CN110149311A - Data processing method, device, server and readable storage medium storing program for executing - Google Patents
Data processing method, device, server and readable storage medium storing program for executing Download PDFInfo
- Publication number
- CN110149311A CN110149311A CN201910281419.1A CN201910281419A CN110149311A CN 110149311 A CN110149311 A CN 110149311A CN 201910281419 A CN201910281419 A CN 201910281419A CN 110149311 A CN110149311 A CN 110149311A
- Authority
- CN
- China
- Prior art keywords
- data
- client
- algorithm
- whitepack
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/34—Encoding or coding, e.g. Huffman coding or error correction
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of data processing method, device, server and readable storage medium storing program for executing, this method comprises: generating the first client whitepack algorithm, save target random number corresponding with target matrix, wherein, first client whitepack algorithm includes pre-arranged code and internal at least two tables of data obscured of process, wherein, target matrix is the tables of data being disposed adjacent at least two tables of data with pre-arranged code;Request of data is received, request of data includes client id information;According to client id information, target matrix and target random number, generates outside and obscure coding;Pre-arranged code in first client whitepack algorithm is replaced with into outside and obscures coding, obscures the second client whitepack algorithm for having client id information to generate;In response to request of data, the second client whitepack algorithm is sent.Present invention saves generate the time of client whitepack algorithm, reduce response time and signaling overheads of the server to request of data.
Description
Technical field
The present invention relates to Internet technical field, more particularly to a kind of data processing method, device, server and readable
Storage medium.
Background technique
Currently, needing data to be encrypted and decrypted processing in order to ensure the safe handling of data.
Server can be to terminal discharge device key, in order to which terminal encrypts data using the device keys
Or decryption oprerations.And due to terminal usage scenario and the particularity of open source operating system, terminal side is stored in plaintext version
Key in the prevalence of security risk, for this purpose, being provided in the related technology by key and encryption or decryption algorithms with whitepack
Form distributes the scheme of key, and key is avoided to deposit brought safety problem in the bright of terminal side.
In the related art, server is when distributing whitepack to terminal, in order to ensure need will be white for the safe handling of whitepack
Box and terminal are bound, i.e., each terminal may only use the encryption or decryption oprerations of the whitepack progress data bound therewith.Specifically
For, terminal needs to send the identification information of terminal to server when requesting whitepack to server, and should by server by utilizing
Identification information generates whitepack in real time, and distributes the whitepack to the terminal of request.And a whitepack will include many lookups
Table, for example, at least look-up table of 700K size, if that each terminal requests whitepack, server all goes to generate in real time
Whitepack, it will cause the expense of server excessive, and terminal side is requesting wait-for-response time when whitepack also longer, therefore eventually
The efficiency that end side obtains whitepack is relatively low.
Summary of the invention
The present invention provides a kind of data processing method, device, server and readable storage medium storing program for executing, to solve the relevant technologies
Existing server overhead is excessive when the whitepack that middle server is bound to terminal side distribution with terminal, the terminal wait-for-response time
Too long problem.
To solve the above-mentioned problems, according to the first aspect of the invention, it the invention discloses a kind of data processing method, answers
For server, which comprises
The first client whitepack algorithm is generated, saves target random number corresponding with target matrix, wherein described first
Client whitepack algorithm includes pre-arranged code and internal at least two tables of data obscured of process, wherein the target matrix
For the tables of data being disposed adjacent at least two tables of data with the pre-arranged code;
The method also includes:
Request of data is received, the request of data includes client id information;
According to the client id information, the target matrix and the target random number, generates outside and obscure coding;
The pre-arranged code in the first client whitepack algorithm is replaced with into the outside and obscures coding, to generate
Obscure the second client whitepack algorithm for having the client id information;
In response to the request of data, the second client whitepack algorithm is sent.
According to the second aspect of the invention, the invention discloses a kind of data processing equipments, are applied to server, the dress
It sets and includes:
First generation module, for generating the first client whitepack algorithm, save corresponding with target matrix target with
Machine number, wherein the first client whitepack algorithm includes pre-arranged code and by internal at least two tables of data obscured,
In, the target matrix is the tables of data being disposed adjacent at least two tables of data with the pre-arranged code;
Receiving module is requested for receiving data, and the request of data includes client id information;
Second generation module is used for according to the client id information, the target matrix and the target random number,
It generates outside and obscures coding;
Replacement module is mixed for the pre-arranged code in the first client whitepack algorithm to be replaced with the outside
Confuse coding, obscures the second client whitepack algorithm for having the client id information to generate;
Respond module, for sending the second client whitepack algorithm in response to the request of data.
According to the third aspect of the invention we, the invention discloses a kind of servers, comprising: memory, processor and storage
On the memory and the data processor that can run on the processor, the data processor is by the processing
It realizes when device executes such as the step of the above-mentioned data processing method applied to server.
According to the fourth aspect of the invention, the invention discloses a kind of computer readable storage mediums, and the computer can
It reads to be stored with data processor on storage medium, realizes when the data processor is executed by processor and be applied to as above-mentioned
The step of data processing method of server.
Compared with prior art, the present invention includes the following advantages:
By means of the technical solution of the above embodiment of the present invention, the embodiment of the present invention is by receiving being used for for client
Before the request of data for requesting whitepack algorithm, at least two tables of data for including pre-arranged code and obscuring by inside are generated
First client whitepack algorithm, and save target random number corresponding with target matrix, wherein the target matrix is institute
State the tables of data being disposed adjacent at least two tables of data with the pre-arranged code, the request of data waiting for receiving client it
Afterwards, client id information, the target matrix in the first client whitepack algorithm and the target data are recycled
The corresponding target random number of table obscures coding to generate outside, finally, the pre-arranged code in the first client whitepack algorithm is replaced
It is changed to outside this and obscures coding, the whitepack algorithm part obscured outside not needing to carry out is enabled to receive client id letter
Breath comes to complete, and saves the time for generating the second client whitepack algorithm, had both realized client id and the second client
The binding of whitepack algorithm, and signaling overheads of server side when in response to the request of data is significantly reduced, it further decreases
Response time of the client-side to the request of data.
Detailed description of the invention
Fig. 1 is a kind of step flow chart of data processing method embodiment of the invention;
Fig. 2 is the step flow chart of another data processing method embodiment of the invention;
Fig. 3 is a kind of schematic diagram of client whitepack algorithm of the embodiment of the present invention;
Fig. 4 is the schematic diagram of another client whitepack algorithm of the embodiment of the present invention;
Fig. 5 is the step flow chart of another data processing method embodiment of the invention;
Fig. 6 is a kind of structural block diagram of data processing equipment embodiment of the invention;
Fig. 7 is the structural block diagram of another data processing equipment embodiment of the invention.
Specific embodiment
In order to make the foregoing objectives, features and advantages of the present invention clearer and more comprehensible, with reference to the accompanying drawing and specific real
Applying mode, the present invention is described in further detail.
In order to save the time that server generates the whitepack bound with client, the present invention provides a kind of data processing sides
Method, it is intended to the step of generating whitepack is divided into two steps, and the first step is to pre-generate a part of whitepack not with client binding,
Second step generates another part whitepack bound with client in real time.In this manner it is possible to which the whitepack at customer in response end generates
Before request, with regard to completing the generation of part whitepack, is receiving whitepack generation request and then going generation and client in real time
Another part whitepack of binding is held, and another part whitepack is combined with the part whitepack pre-generated, to obtain and client
Hold the whitepack algorithm of binding.The data processing method of the embodiment of the present invention is described in detail with reference to the accompanying drawing.
Referring to Fig.1, a kind of step flow chart of data processing method embodiment of the invention is shown, service is applied to
Device, this method can specifically include following steps:
Step 100, the first client whitepack algorithm is generated, target random number corresponding with target matrix is saved;
Wherein, the first client whitepack algorithm includes pre-arranged code and internal at least two data obscured of process
Table, wherein the target matrix is the tables of data being disposed adjacent at least two tables of data with the pre-arranged code;
In embodiments of the present invention, step 100 is first carried out before receiving the request of data of client in server
A part of whitepack (the first client whitepack algorithm i.e. here) not with client binding is generated.
Step 101, request of data is received, the request of data includes client id information;
Wherein, server can receive the request of data of client, which can request for whitepack.
Client can be to the key of encryption or the decryption of server request data, to be encrypted or be decrypted to data
Operation, and in order to avoid key deposits caused problem of data safety in the bright of client-side, server when distributing key, with
The mode of whitepack distributes key and encryption or decryption algorithms, so that complete key and algorithm do not go out in clear text manner
It is existing, but obscure in multiple tables, client can carry out the encryption or decryption oprerations of data by way of tabling look-up.And it is
Ensure the binding of whitepack and client, i.e., only the client with the client id just can be used the whitepack, client
The request of data sent to server may include client id information.
Optionally, when executing the step of the generation the first client whitepack algorithm in step 100, referring to Fig. 2, root
It can be realized by step 201~step 203 according to the method for the embodiment of the present invention, and execute the guarantor in step 100
When depositing the step of target random number corresponding with target matrix, then it can be realized by step 204~step 205:
Step 201, it according to preset-key, default Processing Algorithm, random number, generates by internal at least two numbers obscured
According to table;
Specifically, needing due to generating whitepack using random number, to obscure key and algorithm, therefore can give birth to
Random matrix is generated at random number, and using random number;According to preset-key, default Processing Algorithm, the random matrix, next life
At by the internal whitepack table (the whitepack table includes at least two tables of data) obscured, the whitepack table is via no any rule
Random mix avoids key from being cracked.Wherein, any one tables of data all have passed through internal mix when generating in whitepack table
Confuse, therefore, each tables of data in whitepack table corresponds to one group of random number.
Wherein, which can be any one symmetry algorithm, such as AES (Advanced Encryption
Standard, Advanced Encryption Standard), DES (Data Encryption Standard, data encryption standards) etc..
In addition, then generated using Encryption Algorithm and to be obscured by inside when the request of data is request encryption whitepack
Whitepack table;When the request of data is request decryption whitepack, then the whitepack table obscured by inside is generated using decipherment algorithm.
In one example, Fig. 3 shows the table structure of the first client whitepack algorithm of generation of the embodiment of the present invention.Such as
Shown in Fig. 3, the first client whitepack algorithm includes pre-arranged code (Table A and table B) and the warp that is distributed between Table A and table B
Cross the internal multiple tables of data obscured (including each tables of data unlisted in 1~table of table 8 shown in figure and figure).
Step 202, according to unit matrix, pre-arranged code is generated;
Wherein, in order to utilize the client id information received based on the first client whitepack algorithm, have to generate
The second client whitepack algorithm that outside is obscured, when generating the first client whitepack algorithm, can also according to unit matrix come
Generate pre-arranged code.In other words, it can use unit matrix to generate one or two tables of data, the two tables of data are being schemed
Table A and table B are corresponded respectively in 3.The purpose for generating Table A and table B is, in pre-generated part whitepack shown in Fig. 3,
For another part whitepack reserved location generated in real time.Table A and the position where table B are the reserved location of another part whitepack,
Namely another part whitepack (obscuring coding in outside i.e. described hereinafter) generated in real time institute in the second client whitepack algorithm
Position.
Wherein, generated using unit matrix in the principle and traditional whitepack encryption and decryption technology of the method for tables of data using with
Machine matrix is similar come the principle for generating the method for the tables of data obscured without outside, and which is not described herein again.In addition, here for giving birth to
Order at the unit matrix of pre-arranged code is identical as generating the external order of random matrix for obscuring coding.
It should be noted that in the present embodiment by taking unit matrix as an example, to illustrate the generating mode of pre-arranged code, and at it
In his embodiment, the present invention is not restricted to unit matrix for the matrix-type for generating pre-arranged code, can also be benefit
Any one random matrix caused by random number.Because the purpose for generating pre-arranged code is pre- Mr. shown in Fig. 3
At part whitepack in, for another part whitepack (i.e. external the obscure coding) reserved location generated in real time, whether which kind of square
Battle array pre-arranged code generated will all be obscured coding by outside and replace, and therefore, the present invention is for generating the square of the pre-arranged code
The type of battle array is with no restrictions.Pre-arranged code is generated used here as unit matrix to be advantageous in that without generating random matrix, is subtracted
Few operating procedure, promotes the response speed of server.
Wherein, the present invention for step 201 and step 202 execution sequence with no restrictions.
Step 203, the pre-arranged code is disposed adjacent at least two tables of data, generates the first client whitepack
Algorithm;
As shown in figure 3, Table A and table B can be separately positioned on to the two sides for the whitepack table obscured by inside, so that Table A
It is disposed adjacent with 1~table of table 4, table B is disposed adjacent with 5~table of table 8, wherein table shown in Fig. 3, i.e. the first client whitepack
One complete look-up table of Algorithm constitution.In this example, as shown in figure 3, one for input data of Table A and the whitepack table
Side is disposed adjacent, and table B is disposed adjacent with the side for output data of the whitepack table.
Step 204, target matrix adjacent with the pre-arranged code at least two tables of data is identified;
As shown in figure 3, the target matrix adjacent with Table A (including table 1, table 2, table 3 and table 4) can be recognized, with table B
The target matrix (including table 5, table 6, table 7 and table 8) being disposed adjacent.
Step 205, target random number used when generating the target matrix is recorded.
Wherein it is possible to which the target random number (that is, 8 groups of random numbers) used respectively when by generation 1~table 8 of table is recorded in number
According in library, also, this 8 groups of random numbers respectively correspond above-mentioned 8 target matrixes.
Further, since the second client whitepack algorithm may include an outside obscure part or two outsides obscure portion
Point, therefore, in the example depicted in fig. 3, shows and be used to form Table A and table B that part is obscured in subsequent two outsides;Work as use
Client id information only generates an outside when obscuring part, then may include in the first pre-generated client whitepack algorithm
Table A or table B, rather than the two includes, specifically the principle of the second client whitepack algorithm of generation is similar, outer with two herein
Portion obscure part come for example, it should be appreciated to those skilled in the art that an outside obscure the implementation principle of part with
The implementation principle that part is obscured in two outsides be it is similar, therefore, no longer repeat one by one herein.
In this way, the server of the embodiment of the present invention before receiving the request of data of client, has just pre-generated warp
The internal whitepack table (including at least two tables of data) obscured is crossed, at least side in the two sides of whitepack table is provided with using single
The pre-arranged code that bit matrix generates, Lai Shengcheng obscure without outside, and only internal the first client whitepack algorithm obscured;
And the target matrix adjacent with pre-arranged code used target random number when generating is stored in advance;So receiving
After the request of data of client, it is only necessary to utilize client id and target matrix and target random number, so that it may in real time
Generation obscure and there is the outside of client id to obscure coding, so that pre-arranged code, which is replaced with outside, obscures coding, generate second
Client whitepack algorithm, realizes the binding of client whitepack and client id, and saves a large amount of time for generating whitepack,
Client can be responded faster, the second client whitepack algorithm of return to client, and reduce server in sound
Answer the expense when request of data of client.
It optionally, according to the method for the embodiment of the present invention can also include: head before step 101 and step 201
First, the data ID of server storing data is obtained;Then, according to pre-set data ID and key, Processing Algorithm
Corresponding relationship, obtain with the matched preset-key of the data ID and default Processing Algorithm.
Specifically, the method for the embodiment of the present invention can be to be stored in each data of server side key is respectively configured
And Processing Algorithm (including encryption or decryption algorithms).
Wherein, the type for the data that the present invention stores server side with no restrictions, such as video data, audio number
According to, document data etc..The data are the data that server can be distributed to client, and client-side can be to received from server
The data carry out encryption or decryption process.Certainly under majority scene, the data that server is issued to client are data ciphertext,
The second client whitepack algorithm that client-side then needs to be issued using the server of the method for the embodiment of the present invention, carrys out logarithm
It is decrypted according to ciphertext.
It being illustrated by taking video data as an example, server side can be key, the Processing Algorithm of each video distribution fixation,
So that some video may only be encrypted or be solved using the whitepack algorithm that the key and algorithm for corresponding to the video generate
Close processing.
After the video data storage of server side is completed, the method for the embodiment of the present invention can be for each video ID
Corresponding key and Processing Algorithm are set, thus generate pre-set video ID and key, Processing Algorithm it is corresponding
Relationship.Such as video 1 corresponds to key 1 and AES encryption algorithm;Video 2 corresponds to key 2 and DES decipherment algorithm.
So in pre-generated first client whitepack algorithm, the method for the embodiment of the present invention can be closed according to the correspondence
System, to obtain the corresponding key of each video ID and Processing Algorithm.
So when executing step 201, then according to random number and the matched preset-key of the data ID and it can preset
Processing Algorithm generates corresponding with the data ID by internal at least two tables of data obscured.
Here, when generating video 1 by internal at least two tables of data obscured, then random using what is generated at random
Number, and key 1 corresponding with video 1 and AES encryption algorithm generate at least two tables of data obscured by inside.To view
Frequently 2 when generating by internal at least two tables of data obscured, then uses the random number generated at random and corresponding with video 2
Key 1 and DES decipherment algorithm generate by least two tables of data obscured of inside.
Wherein, different based on used algorithm when generating whitepack table, the second client whitepack ultimately generated can be made
The purposes of algorithm is different, such as corresponding to the second client whitepack algorithm 2 generated of video 1, special for having the client
The video data that video ID is video 1 is encrypted in the client for holding ID;For another example, correspond to video 2 generated the
Two client whitepack algorithms 2, it is special for having the client of the client id, to the video data that video ID is video 2 into
Row decryption processing.
In addition, after step 203, can also include: according to the method for the embodiment of the present invention generate the data ID with
Corresponding relationship between the first client whitepack algorithm.
Wherein, since each video of server side storage is corresponding with respective key and algorithm, pre- Mr.
At the first client whitepack algorithm be also required to be bound with the ID of corresponding video.Such as video 1 and the first client it is white
Box algorithm 1 is corresponding, and video 2 is corresponding with the first client whitepack algorithm 2.
In this way, the embodiment of the present invention is preset between the data ID and key, Processing Algorithm of the data of server storage
Corresponding relationship, and the corresponding key of each video ID and Processing Algorithm are obtained using the corresponding relationship, then making base
Incidence relation can be established with video ID in key and Processing Algorithm the first client whitepack algorithm generated, thus taking
Being engaged in device side can be for each stored data, pre-generated the first client whitepack algorithm mutually bound with each data.
Convenient for carrying out classification storage to the corresponding whitepack algorithm of each storing data.Realize the independent encryption to different data, solution
It is close.And the second client whitepack algorithm ultimately generated not only can mutually be bound with client id, it can also be with video ID
It mutually binds, then client may only then use and this when carrying out encryption or decryption oprerations to the data from server side
Client id binds and carries out encryption or decryption oprerations with the second client whitepack algorithm of data binding, improves data
Safety.
Step 102, it according to the client id information, the target matrix and the target random number, generates external
Obscure coding;
Wherein, the first client whitepack algorithm generated is only obscured by inside before the data request is received, also
It is not bound with client id, therefore, this step can use the institute in the client id information and the first client whitepack algorithm
Target matrix and the corresponding target random number of the target matrix are stated, obscures coding to generate outside.
Wherein, it is identical that the quantity of coding and pre-arranged code described in above-mentioned steps 202 is obscured outside this.
That is, if being provided with Table A as shown in Figure 3, needing exist for giving birth in the first client whitepack algorithm
At Table A ';If being provided with table B as shown in Figure 3, generation table B ' is needed exist for.Wherein, Table A ' and table B ' be located at
In two client whitepack algorithms before and after default Processing Algorithm (Encryption Algorithm or decipherment algorithm).
Use for the second client whitepack algorithm, is described briefly here:
Obscure if the second client whitepack algorithm shown in Fig. 4 have passed through outside, including Table A ' and table B ', number to be decrypted
According to being 7, then client can pass through Table A ' it is inverse become 6 for 7, then, client is input to the second client whitepack for 6 and calculates
Method.The inverse of second client whitepack algorithm, first with Table A ' offset Table A ' obscures operation, that is, is reduced to 7 for 6,
The whitepack table in the second client whitepack algorithm is recycled, to be decrypted to 7, generates 12;12 are mixed followed by table B '
Confuse into 15 outputs;Finally, client recycles the inverse counteracting table B's ' of table B ' to obscure operation, it is, being reduced to 12 for 15, make
The ciphertext data 12 that must be ultimately generated is to have carried out the result of decryption oprerations merely with preset-key and default decipherment algorithm.
Optionally, the first client whitepack algorithm can be white for embodiment illustrated in fig. 2 the first client generated
Box algorithm, that is, the first client whitepack algorithm include by least two tables of data obscured of inside and with it is described at least
The pre-arranged code that two tables of data are disposed adjacent.
It optionally, can be firstly, obscuring plan using default according to the client id information when executing step 102
Slightly, Obfuscating Algorithms are generated;Then, it according to the Obfuscating Algorithms, the target matrix and the target random number, generates external
Obscure coding.
Wherein, the structure of Obfuscating Algorithms can be matrix queue.
The default aliasing strategy can be acquisition cryptographic Hash, then server is obscured according to client id using default
Strategy then can carry out Hash operation to client id, obtain the cryptographic Hash of client id come when generating Obfuscating Algorithms, then,
Using the cryptographic Hash of the client id as the Obfuscating Algorithms (such as confusion matrix C1);
Alternatively, the default aliasing strategy can be using the seed of random function and generate random number, then server exists
It, then can be to using client id as random function using default aliasing strategy come when generating Obfuscating Algorithms according to client id
Seed, random number A is generated with the seed, then, (such as obscures square for the random number A of generation as the Obfuscating Algorithms
Battle array C2).
When obscuring coding outside generation, then it can use 1~table of table adjacent with Table A in the confusion matrix and Fig. 3
4, coding 1, i.e. Table A are obscured to generate outside ';And 5~table of table 8 adjacent with table B in the matrix queue and Fig. 3 is utilized,
Coding 2, i.e. table B ' are obscured to generate outside.
In this way, utilizing client when coding is obscured in outside of the embodiment of the present invention in the second client whitepack algorithm of generation
Hold id information and default aliasing strategy, Lai Shengcheng Obfuscating Algorithms (i.e. matrix queue), so that covering client in matrix queue
Hold id information;Then, number of targets adjacent with the pre-arranged code in the matrix queue and the first client whitepack algorithm is utilized
According to target random number corresponding to table and target matrix, coding is obscured to generate outside, so that volume is obscured in the outside generated
Code is mutually bound with client id, so that the second client whitepack algorithm ultimately generated is also bound with client id, so that only
Encryption or decryption that the second client whitepack algorithm carries out data just can be used in the client for possessing the client id, it is ensured that
The safety of data.
Optionally, described according to the Obfuscating Algorithms, the target matrix and the target random number in execution, it generates
When the step of coding is obscured in outside, matrix multiplication operation can be carried out to the Obfuscating Algorithms and the target matrix first;
Finally, the result and the target random number that generate by the matrix multiplication operation are made XOR operation, to generate outside
Obscure coding.
Referring to shown in Fig. 3 and Fig. 4, for example, the corresponding random number 1 of table 1, the corresponding random number 2 of table 2, the corresponding random number 3 of table 3, table 4
Confusion matrix C and table 1 then can be carried out matrix multiplication operation here by corresponding random number 4, by the result of matrix multiplication operation with
Random number 1 carries out XOR operation, generates table 1 ';Confusion matrix C and table 2 are subjected to matrix multiplication operation, by matrix multiplication operation
Result and random number 2 carry out XOR operation, generate table 2 ';Confusion matrix C and table 3 are subjected to matrix multiplication operation, by matrix
The result and random number 3 of multiplying carry out XOR operation, generate table 3 ';Confusion matrix C and table 4 are subjected to matrix multiplication fortune
It calculates, the result of matrix multiplication operation and random number 4 is subjected to XOR operation, generate table 4 ';Finally, by table 1 ', table 2 ', table 3 ' and
Table 4 ' puts in order according to table 1, table 2, table 3 and table 4, generates outside as shown in Figure 4 and obscures coding --- Table A '.For figure
The generating mode of 4 total table B ' and Table A ' generating mode it is similar, difference uses used 1~table of table 4, replace with table 5~
Table 8.
So in embodiments of the present invention, referring to the first client whitepack algorithm shown in Fig. 3, pre-arranged code (Table A and
Table B) and multiple tables of data between Table A and table B it is pre-generated;And server is asked in the data for receiving client
After asking, then Table A as shown in Figure 4 is generated in conjunction with client id ' and table B ', and by the table in the first client whitepack algorithm
A replaces with the Table A generated in real time ', table B is replaced with to the table B ' generated in real time, to generate the second client as shown in Figure 4
Whitepack algorithm, in the related technology before the data request is received without any whitepack pre-generate step, but
It receives the request of data of client and then to directly generate the second client using client id, key, Processing Algorithm white
The technical solution of box algorithm is compared, the technical solution of the embodiment of the present invention, will can obscure in advance without outside at least two
Tables of data generates, and the request of data waiting for receiving client and then generation are greatly reduced by the external partial table obscured
The generation time of client whitepack reduces expense of the server in the request of data at customer in response end, and reduces service
Response time of the device to client.
In this way, being utilized to obscure has obscuring for client id information when the embodiment of the present invention obscures coding outside generation
In algorithm and the first client whitepack algorithm the data of each target whitepack table adjacent with the position where pre-arranged code with
And random number corresponding to each target whitepack table, since the generation of coding is obscured by means of the first client whitepack algorithm in outside
In it is adjacent with pre-arranged code by the internal boundary table (i.e. above-mentioned target whitepack table) obscured so that the outside generated in this way
Obscuring coding can just combine with the first pre-generated client whitepack algorithm, and obtaining obscuring has the of client id information
Two client whitepack algorithms.
Step 103, the pre-arranged code in the first client whitepack algorithm is replaced with into the outside and obscures volume
Code obscures the second client whitepack algorithm for having the client id information to generate;
As shown in Figure 3 and Figure 4, by step 103, can by the Table A in the first client whitepack algorithm shown in Fig. 3,
Replace with Table A ', and table B shown in Fig. 3 is replaced with into table B ', thus generate it is shown in Fig. 4 obscure have client id information
Second client whitepack algorithm.
In this way, the embodiment of the present invention is using in whitepack table in client id information and the first client whitepack algorithm
Target matrix in the two sides of data input position and data output position obscures coding to generate outside, enables to give birth to
At outside obscure the data of coding and target matrix adjacent thereto and mutually merge.
Step 104, in response to the request of data, the second client whitepack algorithm is sent.
Wherein, server side can be come after generating the second client whitepack algorithm in response to the request of data of client
The second client whitepack algorithm for example, as shown in figure 4 is sent to client.So that client is to the number downloaded from server
According to the operation such as being signed, encrypted or decrypted.
By means of the technical solution of the above embodiment of the present invention, the embodiment of the present invention is by receiving being used for for client
Before the request of data for requesting whitepack algorithm, at least two tables of data for including pre-arranged code and obscuring by inside are generated
First client whitepack algorithm, and save target random number corresponding with target matrix, wherein the target matrix is institute
State the tables of data being disposed adjacent at least two tables of data with the pre-arranged code, the request of data waiting for receiving client it
Afterwards, client id information, the target matrix in the first client whitepack algorithm and the target data are recycled
The corresponding target random number of table obscures coding to generate outside, finally, the pre-arranged code in the first client whitepack algorithm is replaced
It is changed to outside this and obscures coding, the whitepack algorithm part obscured outside not needing to carry out is enabled to receive client id letter
Breath comes to complete, and saves the time for generating the second client whitepack algorithm, had both realized client id and the second client
The binding of whitepack algorithm, and signaling overheads of server side when in response to the request of data is significantly reduced, it further decreases
Response time of the client-side to the request of data.
Optionally, the request of data further includes data ID, then when executing step 103, it can be firstly, according to preparatory
Corresponding relationship between the data ID of setting and the first client whitepack algorithm obtains and ID pairs of data in the request of data
Target the first client whitepack algorithm answered;Then, by the pre-arranged code in the first client of target whitepack algorithm
It replaces with the outside and obscures coding, to generate the second client whitepack corresponding with the data ID in the data processing request
Algorithm.
Wherein, when in request of data including the data ID of to be encrypted/decryption/signature data, then server side can be with
It is next targetedly only to obtain and be somebody's turn to do according to the corresponding relationship between pre-set data ID and the first client whitepack algorithm
Corresponding the first client of the target whitepack algorithm of data ID in request of data, and by the first client of target whitepack algorithm
In the pre-arranged code replace with the outside and obscure coding, it is corresponding with the data ID in the data processing request to generate
The second client whitepack algorithm.
In this way, the server of the embodiment of the present invention can in advance for different data generate respectively it is corresponding without
The first client whitepack algorithm that outside is obscured is used to carry out encryption or decryption process to some target data to client request
Client whitepack algorithm when, recycle the client id of the client and corresponding the first client of target of the target data
Whitepack algorithm is obscured to carry out outside to target the first client whitepack algorithm, it is made to obscure the id information for having the client.
So only with the client id client, just can be used the second client whitepack algorithm come to the target data into
The operation such as row encryption/decryption/signature, it is ensured that one between encryption/decryption/signature of client, data and data is a pair of
It should be related to, improve data safety degree.
Optionally, the request of data further includes the acquisition modes of client id information, before step 102, can be sentenced
Whether the acquisition modes for the client id information of breaking are default acquisition modes;If the acquisition modes of the client id information are
Default acquisition modes, then follow the steps 102.
Wherein, for client before sending request of data to server, client can identify obtaining for client id information
Mode, such as the client id information is taken to be come by which function passes, then can not only make to count when sending request of data
According to request carry client id information, also make its carry client id information acquisition modes (such as transmit the client id letter
The function name of the function of breath).
So the acquisition modes which is legal client id, such as function 1, function can be set in server side in advance
2 is legal, other functions are not illegal.Server side can parse it after receiving the request of data of client, obtain
The acquisition modes of client id information are got, and judge whether the acquisition modes are default acquisition modes, are here discriminant function
Whether name is preset function name, if so, illustrating that the client is the client with the client id information, executes step
102, Lai Zhihang are subsequently used for generating the step of being bound to the second client whitepack algorithm of the client;On the contrary, if it is not, then saying
Client id information transmitted by the bright client may be not the practical client id information of the client, it may be possible to steal
It is derived from the id information of other clients having permission, then step 102 can not be executed in order to ensure the safety of key, or
Person generates the second client whitepack algorithm using a false key, even if then client to receive second client white
Box algorithm also can not accurately be encrypted/decryption/to data and the operation such as be signed.
Referring to Fig. 5, a kind of step flow chart of data processing method embodiment of the invention is shown, is applied to client
End, this method can specifically include following steps:
Step 501, request of data is sent, the request of data includes client id information;
Step 502, the second client whitepack algorithm is received, wherein the second client whitepack algorithm is according to
Client id information and the first pre-generated client whitepack algorithm and generate obscure the visitor for having the client id information
Family end whitepack algorithm.
The client of the embodiment of the present invention can send request of data to server, and server is receiving client
Before request of data for requesting whitepack algorithm, so that it may pre-generated first client whitepack algorithm, then waiting receive
The request of data of client and then there is client using client id information and the first client whitepack algorithm to generate to obscure
It holds the second client whitepack algorithm of id information and returns to client.So that not needing to carry out the external whitepack algorithm portion obscured
It point can be sent in client and to carry the request of data of client id information and come to complete, saved and generate second client
The time of whitepack algorithm, the binding of client id Yu the second client whitepack algorithm was not only realized, but also has significantly reduced server
Signaling overheads of side when in response to the request of data, when further reduced wait-for-response of the client-side to the request of data
Between.
Wherein, can join about the first client whitepack algorithm, the generation of the second client whitepack algorithm and treatment process
According to above-mentioned FIG. 1 to FIG. 4 embodiment, no longer repeat one by one here.
It should be noted that for simple description, therefore, it is stated as a series of action groups for embodiment of the method
It closes, but those skilled in the art should understand that, embodiment of that present invention are not limited by the describe sequence of actions, because according to
According to the embodiment of the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also should
Know, the embodiments described in the specification are all preferred embodiments, and the related movement not necessarily present invention is implemented
Necessary to example.Above-mentioned each alternative embodiment can constitute new embodiment in any combination, and which is not described herein again.
It is corresponding with the data processing method of server is applied to provided by the embodiments of the present invention, referring to Fig. 6, show
Go out a kind of structural block diagram of data processing equipment embodiment of the invention, be applied to server, can specifically include following module:
First generation module 601 saves target corresponding with target matrix for generating the first client whitepack algorithm
Random number, wherein the first client whitepack algorithm includes pre-arranged code and by internal at least two tables of data obscured,
Wherein, the target matrix is the tables of data being disposed adjacent at least two tables of data with the pre-arranged code;
Receiving module 602, is requested for receiving data, and the request of data includes client id information;
Second generation module 603, for random according to the client id information, the target matrix and the target
Number generates outside and obscures coding;
Replacement module 604, it is described outer for replacing with the pre-arranged code in the first client whitepack algorithm
Portion obscures coding, obscures the second client whitepack algorithm for having the client id information to generate;
Respond module 605, for sending the second client whitepack algorithm in response to the request of data.
Optionally, as shown in fig. 7, second generation module 603 includes:
First generates submodule 631, for according to the client id information, using default aliasing strategy, generation to be obscured
Algorithm;
Second generates submodule 632, for random according to the Obfuscating Algorithms, the target matrix and the target
Number generates outside and obscures coding.
Optionally, as shown in fig. 7, the second generation submodule 632 includes:
First arithmetic element 6321, for carrying out matrix multiplication operation to the Obfuscating Algorithms and the target matrix;
Second arithmetic element 6322, the result and the target for that will pass through the matrix multiplication operation and generate are random
Number makees XOR operation, obscures coding to generate outside.
Optionally, as shown in fig. 7, first generation module 601 includes:
Third generates submodule 611, for generating by internal mixed according to preset-key, default Processing Algorithm, random number
At least two tables of data confused;
4th generates submodule 612, for generating pre-arranged code according to matrix is preset;
5th generates submodule 613, for the pre-arranged code to be disposed adjacent at least two tables of data, generates
First client whitepack algorithm;
Identify submodule 614, for identification number of targets adjacent with the pre-arranged code at least two tables of data
According to table;
Submodule 615 is saved, for saving to target random number used when generating the target matrix.
Optionally, as shown in fig. 7, described device further include:
First obtains module 606, for obtaining the data ID of server storing data;
Second obtains module 607, for the corresponding relationship according to pre-set data ID and key, Processing Algorithm, obtains
It takes and the matched preset-key of the data ID and default Processing Algorithm;
The third generates submodule 611, be also used to according to random number, with the matched preset-key of the data ID and pre-
If Processing Algorithm, generate corresponding with the data ID by internal at least two tables of data obscured;
Third generation module 608, it is corresponding between the data ID and the first client whitepack algorithm for generating
Relationship.
Optionally, as shown in fig. 7, the replacement module 604 includes:
Acquisition submodule 641, for when the request of data further includes data ID, according to pre-set data ID with
Corresponding relationship between first client whitepack algorithm obtains the first visitor of target corresponding with the data ID in the request of data
Family end whitepack algorithm;
Submodule 642 is replaced, for replacing with the pre-arranged code in the first client of target whitepack algorithm
Coding is obscured in the outside, to generate the second client whitepack algorithm corresponding with the data ID in the data processing request.
Optionally, as shown in fig. 7, described device further include:
Judgment module 609, for when the request of data further includes the acquisition modes of client id information, described in judgement
Whether the acquisition modes of client id information are default acquisition modes;
Second generation module 603, if the acquisition modes for being also used to the client id information are default acquisition modes,
Then according to the client id information, the target matrix and the target random number, generates outside and obscure coding.
For device embodiment, since it is basically similar to the method embodiment, related so being described relatively simple
Place illustrates referring to the part of embodiment of the method.
According to still another embodiment of the invention, the present invention also provides a kind of servers, comprising: memory, processor
And it is stored in the data processor that can be run on the memory and on the processor, the data processor is by institute
State processor execute when realize as it is above-mentioned any one applied to server embodiment as described in data processing method the step of.
According to still another embodiment of the invention, the present invention also provides a kind of clients, comprising: memory, processor
And it is stored in the data processor that can be run on the memory and on the processor, the data processor is by institute
State processor execute when realize as it is above-mentioned any one applied to client embodiment as described in data processing method the step of.
Still another embodiment in accordance with the present invention, the present invention also provides a kind of computer readable storage medium, the meter
It is stored with data processor on calculation machine readable storage medium storing program for executing, realizes when the data processor is executed by processor as above-mentioned
Step in data processing method described in any one embodiment.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with
The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
It should be understood by those skilled in the art that, the embodiment of the embodiment of the present invention can provide as method, apparatus or calculate
Machine program product.Therefore, the embodiment of the present invention can be used complete hardware embodiment, complete software embodiment or combine software and
The form of the embodiment of hardware aspect.Moreover, the embodiment of the present invention can be used one or more wherein include computer can
With in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code
The form of the computer program product of implementation.
The embodiment of the present invention be referring to according to the method for the embodiment of the present invention, terminal device (system) and computer program
The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions
In each flow and/or block and flowchart and/or the block diagram in process and/or box combination.It can provide these
Computer program instructions are set to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals
Standby processor is to generate a machine, so that being held by the processor of computer or other programmable data processing terminal devices
Capable instruction generates for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram
The device of specified function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing terminal devices
In computer-readable memory operate in a specific manner, so that instruction stored in the computer readable memory generates packet
The manufacture of command device is included, which realizes in one side of one or more flows of the flowchart and/or block diagram
The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing terminal devices, so that
Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus
The instruction executed on computer or other programmable terminal equipments is provided for realizing in one or more flows of the flowchart
And/or in one or more blocks of the block diagram specify function the step of.
Although the preferred embodiment of the embodiment of the present invention has been described, once a person skilled in the art knows bases
This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as
Including preferred embodiment and fall into all change and modification of range of embodiment of the invention.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap
Those elements are included, but also including other elements that are not explicitly listed, or further includes for this process, method, article
Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited
Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device for including the element.
Above to a kind of data processing method provided by the present invention, a kind of data processing equipment, a kind of client, one kind
Server, a kind of computer readable storage medium, are described in detail, and specific case used herein is to original of the invention
Reason and embodiment are expounded, and the above embodiments are only used to help understand, and method and its core of the invention is thought
Think;At the same time, for those skilled in the art, according to the thought of the present invention, in specific embodiments and applications
There will be changes, in conclusion the contents of this specification are not to be construed as limiting the invention.
Claims (16)
1. a kind of data processing method, which is characterized in that be applied to server, which comprises it is white to generate the first client
Box algorithm saves target random number corresponding with target matrix, wherein the first client whitepack algorithm includes default compiles
Code and by internal at least two tables of data obscured, wherein the target matrix be at least two tables of data with
The tables of data that the pre-arranged code is disposed adjacent;
The method also includes:
Request of data is received, the request of data includes client id information;
According to the client id information, the target matrix and the target random number, generates outside and obscure coding;
The pre-arranged code in the first client whitepack algorithm is replaced with into the outside and obscures coding, is obscured with generating
There is the second client whitepack algorithm of the client id information;
In response to the request of data, the second client whitepack algorithm is sent.
2. the method according to claim 1, wherein described according to the client id information, the number of targets
According to table and the target random number, generates outside and obscures coding, comprising:
Obfuscating Algorithms are generated using default aliasing strategy according to the client id information;
According to the Obfuscating Algorithms, the target matrix and the target random number, generates outside and obscure coding.
3. according to the method described in claim 2, it is characterized in that, described according to the Obfuscating Algorithms, the target matrix
With the target random number, generates outside and obscures coding, comprising:
Matrix multiplication operation is carried out to the Obfuscating Algorithms and the target matrix;
The result and the target random number that generate by the matrix multiplication operation are made into XOR operation, it is external mixed to generate
Confuse coding.
4. the method according to claim 1, wherein
The first client whitepack algorithm of the generation, comprising:
According to preset-key, default Processing Algorithm, random number, generate by internal at least two tables of data obscured;
According to default matrix, pre-arranged code is generated;
The pre-arranged code is disposed adjacent at least two tables of data, generates the first client whitepack algorithm;
It is described to save corresponding with target matrix target random number and include:
Identify target matrix adjacent with the pre-arranged code at least two tables of data;
Target random number used when generating the target matrix is saved.
5. according to the method described in claim 4, it is characterized in that,
It is described according to preset-key, default Processing Algorithm, random number, generate by internal at least two tables of data obscured it
Before, the method also includes:
Obtain the data ID of server storing data;
According to the corresponding relationship of pre-set data ID and key, Processing Algorithm, obtain matched default with the data ID
Key and default Processing Algorithm;
It is described to generate according to preset-key, default Processing Algorithm, random number and pass through at least two tables of data that inside is obscured, packet
It includes: according to random number and the matched preset-key of the data ID and default Processing Algorithm, generating corresponding with the data ID
At least two tables of data obscured by inside;
It is described to be disposed adjacent the pre-arranged code at least two tables of data, generate the first client whitepack algorithm it
Afterwards, the method also includes: generate the corresponding relationship between the data ID and the first client whitepack algorithm.
6. method according to claim 1 or 5, which is characterized in that the request of data further includes data ID;
The pre-arranged code by the first client whitepack algorithm replaces with the outside and obscures coding, to generate
Obscure the second client whitepack algorithm for having the client id information, comprising:
According to the corresponding relationship between pre-set data ID and the first client whitepack algorithm, obtain and the request of data
In corresponding the first client of the target whitepack algorithm of data ID;
The pre-arranged code in the first client of target whitepack algorithm is replaced with into the outside and obscures coding, to generate
The second client whitepack algorithm corresponding with the data ID in the data processing request.
7. the method according to claim 1, wherein the request of data further includes the acquisition of client id information
Mode, it is described according to the client id information, the target matrix and the target random number, it generates outside and obscures coding
Before, the method also includes:
Whether the acquisition modes for judging the client id information are default acquisition modes;
If the acquisition modes of the client id information are default acquisition modes, execute according to the client id information, described
Target matrix and the target random number generate external the step of obscuring coding.
8. a kind of data processing equipment, which is characterized in that be applied to server, described device includes:
First generation module saves target random number corresponding with target matrix for the first client whitepack algorithm of generation,
Wherein, the first client whitepack algorithm includes pre-arranged code and internal at least two tables of data obscured of process, wherein institute
Stating target matrix is the tables of data being disposed adjacent at least two tables of data with the pre-arranged code;
Receiving module is requested for receiving data, and the request of data includes client id information;
Second generation module, for generating according to the client id information, the target matrix and the target random number
Obscure coding in outside;
Replacement module obscures volume for the pre-arranged code in the first client whitepack algorithm to be replaced with the outside
Code obscures the second client whitepack algorithm for having the client id information to generate;
Respond module, for sending the second client whitepack algorithm in response to the request of data.
9. device according to claim 8, which is characterized in that second generation module includes:
First generates submodule, for generating Obfuscating Algorithms using default aliasing strategy according to the client id information;
Second generates submodule, for generating outer according to the Obfuscating Algorithms, the target matrix and the target random number
Obscure coding in portion.
10. device according to claim 9, which is characterized in that described second, which generates submodule, includes:
First arithmetic element, for carrying out matrix multiplication operation to the Obfuscating Algorithms and the target matrix;
Second arithmetic element, the result generated for will pass through the matrix multiplication operation and the target random number make exclusive or
Operation obscures coding to generate outside.
11. device according to claim 8, which is characterized in that first generation module includes:
Third generates submodule, for according to preset-key, default Processing Algorithm, random number, generate by inside obscure to
Few two tables of data;
4th generates submodule, for generating pre-arranged code according to matrix is preset;
5th generates submodule, for the pre-arranged code to be disposed adjacent at least two tables of data, generates the first visitor
Family end whitepack algorithm;
Identify submodule, for identification target matrix adjacent with the pre-arranged code at least two tables of data;
Submodule is saved, for saving to target random number used when generating the target matrix.
12. device according to claim 11, which is characterized in that described device further include:
First obtains module, for obtaining the data ID of server storing data;
Second obtains module, for the corresponding relationship according to pre-set data ID and key, Processing Algorithm, obtain with it is described
The matched preset-key of data ID and default Processing Algorithm;
The third generates submodule, is also used to according to random number and the matched preset-key of the data ID and default processing
Algorithm generates corresponding with the data ID by internal at least two tables of data obscured;
Third generation module, for generating the corresponding relationship between the data ID and the first client whitepack algorithm.
13. the device stated according to claim 8 or 12, which is characterized in that
The replacement module includes:
Acquisition submodule, for when the request of data further includes data ID, according to the visitor of pre-set data ID and first
It is white to obtain the first client of target corresponding with the data ID in the request of data for corresponding relationship between the whitepack algorithm of family end
Box algorithm;
Submodule is replaced, for the pre-arranged code in the first client of target whitepack algorithm to be replaced with the outside
Coding is obscured, to generate the second client whitepack algorithm corresponding with the data ID in the data processing request.
14. device according to claim 8, which is characterized in that described device further include:
Judgment module, for judging the client when the request of data further includes the acquisition modes of client id information
Whether the acquisition modes of id information are default acquisition modes;
Second generation module, if the acquisition modes for being also used to the client id information are default acquisition modes, basis
The client id information, the target matrix and the target random number generate outside and obscure coding.
15. a kind of server characterized by comprising memory, processor and be stored on the memory and can be described
The data processor run on processor realizes such as claim 1 when the data processor is executed by the processor
The step of to data processing method described in any one of 7.
16. a kind of computer readable storage medium, which is characterized in that be stored at data on the computer readable storage medium
Program is managed, the data processing as described in any one of claims 1 to 7 is realized when the data processor is executed by processor
Step in method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910281419.1A CN110149311B (en) | 2019-04-09 | 2019-04-09 | Data processing method, device, server and readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910281419.1A CN110149311B (en) | 2019-04-09 | 2019-04-09 | Data processing method, device, server and readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110149311A true CN110149311A (en) | 2019-08-20 |
CN110149311B CN110149311B (en) | 2021-05-25 |
Family
ID=67588332
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910281419.1A Active CN110149311B (en) | 2019-04-09 | 2019-04-09 | Data processing method, device, server and readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110149311B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110611830A (en) * | 2019-09-29 | 2019-12-24 | 腾讯科技(深圳)有限公司 | Video processing method, device, equipment and medium |
CN111343421A (en) * | 2020-02-19 | 2020-06-26 | 成都三零凯天通信实业有限公司 | Video sharing method and system based on white-box encryption |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2940917A1 (en) * | 2014-04-28 | 2015-11-04 | Nxp B.V. | Behavioral fingerprint in a white-box implementation |
CN105681025A (en) * | 2016-01-29 | 2016-06-15 | 中国科学院信息工程研究所 | Security white box realizing method and device for national cipher standard algorithm SM4 |
CN107947917A (en) * | 2017-12-29 | 2018-04-20 | 北京梆梆安全科技有限公司 | A kind of method and device for generating whitepack key |
CN108123794A (en) * | 2017-12-20 | 2018-06-05 | 上海众人网络安全技术有限公司 | The generation method and encryption method of whitepack key, apparatus and system |
CN108183796A (en) * | 2017-12-29 | 2018-06-19 | 北京梆梆安全科技有限公司 | The method and device of encryption and decryption is carried out using whitepack library file and whitepack key file |
CN108494546A (en) * | 2018-02-13 | 2018-09-04 | 北京梆梆安全科技有限公司 | A kind of whitepack encryption method, device and storage medium |
-
2019
- 2019-04-09 CN CN201910281419.1A patent/CN110149311B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2940917A1 (en) * | 2014-04-28 | 2015-11-04 | Nxp B.V. | Behavioral fingerprint in a white-box implementation |
CN105681025A (en) * | 2016-01-29 | 2016-06-15 | 中国科学院信息工程研究所 | Security white box realizing method and device for national cipher standard algorithm SM4 |
CN108123794A (en) * | 2017-12-20 | 2018-06-05 | 上海众人网络安全技术有限公司 | The generation method and encryption method of whitepack key, apparatus and system |
CN107947917A (en) * | 2017-12-29 | 2018-04-20 | 北京梆梆安全科技有限公司 | A kind of method and device for generating whitepack key |
CN108183796A (en) * | 2017-12-29 | 2018-06-19 | 北京梆梆安全科技有限公司 | The method and device of encryption and decryption is carried out using whitepack library file and whitepack key file |
CN108494546A (en) * | 2018-02-13 | 2018-09-04 | 北京梆梆安全科技有限公司 | A kind of whitepack encryption method, device and storage medium |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110611830A (en) * | 2019-09-29 | 2019-12-24 | 腾讯科技(深圳)有限公司 | Video processing method, device, equipment and medium |
CN111343421A (en) * | 2020-02-19 | 2020-06-26 | 成都三零凯天通信实业有限公司 | Video sharing method and system based on white-box encryption |
CN111343421B (en) * | 2020-02-19 | 2020-12-29 | 成都三零凯天通信实业有限公司 | Video sharing method and system based on white-box encryption |
Also Published As
Publication number | Publication date |
---|---|
CN110149311B (en) | 2021-05-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107248984B (en) | Data exchange system, method and device | |
CN110474898A (en) | Data encrypting and deciphering and key location mode, device, equipment and readable storage medium storing program for executing | |
CN106549940B (en) | Vehicle data transmission method and system | |
CN109800588B (en) | Dynamic bar code encryption method and device and dynamic bar code decryption method and device | |
CN109039628A (en) | Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system | |
CN108881262A (en) | Restoring files methods, devices and systems based on block chain | |
CN109728914A (en) | Digital signature authentication method, system, device and computer readable storage medium | |
CN107948152A (en) | Information storage means, acquisition methods, device and equipment | |
CN109872155A (en) | Data processing method and device | |
CN102984273B (en) | Encryption method, decryption method, encryption device and decryption device of virtual disk and cloud server | |
CN110177073A (en) | Data processing method, device, system and computer readable storage medium | |
CN110519309A (en) | Data transmission method, device, terminal, server and storage medium | |
CN108964922A (en) | mobile terminal token activation method, terminal device and server | |
CN106130716A (en) | Cipher key exchange system based on authentication information and method | |
CN110312054B (en) | Image encryption and decryption method, related device and storage medium | |
CN113497709A (en) | Trusted data source management method based on block chain, signature device and verification device | |
WO2020253108A1 (en) | Information hiding method, apparatus, device, and storage medium | |
CN111737715A (en) | Decentralized electronic contract online signing method and system | |
CN105407467B (en) | Method for encrypting short message, device and system | |
CN109005184A (en) | File encrypting method and device, storage medium, terminal | |
CN110049032A (en) | A kind of the data content encryption method and device of two-way authentication | |
CN106161472A (en) | A kind of method of data encryption, Apparatus and system | |
CN113572604B (en) | Method, device and system for sending secret key and electronic equipment | |
CN110149311A (en) | Data processing method, device, server and readable storage medium storing program for executing | |
CN110149312A (en) | Data processing method, device, system and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |