CN104899522B - A kind of data processing method and device - Google Patents

A kind of data processing method and device Download PDF

Info

Publication number
CN104899522B
CN104899522B CN201510313189.4A CN201510313189A CN104899522B CN 104899522 B CN104899522 B CN 104899522B CN 201510313189 A CN201510313189 A CN 201510313189A CN 104899522 B CN104899522 B CN 104899522B
Authority
CN
China
Prior art keywords
memory space
variable
read
data
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510313189.4A
Other languages
Chinese (zh)
Other versions
CN104899522A (en
Inventor
冯世杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Netease Hangzhou Network Co Ltd
Original Assignee
Netease Hangzhou Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Netease Hangzhou Network Co Ltd filed Critical Netease Hangzhou Network Co Ltd
Priority to CN201510313189.4A priority Critical patent/CN104899522B/en
Publication of CN104899522A publication Critical patent/CN104899522A/en
Application granted granted Critical
Publication of CN104899522B publication Critical patent/CN104899522B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries

Abstract

The invention discloses a kind of data processing method and device.The data processing method includes:M memory space is configured for N number of variable to be stored;M≥N≥1;A fixed memory space is specified to carry out numerical value storage for each variable;According to default first shifting algorithm, shifting function is carried out to the bit of the M memory space.Using the embodiment of the present invention, the data in internal memory can be effectively protected not by malicious modification;The embodiment of the present invention can be applied in single-play game, can ensure the safety of game data.

Description

A kind of data processing method and device
Technical field
The present invention relates to communication technical field, more particularly to a kind of data processing method and device.
Background technology
With the rapid development of mobile phone, application program of mobile phone is widely popularized and applied.Common applications, including Single-play game, it can be modified by directly changing the form of internal storage data come logarithm value, such as the money in single-play game Quantity, vital values etc..And the irrational modification of logarithm value, life-span of a application program can be greatly shortened, so as to cause business revenue Reduction.
In the prior art, in order to prevent that internal storage data from being changed, only with real to specifying the method that numerical value is encrypted It is existing.When writing the numerical value of specifying variable, by numerical value by being stored again after assignment algorithm computing, specifying variable is being read During numerical value, read again after the numerical value of storage is carried out into corresponding inverse operation.But this method is to the specified data of each encryption Being required for, which increases code, is handled, and is also not easy to change the logic of code after processing.Moreover, specify the storage location of numerical value can To be analyzed by low order to obtain, it can equally reach the purpose of modification numerical value.
Prior art can also prevent that critical data from being changed by network transmission critical data.But this method Network must be constantly connected, the critical data if desired protected is more, then can consume various flow.Moreover, by intercepting network Package obtains the data of transmission, and then forges server and network package and can also reach the purpose of modification data.
The content of the invention
The embodiment of the present invention proposes a kind of data processing method and device, can effectively protect the data in internal memory not disliked Meaning modification.
The embodiment of the present invention provides a kind of data processing method, including:
M memory space is configured for N number of variable to be stored;M≥N≥1;
A fixed memory space is specified to carry out numerical value storage for each variable;
According to default first shifting algorithm, shifting function is carried out to the bit of the M memory space.
Further, all bits of the M memory space are entered according to default first shifting algorithm described After row shifting function, in addition to:
Receive the data write request that request of data side is sent;The data write request includes the title of variable to be written And numerical value;
Judge that the title of the variable to be written whether there is in default chained list;The chained list is the name of each variable Claim the mapping table with its memory space;
If in the presence of, according to the title of the variable to be written, from the chained list inquiry obtain the variable to be written Memory space;If being not present, an idle memory space in the M memory space is allocated to described to be written Variable, and the corresponding relation of the title of the variable to be written and its memory space is stored in the chained list;
According to first shifting algorithm, shift-reduce is carried out to all bits of the M memory space;
The numerical value of the variable to be written is write in the memory space of the variable to be written;
According to default second shifting algorithm, shifting function is carried out to all bits of the M memory space.
Further, all bits of the M memory space are entered according to default first shifting algorithm described After row shifting function, in addition to:
Receive the data read request that request of data side is sent;The data read request includes the name of variable to be read Claim;
Judge that the title of the variable to be read whether there is in default chained list;
If in the presence of, according to the title of the variable to be read, from the chained list inquiry obtain the variable to be read Memory space;If being not present, return to read and unsuccessfully prompt;
According to first shifting algorithm, shift-reduce is carried out to all bits of the M memory space;
The numerical value of the variable to be read is read from the memory space of the variable to be read, and feeds back to the data Requesting party;
According to default second shifting algorithm, shifting function is carried out to all bits of the M memory space.
It is preferably carried out at one in mode, specifies a fixed memory space to carry out numerical value for each variable described After storage, in addition to:
According to default first XOR algorithm, XOR encryption is carried out respectively to the numerical value in each memory space, obtain every First secret value of individual numerical value, and by first secret value write-in corresponding to memory space.
Further, all bits of the M memory space are entered according to default first shifting algorithm described After row shifting function, in addition to:
Receive the data write request that request of data side is sent;The data write request includes the title of variable to be written And numerical value;
Judge that the title of the variable to be written whether there is in default chained list;
If in the presence of, according to the title of the variable to be written, from the chained list inquiry obtain the variable to be written Memory space;If being not present, an idle memory space in the M memory space is allocated to described to be written Variable, and the corresponding relation of the title of the variable to be written and its memory space is stored in the chained list;
According to first shifting algorithm, shift-reduce is carried out to all bits of the M memory space;
According to the first XOR algorithm, XOR behaviour is carried out respectively to each first secret value in the M memory space Make, each first secret value is reduced into numerical value;
The numerical value of the variable to be written is write in the memory space of the variable to be written;
According to default second XOR algorithm, XOR encryption is carried out respectively to the numerical value in each memory space, obtain every Second secret value of individual numerical value, and by second secret value write-in corresponding to memory space;
According to default second shifting algorithm, shifting function is carried out to all bits of the M memory space.
Further, all bits of the M memory space are entered according to default first shifting algorithm described After row shifting function, in addition to:
Receive the data read request that request of data side is sent;The data read request includes the name of variable to be read Claim;
Judge that the title of the variable to be read whether there is in default chained list;
If in the presence of, according to the title of the variable to be read, from the chained list inquiry obtain the variable to be read Memory space;If being not present, return to read and unsuccessfully prompt;
According to first shifting algorithm, shift-reduce is carried out to all bits of the M memory space;
According to the first XOR algorithm, XOR behaviour is carried out respectively to each first secret value in the M memory space Make, each first secret value is reduced into numerical value;
The numerical value of the variable to be read is read from the memory space of the variable to be read, and feeds back to the data Requesting party;
According to default second XOR algorithm, XOR encryption is carried out respectively to the numerical value in each memory space, obtain every Second secret value of individual numerical value, and by second secret value write-in corresponding to memory space;
According to default second shifting algorithm, shifting function is carried out to all bits of the M memory space.
It is preferably carried out at another in mode, it is empty to described M storage described according to default first shifting algorithm Between all bits carry out shifting function after, in addition to:
Using hash algorithm, the value of all bits in the M memory space is calculated, obtains the first Hash Value.
Further, hash algorithm is used described, the value of all bits in the M memory space is counted Calculate, after obtaining the first cryptographic Hash, in addition to:
Receive the request of data that request of data side is sent;
Using the hash algorithm, the value of all bits in the M memory space is calculated, obtains second Cryptographic Hash;
Judge whether second cryptographic Hash and first cryptographic Hash are identical;
If identical, the request of data is handled;
If differing, refusal handles the request of data.
Correspondingly, the embodiment of the present invention also provides a kind of data processing equipment, including:
Configuration module, for configuring M memory space for N number of variable to be stored;M≥N≥1;
Memory module, for specifying a fixed memory space to carry out numerical value storage for each variable;And
Shift module, for according to default first shifting algorithm, being shifted to the bit of the M memory space Operation.
Further, the data processing equipment also includes:
First write request receiving module, for receiving the data write request of request of data side's transmission;The data are write Enter title and numerical value of the request bag containing variable to be written;
First judge module, for judging that the title of the variable to be written whether there is in default chained list;It is described Chained list is the title of each variable and the mapping table of its memory space;
First memory space acquisition module, if in the presence of according to the title of the variable to be written, from the chained list Middle inquiry obtains the memory space of the variable to be written;If being not present, one in the M memory space is idle Memory space is allocated to the variable to be written, and the corresponding relation of the title of the variable to be written and its memory space is protected Exist in the chained list;
First shift-reduce module, for according to first shifting algorithm, to all bits of the M memory space Position carries out shift-reduce;
First writing module, for writing the number of the variable to be written in the memory space of the variable to be written Value;And
First shifting function module, for according to default second shifting algorithm, to all ratios of the M memory space Special position carries out shifting function.
Further, the data processing equipment also includes:
First read requests receiving module, for receiving the data read request of request of data side's transmission;The data are read Take title of the request bag containing variable to be read;
First title judge module, for judging that the title of the variable to be read whether there is in default chained list;
First memory space enquiry module, if in the presence of according to the title of the variable to be read, from the chained list Middle inquiry obtains the memory space of the variable to be read;If being not present, return to read and unsuccessfully prompt;
First recovery module, for according to first shifting algorithm, entering to all bits of the M memory space Row shift-reduce;
First read module, for reading the number of the variable to be read from the memory space of the variable to be read Value, and feed back to the request of data side;And
First operation module, for according to default second shifting algorithm, to all bits of the M memory space Carry out shifting function.
It is preferably carried out at one in mode, the data processing equipment also includes:
XOR encrypting module, for according to default first XOR algorithm, entering respectively to the numerical value in each memory space Row XOR is encrypted, and obtains the first secret value of each numerical value, and will first secret value write corresponding to memory space.
Further, the data processing equipment also includes:
Second write request receiving module, for receiving the data write request of request of data side's transmission;The data are write Enter title and numerical value of the request bag containing variable to be written;
Second judge module, for judging that the title of the variable to be written whether there is in default chained list;
Second memory space acquisition module, if in the presence of according to the title of the variable to be written, from the chained list Middle inquiry obtains the memory space of the variable to be written;If being not present, one in the M memory space is idle Memory space is allocated to the variable to be written, and the corresponding relation of the title of the variable to be written and its memory space is protected Exist in the chained list;
Second shift-reduce module, for according to first shifting algorithm, to all bits of the M memory space Position carries out shift-reduce;
XOR module, for according to the first XOR algorithm, dividing each first secret value in the M memory space Xor operation is not carried out, and each first secret value is reduced into numerical value;
Second writing module, the numerical value of the variable to be written is write in the memory space of the variable to be written;
Encrypting module, for according to default second XOR algorithm, being carried out respectively to the numerical value in each memory space different Or encryption, obtain the second secret value of each numerical value, and will second secret value write corresponding to memory space;And
Second shifting function module, for according to default second shifting algorithm, to all ratios of the M memory space Special position carries out shifting function.
Further, the data processing equipment also includes:
Second read requests receiving module, for receiving the data read request of request of data side's transmission;The data are read Take title of the request bag containing variable to be read;
Second title judge module, for judging that the title of the variable to be read whether there is in default chained list;
Second memory space enquiry module, if in the presence of according to the title of the variable to be read, from the chained list Middle inquiry obtains the memory space of the variable to be read;If being not present, return to read and unsuccessfully prompt;
Second recovery module, for according to first shifting algorithm, entering to all bits of the M memory space Row shift-reduce;
Secret value recovery module, for according to the first XOR algorithm, adding in the M memory space each first Close value carries out xor operation respectively, and each first secret value is reduced into numerical value;
Second read module, for reading the number of the variable to be read from the memory space of the variable to be read Value, and feed back to the request of data side;
Secret value acquisition module, for according to default second XOR algorithm, distinguishing the numerical value in each memory space Carry out XOR encryption, obtain the second secret value of each numerical value, and will second secret value write corresponding to memory space;With And
Second operation module, for according to default second shifting algorithm, to all bits of the M memory space Carry out shifting function.
It is preferably carried out at another in mode, the data processing equipment also includes:
Computing module, for using hash algorithm, being counted to the value of all bits in the M memory space Calculate, obtain the first cryptographic Hash.
Further, the data processing equipment also includes:
Request of data receiving module, for receiving the request of data of request of data side's transmission;
Cryptographic Hash acquisition module, for using the hash algorithm, to all bits in the M memory space Value is calculated, and obtains the second cryptographic Hash;
Cryptographic Hash judge module, for judging whether second cryptographic Hash and first cryptographic Hash are identical;
Request processing module, if for identical, the request of data is handled;And
Request refusal module, if for differing, refusal handles the request of data.
Implement the embodiment of the present invention, have the advantages that:
Data processing method provided in an embodiment of the present invention and device, can be that each variable specifies a fixed storage Space carries out numerical value storage, and carries out shifting function to the bit of all memory spaces to change the storage of each variable sky Between, so as to prevent the memory space of variable is scanned by internal memory from obtaining, the data in internal memory effectively are protected not by malicious modification; After writing every time or reading the data in memory space, change the memory space of each variable using different shifting algorithms, more Effectively protect the data in memory space;XOR encryption is carried out to the numerical value of each variable, prevents user from illegally obtaining variable Plaintext, moreover, after each write-in or reading data in memory space, the numerical value using different XOR algorithms to variable It is encrypted, further effectively protects the data in internal memory not by malicious modification;When receiving request of data every time, to storage All data in space are calculated using hash algorithm, and the cryptographic Hash after calculating and the cryptographic Hash pre-saved are carried out Contrast, if two cryptographic Hash differences, refusal processing data request, it can find that the data in internal memory are illegally distorted in time. The embodiment of the present invention can be applied in single-play game, can ensure the safety of game data.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of one embodiment of data processing method provided by the invention;
Fig. 2 is the schematic flow sheet of an embodiment of data processing method provided by the invention;
Fig. 3 is the schematic flow sheet of another embodiment of data processing method provided by the invention;
Fig. 4 is the structural representation of one embodiment of data processing equipment provided by the invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made Embodiment, belong to the scope of protection of the invention.
It is the schematic flow sheet of one embodiment of data processing method provided by the invention referring to Fig. 1.
The embodiment of the present invention provides a kind of data processing method, including:
S1, it is that N number of variable to be stored configures M memory space;M≥N≥1;
S2, a fixed memory space progress numerical value storage is specified for each variable;
S3, according to default first shifting algorithm, shifting function is carried out to all bits of the M memory space.
Wherein, M memory space is configured for N number of variable to be stored, and a fixed storage is specified for each variable Space, meanwhile, the memory space of free time is reserved in M memory space, for example, to store 80 variables, then needs configuration 80 Memory space more than individual.A chained list is pre-established, the corresponding relation of the title of each variable and its memory space is preserved In the chained list.Multiple displacement tables are pre-established, general recommendations shifts table number more than 64, wherein, displacement table describes M Shifted relationship between all bits of individual memory space.Different shifting algorithms is set according to different displacement tables, made every The memory space of individual variable carries out shifting function according to different shifting algorithms.
After variable storage, a first displacement table is randomly selected, and record the table number of the first displacement table.Using first Shifting algorithm, i.e., shifting function is carried out to all bits of M memory space according to the first displacement table.For example, it is configured with M= 100 memory spaces, each memory space have 8 bits, i.e. M memory space shares 800 bits, according to first Shift table and shifting function is carried out to all bits, i.e., the 1st bit is moved to the position of the 200th bit, by the 200th Individual bit is moved to the position of the 456th bit, the 456th bit is moved to the position etc. of the 321st bit, directly Shifting function is all carried out to 800 bits.By the shifting function of all bits to M memory space, prevent from becoming The memory space of amount is scanned by internal memory and obtained, and effectively protects the data in internal memory not by malicious modification.
It is preferably carried out at one in mode, described according to default first shifting algorithm, to the M memory space All bits carry out shifting function after, in addition to:
Receive the data write request that request of data side is sent;The data write request includes the title of variable to be written And numerical value;
Judge that the title of the variable to be written whether there is in default chained list;The chained list is the name of each variable Claim the mapping table with its memory space;
If in the presence of, according to the title of the variable to be written, from the chained list inquiry obtain the variable to be written Memory space;If being not present, an idle memory space in the M memory space is allocated to described to be written Variable, and the corresponding relation of the title of the variable to be written and its memory space is stored in the chained list;
According to first shifting algorithm, shift-reduce is carried out to all bits of the M memory space;
The numerical value of the variable to be written is write in the memory space of the variable to be written;
According to default second shifting algorithm, shifting function is carried out to all bits of the M memory space.
It should be noted that when receiving data write request, first inquiry whether there is variable to be written from chained list Title, if in the presence of directly inquiring about the memory space of the variable from chained list;If being not present, by M memory space A reserved idle memory space is assigned to the variable, and the title of the variable and the corresponding of the memory space specified are closed System is stored in chained list, the convenient inquiry again to the variable storage space.
When inquiring the memory space of variable to be written, first according to the table number of the first pre-recorded displacement table, choose First displacement table carries out shift-reduce to all bits of M memory space, that is, is reduced to storage when variable is stored Space.The memory space of variable to be written is found, the numerical value for being written into variable is write in the memory space, you can realizes variable The write-in of numerical value.After completing to write, another the second displacement table is randomly selected, and records the table number of the second displacement table, is adopted With the second shifting algorithm, i.e., shifting function is carried out to all bits of M memory space according to the second displacement table.Writing every time After entering, all bits of M memory space are shifted using different shifting algorithms, more effectively protection storage Data in space.
It is preferably carried out at another in mode, it is empty to described M storage described according to default first shifting algorithm Between all bits carry out shifting function after, in addition to:
Receive the data read request that request of data side is sent;The data read request includes the name of variable to be read Claim;
Judge that the title of the variable to be read whether there is in default chained list;
If in the presence of, according to the title of the variable to be read, from the chained list inquiry obtain the variable to be read Memory space;If being not present, return to read and unsuccessfully prompt;
According to first shifting algorithm, shift-reduce is carried out to all bits of the M memory space;
The numerical value of the variable to be read is read from the memory space of the variable to be read, and feeds back to the data Requesting party;
According to default second shifting algorithm, shifting function is carried out to all bits of the M memory space.
It should be noted that when receiving data read request, first inquire about whether there is from chained list and read into variable Title, if in the presence of directly inquiring about the memory space of the variable from chained list;If being not present, request error, at refusal Manage the request.
When inquiring the memory space of variable to be read, first according to the table number of the first pre-recorded displacement table, choose First displacement table carries out shift-reduce to all bits of M memory space, that is, is reduced to storage when variable is stored Space.The memory space of variable to be read is found, the reading numerical values from the memory space, and by the numeric feedback to request of data Side, you can realize the reading of variable value.After completing to read, another the second displacement table is randomly selected, and record second The table number of table is shifted, using the second shifting algorithm, i.e., all bits of M memory space are moved according to the second displacement table Bit manipulation.After each read, all bits of M memory space are shifted using different shifting algorithms, Data more effectively in protection memory space.
In the present embodiment, further, described according to default first shifting algorithm, to the M memory space All bits carry out shifting function after, in addition to:
Using hash algorithm, the value of all bits in the M memory space is calculated, obtains the first Hash Value.
Further, hash algorithm is used described, the value of all bits in the M memory space is counted Calculate, after obtaining the first cryptographic Hash, in addition to:
Receive the request of data that request of data side is sent;
Using the hash algorithm, the value of all bits in the M memory space is calculated, obtains second Cryptographic Hash;
Judge whether second cryptographic Hash and first cryptographic Hash are identical;
If identical, the request of data is handled;
If differing, refusal handles the request of data.
It should be noted that after each shifting function, hash algorithm can be also used, to all in M memory space Numerical value is calculated, and is obtained cryptographic Hash and is preserved.When receiving request of data every time, using hash algorithm, M are deposited All numerical value in storage space are calculated again, and whether cryptographic Hash is identical twice whether judges memory space by judgement There is numerical value by malicious modification.If identical, illustrate that numerical value by malicious modification, is not then handled request of data, processing method can Think the processing method that data write request or data read request are received in the present embodiment;If differing, illustrate numerical value By malicious modification, then refusal processing request.
The present invention also provides second embodiment of data processing method.
Compared with above-mentioned first embodiment, the difference for the data processing method that second embodiment provides is:
After a fixed memory space specified for each variable carries out numerical value storage, in addition to:
According to default first XOR algorithm, XOR encryption is carried out respectively to the numerical value in each memory space, obtain every First secret value of individual numerical value, and by first secret value write-in corresponding to memory space.
Wherein, multiple XOR tables are pre-established, general recommendations XOR table number is more than 64, according to different XOR tables Different XOR algorithms is set, the numerical value of each variable is carried out XOR encryption according to different XOR algorithms.Encrypted in XOR When, a first XOR table is randomly selected, and the table number of the first XOR table is recorded, using the first XOR algorithm, by M storage All numerical value in space are converted to binary value, XOR encryption are carried out to each bit respectively, so as to prevent that user is illegal Obtain the plaintext of each variable.
It is preferably carried out at one in mode, as shown in Fig. 2 described according to default first shifting algorithm, to the M After all bits of individual memory space carry out shifting function, in addition to:
S201, receive the data write request that request of data side is sent;The data write request includes variable to be written Title and numerical value;
S202, judge that the title of the variable to be written whether there is in default chained list;If in the presence of performing step S203, if being not present, perform step S204;
S203, the title according to the variable to be written, inquired about from the chained list and obtain depositing for the variable to be written Space is stored up, and continues executing with step S205;
S204, an idle memory space in the M memory space is allocated to the variable to be written, and will The title of the variable to be written and the corresponding relation of its memory space are stored in the chained list, and continue executing with step S205;
S205, according to first shifting algorithm, shift-reduce is carried out to all bits of the M memory space;
S206, according to the first XOR algorithm, each first secret value in the M memory space is carried out respectively different Or operation, each first secret value is reduced into numerical value;
S207, the numerical value for writing in the memory space of the variable to be written the variable to be written;
S208, according to default second XOR algorithm, XOR encryption is carried out respectively to the numerical value in each memory space, obtained Each numerical value the second secret value, and will second secret value write corresponding to memory space;
S209, according to default second shifting algorithm, displacement behaviour is carried out to all bits of the M memory space Make.
It should be noted that when receiving data write request, first inquiry whether there is variable to be written from chained list Title, if in the presence of directly inquiring about the memory space of the variable from chained list;If being not present, by M memory space A reserved idle memory space is assigned to the variable, and the title of the variable and the corresponding of the memory space specified are closed System is stored in chained list, the convenient inquiry again to the variable storage space.
When inquiring the memory space of variable to be written, according to the table number of pre-recorded first displacement table, the is chosen One displacement table carries out shift-reduce to all bits of M memory space, that is, the storage being reduced to when variable is stored is empty Between.Meanwhile according to the table number of the first pre-recorded XOR table, the first XOR table is chosen to all the in M memory space One secret value carries out xor operation, is reduced to numerical value.The memory space of variable to be written is found, the numerical value for being written into variable is write Enter in the memory space, you can realize the write-in of variable value.After completing to write, another the second XOR table is randomly selected, And the table number of the second XOR table is recorded, using the second XOR algorithm, i.e., according to the second XOR table to the institute in M memory space There is numerical value to carry out XOR encryption.Meanwhile another the second displacement table is randomly selected, and the table number of the second displacement table is recorded, adopt With the second shifting algorithm, i.e., shifting function is carried out to all bits of M memory space according to the second displacement table.Writing every time After entering, all bits of M memory space are shifted using different XOR algorithm and shifting algorithm, more effectively Protection memory space in data.
It is preferably carried out at another in mode, as shown in figure 3, described according to default first shifting algorithm, to institute After all bits progress shifting function for stating M memory space, in addition to:
S301, receive the data read request that request of data side is sent;The data read request includes variable to be read Title;
S302, judge that the title of the variable to be read whether there is in default chained list;If in the presence of performing step S303, if being not present, perform step S304;
S303, the title according to the variable to be read, inquired about from the chained list and obtain depositing for the variable to be read Space is stored up, and continues executing with step S305;
S304, return to read and unsuccessfully prompt;
S305, according to first shifting algorithm, shift-reduce is carried out to all bits of the M memory space;
S306, according to the first XOR algorithm, each first secret value in the M memory space is carried out respectively different Or operation, each first secret value is reduced into numerical value;
S307, the numerical value for reading from the memory space of the variable to be read the variable to be read, and feed back to institute State request of data side;
S308, according to default second XOR algorithm, XOR encryption is carried out respectively to the numerical value in each memory space, obtained Each numerical value the second secret value, and will second secret value write corresponding to memory space;
S309, according to default second shifting algorithm, displacement behaviour is carried out to all bits of the M memory space Make.
It should be noted that when receiving data read request, first inquiry whether there is variable to be read from chained list Title, if in the presence of directly inquiring about the memory space of the variable from chained list;If being not present, request error, at refusal Manage the request.
When inquiring the memory space of variable to be read, according to the table number of pre-recorded first displacement table, the is chosen One displacement table carries out shift-reduce to all bits of M memory space, that is, the storage being reduced to when variable is stored is empty Between.Meanwhile according to the table number of the first pre-recorded XOR table, the first XOR table is chosen to all the in M memory space One secret value carries out xor operation, is reduced to numerical value.The memory space of variable to be read is found, number is read from the memory space Value, and feed back to request of data side, you can realize the reading of variable value.Complete read after, randomly select another second XOR table, and the table number of the second XOR table is recorded, it is using the second XOR algorithm, i.e., empty to M storage according to the second XOR table Between in all numerical value carry out XOR encryption.Meanwhile another the second displacement table is randomly selected, and record the second displacement table Table number, using the second shifting algorithm, i.e., shifting function is carried out to all bits of M memory space according to the second displacement table. After each read, all bits of M memory space are moved using different XOR algorithm and shifting algorithm Position, more effectively protect the data in memory space.
In the present embodiment, further, described according to default first shifting algorithm, to the M memory space All bits carry out shifting function after, in addition to:
Using hash algorithm, the value of all bits in the M memory space is calculated, obtains the first Hash Value.
Further, hash algorithm is used described, the value of all bits in the M memory space is counted Calculate, after obtaining the first cryptographic Hash, in addition to:
Receive the request of data that request of data side is sent;
Using the hash algorithm, the value of all bits in the M memory space is calculated, obtains second Cryptographic Hash;
Judge whether second cryptographic Hash and first cryptographic Hash are identical;
If identical, the request of data is handled;
If differing, refusal handles the request of data.
It should be noted that after each shifting function, hash algorithm can be also used, to all in M memory space Numerical value is calculated, and is obtained cryptographic Hash and is preserved.When receiving request of data every time, using hash algorithm, M are deposited All numerical value in storage space are calculated again, and whether cryptographic Hash is identical twice whether judges memory space by judgement There is numerical value by malicious modification.If identical, illustrate that numerical value by malicious modification, is not then handled request of data, processing method can Think the processing method that data write request or data read request are received in the present embodiment;If differing, illustrate numerical value By malicious modification, then refusal processing request.
Data processing method provided in an embodiment of the present invention, can be that each variable specifies a fixed memory space to enter Line number value stores, and carries out shifting function to the bit of all memory spaces to change the memory space of each variable, so as to Prevent the memory space of variable is scanned by internal memory from obtaining, effectively protect the data in internal memory not by malicious modification;Writing every time After entering or reading the data in memory space, change the memory space of each variable using different shifting algorithms, more effectively Protect the data in memory space;XOR encryption is carried out to the numerical value of each variable, prevents user from illegally obtaining the plaintext of variable, Moreover, after the data in writing or reading memory space every time, the numerical value of variable is added using different XOR algorithms It is close, further the data in internal memory effectively are protected not by malicious modification;When receiving request of data every time, in memory space All data calculated using hash algorithm, and the cryptographic Hash after calculating is contrasted with the cryptographic Hash pre-saved, If two cryptographic Hash differences, refusal processing data request, it can find that the data in internal memory are illegally distorted in time.The present invention Embodiment can be applied in single-play game, can ensure the safety of game data.
Accordingly, the present invention also provides a kind of data processing equipment, can realize the data processing side in above-described embodiment All flows of method.
It is the structural representation of one embodiment of data processing equipment provided by the invention referring to Fig. 4, including:
Configuration module 1, for configuring M memory space for N number of variable to be stored;M≥N≥1;
Memory module 2, for specifying a fixed memory space to carry out numerical value storage for each variable;And
Shift module 3, for according to default first shifting algorithm, entering to all bits of the M memory space Row shifting function.
Further, the data processing equipment also includes:
First write request receiving module, for receiving the data write request of request of data side's transmission;The data are write Enter title and numerical value of the request bag containing variable to be written;
First judge module, for judging that the title of the variable to be written whether there is in default chained list;It is described Chained list is the title of each variable and the mapping table of its memory space;
First memory space acquisition module, if in the presence of according to the title of the variable to be written, from the chained list Middle inquiry obtains the memory space of the variable to be written;If being not present, one in the M memory space is idle Memory space is allocated to the variable to be written, and the corresponding relation of the title of the variable to be written and its memory space is protected Exist in the chained list;
First shift-reduce module, for according to first shifting algorithm, to all bits of the M memory space Position carries out shift-reduce;
First writing module, for writing the number of the variable to be written in the memory space of the variable to be written Value;And
First shifting function module, for according to default second shifting algorithm, to all ratios of the M memory space Special position carries out shifting function.
Further, the data processing equipment also includes:
First read requests receiving module, for receiving the data read request of request of data side's transmission;The data are read Take title of the request bag containing variable to be read;
First title judge module, for judging that the title of the variable to be read whether there is in default chained list;
First memory space enquiry module, if in the presence of according to the title of the variable to be read, from the chained list Middle inquiry obtains the memory space of the variable to be read;If being not present, return to read and unsuccessfully prompt;
First recovery module, for according to first shifting algorithm, entering to all bits of the M memory space Row shift-reduce;
First read module, for reading the number of the variable to be read from the memory space of the variable to be read Value, and feed back to the request of data side;And
First operation module, for according to default second shifting algorithm, to all bits of the M memory space Carry out shifting function.
It is preferably carried out at one in mode, the data processing equipment also includes:
XOR encrypting module, for according to default first XOR algorithm, entering respectively to the numerical value in each memory space Row XOR is encrypted, and obtains the first secret value of each numerical value, and will first secret value write corresponding to memory space.
Further, the data processing equipment also includes:
Second write request receiving module, for receiving the data write request of request of data side's transmission;The data are write Enter title and numerical value of the request bag containing variable to be written;
Second judge module, for judging that the title of the variable to be written whether there is in default chained list;
Second memory space acquisition module, if in the presence of according to the title of the variable to be written, from the chained list Middle inquiry obtains the memory space of the variable to be written;If being not present, one in the M memory space is idle Memory space is allocated to the variable to be written, and the corresponding relation of the title of the variable to be written and its memory space is protected Exist in the chained list;
Second shift-reduce module, for according to first shifting algorithm, to all bits of the M memory space Position carries out shift-reduce;
XOR module, for according to the first XOR algorithm, dividing each first secret value in the M memory space Xor operation is not carried out, and each first secret value is reduced into numerical value;
Second writing module, the numerical value of the variable to be written is write in the memory space of the variable to be written;
Encrypting module, for according to default second XOR algorithm, being carried out respectively to the numerical value in each memory space different Or encryption, obtain the second secret value of each numerical value, and will second secret value write corresponding to memory space;And
Second shifting function module, for according to default second shifting algorithm, to all ratios of the M memory space Special position carries out shifting function.
Further, the data processing equipment also includes:
Second read requests receiving module, for receiving the data read request of request of data side's transmission;The data are read Take title of the request bag containing variable to be read;
Second title judge module, for judging that the title of the variable to be read whether there is in default chained list;
Second memory space enquiry module, if in the presence of according to the title of the variable to be read, from the chained list Middle inquiry obtains the memory space of the variable to be read;If being not present, return to read and unsuccessfully prompt;
Second recovery module, for according to first shifting algorithm, entering to all bits of the M memory space Row shift-reduce;
Secret value recovery module, for according to the first XOR algorithm, adding in the M memory space each first Close value carries out xor operation respectively, and each first secret value is reduced into numerical value;
Second read module, for reading the number of the variable to be read from the memory space of the variable to be read Value, and feed back to the request of data side;
Secret value acquisition module, for according to default second XOR algorithm, distinguishing the numerical value in each memory space Carry out XOR encryption, obtain the second secret value of each numerical value, and will second secret value write corresponding to memory space;With And
Second operation module, for according to default second shifting algorithm, to all bits of the M memory space Carry out shifting function.
It is preferably carried out at another in mode, the data processing equipment also includes:
Computing module, for using hash algorithm, being counted to the value of all bits in the M memory space Calculate, obtain the first cryptographic Hash.
Further, the data processing equipment also includes:
Request of data receiving module, for receiving the request of data of request of data side's transmission;
Cryptographic Hash acquisition module, for using the hash algorithm, to all bits in the M memory space Value is calculated, and obtains the second cryptographic Hash;
Cryptographic Hash judge module, for judging whether second cryptographic Hash and first cryptographic Hash are identical;
Request processing module, if for identical, the request of data is handled;And
Request refusal module, if for differing, refusal handles the request of data.
Data processing equipment provided in an embodiment of the present invention, can be that each variable specifies a fixed memory space to enter Line number value stores, and carries out shifting function to the bit of all memory spaces to change the memory space of each variable, so as to Prevent the memory space of variable is scanned by internal memory from obtaining, effectively protect the data in internal memory not by malicious modification;Writing every time After entering or reading the data in memory space, change the memory space of each variable using different shifting algorithms, more effectively Protect the data in memory space;XOR encryption is carried out to the numerical value of each variable, prevents user from illegally obtaining the plaintext of variable, Moreover, after the data in writing or reading memory space every time, the numerical value of variable is added using different XOR algorithms It is close, further the data in internal memory effectively are protected not by malicious modification;When receiving request of data every time, in memory space All data calculated using hash algorithm, and the cryptographic Hash after calculating is contrasted with the cryptographic Hash pre-saved, If two cryptographic Hash differences, refusal processing data request, it can find that the data in internal memory are illegally distorted in time.The present invention Embodiment can be applied in single-play game, can ensure the safety of game data.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements not only include those key elements, and And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Other identical element also be present in the process of key element, method, article or device.The embodiments of the present invention are only Description, the quality of embodiment is not represented.In several embodiments provided herein, it should be understood that disclosed is System and method can be realized by another way.For example, system embodiment described above is only schematical, example Such as, the division of the unit, only a kind of division of logic function, there can be other dividing mode when actually realizing, such as Multiple units or component can combine or be desirably integrated into another system, or some features can be ignored, or not perform.Separately A bit, shown or discussed mutual coupling or direct-coupling or communication connection can be by some interfaces, device Or INDIRECT COUPLING or the communication connection of unit, can be electrical, mechanical or other forms.
Professional further appreciates that, with reference to the unit of each example of the embodiments described herein description And algorithm steps, can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware and The interchangeability of software, the composition and step of each example are generally described according to function in the above description.These Function is performed with hardware or software mode actually, application-specific and design constraint depending on technical scheme.Specialty Technical staff can realize described function using distinct methods to each specific application, but this realization should not Think beyond the scope of this invention.
Directly it can be held with reference to the step of method or algorithm that the embodiments described herein describes with hardware, processor Capable software module, or the two combination are implemented.Software module can be placed in random access memory (RAM), internal memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology In any other form of storage medium well known in field.
The foregoing description of the disclosed embodiments, professional and technical personnel in the field are enable to realize or using the present invention. A variety of modifications to these embodiments will be apparent for those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, it is of the invention The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one The most wide scope caused.

Claims (16)

  1. A kind of 1. data processing method, it is characterised in that including:
    M memory space is configured for N number of variable to be stored;M≥N≥1;
    A fixed memory space is specified to carry out numerical value storage for each variable;
    According to default first shifting algorithm, shifting function is carried out to all bits of the M memory space;
    Receive the data write request that request of data side is sent;The data write request includes the title sum of variable to be written Value;
    According to first shifting algorithm, shift-reduce is carried out to all bits of the M memory space;
    The numerical value of the variable to be written is write in the memory space of the variable to be written;
    According to default second shifting algorithm, shifting function is carried out to all bits of the M memory space.
  2. 2. data processing method as claimed in claim 1, it is characterised in that in the data that the reception request of data side is sent After write request, also include before all bits to the M memory space carry out shift-reduce:
    Judge that the title of the variable to be written whether there is in default chained list;The chained list for each variable title with The mapping table of its memory space;
    If in the presence of, according to the title of the variable to be written, from the chained list inquiry obtain depositing for the variable to be written Store up space;If being not present, an idle memory space in the M memory space is allocated to the change to be written Amount, and the corresponding relation of the title of the variable to be written and its memory space is stored in the chained list.
  3. 3. data processing method as claimed in claim 1 or 2, it is characterised in that calculated described according to the default first displacement Method, after all bits progress shifting function of the M memory space, in addition to:
    Receive the data read request that request of data side is sent;The data read request includes the title of variable to be read;
    Judge that the title of the variable to be read whether there is in default chained list;
    If in the presence of, according to the title of the variable to be read, from the chained list inquiry obtain depositing for the variable to be read Store up space;If being not present, return to read and unsuccessfully prompt;
    According to first shifting algorithm, shift-reduce is carried out to all bits of the M memory space;
    The numerical value of the variable to be read is read from the memory space of the variable to be read, and feeds back to the request of data Side;
    According to default second shifting algorithm, shifting function is carried out to all bits of the M memory space.
  4. 4. data processing method as claimed in claim 1, it is characterised in that it is described for each variable specify one it is fixed After memory space carries out numerical value storage, in addition to:
    According to default first XOR algorithm, XOR encryption is carried out respectively to the numerical value in each memory space, obtain per number Value the first secret value, and will first secret value write corresponding to memory space.
  5. 5. data processing method as claimed in claim 4, it is characterised in that described according to default first shifting algorithm, After all bits progress shifting function of the M memory space, in addition to:
    Receive the data write request that request of data side is sent;The data write request includes the title sum of variable to be written Value;
    Judge that the title of the variable to be written whether there is in default chained list;
    If in the presence of, according to the title of the variable to be written, from the chained list inquiry obtain depositing for the variable to be written Store up space;If being not present, an idle memory space in the M memory space is allocated to the change to be written Amount, and the corresponding relation of the title of the variable to be written and its memory space is stored in the chained list;
    According to first shifting algorithm, shift-reduce is carried out to all bits of the M memory space;
    According to the first XOR algorithm, xor operation is carried out respectively to each first secret value in the M memory space, will Each first secret value is reduced into numerical value;
    The numerical value of the variable to be written is write in the memory space of the variable to be written;
    According to default second XOR algorithm, XOR encryption is carried out respectively to the numerical value in each memory space, obtain per number Value the second secret value, and will second secret value write corresponding to memory space;
    According to default second shifting algorithm, shifting function is carried out to all bits of the M memory space.
  6. 6. the data processing method as described in claim 4 or 5, it is characterised in that calculated described according to the default first displacement Method, after all bits progress shifting function of the M memory space, in addition to:
    Receive the data read request that request of data side is sent;The data read request includes the title of variable to be read;
    Judge that the title of the variable to be read whether there is in default chained list;
    If in the presence of, according to the title of the variable to be read, from the chained list inquiry obtain depositing for the variable to be read Store up space;If being not present, return to read and unsuccessfully prompt;
    According to first shifting algorithm, shift-reduce is carried out to all bits of the M memory space;
    According to the first XOR algorithm, xor operation is carried out respectively to each first secret value in the M memory space, will Each first secret value is reduced into numerical value;
    The numerical value of the variable to be read is read from the memory space of the variable to be read, and feeds back to the request of data Side;
    According to default second XOR algorithm, XOR encryption is carried out respectively to the numerical value in each memory space, obtain per number Value the second secret value, and will second secret value write corresponding to memory space;
    According to default second shifting algorithm, shifting function is carried out to all bits of the M memory space.
  7. 7. the data processing method as described in claim 1 or 4, it is characterised in that calculated described according to the default first displacement Method, after all bits progress shifting function of the M memory space, in addition to:
    Using hash algorithm, the value of all bits in the M memory space is calculated, obtains the first cryptographic Hash.
  8. 8. data processing method as claimed in claim 7, it is characterised in that use hash algorithm described, the M are deposited The value of all bits in storage space is calculated, after obtaining the first cryptographic Hash, in addition to:
    Receive the request of data that request of data side is sent;
    Using the hash algorithm, the value of all bits in the M memory space is calculated, obtains the second Hash Value;
    Judge whether second cryptographic Hash and first cryptographic Hash are identical;
    If identical, the request of data is handled;
    If differing, refusal handles the request of data.
  9. A kind of 9. data processing equipment, it is characterised in that including:
    Configuration module, for configuring M memory space for N number of variable to be stored;M≥N≥1;
    Memory module, for specifying a fixed memory space to carry out numerical value storage for each variable;And
    Shift module, for according to default first shifting algorithm, being shifted to all bits of the M memory space Operation;
    First write request receiving module, for receiving the data write request of request of data side's transmission;The data write-in please Seek the title and numerical value for including variable to be written;
    First shift-reduce module, for according to first shifting algorithm, entering to all bits of the M memory space Row shift-reduce;
    First writing module, for writing the numerical value of the variable to be written in the memory space of the variable to be written;With And
    First shifting function module, for according to default second shifting algorithm, to all bits of the M memory space Carry out shifting function.
  10. 10. data processing equipment as claimed in claim 9, it is characterised in that the data processing equipment also includes:
    First judge module, for judging that the title of the variable to be written whether there is in default chained list;The chained list For the title and the mapping table of its memory space of each variable;
    First memory space acquisition module, if in the presence of according to the title of the variable to be written, being looked into from the chained list Ask the memory space for obtaining the variable to be written;If being not present, by an idle storage in the M memory space Space configuration gives the variable to be written, and the corresponding relation of the title of the variable to be written and its memory space is stored in In the chained list.
  11. 11. the data processing equipment as described in claim 9 or 10, it is characterised in that the data processing equipment also includes:
    First read requests receiving module, for receiving the data read request of request of data side's transmission;The digital independent please Seek the title for including variable to be read;
    First title judge module, for judging that the title of the variable to be read whether there is in default chained list;
    First memory space enquiry module, if in the presence of according to the title of the variable to be read, being looked into from the chained list Ask the memory space for obtaining the variable to be read;If being not present, return to read and unsuccessfully prompt;
    First recovery module, for according to first shifting algorithm, being moved to all bits of the M memory space Position reduction;
    First read module, for reading the numerical value of the variable to be read from the memory space of the variable to be read, and Feed back to the request of data side;And
    First operation module, for according to default second shifting algorithm, being carried out to all bits of the M memory space Shifting function.
  12. 12. data processing equipment as claimed in claim 9, it is characterised in that the data processing equipment also includes:
    XOR encrypting module, for according to default first XOR algorithm, being carried out respectively to the numerical value in each memory space different Or encryption, obtain the first secret value of each numerical value, and will first secret value write corresponding to memory space.
  13. 13. data processing equipment as claimed in claim 12, it is characterised in that the data processing equipment also includes:
    Second write request receiving module, for receiving the data write request of request of data side's transmission;The data write-in please Seek the title and numerical value for including variable to be written;
    Second judge module, for judging that the title of the variable to be written whether there is in default chained list;
    Second memory space acquisition module, if in the presence of according to the title of the variable to be written, being looked into from the chained list Ask the memory space for obtaining the variable to be written;If being not present, by an idle storage in the M memory space Space configuration gives the variable to be written, and the corresponding relation of the title of the variable to be written and its memory space is stored in In the chained list;
    Second shift-reduce module, for according to first shifting algorithm, entering to all bits of the M memory space Row shift-reduce;
    XOR module, for according to the first XOR algorithm, entering respectively to each first secret value in the M memory space Row xor operation, each first secret value is reduced into numerical value;
    Second writing module, the numerical value of the variable to be written is write in the memory space of the variable to be written;
    Encrypting module, for according to default second XOR algorithm, carrying out XOR respectively to the numerical value in each memory space and adding It is close, obtain the second secret value of each numerical value, and by memory space corresponding to second secret value write-in;And
    Second shifting function module, for according to default second shifting algorithm, to all bits of the M memory space Carry out shifting function.
  14. 14. the data processing equipment as described in claim 12 or 13, it is characterised in that the data processing equipment also includes:
    Second read requests receiving module, for receiving the data read request of request of data side's transmission;The digital independent please Seek the title for including variable to be read;
    Second title judge module, for judging that the title of the variable to be read whether there is in default chained list;
    Second memory space enquiry module, if in the presence of according to the title of the variable to be read, being looked into from the chained list Ask the memory space for obtaining the variable to be read;If being not present, return to read and unsuccessfully prompt;
    Second recovery module, for according to first shifting algorithm, being moved to all bits of the M memory space Position reduction;
    Secret value recovery module, for according to the first XOR algorithm, to each first secret value in the M memory space Xor operation is carried out respectively, and each first secret value is reduced into numerical value;
    Second read module, for reading the numerical value of the variable to be read from the memory space of the variable to be read, and Feed back to the request of data side;
    Secret value acquisition module, for according to default second XOR algorithm, being carried out respectively to the numerical value in each memory space XOR is encrypted, and obtains the second secret value of each numerical value, and will second secret value write corresponding to memory space;And
    Second operation module, for according to default second shifting algorithm, being carried out to all bits of the M memory space Shifting function.
  15. 15. the data processing equipment as described in claim 9 or 12, it is characterised in that the data processing equipment also includes:
    Computing module, for using hash algorithm, calculating the value of all bits in the M memory space, obtaining Obtain the first cryptographic Hash.
  16. 16. data processing equipment as claimed in claim 15, it is characterised in that the data processing equipment also includes:
    Request of data receiving module, for receiving the request of data of request of data side's transmission;
    Cryptographic Hash acquisition module, for using the hash algorithm, the value of all bits in the M memory space is entered Row calculates, and obtains the second cryptographic Hash;
    Cryptographic Hash judge module, for judging whether second cryptographic Hash and first cryptographic Hash are identical;
    Request processing module, if for identical, the request of data is handled;And
    Request refusal module, if for differing, refusal handles the request of data.
CN201510313189.4A 2015-06-09 2015-06-09 A kind of data processing method and device Active CN104899522B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510313189.4A CN104899522B (en) 2015-06-09 2015-06-09 A kind of data processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510313189.4A CN104899522B (en) 2015-06-09 2015-06-09 A kind of data processing method and device

Publications (2)

Publication Number Publication Date
CN104899522A CN104899522A (en) 2015-09-09
CN104899522B true CN104899522B (en) 2018-01-30

Family

ID=54032182

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510313189.4A Active CN104899522B (en) 2015-06-09 2015-06-09 A kind of data processing method and device

Country Status (1)

Country Link
CN (1) CN104899522B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106934280A (en) * 2017-03-08 2017-07-07 网易(杭州)网络有限公司 Internal storage data processing method, device and network game client
CN109446758B (en) * 2018-09-17 2022-12-20 深圳市创梦天地科技有限公司 Data processing method, terminal and computer readable medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1512322A (en) * 2002-12-27 2004-07-14 上海华虹集成电路有限责任公司 Coprocessor for realizing IC card RSA enciphered algorithm
CN1926511A (en) * 2004-03-10 2007-03-07 Arm有限公司 Inserting bits within a data word
CN102594797A (en) * 2011-12-30 2012-07-18 飞天诚信科技股份有限公司 Method and device for generating verification code in embedded system
CN102831347A (en) * 2012-07-31 2012-12-19 飞天诚信科技股份有限公司 Data processing method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1512322A (en) * 2002-12-27 2004-07-14 上海华虹集成电路有限责任公司 Coprocessor for realizing IC card RSA enciphered algorithm
CN1926511A (en) * 2004-03-10 2007-03-07 Arm有限公司 Inserting bits within a data word
CN102594797A (en) * 2011-12-30 2012-07-18 飞天诚信科技股份有限公司 Method and device for generating verification code in embedded system
CN102831347A (en) * 2012-07-31 2012-12-19 飞天诚信科技股份有限公司 Data processing method and device

Also Published As

Publication number Publication date
CN104899522A (en) 2015-09-09

Similar Documents

Publication Publication Date Title
CN103107995B (en) A kind of cloud computing environment date safety storing system and method
US8078869B2 (en) System and method of protecting data on a communication device
WO2020211485A1 (en) Data processing method and apparatus, and electronic device
US20070239615A1 (en) Personal Information Management Device, Distributed Key Storage Device, and Personal Information Management System
US20030138105A1 (en) Storing keys in a cryptology device
CN107070660B (en) Storage design method of block chain encryption radio frequency chip
US9602273B2 (en) Implementing key scheduling for white-box DES implementation
US20110154056A1 (en) Computer readable storage medium for generating an access key, computer implemented method and computing device
CN102006300A (en) Method, device and system for encrypting cloud storage data
WO2006118171A1 (en) Electronic information storage method and device, electronic information division storage method and device, electronic information division restoration processing method and device, and program thereof
MX2007014237A (en) Implementation of an integrity-protected secure storage.
CN103310169A (en) SD (Secure Digital) card data protection method and protection system thereof
US20110154055A1 (en) Computer readable storage medium for generating a pseudonym, computer implemented method and computing device
CN112100679B (en) Data processing method and device based on privacy protection and server
CN106571905A (en) Numeric data homomorphic order-preserving encryption method
CN103888410B (en) Application identity verification method and system
CN110266682A (en) Data ciphering method, device, mobile terminal and decryption method
EP2779522A1 (en) Configurable key-based data shuffling and encryption
Cui et al. A practical and efficient bidirectional access control scheme for cloud-edge data sharing
CN104899522B (en) A kind of data processing method and device
CN105978680B (en) Encryption operation method for encryption key
CN104166821A (en) Data processing method and device
CN111639938A (en) Data processing method, device, equipment and medium
US11386227B1 (en) Protection of databases, data transmissions and files without the use of encryption
JP2002539545A (en) Anonymization method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant