CN107896222A - A kind of data processing method and system - Google Patents

A kind of data processing method and system Download PDF

Info

Publication number
CN107896222A
CN107896222A CN201711259818.5A CN201711259818A CN107896222A CN 107896222 A CN107896222 A CN 107896222A CN 201711259818 A CN201711259818 A CN 201711259818A CN 107896222 A CN107896222 A CN 107896222A
Authority
CN
China
Prior art keywords
record data
data
target record
target
encryption information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711259818.5A
Other languages
Chinese (zh)
Inventor
侯恩超
宋志华
徐波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANDONG YUWENG INFORMATION TECHNOLOGY Co Ltd
Original Assignee
SHANDONG YUWENG INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANDONG YUWENG INFORMATION TECHNOLOGY Co Ltd filed Critical SHANDONG YUWENG INFORMATION TECHNOLOGY Co Ltd
Priority to CN201711259818.5A priority Critical patent/CN107896222A/en
Publication of CN107896222A publication Critical patent/CN107896222A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/28Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
    • H04L67/2823Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network for conversion or adaptation of application content or format
    • H04L67/2828Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network for conversion or adaptation of application content or format for reducing the amount or size of exchanged application data

Abstract

The invention discloses a kind of method of data processing, and the record data of every predetermined number is merged for a target record data, to being sent after each target record data encryption to reception system.By each record data is handled and sent one by one originally, it is improved to merge multiple record datas, then processing transmission is carried out to the data after merging, therefore reduce the quantity of encryption data, decrease the quantity of transmission, therefore, improve the efficiency to gathered data processing, meanwhile after record data merges, target record data are encrypted with the security for retransmiting and also ensure that gathered data in transmitting procedure.The embodiment of the present invention additionally provides a kind of data handling system, can equally realize above-mentioned technique effect.

Description

A kind of data processing method and system
Technical field
The present invention relates to computer information safe communication technical field, more specifically to a kind of data processing method And system.
Background technology
In computer communication field, it will usually have data acquisition equipment, for gathering some data, after gathered data, also The recipient for sending data is needed, so that recipient carries out other operations to data.But in the prior art, due to needing The overabundance of data of transmission, collecting device sends the process very very complicated of data to receiving device, while collecting device case connects The data that receiving unit is sent are generally dangerous, can be by attacker using instruments such as Technology of Network Sniffer, by way of network monitoring Just it is easy to intercept the data message of transmission, causes data leak.If sensitive information is leaked, it will data owner is made Into huge harm.In addition, attacker can be distorted and not detectable to the data of intercepting and capturing in data transmission procedure, from And it have impact on the authenticity of data.
Therefore, how to improve processing gathered data and send the efficiency of gathered data, be those skilled in the art's needs Solve the problems, such as.
The content of the invention
It is an object of the invention to provide a kind of data processing method and system, to improve processing gathered data and transmission The efficiency of gathered data.
To achieve the above object, the embodiments of the invention provide following technical scheme:
A kind of data processing method, including:
Record data is obtained, will be every in all record datas when the quantity of the record data reaches preset value The record data of preset value quantity merges into a target record data;
Each target record data are encrypted to obtain encryption letter corresponding with each target record data Breath;
Each encryption information is sent to reception system, so that the reception system is receiving the encryption information When be decrypted to obtain the target record data to the encryption information, and the target record data are split to obtain described Record data.
Wherein, it is described each target record data are encrypted to obtain it is corresponding with each target record data Encryption information, including:
Each target record data are encrypted using symmetric key to obtain each target record data Encrypted cipher text;
The symmetric key is encrypted to obtain encryption key using the first public key of the reception system;It is wherein described Encryption information includes the encrypted cipher text and the encryption key;So that the reception system utilizes the first of the reception system Private key decrypts the encryption key and obtains the symmetric key, is obtained using encrypted cipher text described in the symmetric key decryption described Target record data.
Wherein, it is described that each target record data are encrypted using symmetric key to obtain each target note Before the encrypted cipher text for recording data, in addition to:
Each target record data are signed to obtain each target using the second private key of acquisition system The signature value of record data, and the signature value is added to the encryption information, so as to be adopted described in reception system utilization Each whether the target record data are tampered second public key verifications of collecting system.
Wherein, each encryption information is sent to reception system, including:
Each encryption information is added to goal set, and the goal set is sent to reception system, so that Every encryption information in the goal set is decrypted when receiving the goal set for the reception system Multiple target record data are obtained, and each target record data are split to obtain and remembered with each target Record the record data of the preset value quantity corresponding to data.
A kind of data processing method, including:
Receive the encryption information sent by acquisition system;
The encryption information is decrypted to obtain target record data;
Split the target record data and obtain the record data of preset value quantity;Wherein described encryption information is collection system The encryption information that system is encrypted to obtain to target record data;The target record data are the acquisition system in record number According to quantity reach preset value when, the record data in all record datas per preset value quantity will be merged what is obtained Target record data.
Wherein, it is described that the encryption information is decrypted to obtain target record data, including:
The encryption key in the encryption information is decrypted to obtain symmetric key using the first private key of reception system; Wherein, the encryption key is that the acquisition system is added using the first public key of the reception system to the symmetric key Close obtained encryption key;
The encrypted cipher text in the encryption information is decrypted using the symmetric key to obtain target record data;Its In, the encrypted cipher text is that each target record data are encrypted using the symmetric key for the acquisition system The encrypted cipher text of each target record data arrived.
Wherein, before the fractionation target record data obtain the record data of preset value quantity, in addition to:
The signature value of each target record data is determined in the encryption information, utilizes the of the acquisition system Two public keys perform verification operation to each target data record data, judge whether the target record data are tampered, If so, then abandoning the target record data being tampered, obtained if it is not, then continuing executing with the fractionation target record data To preset value quantity record data the step of;Wherein, the signature value is that the acquisition system utilizes the acquisition system The signature value for each target record data that second private key is signed to obtain to each target record data.
Wherein, it is described to receive by the encryption information of acquisition system transmission, including:
Receive the goal set for including multiple encryption information sent by acquisition system;
It is then described that the encryption information is decrypted to obtain target record data;The target record data are split to obtain The record data of preset value quantity, including:
Each encryption information is decrypted to obtain multiple target record data;
Split each target record data and obtain preset value quantity corresponding with each target record data Record data.
A kind of data handling system, including:
Acquisition system,, will be all described when the quantity of the record data reaches preset value for obtaining record data In record data a target record data are merged into per the record data of preset value quantity;To each target record Data are encrypted to obtain encryption information corresponding with each target record data;By each encryption information send to Reception system;
Reception system, for receiving the encryption information;The encryption information is decrypted to obtain target record data; Split the target record data and obtain the record data of preset value quantity.
Wherein, the reception system is specifically used for, and receive includes multiple encryption information by what acquisition system was sent Goal set;Each encryption information is decrypted to obtain multiple target record data;Split each target record Data obtain the record data of preset value quantity corresponding with each target record data.
By above scheme, a kind of data processing method provided in an embodiment of the present invention, record data is obtained, works as institute When stating the quantity of record data and reaching preset value, the record data in all record datas per preset value quantity is closed And it is a target record data;Each target record data are encrypted to obtain and each target record data Corresponding encryption information;Each encryption information is sent to reception system so that the reception system receive it is described The encryption information is decrypted during encryption information to obtain the target record data, and the target record data are split Obtain the record data.
As can be seen here, the method for a kind of data processing provided in an embodiment of the present invention, by the record data of every predetermined number Merge for a target record data, to being sent after each target record data encryption to reception system.By originally right one by one Each record data, which carries out handling transmission, to be improved to merge multiple record datas, then to the data after merging at Haircut is sent, therefore reduces the quantity of encryption data, decreases the quantity of transmission, this improves gathered data is handled Efficiency, meanwhile, retransmited after target record data are encrypted after merging and also ensure that gathered data in transmitting procedure Security.The embodiment of the present invention additionally provides a kind of data handling system, can equally realize above-mentioned technique effect.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is a kind of data processing method flow chart applied to acquisition system disclosed in the embodiment of the present invention;
Fig. 2 is a kind of specific data processing method flow chart for being applied to acquisition system disclosed in the embodiment of the present invention;
Fig. 3 is a kind of data processing method flow chart applied to reception system disclosed in the embodiment of the present invention;
Fig. 4 is a kind of specific data processing method flow chart for being applied to reception system disclosed in the embodiment of the present invention;
Fig. 5 is a kind of acquisition system flow chart of data processing figure disclosed in the embodiment of the present invention;
Fig. 6 is a kind of reception system flow chart of data processing figure disclosed in the embodiment of the present invention;
Fig. 7 is a kind of data handling system structural representation disclosed in the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made Embodiment, belong to the scope of protection of the invention.
The embodiment of the invention discloses a kind of data processing method and system, is adopted with improving processing gathered data and sending Collect the efficiency of data.
Referring to Fig. 1, a kind of data processing method provided in an embodiment of the present invention, specifically include:
S101, record data is obtained, when the quantity of the record data reaches preset value, by all record datas In the record data per preset value quantity merge into a target record data.
Specifically, data collecting system obtains record data to be sent, when the quantity of record data reaches preset value, Such as preset value is 10, then the quantity of current record data is 10000, then has reached preset value 10, then according to predetermined number 10, record data is merged into one, i.e., 10 record datas are merged into 1 target record data, finally by 10000 notes Record data merge to obtain 1000 target record data.
Again in this programme, record data can be converted to character string, if transmission for unstructured data, also change For character string forms, the character string of record data is merged into a number of target record data character string, made between record Separated with additional character, such as " | | ".
S102, each target record data are encrypted to obtain add corresponding with each target record data Confidential information.
Specifically, it is encrypted to obtain encryption letter corresponding with each target record data for each target record data Breath, the method that target record data are encrypted is in this programme and is not construed as limiting, and can be to target using symmetric key Record data is encrypted, and then the symmetric key is encrypted using unsymmetrical key, then remembers the target of encryption Record data and the symmetric key of encryption are transferred to reception system.
It should be noted that the process being encrypted for each target record data, can get a target Just it is encrypted or got during record data after all target record data again one by one to each target record Data are encrypted, and concrete mode can be determined on a case-by-case basis, and not limit herein.
S103, each encryption information is sent to reception system, so that the reception system is receiving described add The encryption information is decrypted during confidential information to obtain the target record data, and the target record data are split To the record data.
Specifically, after encryption information being sent into reception system, encryption information is decrypted one by one for reception system, obtains Target record data, then target record data are split, obtain final each record data.
As can be seen here, the method for a kind of data processing provided in an embodiment of the present invention, by the record data of every predetermined number Merge for a target record data, to being sent after each target record data encryption to reception system.By originally right one by one Each record data, which carries out handling transmission, to be improved to merge multiple record datas, then to the data after merging at Haircut is sent, therefore reduces the quantity of encryption data, decreases the quantity of transmission, this improves gathered data is handled Efficiency, meanwhile, retransmited after target record data are encrypted after merging and also ensure that gathered data in transmitting procedure Security.
The embodiment of the present invention provides a kind of specific data processing method, is different from above-described embodiment embodiment of the present invention pair S102 has done further restriction and explanation in above-described embodiment, and other step contents are roughly the same with above-described embodiment, specifically Above-described embodiment is may be referred to, here is omitted.
Referring to Fig. 2, the S102, specifically include:
S201, each target record data are encrypted using symmetric key to obtain each target record number According to encrypted cipher text.
Specifically, each target record data are encrypted by acquisition system generation symmetric key, are obtained corresponding Encrypted cipher text.It should be noted that for that can be all targets for the symmetric key to each target record data encryption Record data all uses same symmetric key, i.e., is encrypting previous existence into a symmetric key for first aim record data Afterwards, the target record data that each follow-up needs are encrypted are encrypted using this symmetric key.
S202, the symmetric key is encrypted to obtain encryption key using the first public key of the reception system;Its Described in encryption information include the encrypted cipher text and the encryption key;So that the reception system utilizes the reception system The first private key decrypt the encryption key and obtain the symmetric key, obtained using encrypted cipher text described in the symmetric key decryption To the target record data.
Specifically, using symmetric key to target record data encryption after, unsymmetrical key can also be utilized to symmetrical close Key is encrypted, i.e., obtains encryption key using the first public key encryption symmetric key of reception system.For unsymmetrical key, often The secondary symmetric key encryption for target record data all uses same unsymmetrical key.Reception system receive encryption key and After encrypted cipher text, symmetric key is obtained first with the private key decryption encryption key of oneself, is encrypted using symmetric key decryption close Text obtains the plaintext of target record data.
Also there is the potential safety hazard being tampered in target record data, cause to count in order to avoid being tampered during transmission According to it is unreliable, the embodiment of the present invention provides a kind of specific data processing method, based on above-described embodiment, the embodiment of the present invention A kind of specific data processing method provided, before S102, in addition to:
Each target record data are signed to obtain each target using the second private key of acquisition system The signature value of record data, and the signature value is added to the encryption information, so as to be adopted described in reception system utilization Each whether the target record data are tampered second public key verifications of collecting system.
Specifically, before encrypted cipher text is sent, signature processing can also be carried out to target record data, it is true using signature Whether the target record data received surely are tampered in transmitting procedure.Using the private key of acquisition system to each target Record data carries out signature processing, then signature value is equally also added in encryption information, it is necessary to which what is illustrated is encryption information Can be a set, wherein, the signature value of each target record data, encrypted cipher text, encryption key use special separator Segmentation.Encryption information is sent to reception system, it is right after plaintext that target record data are decrypted to obtain after reception system Target record data carry out signature verification, because target record data are signed using the private key of acquisition system, therefore Reception system will obtain the public key of acquisition system to be verified first, if the verification passes, then prove that target record data do not have Have and be tampered in transmitting procedure, can both be split, and be split as record data, if checking is not by that can abandon This target record data, then makes acquisition system resurvey record data, is retransmited by above-mentioned steps operation to reception System, until being verified.
The embodiment of the present invention provides a kind of specific data processing method, is different from above-described embodiment embodiment of the present invention pair S103 has done further restriction and explanation in above-described embodiment, and other step contents are roughly the same with above-described embodiment, specifically Above-described embodiment is may be referred to, here is omitted.Specifically, S103 is specifically included:
Each encryption information is added to goal set, and the goal set is sent to reception system, so that Every encryption information in the goal set is decrypted when receiving the goal set for the reception system Multiple target record data are obtained, and each target record data are split to obtain and remembered with each target Record the record data of the preset value quantity corresponding to data.
In this programme, each encryption information is added to a goal set, then sends object set to reception system Close, realize the submission request of data for disposably sending all encryption information, i.e. batch, total the step of handling is reduced, so as to reduce Total processing time, improve treatment effeciency.
Below to another data processing method provided in an embodiment of the present invention, for alloing reception system to improve processing The efficiency of gathered data, it is cross-referenced with a kind of data processing method of above-described embodiment description.
Referring to Fig. 3, a kind of data processing method of this method embodiment offer, specifically include:
S301, receive the encryption information sent by acquisition system.
Specifically, collection system when reception system receives the encryption information, wherein encryption information sent by acquisition system first The relevant information that system is encrypted to obtain to target record data, target record data are multiple notes that acquisition system will collect Record data merge to obtain target record data.
S302, the encryption information is decrypted to obtain target record data.
Related content in encryption information is decrypted to obtain target record data, now target record data are still closed Result after and, it is also necessary to which final record data can just be obtained by being split.
S303, split the target record data and obtain the record data of preset value quantity;Wherein described encryption information is The encryption information that acquisition system is encrypted to obtain to target record data;The target record data are that the acquisition system exists When the quantity of record data reaches preset value, the record data in all record datas per preset value quantity is merged Obtained target record data.
Specifically, reception system, to splitting in plain text, is recorded after decryption obtains the plaintext of target record data Data, because acquisition system is that the record data of every predetermined number is merged into a target record data, therefore receive system For system when splitting, each target record data can also split out the record data of predetermined number.
As can be seen here, a kind of data processing method provided in an embodiment of the present invention, adding for acquisition system transmission is being received After confidential information, decrypt each encryption information and can be obtained by a target record data, and in a target record data Including multiple record datas, therefore carry out once decryption and can obtain multiple data.As can be seen here, in the certain feelings of total amount of data Under condition, by the way of single treatment data scale is increased, number of processes is reduced, so as to reduce total processing time.
The embodiment of the present invention provides a kind of specific data processing method, is different from above-described embodiment, the embodiment of the present invention Further restriction and explanation are done to S302 in above-described embodiment, other step contents are roughly the same with above-described embodiment, tool Body may be referred to above-described embodiment, and here is omitted.
With reference to figure 4, S302 is specifically included:
S401, the encryption key in the encryption information is decrypted to obtain symmetrically using the first private key of reception system Key;Wherein, the encryption key is that the acquisition system utilizes the first public key of the reception system to the symmetric key Obtained encryption key is encrypted.
S402, the encrypted cipher text in the encryption information is decrypted using the symmetric key to obtain target record number According to;Wherein, the encrypted cipher text is that the acquisition system is carried out using the symmetric key to each target record data Encrypt the encrypted cipher text of obtained each target record data.
Specifically, in order to ensure the security of data, acquisition system can be that target record data are encrypted, and add Close mode can be that target record is encrypted using symmetric key to obtain encrypted cipher text, then be added using unsymmetrical key This close symmetric key, can utilize reception system public key symmetric key is encrypted, obtain one encryption it is symmetrical close Key, i.e. encryption key, then encrypted cipher text and encryption key are all added in encryption information, are sent to reception system.Therefore, Reception system is decrypted and can obtained using the encryption key in the private key pair encryption information of oneself after encryption information is received To symmetric key, the plaintext for the target record data that can be arrived followed by symmetric key decryption encrypted cipher text.
The potential safety hazard that is tampered during data transfer also be present, in order to avoid be tampered cause data can not Lean on, the embodiment of the present invention provides a kind of specific data processing method, based on above-described embodiment, provided in an embodiment of the present invention one The specific data processing method of kind, before S303, in addition to:
The signature value of each target record data is determined in the encryption information, utilizes the of the acquisition system Two public keys perform verification operation to each target data record data, judge whether the target record data are tampered, If so, then abandoning the target record data being tampered, obtained if it is not, then continuing executing with the fractionation target record data To preset value quantity record data the step of;Wherein, the signature value is that the acquisition system utilizes the acquisition system The signature value for each target record data that second private key is signed to obtain to each target record data.
Specifically, reception system is verified using the public key of acquisition system to target record data and signature value, such as Fruit is proved to be successful, then splits target record data and obtain record data, if it fails, then abandoning this transmission data, adopts again Collection.
The embodiment of the present invention provides a kind of specific data processing method, is different from above-described embodiment, the embodiment of the present invention Further restriction and explanation are done to S301 in above-described embodiment, other step contents are roughly the same with above-described embodiment, tool Body may be referred to above-described embodiment, and here is omitted.
Specifically, the S301, including:
Receive the goal set for including multiple encryption information sent by acquisition system;
It is then described that the encryption information is decrypted to obtain target record data;The target record data are split to obtain The record data of preset value quantity, including:
Each encryption information is decrypted to obtain multiple target record data;
Split each target record data and obtain preset value quantity corresponding with each target record data Record data.
In this programme, it is reduced to reduce the number of data transfer, multiple encryption information can be stored in one by acquisition system In individual goal set, then send a goal set and just have sent multiple encryption information.Only connect for reception system can Multiple encryption information can be got by receiving a goal set, and then each encryption information is handled to obtain final entry number According to.
A kind of specific data processing method provided in an embodiment of the present invention is introduced below, one kind described below Data processing method can be cross-referenced with any one above-mentioned data processing method.
Referring to Fig. 5, Fig. 6, a kind of data processing method provided in an embodiment of the present invention specifically includes:
Illustrated below by taking a kind of application scenarios as an example.If acquisition system has 10000 records to need to be transferred to certain One reception system is as follows in the data processing step of acquisition system with reference to figure 5, acquisition system (part) flow chart of data processing figure:
First, record is divided into 1000 parts, every part includes 10 records, and every 10 records are spliced with " | | " for decollator Into 1 clear data;
S501, generate symmetric key;
A list (List) is initialized before S502 and S503 is performed, to store encrypted cipher text and encryption key;
S502, the symmetric key in step S501 is encrypted using the public key of receiving point, generates encryption key;
S503, clear data is encrypted using the symmetric key in step S501, generates encrypted cipher text;
Data in S502, S503 are converted into json strings, and added it in above-mentioned list (List);
Remaining in traversal of lists 999 records in plain text, the operation of repeat step S502, S503;
Finally, information in list is sent to receiving point.
So far, the work of acquisition system is completed.
The processing step of reception system is described below, referring to Fig. 6, reception system (part) flow chart of data processing figure.
S601, reception system are taken out a data in list, are decrypted using the private key encryption key of reception system, Obtain symmetric key;
S602, ciphertext is decrypted using the symmetric key obtained in S601, obtains a clear data;
S603, the clear data in S602 is split according to " | | ", obtains 10 record datas;
Remaining 999 data in traversal of lists, repeat S602, S603 operation.
So, 10000 all record datas have just been obtained.
A kind of data handling system provided in an embodiment of the present invention is introduced below, at a kind of data described below Reason system can be with cross-referenced with a kind of above-described data processing method.
With reference to figure 7, a kind of data handling system provided in an embodiment of the present invention, specifically include:
Acquisition system 701,, will be all when the quantity of the record data reaches preset value for obtaining record data In the record data target record data are merged into per the record data of preset value quantity;To each target Record data is encrypted to obtain encryption information corresponding with each target record data;Will each encryption information hair Deliver to reception system;
Reception system 702, for receiving the encryption information;The encryption information is decrypted to obtain target record number According to;Split the target record data and obtain the record data of preset value quantity.
The embodiment of the present invention provides a kind of specific data handling system, is different from above-described embodiment embodiment of the present invention and carries A kind of data handling system supplied, is specifically used for, and receives the target for including multiple encryption information sent by acquisition system Set;Each encryption information is decrypted to obtain multiple target record data;Split each target record data Obtain the record data of preset value quantity corresponding with each target record data.
Each embodiment is described by the way of progressive in this specification, what each embodiment stressed be and other The difference of embodiment, between each embodiment identical similar portion mutually referring to.
The foregoing description of the disclosed embodiments, professional and technical personnel in the field are enable to realize or using the present invention. A variety of modifications to these embodiments will be apparent for those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, it is of the invention The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one The most wide scope caused.

Claims (10)

  1. A kind of 1. data processing method, it is characterised in that including:
    Record data is obtained, when the quantity of the record data reaches preset value, will often be preset in all record datas The record data of value quantity merges into a target record data;
    Each target record data are encrypted to obtain encryption information corresponding with each target record data;
    Each encryption information is sent to reception system, so that the reception system is when receiving the encryption information pair The encryption information is decrypted to obtain the target record data, and the target record data are split to obtain the record Data.
  2. 2. according to the method for claim 1, it is characterised in that described that each target record data are encrypted To encryption information corresponding with each target record data, including:
    Each target record data are encrypted using symmetric key to obtain the encryption of each target record data Ciphertext;
    The symmetric key is encrypted to obtain encryption key using the first public key of the reception system;Wherein described encryption Information includes the encrypted cipher text and the encryption key;So that the reception system utilizes the first private key of the reception system Decrypt the encryption key and obtain the symmetric key, the target is obtained using encrypted cipher text described in the symmetric key decryption Record data.
  3. 3. according to the method for claim 1, it is characterised in that described to utilize symmetric key to each target record number According to before being encrypted to obtain the encrypted cipher text of each target record data, in addition to:
    Each target record data are signed to obtain each target record using the second private key of acquisition system The signature value of data, and the signature value is added to the encryption information, so that the reception system is using the collection Each whether the target record data are tampered second public key verifications of system.
  4. 4. method as claimed in any of claims 1 to 3, it is characterised in that send each encryption information To reception system, including:
    Each encryption information is added to goal set, and the goal set is sent to reception system, so that described Reception system is decrypted to obtain when receiving the goal set to every encryption information in the goal set Multiple target record data, and each target record data are split to obtain and each target record number According to the record data of the corresponding preset value quantity.
  5. A kind of 5. data processing method, it is characterised in that including:
    Receive the encryption information sent by acquisition system;
    The encryption information is decrypted to obtain target record data;
    Split the target record data and obtain the record data of preset value quantity;Wherein described encryption information is acquisition system pair Obtained encryption information is encrypted in target record data;The target record data are the acquisition system in record data When quantity reaches preset value, obtained target will be merged per the record data of preset value quantity in all record datas Record data.
  6. 6. according to the method for claim 5, it is characterised in that described that the encryption information is decrypted to obtain target note Data are recorded, including:
    The encryption key in the encryption information is decrypted to obtain symmetric key using the first private key of reception system;Its In, the encryption key is that the symmetric key is encrypted using the first public key of the reception system for the acquisition system Obtained encryption key;
    The encrypted cipher text in the encryption information is decrypted using the symmetric key to obtain target record data;Wherein, The encrypted cipher text is that the acquisition system is encrypted to obtain using the symmetric key to each target record data Each target record data encrypted cipher text.
  7. 7. according to the method for claim 6, it is characterised in that the fractionation target record data obtain preset value number Before the record data of amount, in addition to:
    The signature value of each target record data is determined in the encryption information, it is public using the second of the acquisition system Key performs verification operation to each target data record data, judges whether the target record data are tampered, if so, Then abandon the target record data being tampered, if it is not, then continue executing with it is described split the target record data obtain it is pre- If the step of being worth the record data of quantity;Wherein, the signature value is that the acquisition system utilizes the second of the acquisition system The signature value for each target record data that private key is signed to obtain to each target record data.
  8. 8. according to the method described in claim 5 to 7 any one, it is characterised in that described to receive what is sent by acquisition system Encryption information, including:
    Receive the goal set for including multiple encryption information sent by acquisition system;
    It is then described that the encryption information is decrypted to obtain target record data;The target record data are split to be preset It is worth the record data of quantity, including:
    Each encryption information is decrypted to obtain multiple target record data;
    Split each target record data and obtain the record of preset value quantity corresponding with each target record data Data.
  9. A kind of 9. data handling system, it is characterised in that including:
    Acquisition system, for obtaining record data, when the quantity of the record data reaches preset value, by all records In data a target record data are merged into per the record data of preset value quantity;To each target record data It is encrypted to obtain encryption information corresponding with each target record data;Each encryption information is sent to reception System;
    Reception system, for receiving the encryption information;The encryption information is decrypted to obtain target record data;Split The target record data obtain the record data of preset value quantity.
  10. 10. data handling system according to claim 9, it is characterised in that the reception system is specifically used for, receive by The goal set for including multiple encryption information that acquisition system is sent;Each encryption information is decrypted to obtain more Individual target record data;Split each target record data and obtain preset value corresponding with each target record data The record data of quantity.
CN201711259818.5A 2017-12-04 2017-12-04 A kind of data processing method and system Pending CN107896222A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711259818.5A CN107896222A (en) 2017-12-04 2017-12-04 A kind of data processing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711259818.5A CN107896222A (en) 2017-12-04 2017-12-04 A kind of data processing method and system

Publications (1)

Publication Number Publication Date
CN107896222A true CN107896222A (en) 2018-04-10

Family

ID=61806902

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711259818.5A Pending CN107896222A (en) 2017-12-04 2017-12-04 A kind of data processing method and system

Country Status (1)

Country Link
CN (1) CN107896222A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109379380A (en) * 2018-12-06 2019-02-22 联想图像(天津)科技有限公司 Data transmission method, data receiver method and remote printing system, mobile terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103139222A (en) * 2013-03-19 2013-06-05 成都卫士通信息产业股份有限公司 Internet protocol security (IPSEC) tunnel data transmission method and device thereof
CN104503869A (en) * 2015-01-15 2015-04-08 宇龙计算机通信科技(深圳)有限公司 Data processing method and data processing system
CN104821944A (en) * 2015-04-28 2015-08-05 广东小天才科技有限公司 Hybrid encrypted network data security method and system
CN105069541A (en) * 2015-09-18 2015-11-18 南京信息工程大学 Short-term weather subjective analysis system for mobile terminals

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103139222A (en) * 2013-03-19 2013-06-05 成都卫士通信息产业股份有限公司 Internet protocol security (IPSEC) tunnel data transmission method and device thereof
CN104503869A (en) * 2015-01-15 2015-04-08 宇龙计算机通信科技(深圳)有限公司 Data processing method and data processing system
CN104821944A (en) * 2015-04-28 2015-08-05 广东小天才科技有限公司 Hybrid encrypted network data security method and system
CN105069541A (en) * 2015-09-18 2015-11-18 南京信息工程大学 Short-term weather subjective analysis system for mobile terminals

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109379380A (en) * 2018-12-06 2019-02-22 联想图像(天津)科技有限公司 Data transmission method, data receiver method and remote printing system, mobile terminal

Similar Documents

Publication Publication Date Title
EP3257227B1 (en) Confidential communication management
EP2290872B1 (en) Device for generating a message authentication code for authenticating a message
EP3289723B1 (en) Encryption system, encryption key wallet and method
CN102780698A (en) User terminal safety communication method in platform of Internet of Things
CN107896223A (en) A kind of data processing method and system, data collecting system and data receiving system
CN103338215A (en) Method for establishing TLS (Transport Layer Security) channel based on state secret algorithm
CN105162599B (en) A kind of data transmission system and its transmission method
WO2009143749A1 (en) Data encryption and decryption method, device and communications system
CN106357690B (en) data transmission method, data sending device and data receiving device
CN103634114B (en) The verification method and system of intelligent code key
CN104144413A (en) Approval method and system based on mobile terminal
CN108347419A (en) Data transmission method and device
CN106941404A (en) Cryptographic key protection method and device
CN104243494A (en) Data processing method
Huang et al. A secure communication over wireless environments by using a data connection core
US20180191495A1 (en) Accelerated encryption and decryption of files with shared secret and method therefor
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN110891061B (en) Data encryption and decryption method and device, storage medium and encrypted file
CN107276996A (en) The transmission method and system of a kind of journal file
CN107896222A (en) A kind of data processing method and system
WO2019100217A1 (en) Biometric information transmission establishing method , device, system, and storage medium
CN109005027A (en) A kind of random data encryption and decryption method, apparatus and system
CN102223229A (en) Method for safe transmission of data in public network
CN106411964A (en) Traceable and encrypted data transmission method and device
CN103312671A (en) Method and system for verifying server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180410

RJ01 Rejection of invention patent application after publication