If identical, the request of data is handled;
If differing, refusal handles the request of data.
Correspondingly, the embodiment of the present invention also provides a kind of data processing equipment, including:
Configuration module, for configuring M memory space for N number of variable to be stored;M≥N≥1;
Memory module, for specifying a fixed memory space to carry out numerical value storage for each variable;And
Shift module, for according to default first shifting algorithm, being shifted to the bit of the M memory space
Operation.
Further, the data processing equipment also includes:
First write request receiving module, for receiving the data write request of request of data side's transmission;The data are write
Enter title and numerical value of the request bag containing variable to be written;
First judge module, for judging that the title of the variable to be written whether there is in default chained list;It is described
Chained list is the title of each variable and the mapping table of its memory space;
First memory space acquisition module, if in the presence of according to the title of the variable to be written, from the chained list
Middle inquiry obtains the memory space of the variable to be written;If being not present, one in the M memory space is idle
Memory space is allocated to the variable to be written, and the corresponding relation of the title of the variable to be written and its memory space is protected
Exist in the chained list;
First shift-reduce module, for according to first shifting algorithm, to all bits of the M memory space
Position carries out shift-reduce;
First writing module, for writing the number of the variable to be written in the memory space of the variable to be written
Value;And
First shifting function module, for according to default second shifting algorithm, to all ratios of the M memory space
Special position carries out shifting function.
Further, the data processing equipment also includes:
First read requests receiving module, for receiving the data read request of request of data side's transmission;The data are read
Take title of the request bag containing variable to be read;
First title judge module, for judging that the title of the variable to be read whether there is in default chained list;
First memory space enquiry module, if in the presence of according to the title of the variable to be read, from the chained list
Middle inquiry obtains the memory space of the variable to be read;If being not present, return to read and unsuccessfully prompt;
First recovery module, for according to first shifting algorithm, entering to all bits of the M memory space
Row shift-reduce;
First read module, for reading the number of the variable to be read from the memory space of the variable to be read
Value, and feed back to the request of data side;And
First operation module, for according to default second shifting algorithm, to all bits of the M memory space
Carry out shifting function.
It is preferably carried out at one in mode, the data processing equipment also includes:
XOR encrypting module, for according to default first XOR algorithm, entering respectively to the numerical value in each memory space
Row XOR is encrypted, and obtains the first secret value of each numerical value, and will first secret value write corresponding to memory space.
Further, the data processing equipment also includes:
Second write request receiving module, for receiving the data write request of request of data side's transmission;The data are write
Enter title and numerical value of the request bag containing variable to be written;
Second judge module, for judging that the title of the variable to be written whether there is in default chained list;
Second memory space acquisition module, if in the presence of according to the title of the variable to be written, from the chained list
Middle inquiry obtains the memory space of the variable to be written;If being not present, one in the M memory space is idle
Memory space is allocated to the variable to be written, and the corresponding relation of the title of the variable to be written and its memory space is protected
Exist in the chained list;
Second shift-reduce module, for according to first shifting algorithm, to all bits of the M memory space
Position carries out shift-reduce;
XOR module, for according to the first XOR algorithm, dividing each first secret value in the M memory space
Xor operation is not carried out, and each first secret value is reduced into numerical value;
Second writing module, the numerical value of the variable to be written is write in the memory space of the variable to be written;
Encrypting module, for according to default second XOR algorithm, being carried out respectively to the numerical value in each memory space different
Or encryption, obtain the second secret value of each numerical value, and will second secret value write corresponding to memory space;And
Second shifting function module, for according to default second shifting algorithm, to all ratios of the M memory space
Special position carries out shifting function.
Further, the data processing equipment also includes:
Second read requests receiving module, for receiving the data read request of request of data side's transmission;The data are read
Take title of the request bag containing variable to be read;
Second title judge module, for judging that the title of the variable to be read whether there is in default chained list;
Second memory space enquiry module, if in the presence of according to the title of the variable to be read, from the chained list
Middle inquiry obtains the memory space of the variable to be read;If being not present, return to read and unsuccessfully prompt;
Second recovery module, for according to first shifting algorithm, entering to all bits of the M memory space
Row shift-reduce;
Secret value recovery module, for according to the first XOR algorithm, adding in the M memory space each first
Close value carries out xor operation respectively, and each first secret value is reduced into numerical value;
Second read module, for reading the number of the variable to be read from the memory space of the variable to be read
Value, and feed back to the request of data side;
Secret value acquisition module, for according to default second XOR algorithm, distinguishing the numerical value in each memory space
Carry out XOR encryption, obtain the second secret value of each numerical value, and will second secret value write corresponding to memory space;With
And
Second operation module, for according to default second shifting algorithm, to all bits of the M memory space
Carry out shifting function.
It is preferably carried out at another in mode, the data processing equipment also includes:
Computing module, for using hash algorithm, being counted to the value of all bits in the M memory space
Calculate, obtain the first cryptographic Hash.
Further, the data processing equipment also includes:
Request of data receiving module, for receiving the request of data of request of data side's transmission;
Cryptographic Hash acquisition module, for using the hash algorithm, to all bits in the M memory space
Value is calculated, and obtains the second cryptographic Hash;
Cryptographic Hash judge module, for judging whether second cryptographic Hash and first cryptographic Hash are identical;
Request processing module, if for identical, the request of data is handled;And
Request refusal module, if for differing, refusal handles the request of data.
Implement the embodiment of the present invention, have the advantages that:
Data processing method provided in an embodiment of the present invention and device, can be that each variable specifies a fixed storage
Space carries out numerical value storage, and carries out shifting function to the bit of all memory spaces to change the storage of each variable sky
Between, so as to prevent the memory space of variable is scanned by internal memory from obtaining, the data in internal memory effectively are protected not by malicious modification;
After writing every time or reading the data in memory space, change the memory space of each variable using different shifting algorithms, more
Effectively protect the data in memory space;XOR encryption is carried out to the numerical value of each variable, prevents user from illegally obtaining variable
Plaintext, moreover, after each write-in or reading data in memory space, the numerical value using different XOR algorithms to variable
It is encrypted, further effectively protects the data in internal memory not by malicious modification;When receiving request of data every time, to storage
All data in space are calculated using hash algorithm, and the cryptographic Hash after calculating and the cryptographic Hash pre-saved are carried out
Contrast, if two cryptographic Hash differences, refusal processing data request, it can find that the data in internal memory are illegally distorted in time.
The embodiment of the present invention can be applied in single-play game, can ensure the safety of game data.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of one embodiment of data processing method provided by the invention;
Fig. 2 is the schematic flow sheet of an embodiment of data processing method provided by the invention;
Fig. 3 is the schematic flow sheet of another embodiment of data processing method provided by the invention;
Fig. 4 is the structural representation of one embodiment of data processing equipment provided by the invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made
Embodiment, belong to the scope of protection of the invention.
It is the schematic flow sheet of one embodiment of data processing method provided by the invention referring to Fig. 1.
The embodiment of the present invention provides a kind of data processing method, including:
S1, it is that N number of variable to be stored configures M memory space;M≥N≥1;
S2, a fixed memory space progress numerical value storage is specified for each variable;
S3, according to default first shifting algorithm, shifting function is carried out to all bits of the M memory space.
Wherein, M memory space is configured for N number of variable to be stored, and a fixed storage is specified for each variable
Space, meanwhile, the memory space of free time is reserved in M memory space, for example, to store 80 variables, then needs configuration 80
Memory space more than individual.A chained list is pre-established, the corresponding relation of the title of each variable and its memory space is preserved
In the chained list.Multiple displacement tables are pre-established, general recommendations shifts table number more than 64, wherein, displacement table describes M
Shifted relationship between all bits of individual memory space.Different shifting algorithms is set according to different displacement tables, made every
The memory space of individual variable carries out shifting function according to different shifting algorithms.
After variable storage, a first displacement table is randomly selected, and record the table number of the first displacement table.Using first
Shifting algorithm, i.e., shifting function is carried out to all bits of M memory space according to the first displacement table.For example, it is configured with M=
100 memory spaces, each memory space have 8 bits, i.e. M memory space shares 800 bits, according to first
Shift table and shifting function is carried out to all bits, i.e., the 1st bit is moved to the position of the 200th bit, by the 200th
Individual bit is moved to the position of the 456th bit, the 456th bit is moved to the position etc. of the 321st bit, directly
Shifting function is all carried out to 800 bits.By the shifting function of all bits to M memory space, prevent from becoming
The memory space of amount is scanned by internal memory and obtained, and effectively protects the data in internal memory not by malicious modification.
It is preferably carried out at one in mode, described according to default first shifting algorithm, to the M memory space
All bits carry out shifting function after, in addition to:
Receive the data write request that request of data side is sent;The data write request includes the title of variable to be written
And numerical value;
Judge that the title of the variable to be written whether there is in default chained list;The chained list is the name of each variable
Claim the mapping table with its memory space;
If in the presence of, according to the title of the variable to be written, from the chained list inquiry obtain the variable to be written
Memory space;If being not present, an idle memory space in the M memory space is allocated to described to be written
Variable, and the corresponding relation of the title of the variable to be written and its memory space is stored in the chained list;
According to first shifting algorithm, shift-reduce is carried out to all bits of the M memory space;
The numerical value of the variable to be written is write in the memory space of the variable to be written;
According to default second shifting algorithm, shifting function is carried out to all bits of the M memory space.
It should be noted that when receiving data write request, first inquiry whether there is variable to be written from chained list
Title, if in the presence of directly inquiring about the memory space of the variable from chained list;If being not present, by M memory space
A reserved idle memory space is assigned to the variable, and the title of the variable and the corresponding of the memory space specified are closed
System is stored in chained list, the convenient inquiry again to the variable storage space.
When inquiring the memory space of variable to be written, first according to the table number of the first pre-recorded displacement table, choose
First displacement table carries out shift-reduce to all bits of M memory space, that is, is reduced to storage when variable is stored
Space.The memory space of variable to be written is found, the numerical value for being written into variable is write in the memory space, you can realizes variable
The write-in of numerical value.After completing to write, another the second displacement table is randomly selected, and records the table number of the second displacement table, is adopted
With the second shifting algorithm, i.e., shifting function is carried out to all bits of M memory space according to the second displacement table.Writing every time
After entering, all bits of M memory space are shifted using different shifting algorithms, more effectively protection storage
Data in space.
It is preferably carried out at another in mode, it is empty to described M storage described according to default first shifting algorithm
Between all bits carry out shifting function after, in addition to:
Receive the data read request that request of data side is sent;The data read request includes the name of variable to be read
Claim;
Judge that the title of the variable to be read whether there is in default chained list;
If in the presence of, according to the title of the variable to be read, from the chained list inquiry obtain the variable to be read
Memory space;If being not present, return to read and unsuccessfully prompt;
According to first shifting algorithm, shift-reduce is carried out to all bits of the M memory space;
The numerical value of the variable to be read is read from the memory space of the variable to be read, and feeds back to the data
Requesting party;
According to default second shifting algorithm, shifting function is carried out to all bits of the M memory space.
It should be noted that when receiving data read request, first inquire about whether there is from chained list and read into variable
Title, if in the presence of directly inquiring about the memory space of the variable from chained list;If being not present, request error, at refusal
Manage the request.
When inquiring the memory space of variable to be read, first according to the table number of the first pre-recorded displacement table, choose
First displacement table carries out shift-reduce to all bits of M memory space, that is, is reduced to storage when variable is stored
Space.The memory space of variable to be read is found, the reading numerical values from the memory space, and by the numeric feedback to request of data
Side, you can realize the reading of variable value.After completing to read, another the second displacement table is randomly selected, and record second
The table number of table is shifted, using the second shifting algorithm, i.e., all bits of M memory space are moved according to the second displacement table
Bit manipulation.After each read, all bits of M memory space are shifted using different shifting algorithms,
Data more effectively in protection memory space.
In the present embodiment, further, described according to default first shifting algorithm, to the M memory space
All bits carry out shifting function after, in addition to:
Using hash algorithm, the value of all bits in the M memory space is calculated, obtains the first Hash
Value.
Further, hash algorithm is used described, the value of all bits in the M memory space is counted
Calculate, after obtaining the first cryptographic Hash, in addition to:
Receive the request of data that request of data side is sent;
Using the hash algorithm, the value of all bits in the M memory space is calculated, obtains second
Cryptographic Hash;
Judge whether second cryptographic Hash and first cryptographic Hash are identical;
If identical, the request of data is handled;
If differing, refusal handles the request of data.
It should be noted that after each shifting function, hash algorithm can be also used, to all in M memory space
Numerical value is calculated, and is obtained cryptographic Hash and is preserved.When receiving request of data every time, using hash algorithm, M are deposited
All numerical value in storage space are calculated again, and whether cryptographic Hash is identical twice whether judges memory space by judgement
There is numerical value by malicious modification.If identical, illustrate that numerical value by malicious modification, is not then handled request of data, processing method can
Think the processing method that data write request or data read request are received in the present embodiment;If differing, illustrate numerical value
By malicious modification, then refusal processing request.
The present invention also provides second embodiment of data processing method.
Compared with above-mentioned first embodiment, the difference for the data processing method that second embodiment provides is:
After a fixed memory space specified for each variable carries out numerical value storage, in addition to:
According to default first XOR algorithm, XOR encryption is carried out respectively to the numerical value in each memory space, obtain every
First secret value of individual numerical value, and by first secret value write-in corresponding to memory space.
Wherein, multiple XOR tables are pre-established, general recommendations XOR table number is more than 64, according to different XOR tables
Different XOR algorithms is set, the numerical value of each variable is carried out XOR encryption according to different XOR algorithms.Encrypted in XOR
When, a first XOR table is randomly selected, and the table number of the first XOR table is recorded, using the first XOR algorithm, by M storage
All numerical value in space are converted to binary value, XOR encryption are carried out to each bit respectively, so as to prevent that user is illegal
Obtain the plaintext of each variable.
It is preferably carried out at one in mode, as shown in Fig. 2 described according to default first shifting algorithm, to the M
After all bits of individual memory space carry out shifting function, in addition to:
S201, receive the data write request that request of data side is sent;The data write request includes variable to be written
Title and numerical value;
S202, judge that the title of the variable to be written whether there is in default chained list;If in the presence of performing step
S203, if being not present, perform step S204;
S203, the title according to the variable to be written, inquired about from the chained list and obtain depositing for the variable to be written
Space is stored up, and continues executing with step S205;
S204, an idle memory space in the M memory space is allocated to the variable to be written, and will
The title of the variable to be written and the corresponding relation of its memory space are stored in the chained list, and continue executing with step
S205;
S205, according to first shifting algorithm, shift-reduce is carried out to all bits of the M memory space;
S206, according to the first XOR algorithm, each first secret value in the M memory space is carried out respectively different
Or operation, each first secret value is reduced into numerical value;
S207, the numerical value for writing in the memory space of the variable to be written the variable to be written;
S208, according to default second XOR algorithm, XOR encryption is carried out respectively to the numerical value in each memory space, obtained
Each numerical value the second secret value, and will second secret value write corresponding to memory space;
S209, according to default second shifting algorithm, displacement behaviour is carried out to all bits of the M memory space
Make.
It should be noted that when receiving data write request, first inquiry whether there is variable to be written from chained list
Title, if in the presence of directly inquiring about the memory space of the variable from chained list;If being not present, by M memory space
A reserved idle memory space is assigned to the variable, and the title of the variable and the corresponding of the memory space specified are closed
System is stored in chained list, the convenient inquiry again to the variable storage space.
When inquiring the memory space of variable to be written, according to the table number of pre-recorded first displacement table, the is chosen
One displacement table carries out shift-reduce to all bits of M memory space, that is, the storage being reduced to when variable is stored is empty
Between.Meanwhile according to the table number of the first pre-recorded XOR table, the first XOR table is chosen to all the in M memory space
One secret value carries out xor operation, is reduced to numerical value.The memory space of variable to be written is found, the numerical value for being written into variable is write
Enter in the memory space, you can realize the write-in of variable value.After completing to write, another the second XOR table is randomly selected,
And the table number of the second XOR table is recorded, using the second XOR algorithm, i.e., according to the second XOR table to the institute in M memory space
There is numerical value to carry out XOR encryption.Meanwhile another the second displacement table is randomly selected, and the table number of the second displacement table is recorded, adopt
With the second shifting algorithm, i.e., shifting function is carried out to all bits of M memory space according to the second displacement table.Writing every time
After entering, all bits of M memory space are shifted using different XOR algorithm and shifting algorithm, more effectively
Protection memory space in data.
It is preferably carried out at another in mode, as shown in figure 3, described according to default first shifting algorithm, to institute
After all bits progress shifting function for stating M memory space, in addition to:
S301, receive the data read request that request of data side is sent;The data read request includes variable to be read
Title;
S302, judge that the title of the variable to be read whether there is in default chained list;If in the presence of performing step
S303, if being not present, perform step S304;
S303, the title according to the variable to be read, inquired about from the chained list and obtain depositing for the variable to be read
Space is stored up, and continues executing with step S305;
S304, return to read and unsuccessfully prompt;
S305, according to first shifting algorithm, shift-reduce is carried out to all bits of the M memory space;
S306, according to the first XOR algorithm, each first secret value in the M memory space is carried out respectively different
Or operation, each first secret value is reduced into numerical value;
S307, the numerical value for reading from the memory space of the variable to be read the variable to be read, and feed back to institute
State request of data side;
S308, according to default second XOR algorithm, XOR encryption is carried out respectively to the numerical value in each memory space, obtained
Each numerical value the second secret value, and will second secret value write corresponding to memory space;
S309, according to default second shifting algorithm, displacement behaviour is carried out to all bits of the M memory space
Make.
It should be noted that when receiving data read request, first inquiry whether there is variable to be read from chained list
Title, if in the presence of directly inquiring about the memory space of the variable from chained list;If being not present, request error, at refusal
Manage the request.
When inquiring the memory space of variable to be read, according to the table number of pre-recorded first displacement table, the is chosen
One displacement table carries out shift-reduce to all bits of M memory space, that is, the storage being reduced to when variable is stored is empty
Between.Meanwhile according to the table number of the first pre-recorded XOR table, the first XOR table is chosen to all the in M memory space
One secret value carries out xor operation, is reduced to numerical value.The memory space of variable to be read is found, number is read from the memory space
Value, and feed back to request of data side, you can realize the reading of variable value.Complete read after, randomly select another second
XOR table, and the table number of the second XOR table is recorded, it is using the second XOR algorithm, i.e., empty to M storage according to the second XOR table
Between in all numerical value carry out XOR encryption.Meanwhile another the second displacement table is randomly selected, and record the second displacement table
Table number, using the second shifting algorithm, i.e., shifting function is carried out to all bits of M memory space according to the second displacement table.
After each read, all bits of M memory space are moved using different XOR algorithm and shifting algorithm
Position, more effectively protect the data in memory space.
In the present embodiment, further, described according to default first shifting algorithm, to the M memory space
All bits carry out shifting function after, in addition to:
Using hash algorithm, the value of all bits in the M memory space is calculated, obtains the first Hash
Value.
Further, hash algorithm is used described, the value of all bits in the M memory space is counted
Calculate, after obtaining the first cryptographic Hash, in addition to:
Receive the request of data that request of data side is sent;
Using the hash algorithm, the value of all bits in the M memory space is calculated, obtains second
Cryptographic Hash;
Judge whether second cryptographic Hash and first cryptographic Hash are identical;
If identical, the request of data is handled;
If differing, refusal handles the request of data.
It should be noted that after each shifting function, hash algorithm can be also used, to all in M memory space
Numerical value is calculated, and is obtained cryptographic Hash and is preserved.When receiving request of data every time, using hash algorithm, M are deposited
All numerical value in storage space are calculated again, and whether cryptographic Hash is identical twice whether judges memory space by judgement
There is numerical value by malicious modification.If identical, illustrate that numerical value by malicious modification, is not then handled request of data, processing method can
Think the processing method that data write request or data read request are received in the present embodiment;If differing, illustrate numerical value
By malicious modification, then refusal processing request.
Data processing method provided in an embodiment of the present invention, can be that each variable specifies a fixed memory space to enter
Line number value stores, and carries out shifting function to the bit of all memory spaces to change the memory space of each variable, so as to
Prevent the memory space of variable is scanned by internal memory from obtaining, effectively protect the data in internal memory not by malicious modification;Writing every time
After entering or reading the data in memory space, change the memory space of each variable using different shifting algorithms, more effectively
Protect the data in memory space;XOR encryption is carried out to the numerical value of each variable, prevents user from illegally obtaining the plaintext of variable,
Moreover, after the data in writing or reading memory space every time, the numerical value of variable is added using different XOR algorithms
It is close, further the data in internal memory effectively are protected not by malicious modification;When receiving request of data every time, in memory space
All data calculated using hash algorithm, and the cryptographic Hash after calculating is contrasted with the cryptographic Hash pre-saved,
If two cryptographic Hash differences, refusal processing data request, it can find that the data in internal memory are illegally distorted in time.The present invention
Embodiment can be applied in single-play game, can ensure the safety of game data.
Accordingly, the present invention also provides a kind of data processing equipment, can realize the data processing side in above-described embodiment
All flows of method.
It is the structural representation of one embodiment of data processing equipment provided by the invention referring to Fig. 4, including:
Configuration module 1, for configuring M memory space for N number of variable to be stored;M≥N≥1;
Memory module 2, for specifying a fixed memory space to carry out numerical value storage for each variable;And
Shift module 3, for according to default first shifting algorithm, entering to all bits of the M memory space
Row shifting function.
Further, the data processing equipment also includes:
First write request receiving module, for receiving the data write request of request of data side's transmission;The data are write
Enter title and numerical value of the request bag containing variable to be written;
First judge module, for judging that the title of the variable to be written whether there is in default chained list;It is described
Chained list is the title of each variable and the mapping table of its memory space;
First memory space acquisition module, if in the presence of according to the title of the variable to be written, from the chained list
Middle inquiry obtains the memory space of the variable to be written;If being not present, one in the M memory space is idle
Memory space is allocated to the variable to be written, and the corresponding relation of the title of the variable to be written and its memory space is protected
Exist in the chained list;
First shift-reduce module, for according to first shifting algorithm, to all bits of the M memory space
Position carries out shift-reduce;
First writing module, for writing the number of the variable to be written in the memory space of the variable to be written
Value;And
First shifting function module, for according to default second shifting algorithm, to all ratios of the M memory space
Special position carries out shifting function.
Further, the data processing equipment also includes:
First read requests receiving module, for receiving the data read request of request of data side's transmission;The data are read
Take title of the request bag containing variable to be read;
First title judge module, for judging that the title of the variable to be read whether there is in default chained list;
First memory space enquiry module, if in the presence of according to the title of the variable to be read, from the chained list
Middle inquiry obtains the memory space of the variable to be read;If being not present, return to read and unsuccessfully prompt;
First recovery module, for according to first shifting algorithm, entering to all bits of the M memory space
Row shift-reduce;
First read module, for reading the number of the variable to be read from the memory space of the variable to be read
Value, and feed back to the request of data side;And
First operation module, for according to default second shifting algorithm, to all bits of the M memory space
Carry out shifting function.
It is preferably carried out at one in mode, the data processing equipment also includes:
XOR encrypting module, for according to default first XOR algorithm, entering respectively to the numerical value in each memory space
Row XOR is encrypted, and obtains the first secret value of each numerical value, and will first secret value write corresponding to memory space.
Further, the data processing equipment also includes:
Second write request receiving module, for receiving the data write request of request of data side's transmission;The data are write
Enter title and numerical value of the request bag containing variable to be written;
Second judge module, for judging that the title of the variable to be written whether there is in default chained list;
Second memory space acquisition module, if in the presence of according to the title of the variable to be written, from the chained list
Middle inquiry obtains the memory space of the variable to be written;If being not present, one in the M memory space is idle
Memory space is allocated to the variable to be written, and the corresponding relation of the title of the variable to be written and its memory space is protected
Exist in the chained list;
Second shift-reduce module, for according to first shifting algorithm, to all bits of the M memory space
Position carries out shift-reduce;
XOR module, for according to the first XOR algorithm, dividing each first secret value in the M memory space
Xor operation is not carried out, and each first secret value is reduced into numerical value;
Second writing module, the numerical value of the variable to be written is write in the memory space of the variable to be written;
Encrypting module, for according to default second XOR algorithm, being carried out respectively to the numerical value in each memory space different
Or encryption, obtain the second secret value of each numerical value, and will second secret value write corresponding to memory space;And
Second shifting function module, for according to default second shifting algorithm, to all ratios of the M memory space
Special position carries out shifting function.
Further, the data processing equipment also includes:
Second read requests receiving module, for receiving the data read request of request of data side's transmission;The data are read
Take title of the request bag containing variable to be read;
Second title judge module, for judging that the title of the variable to be read whether there is in default chained list;
Second memory space enquiry module, if in the presence of according to the title of the variable to be read, from the chained list
Middle inquiry obtains the memory space of the variable to be read;If being not present, return to read and unsuccessfully prompt;
Second recovery module, for according to first shifting algorithm, entering to all bits of the M memory space
Row shift-reduce;
Secret value recovery module, for according to the first XOR algorithm, adding in the M memory space each first
Close value carries out xor operation respectively, and each first secret value is reduced into numerical value;
Second read module, for reading the number of the variable to be read from the memory space of the variable to be read
Value, and feed back to the request of data side;
Secret value acquisition module, for according to default second XOR algorithm, distinguishing the numerical value in each memory space
Carry out XOR encryption, obtain the second secret value of each numerical value, and will second secret value write corresponding to memory space;With
And
Second operation module, for according to default second shifting algorithm, to all bits of the M memory space
Carry out shifting function.
It is preferably carried out at another in mode, the data processing equipment also includes:
Computing module, for using hash algorithm, being counted to the value of all bits in the M memory space
Calculate, obtain the first cryptographic Hash.
Further, the data processing equipment also includes:
Request of data receiving module, for receiving the request of data of request of data side's transmission;
Cryptographic Hash acquisition module, for using the hash algorithm, to all bits in the M memory space
Value is calculated, and obtains the second cryptographic Hash;
Cryptographic Hash judge module, for judging whether second cryptographic Hash and first cryptographic Hash are identical;
Request processing module, if for identical, the request of data is handled;And
Request refusal module, if for differing, refusal handles the request of data.
Data processing equipment provided in an embodiment of the present invention, can be that each variable specifies a fixed memory space to enter
Line number value stores, and carries out shifting function to the bit of all memory spaces to change the memory space of each variable, so as to
Prevent the memory space of variable is scanned by internal memory from obtaining, effectively protect the data in internal memory not by malicious modification;Writing every time
After entering or reading the data in memory space, change the memory space of each variable using different shifting algorithms, more effectively
Protect the data in memory space;XOR encryption is carried out to the numerical value of each variable, prevents user from illegally obtaining the plaintext of variable,
Moreover, after the data in writing or reading memory space every time, the numerical value of variable is added using different XOR algorithms
It is close, further the data in internal memory effectively are protected not by malicious modification;When receiving request of data every time, in memory space
All data calculated using hash algorithm, and the cryptographic Hash after calculating is contrasted with the cryptographic Hash pre-saved,
If two cryptographic Hash differences, refusal processing data request, it can find that the data in internal memory are illegally distorted in time.The present invention
Embodiment can be applied in single-play game, can ensure the safety of game data.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements not only include those key elements, and
And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently
Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this
Other identical element also be present in the process of key element, method, article or device.The embodiments of the present invention are only
Description, the quality of embodiment is not represented.In several embodiments provided herein, it should be understood that disclosed is
System and method can be realized by another way.For example, system embodiment described above is only schematical, example
Such as, the division of the unit, only a kind of division of logic function, there can be other dividing mode when actually realizing, such as
Multiple units or component can combine or be desirably integrated into another system, or some features can be ignored, or not perform.Separately
A bit, shown or discussed mutual coupling or direct-coupling or communication connection can be by some interfaces, device
Or INDIRECT COUPLING or the communication connection of unit, can be electrical, mechanical or other forms.
Professional further appreciates that, with reference to the unit of each example of the embodiments described herein description
And algorithm steps, can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware and
The interchangeability of software, the composition and step of each example are generally described according to function in the above description.These
Function is performed with hardware or software mode actually, application-specific and design constraint depending on technical scheme.Specialty
Technical staff can realize described function using distinct methods to each specific application, but this realization should not
Think beyond the scope of this invention.
Directly it can be held with reference to the step of method or algorithm that the embodiments described herein describes with hardware, processor
Capable software module, or the two combination are implemented.Software module can be placed in random access memory (RAM), internal memory, read-only deposit
Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology
In any other form of storage medium well known in field.
The foregoing description of the disclosed embodiments, professional and technical personnel in the field are enable to realize or using the present invention.
A variety of modifications to these embodiments will be apparent for those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, it is of the invention
The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one
The most wide scope caused.
Claims (16)
- A kind of 1. data processing method, it is characterised in that including:M memory space is configured for N number of variable to be stored;M≥N≥1;A fixed memory space is specified to carry out numerical value storage for each variable;According to default first shifting algorithm, shifting function is carried out to all bits of the M memory space;Receive the data write request that request of data side is sent;The data write request includes the title sum of variable to be written Value;According to first shifting algorithm, shift-reduce is carried out to all bits of the M memory space;The numerical value of the variable to be written is write in the memory space of the variable to be written;According to default second shifting algorithm, shifting function is carried out to all bits of the M memory space.
- 2. data processing method as claimed in claim 1, it is characterised in that in the data that the reception request of data side is sent After write request, also include before all bits to the M memory space carry out shift-reduce:Judge that the title of the variable to be written whether there is in default chained list;The chained list for each variable title with The mapping table of its memory space;If in the presence of, according to the title of the variable to be written, from the chained list inquiry obtain depositing for the variable to be written Store up space;If being not present, an idle memory space in the M memory space is allocated to the change to be written Amount, and the corresponding relation of the title of the variable to be written and its memory space is stored in the chained list.
- 3. data processing method as claimed in claim 1 or 2, it is characterised in that calculated described according to the default first displacement Method, after all bits progress shifting function of the M memory space, in addition to:Receive the data read request that request of data side is sent;The data read request includes the title of variable to be read;Judge that the title of the variable to be read whether there is in default chained list;If in the presence of, according to the title of the variable to be read, from the chained list inquiry obtain depositing for the variable to be read Store up space;If being not present, return to read and unsuccessfully prompt;According to first shifting algorithm, shift-reduce is carried out to all bits of the M memory space;The numerical value of the variable to be read is read from the memory space of the variable to be read, and feeds back to the request of data Side;According to default second shifting algorithm, shifting function is carried out to all bits of the M memory space.
- 4. data processing method as claimed in claim 1, it is characterised in that it is described for each variable specify one it is fixed After memory space carries out numerical value storage, in addition to:According to default first XOR algorithm, XOR encryption is carried out respectively to the numerical value in each memory space, obtain per number Value the first secret value, and will first secret value write corresponding to memory space.
- 5. data processing method as claimed in claim 4, it is characterised in that described according to default first shifting algorithm, After all bits progress shifting function of the M memory space, in addition to:Receive the data write request that request of data side is sent;The data write request includes the title sum of variable to be written Value;Judge that the title of the variable to be written whether there is in default chained list;If in the presence of, according to the title of the variable to be written, from the chained list inquiry obtain depositing for the variable to be written Store up space;If being not present, an idle memory space in the M memory space is allocated to the change to be written Amount, and the corresponding relation of the title of the variable to be written and its memory space is stored in the chained list;According to first shifting algorithm, shift-reduce is carried out to all bits of the M memory space;According to the first XOR algorithm, xor operation is carried out respectively to each first secret value in the M memory space, will Each first secret value is reduced into numerical value;The numerical value of the variable to be written is write in the memory space of the variable to be written;According to default second XOR algorithm, XOR encryption is carried out respectively to the numerical value in each memory space, obtain per number Value the second secret value, and will second secret value write corresponding to memory space;According to default second shifting algorithm, shifting function is carried out to all bits of the M memory space.
- 6. the data processing method as described in claim 4 or 5, it is characterised in that calculated described according to the default first displacement Method, after all bits progress shifting function of the M memory space, in addition to:Receive the data read request that request of data side is sent;The data read request includes the title of variable to be read;Judge that the title of the variable to be read whether there is in default chained list;If in the presence of, according to the title of the variable to be read, from the chained list inquiry obtain depositing for the variable to be read Store up space;If being not present, return to read and unsuccessfully prompt;According to first shifting algorithm, shift-reduce is carried out to all bits of the M memory space;According to the first XOR algorithm, xor operation is carried out respectively to each first secret value in the M memory space, will Each first secret value is reduced into numerical value;The numerical value of the variable to be read is read from the memory space of the variable to be read, and feeds back to the request of data Side;According to default second XOR algorithm, XOR encryption is carried out respectively to the numerical value in each memory space, obtain per number Value the second secret value, and will second secret value write corresponding to memory space;According to default second shifting algorithm, shifting function is carried out to all bits of the M memory space.
- 7. the data processing method as described in claim 1 or 4, it is characterised in that calculated described according to the default first displacement Method, after all bits progress shifting function of the M memory space, in addition to:Using hash algorithm, the value of all bits in the M memory space is calculated, obtains the first cryptographic Hash.
- 8. data processing method as claimed in claim 7, it is characterised in that use hash algorithm described, the M are deposited The value of all bits in storage space is calculated, after obtaining the first cryptographic Hash, in addition to:Receive the request of data that request of data side is sent;Using the hash algorithm, the value of all bits in the M memory space is calculated, obtains the second Hash Value;Judge whether second cryptographic Hash and first cryptographic Hash are identical;If identical, the request of data is handled;If differing, refusal handles the request of data.
- A kind of 9. data processing equipment, it is characterised in that including:Configuration module, for configuring M memory space for N number of variable to be stored;M≥N≥1;Memory module, for specifying a fixed memory space to carry out numerical value storage for each variable;AndShift module, for according to default first shifting algorithm, being shifted to all bits of the M memory space Operation;First write request receiving module, for receiving the data write request of request of data side's transmission;The data write-in please Seek the title and numerical value for including variable to be written;First shift-reduce module, for according to first shifting algorithm, entering to all bits of the M memory space Row shift-reduce;First writing module, for writing the numerical value of the variable to be written in the memory space of the variable to be written;With AndFirst shifting function module, for according to default second shifting algorithm, to all bits of the M memory space Carry out shifting function.
- 10. data processing equipment as claimed in claim 9, it is characterised in that the data processing equipment also includes:First judge module, for judging that the title of the variable to be written whether there is in default chained list;The chained list For the title and the mapping table of its memory space of each variable;First memory space acquisition module, if in the presence of according to the title of the variable to be written, being looked into from the chained list Ask the memory space for obtaining the variable to be written;If being not present, by an idle storage in the M memory space Space configuration gives the variable to be written, and the corresponding relation of the title of the variable to be written and its memory space is stored in In the chained list.
- 11. the data processing equipment as described in claim 9 or 10, it is characterised in that the data processing equipment also includes:First read requests receiving module, for receiving the data read request of request of data side's transmission;The digital independent please Seek the title for including variable to be read;First title judge module, for judging that the title of the variable to be read whether there is in default chained list;First memory space enquiry module, if in the presence of according to the title of the variable to be read, being looked into from the chained list Ask the memory space for obtaining the variable to be read;If being not present, return to read and unsuccessfully prompt;First recovery module, for according to first shifting algorithm, being moved to all bits of the M memory space Position reduction;First read module, for reading the numerical value of the variable to be read from the memory space of the variable to be read, and Feed back to the request of data side;AndFirst operation module, for according to default second shifting algorithm, being carried out to all bits of the M memory space Shifting function.
- 12. data processing equipment as claimed in claim 9, it is characterised in that the data processing equipment also includes:XOR encrypting module, for according to default first XOR algorithm, being carried out respectively to the numerical value in each memory space different Or encryption, obtain the first secret value of each numerical value, and will first secret value write corresponding to memory space.
- 13. data processing equipment as claimed in claim 12, it is characterised in that the data processing equipment also includes:Second write request receiving module, for receiving the data write request of request of data side's transmission;The data write-in please Seek the title and numerical value for including variable to be written;Second judge module, for judging that the title of the variable to be written whether there is in default chained list;Second memory space acquisition module, if in the presence of according to the title of the variable to be written, being looked into from the chained list Ask the memory space for obtaining the variable to be written;If being not present, by an idle storage in the M memory space Space configuration gives the variable to be written, and the corresponding relation of the title of the variable to be written and its memory space is stored in In the chained list;Second shift-reduce module, for according to first shifting algorithm, entering to all bits of the M memory space Row shift-reduce;XOR module, for according to the first XOR algorithm, entering respectively to each first secret value in the M memory space Row xor operation, each first secret value is reduced into numerical value;Second writing module, the numerical value of the variable to be written is write in the memory space of the variable to be written;Encrypting module, for according to default second XOR algorithm, carrying out XOR respectively to the numerical value in each memory space and adding It is close, obtain the second secret value of each numerical value, and by memory space corresponding to second secret value write-in;AndSecond shifting function module, for according to default second shifting algorithm, to all bits of the M memory space Carry out shifting function.
- 14. the data processing equipment as described in claim 12 or 13, it is characterised in that the data processing equipment also includes:Second read requests receiving module, for receiving the data read request of request of data side's transmission;The digital independent please Seek the title for including variable to be read;Second title judge module, for judging that the title of the variable to be read whether there is in default chained list;Second memory space enquiry module, if in the presence of according to the title of the variable to be read, being looked into from the chained list Ask the memory space for obtaining the variable to be read;If being not present, return to read and unsuccessfully prompt;Second recovery module, for according to first shifting algorithm, being moved to all bits of the M memory space Position reduction;Secret value recovery module, for according to the first XOR algorithm, to each first secret value in the M memory space Xor operation is carried out respectively, and each first secret value is reduced into numerical value;Second read module, for reading the numerical value of the variable to be read from the memory space of the variable to be read, and Feed back to the request of data side;Secret value acquisition module, for according to default second XOR algorithm, being carried out respectively to the numerical value in each memory space XOR is encrypted, and obtains the second secret value of each numerical value, and will second secret value write corresponding to memory space;AndSecond operation module, for according to default second shifting algorithm, being carried out to all bits of the M memory space Shifting function.
- 15. the data processing equipment as described in claim 9 or 12, it is characterised in that the data processing equipment also includes:Computing module, for using hash algorithm, calculating the value of all bits in the M memory space, obtaining Obtain the first cryptographic Hash.
- 16. data processing equipment as claimed in claim 15, it is characterised in that the data processing equipment also includes:Request of data receiving module, for receiving the request of data of request of data side's transmission;Cryptographic Hash acquisition module, for using the hash algorithm, the value of all bits in the M memory space is entered Row calculates, and obtains the second cryptographic Hash;Cryptographic Hash judge module, for judging whether second cryptographic Hash and first cryptographic Hash are identical;Request processing module, if for identical, the request of data is handled;AndRequest refusal module, if for differing, refusal handles the request of data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510313189.4A CN104899522B (en) | 2015-06-09 | 2015-06-09 | A kind of data processing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510313189.4A CN104899522B (en) | 2015-06-09 | 2015-06-09 | A kind of data processing method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104899522A CN104899522A (en) | 2015-09-09 |
CN104899522B true CN104899522B (en) | 2018-01-30 |
Family
ID=54032182
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510313189.4A Active CN104899522B (en) | 2015-06-09 | 2015-06-09 | A kind of data processing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104899522B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106934280A (en) * | 2017-03-08 | 2017-07-07 | 网易(杭州)网络有限公司 | Internal storage data processing method, device and network game client |
CN109446758B (en) * | 2018-09-17 | 2022-12-20 | 深圳市创梦天地科技有限公司 | Data processing method, terminal and computer readable medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1512322A (en) * | 2002-12-27 | 2004-07-14 | 上海华虹集成电路有限责任公司 | Coprocessor for realizing IC card RSA enciphered algorithm |
CN1926511A (en) * | 2004-03-10 | 2007-03-07 | Arm有限公司 | Inserting bits within a data word |
CN102594797A (en) * | 2011-12-30 | 2012-07-18 | 飞天诚信科技股份有限公司 | Method and device for generating verification code in embedded system |
CN102831347A (en) * | 2012-07-31 | 2012-12-19 | 飞天诚信科技股份有限公司 | Data processing method and device |
-
2015
- 2015-06-09 CN CN201510313189.4A patent/CN104899522B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1512322A (en) * | 2002-12-27 | 2004-07-14 | 上海华虹集成电路有限责任公司 | Coprocessor for realizing IC card RSA enciphered algorithm |
CN1926511A (en) * | 2004-03-10 | 2007-03-07 | Arm有限公司 | Inserting bits within a data word |
CN102594797A (en) * | 2011-12-30 | 2012-07-18 | 飞天诚信科技股份有限公司 | Method and device for generating verification code in embedded system |
CN102831347A (en) * | 2012-07-31 | 2012-12-19 | 飞天诚信科技股份有限公司 | Data processing method and device |
Also Published As
Publication number | Publication date |
---|---|
CN104899522A (en) | 2015-09-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103107995B (en) | A kind of cloud computing environment date safety storing system and method | |
US8078869B2 (en) | System and method of protecting data on a communication device | |
WO2020211485A1 (en) | Data processing method and apparatus, and electronic device | |
US20070239615A1 (en) | Personal Information Management Device, Distributed Key Storage Device, and Personal Information Management System | |
US20030138105A1 (en) | Storing keys in a cryptology device | |
CN107070660B (en) | Storage design method of block chain encryption radio frequency chip | |
US9602273B2 (en) | Implementing key scheduling for white-box DES implementation | |
US20110154056A1 (en) | Computer readable storage medium for generating an access key, computer implemented method and computing device | |
CN102006300A (en) | Method, device and system for encrypting cloud storage data | |
WO2006118171A1 (en) | Electronic information storage method and device, electronic information division storage method and device, electronic information division restoration processing method and device, and program thereof | |
MX2007014237A (en) | Implementation of an integrity-protected secure storage. | |
CN103310169A (en) | SD (Secure Digital) card data protection method and protection system thereof | |
US20110154055A1 (en) | Computer readable storage medium for generating a pseudonym, computer implemented method and computing device | |
CN112100679B (en) | Data processing method and device based on privacy protection and server | |
CN106571905A (en) | Numeric data homomorphic order-preserving encryption method | |
CN103888410B (en) | Application identity verification method and system | |
CN110266682A (en) | Data ciphering method, device, mobile terminal and decryption method | |
EP2779522A1 (en) | Configurable key-based data shuffling and encryption | |
Cui et al. | A practical and efficient bidirectional access control scheme for cloud-edge data sharing | |
CN104899522B (en) | A kind of data processing method and device | |
CN105978680B (en) | Encryption operation method for encryption key | |
CN104166821A (en) | Data processing method and device | |
CN111639938A (en) | Data processing method, device, equipment and medium | |
US11386227B1 (en) | Protection of databases, data transmissions and files without the use of encryption | |
JP2002539545A (en) | Anonymization method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |