CN110502915B - Data processing method, device and system - Google Patents

Data processing method, device and system Download PDF

Info

Publication number
CN110502915B
CN110502915B CN201910811207.XA CN201910811207A CN110502915B CN 110502915 B CN110502915 B CN 110502915B CN 201910811207 A CN201910811207 A CN 201910811207A CN 110502915 B CN110502915 B CN 110502915B
Authority
CN
China
Prior art keywords
database
target demand
task
data
end processor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910811207.XA
Other languages
Chinese (zh)
Other versions
CN110502915A (en
Inventor
邱文一
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Enyike Beijing Data Technology Co ltd
Original Assignee
Enyike Beijing Data Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Enyike Beijing Data Technology Co ltd filed Critical Enyike Beijing Data Technology Co ltd
Priority to CN201910811207.XA priority Critical patent/CN110502915B/en
Publication of CN110502915A publication Critical patent/CN110502915A/en
Application granted granted Critical
Publication of CN110502915B publication Critical patent/CN110502915B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides a method, a device and a system for processing data, firstly, a data receiver sends a target demand task and a first database corresponding to the target demand task to a data receiver front-end processor, the data receiver front-end processor acquires the target demand first database corresponding to the target demand task from the first database, after determining that the first database cannot acquire a corresponding task result report according to the target demand, the encrypted target demand first database and the target demand task are sent to a data provider front-end processor, the data provider front-end processor determines the data information of the target demand task contained in a second database, updates the target demand first database, encrypts and sends the encrypted data information to the data receiver front-end processor, the data receiver front-end processor determines a task result report and sends the task result report to the data receiver, and when the information receiver utilizes the information acquired from the information provider to calculate the task, information is leaked at an information receiving side.

Description

Data processing method, device and system
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method, an apparatus, and a system for data processing.
Background
Along with the rapid development of networks, information exchange is increasingly convenient, information exchange among users is transmitted through the networks, the time of the users is saved, but due to the occurrence of hackers and the appearance of network security problems, the information exchanged among the users is leaked.
As for the medium which takes the safe USB flash disk or the optical disk as transmission, the information is copied from the information provider to the information receiver in an off-line state, so that the network is completely isolated, the problems caused by the network are avoided, but the information transmission efficiency in the off-line state is low, the information transmission lacks real-time performance, and the information cannot be exchanged in time.
In addition, generally, after the information provider and the information receiver agree with the password together, the information is directly transmitted to the information receiver from the information provider after being encrypted, and after the information receiver receives the information, the information receiver can grasp the specific content in the information by agreeing the password, so that the information receiver still has a risk of leakage of the received information, and after the information is exchanged, the information receiver needs not to directly contact the specific content of the information, and can obtain a required task result of the information receiver according to the information, so that the leakage of the information on the information receiver is avoided.
Disclosure of Invention
In view of the above, an object of the present application is to provide a method, an apparatus, and a system for data processing, so as to avoid information leakage at an information receiver when the information receiver performs task computation by using information acquired from an information provider.
In a first aspect, an embodiment of the present application provides a data processing system, including: the system comprises a data receiver, a data provider front-end processor and a data receiver front-end processor;
the data receiver is used for sending a preset target demand task and a first database corresponding to the target demand task to the data receiver front-end processor; sending a target demand task to the data receiver front-end processor to obtain a task result report corresponding to the target demand task;
the data receiver front-end processor is used for receiving the target demand task, acquiring a target demand first database corresponding to the target demand task from the first database, and determining that a corresponding task result report cannot be acquired according to the target demand first database;
acquiring a second key of a second database in the data provider front-end processor, encrypting the target demand first database through the second key to obtain a third database, and sending the third database and the target demand task to the data provider front-end processor;
the data provider front-end processor is used for decrypting the third database to obtain the first database of the target requirement and extracting task keywords corresponding to the task of the target requirement;
acquiring a second target demand database matched with the task keywords from the second database, updating the first target demand database according to the second target demand database to obtain a target demand database, encrypting the target demand database and sending the encrypted target demand database to the front-end processor of the data receiver;
the data receiver front-end processor is further configured to decrypt the received encrypted target demand database, obtain a corresponding task result report according to the decrypted target demand database, and send the obtained task result report to the data receiver.
In an embodiment of the application, the data receiver is further configured to: sending the key database corresponding to the first database to the data receiver front-end processor;
the data receiving side front-end processor is further configured to encrypt the first database through a first key to obtain a fourth database, where the first key is any one of keys in a key database corresponding to the first database;
the data provider front-end processor is further configured to acquire the fourth database in the data receiver front-end processor, and update the second database by using the fourth database.
In an embodiment of the present application, the system further includes: a data provider;
and the data provider is used for sending the second database and the key database corresponding to the second database to the data provider front-end processor.
In an embodiment of the application, in the data receiver front-end processor, the decrypted target requirement database calculates the target requirement task through a preset data component, where the preset data component includes one or more of the following components:
a data processing component, an analysis and reporting tool component, a data storage component, a data gathering component.
In an embodiment of the application, in the data receiver front-end processor, the task result report is sent to the data receiver through a secure socket layer SSL protocol.
In a second aspect, an embodiment of the present application provides a data processing method, which is applied to a front-end processor of a data receiving party, and includes:
receiving a target demand task sent by a data receiver and a first database corresponding to the target demand task;
acquiring a target demand first database corresponding to the target demand task by using the first database;
if it is determined that the first database cannot obtain the task result report of the target demand task according to the target demand, a second key of a second database in a data provider front-end processor is obtained, the first database of the target demand is encrypted through the second key to obtain a third database, and the third database and the target demand task are sent to the data provider front-end processor;
receiving and decrypting the encrypted target demand database obtained by the data provider front-end processor by using the third database and the target demand task;
and acquiring a task result report of the target demand task according to the decrypted target demand database, and sending the acquired task result report to the data receiver.
In an embodiment of the present application, the method further includes:
acquiring a key database corresponding to the first database in the data receiver;
encrypting the first database through a first key to obtain a fourth database, wherein the first key is any one key in a key database corresponding to the first database;
and sending the fourth database to the data receiver front-end processor, and updating the second database by using the fourth database.
In a third aspect, an embodiment of the present application provides an apparatus for data processing, including:
the first receiving module is used for receiving a target demand task sent by a data receiving party and a first database corresponding to the target demand task;
the first acquisition module is used for acquiring a first target demand database corresponding to the target demand task by using the first database;
the processing module is used for determining that the first database cannot obtain the task result report of the target demand task according to the target demand, obtaining a second key of a second database in a data provider front-end processor, encrypting the first database of the target demand through the second key to obtain a third database, and sending the third database and the target demand task to the data provider front-end processor;
the second receiving module is used for receiving the encrypted target demand database obtained by the data provider front-end processor by using the third database and the target demand task and decrypting the encrypted target demand database;
and the second acquisition module is used for acquiring a task result report of the target demand task according to the decrypted target demand database and sending the acquired task result report to the data receiver.
In a fourth aspect, an embodiment of the present application further provides an electronic device, including: a processor, a memory and a bus, the memory storing machine-readable instructions executable by the processor, the processor and the memory communicating via the bus when the electronic device is running, the machine-readable instructions when executed by the processor performing the steps of the first aspect described above, or any possible implementation of the first aspect.
In a fifth aspect, this application further provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to perform the steps in the first aspect or any one of the possible implementation manners of the first aspect.
The embodiment of the application provides a method, a device and a system for data processing, firstly, a preset target demand task and a first database corresponding to the target demand task are sent to a data receiver front-end processor through a data receiver, the data receiver front-end processor obtains the target demand first database corresponding to the target demand task from the first database, determines that the first database cannot obtain a corresponding task result report according to the target demand, then sends the encrypted target demand first database and the target demand task to a data provider front-end processor, determines that the second database contains data information of the target demand task in the data provider front-end processor, updates the target demand first database, then encrypts the encrypted data information and sends the encrypted data information to the data receiver front-end processor, obtains a corresponding task result report, and sends the task result report to the data receiver, therefore, the information leakage at the information receiver is avoided when the information receiver performs task calculation by using the information acquired from the information provider.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
FIG. 1 is a flow chart illustrating a system for data processing provided by an embodiment of the present application;
FIG. 2a is a schematic diagram illustrating a first database corresponding to a target demand task provided by an embodiment of the present application;
FIG. 2b is a schematic diagram illustrating a first database of target requirements corresponding to a target requirement task provided in an embodiment of the present application;
FIG. 2c is a diagram illustrating a second database in a data provider front-end processor, according to an embodiment of the present application;
FIG. 2d is a diagram illustrating ID information of a user in a second database encrypted by a second key according to an embodiment of the present application;
FIG. 3 is a flow chart illustrating a method of data processing provided by an embodiment of the present application;
FIG. 4 is a block diagram of a data processing apparatus according to an embodiment of the present application;
fig. 5 shows a schematic structural diagram of an electronic device provided in an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present application without making any creative effort, shall fall within the protection scope of the present application.
For the convenience of understanding of the present embodiment, a detailed description will be given first of all to a data processing system disclosed in the embodiments of the present application.
Example one
Referring to fig. 1, a flow chart of a data processing system provided by an embodiment of the present application is shown; the system comprises: the method comprises the following steps of:
s101: and sending the preset target demand task and the first database corresponding to the target demand task to a data receiver front-end processor.
Here, the data receiver sends the target demand task to the data receiver front-end processor to obtain a task result report corresponding to the target demand task.
Illustratively, the target requirement task preset in the data receiver a is to find the age of the user B in the first database corresponding to the data receiver a, and the first database corresponding to the target demanding task is shown in fig. 2a, the first database includes ID information of the user, and personal information of the user corresponding to the ID information, wherein the ID information of the user B is 653395803928432, the personal information of the user B corresponding to the ID information is that the work place of the user B is Tanjin, the home address sets up the water bridge, the city is Beijing, the ID information of the user C is 635395823928209, the personal information of the user C corresponding to the ID information is the West Small-mouth work place of the user C, the Return to Dragon's family address, Beijing city, the ID information of the user D is 643395813328593, the personal information of the user D corresponding to the ID information is the work place of the user D, the home address bridge, and the city shanghai.
S102: receiving a target demand task, acquiring a target demand first database corresponding to the target demand task from the first database, and determining that the first database cannot acquire a corresponding task result report according to the target demand.
Here, after the receiver front-end processor receives the target demand task of the age of the user B in the first database corresponding to the search data receiver a, the target demand first database corresponding to the target demand task is obtained from the first database, as shown in fig. 2B, the target demand first database includes the ID information of the user B of 653395803928432, and the personal information of the user B corresponding to the ID information is the work place of the user B, tokyo, home address water bridge, city, beijing.
And after the information in the first database of the target requirements passes through a pre-established data assembly frame, determining that the first database cannot obtain a corresponding task result report according to the target requirements. Optionally, when the demand task is to count the time from the home address to the work site, the built frame structure of the data assembly is the data assembly combination of Hadoop and Flink, and when the demand task is to count the age distribution of the user, the built frame structure of the data assembly is the data assembly combination of Hadoop and Kylin, and the specific data assembly is not limited herein and can be adjusted according to the actual application scenario.
Here, the data component includes one or more of the following components:
a data processing component, an analysis and reporting tool component, a data storage component, a data gathering component.
In a specific embodiment, after it is determined that the first database cannot acquire the corresponding task result report according to the target requirement, the data receiver front-end processor acquires the database stored in the data provider front-end processor, so that the acquired database is used for updating the target requirement first database to obtain the task result report corresponding to the target requirement task.
S103: and acquiring a second key of a second database in the data provider front-end processor.
Optionally, the system further comprises: a data provider; and the data provider is used for sending the second database and the key database corresponding to the second database to the data provider front-end processor.
Specifically, the data provider sends a second database and a key database corresponding to the second database to the data provider front-end processor through a secure socket layer SSL protocol, where the second database is shown in fig. 2C, the second database contains ID information of a user and personal information of the user corresponding to the ID information, where the ID information of the user B is 653395803928432, the personal information of the user B corresponding to the ID information is the work location beijing of the user B, the home address founding bridge, the city beijing, the age 26, the ID information of the user C is 635395823928209, the personal information of the user C corresponding to the ID information is the work location west minor of the user C, the home address back-dragon, the city beijing, the age 43, the ID information of the user D is 643395813328593, the personal information of the user D corresponding to the ID information is the work location golden sea road of the user D, the home address golden bridge, shanghai, age 32.
After receiving the second database and the key bank corresponding to the second database, the data provider front-end processor encrypts the second database by using a second key, where the second key is any one of the key banks corresponding to the second database, and information corresponding to the ID information of the user in the second database after being encrypted by the second key is shown in fig. 2D, the ID information 653395803928432 of the user B is 1234 after being encrypted by the second key, the ID information 635395823928209 of the user C is 5678 after being encrypted by the second key, and the ID information 643395813328593 of the user D is 1278 after being encrypted by the second key.
Here, the data receiver front-end processor obtains a second key of a second database in the data provider front-end processor.
S104: and encrypting the first database with the target requirement by using the second key to obtain a third database.
Illustratively, the first database of the target demand obtained according to the above example contains 653395803928432 ID information of the user B, and the personal information of the user B corresponding to the ID information is kyoto, home address water bridge, and city beijing of the user B, and the first database of the target demand is encrypted by the second key to obtain a third database, where the ID information 653395803928432 of the user B is 1234 encrypted by the second key.
S105: and sending the third database and the target demand task to a data provider front-end processor.
Specifically, the data receiver front-end processor sends the third database and the target demand task to the data provider front-end processor through a secure socket layer SSL protocol, where a specific protocol type in the transmission process is not limited herein.
S106: decrypting the third database to obtain a first database of the target demand and extracting task keywords corresponding to the task of the target demand;
and acquiring a target demand second database matched with the task keywords from the second database, and updating the target demand first database according to the target demand second database to obtain a target demand database.
And decrypting the third database by using the second key to obtain a first target demand database which contains 653395803928432 ID information of the user B, wherein the personal information of the user B corresponding to the ID information is the work place Tanjin of the user B, the family address sets up a water bridge and the city Beijing, extracting and searching the task key words corresponding to the target demand task of the age of the user B in the first database corresponding to the data receiver A, decrypting the second database, and acquiring a second target demand database matched with the task key words from the second database.
Here, the second target demand database includes ID information of user B of 653395803928432, and the personal information of user B corresponding to the ID information is the work place of user B, tokyo, beijing, and age 26, and the first target demand database is updated according to the second target demand database to obtain the target demand database, where the target demand database includes ID information of user B of 653395803928432, and the personal information of user B corresponding to the ID information is the work place of user B, tokyo, beijing, and age 26.
S107: and encrypting the target demand database and then sending the encrypted target demand database to a data receiver front-end processor.
Specifically, the data provider front-end processor encrypts the target demand database through the second key, and then sends the encrypted target demand database to the data receiver front-end processor through the secure socket layer SSL protocol, where a specific protocol type in the transmission process is not limited herein.
S108: and decrypting the received encrypted target requirement database, and acquiring a corresponding task result report according to the decrypted target requirement database.
Specifically, the data receiver front-end processor decrypts the target demand database through the second key, and after information in the target demand database passes through a pre-established data assembly framework, the data receiver front-end processor determines to obtain a corresponding task result report according to the target demand database.
Optionally, when the demand task is to count the time from the home address to the work site, the built frame structure of the data assembly is the data assembly combination of Hadoop and Flink, and when the demand task is to count the age distribution of the user, the built frame structure of the data assembly is the data assembly combination of Hadoop and Kylin, and the specific data assembly is not limited herein and can be adjusted according to the actual application scenario.
Here, the data component includes one or more of the following components:
a data processing component, an analysis and reporting tool component, a data storage component, a data gathering component.
Illustratively, the target requirement database contains 653395803928432 ID information of a user B, the personal information of the user B corresponding to the ID information is that the work place of the user B is yingjing, the home address is a water bridge, the city is beijing, and the age is 26, and after the information in the target requirement database passes through a pre-built data assembly frame, it is determined that the corresponding task result obtained according to the target requirement database is reported that the age of the user B is 26.
S109: and sending the acquired task result report to a data receiver.
Specifically, the data receiver front-end processor sends the obtained task result report to the data receiver through the secure socket layer SSL protocol, where a specific protocol type in the transmission process is not limited herein.
The data receiver front-end processor and the data provider front-end processor are both used for exchanging data information with a network, and the data receiver front-end processor and the data provider front-end processor can be both hardware servers.
In a specific embodiment, the data receiving party sends the key database corresponding to the first database to the data receiving party front-end processor; the data receiver front-end processor encrypts the first database through the first key to obtain a fourth database, wherein the first key is any one key in a key database corresponding to the first database; and the data provider front-end processor acquires a fourth database in the data receiver front-end processor, and updates the second database by using the fourth database.
Here, the encrypted first database is stored in the memory of the data receiver front-end processor.
The system for processing data provided by this embodiment first sends a preset target demand task and a first database corresponding to the target demand task to a data receiver front-end processor through a data receiver, the data receiver front-end processor obtains the first target demand database corresponding to the target demand task from the first database, determines that the first database cannot obtain a corresponding task result report according to the target demand, sends the encrypted first target demand database and the target demand task to a data provider front-end processor, determines that the second database contains data information of the target demand task, updates the first target demand database, encrypts the data information, sends the encrypted data information to the data receiver front-end processor, obtains a corresponding task result report, and sends the task result report to the data receiver, therefore, the information leakage at the information receiver is avoided when the information receiver performs task calculation by using the information acquired from the information provider.
Example two
As shown in fig. 3, a flow chart of a method for data processing provided by the embodiment of the present application is shown; the method is applied to a data receiver front-end processor and specifically comprises the following steps:
s301: receiving a target demand task sent by a data receiver and a first database corresponding to the target demand task;
s302: acquiring a target demand first database corresponding to the target demand task by using the first database;
s303: if it is determined that the first database cannot obtain the task result report of the target demand task according to the target demand, a second key of a second database in a data provider front-end processor is obtained, the first database of the target demand is encrypted through the second key to obtain a third database, and the third database and the target demand task are sent to the data provider front-end processor;
s304: receiving and decrypting the encrypted target demand database obtained by the data provider front-end processor by using the third database and the target demand task;
s305: and acquiring a task result report of the target demand task according to the decrypted target demand database, and sending the acquired task result report to the data receiver.
In an embodiment of the present application, the method further includes:
acquiring a key database corresponding to the first database in the data receiver;
encrypting the first database through a first key to obtain a fourth database, wherein the first key is any one key in a key database corresponding to the first database;
and sending the fourth database to the data receiver front-end processor, and updating the second database by using the fourth database.
EXAMPLE III
As shown in fig. 4, a block diagram of a data processing apparatus provided in an embodiment of the present application is shown; the device includes: a first receiving module 401, a first obtaining module 402, a processing module 403, a second receiving module 404, and a second obtaining module 405, specifically:
a first receiving module 401, configured to receive a target demand task sent by a data receiving side and a first database corresponding to the target demand task;
a first obtaining module 402, configured to obtain, by using the first database, a first target requirement database corresponding to the target requirement task;
a processing module 403, configured to determine that the first database cannot obtain the task result report of the target required task according to the target requirement, obtain a second key of a second database in a data provider front-end processor, encrypt the target required first database by using the second key to obtain a third database, and send the third database and the target required task to the data provider front-end processor;
a second receiving module 404, configured to receive and decrypt the encrypted target demand database obtained by using the third database and the target demand task in the data provider front-end processor;
a second obtaining module 405, configured to obtain a task result report of the target demand task according to the decrypted target demand database, and send the obtained task result report to the data receiving party.
In an embodiment of the present application, the apparatus further includes:
acquiring a key database corresponding to the first database in the data receiver;
encrypting the first database through a first key to obtain a fourth database, wherein the first key is any one key in a key database corresponding to the first database;
and sending the fourth database to the data receiver front-end processor, and updating the second database by using the fourth database.
Example four
Based on the same technical concept, the embodiment of the application also provides the electronic equipment. Referring to fig. 5, a schematic structural diagram of an electronic device 500 provided in the embodiment of the present application includes a processor 501, a memory 502, and a bus 503. The memory 502 is used for storing execution instructions and includes a memory 5021 and an external memory 5022; the memory 5021 is also referred to as an internal memory, and is used for temporarily storing operation data in the processor 501 and data exchanged with an external storage 5022 such as a hard disk, the processor 501 exchanges data with the external storage 5022 through the memory 5021, and when the electronic device 500 operates, the processor 501 communicates with the storage 502 through the bus 503, so that the processor 501 executes the following instructions:
receiving a target demand task sent by a data receiver and a first database corresponding to the target demand task;
acquiring a target demand first database corresponding to the target demand task by using the first database;
if it is determined that the first database cannot obtain the task result report of the target demand task according to the target demand, a second key of a second database in a data provider front-end processor is obtained, the first database of the target demand is encrypted through the second key to obtain a third database, and the third database and the target demand task are sent to the data provider front-end processor;
receiving and decrypting the encrypted target demand database obtained by the data provider front-end processor by using the third database and the target demand task;
and acquiring a task result report of the target demand task according to the decrypted target demand database, and sending the acquired task result report to the data receiver.
In one possible design, the processor 501 performs the processing, and the method further includes:
acquiring a key database corresponding to the first database in the data receiver;
encrypting the first database through a first key to obtain a fourth database, wherein the first key is any one key in a key database corresponding to the first database;
and sending the fourth database to the data receiver front-end processor, and updating the second database by using the fourth database.
EXAMPLE five
Embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program performs the steps of the data processing method described in any of the above embodiments.
In particular, the storage medium can be a general-purpose storage medium, such as a removable disk, a hard disk, or the like, and when the computer program on the storage medium is executed, the steps of the data processing method can be executed, so that leakage of information at the information receiver when the information receiver performs task calculation using the information acquired from the information provider is avoided.
The computer program product of the method for processing data provided in the embodiment of the present application includes a computer-readable storage medium storing a nonvolatile program code executable by a processor, where instructions included in the program code may be used to execute the method described in the foregoing method embodiment, and specific implementation may refer to the method embodiment, and is not described herein again.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a non-volatile computer-readable storage medium executable by a processor. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present application, and are used for illustrating the technical solutions of the present application, but not limiting the same, and the scope of the present application is not limited thereto, and although the present application is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope disclosed in the present application; such modifications, changes or substitutions do not depart from the spirit and scope of the exemplary embodiments of the present application, and are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A system for data processing, comprising: the system comprises a data receiver, a data provider front-end processor and a data receiver front-end processor;
the data receiver is used for sending a preset target demand task and a first database corresponding to the target demand task to the data receiver front-end processor; sending a target demand task to the data receiver front-end processor to obtain a task result report corresponding to the target demand task;
the data receiver front-end processor is used for receiving the target demand task, acquiring a target demand first database corresponding to the target demand task from the first database, and determining that a corresponding task result report cannot be acquired according to the target demand first database;
the data receiver front-end processor is further configured to obtain a second key of a second database in the data provider front-end processor, encrypt the target demand first database through the second key to obtain a third database, and send the third database and the target demand task to the data provider front-end processor;
the data provider front-end processor is used for decrypting the third database to obtain the first database of the target requirement and extracting task keywords corresponding to the task of the target requirement;
the data provider front-end processor is further configured to acquire a second target demand database matched with the task keyword from the second database, update the first target demand database according to the second target demand database to obtain a target demand database, encrypt the target demand database, and send the encrypted target demand database to the data receiver front-end processor;
the data receiver front-end processor is further configured to decrypt the received encrypted target demand database, obtain a corresponding task result report according to the decrypted target demand database, and send the obtained task result report to the data receiver.
2. The system of claim 1, wherein the data receiver is further configured to: sending the key database corresponding to the first database to the data receiver front-end processor;
the data receiving side front-end processor is further configured to encrypt the first database through a first key to obtain a fourth database, where the first key is any one of keys in a key database corresponding to the first database;
the data provider front-end processor is further configured to acquire the fourth database in the data receiver front-end processor, and update the second database by using the fourth database.
3. The system of claim 2, further comprising: a data provider;
and the data provider is used for sending the second database and the key database corresponding to the second database to the data provider front-end processor.
4. The system of claim 3, wherein in the data receiver front-end processor, the decrypted target demand database calculates the target demand task through preset data components, and the preset data components comprise one or more of the following components:
a data processing component, an analysis and reporting tool component, a data storage component, a data gathering component.
5. The system of claim 4, wherein the task result report is sent to the data receiver in the data receiver front-end processor via a Secure Socket Layer (SSL) protocol.
6. A data processing method is applied to a data receiver front-end processor, and is characterized by comprising the following steps:
receiving a target demand task sent by a data receiver and a first database corresponding to the target demand task;
acquiring a target demand first database corresponding to the target demand task by using the first database;
if it is determined that the first database cannot obtain the task result report of the target demand task according to the target demand, a second key of a second database in a data provider front-end processor is obtained, the first database of the target demand is encrypted through the second key to obtain a third database, and the third database and the target demand task are sent to the data provider front-end processor;
receiving and decrypting the encrypted target demand database obtained by the data provider front-end processor by using the third database and the target demand task;
and acquiring a task result report of the target demand task according to the decrypted target demand database, and sending the acquired task result report to the data receiver.
7. The method of claim 6, further comprising:
acquiring a key database corresponding to the first database in the data receiver;
encrypting the first database through a first key to obtain a fourth database, wherein the first key is any one key in a key database corresponding to the first database;
and sending the fourth database to the data receiver front-end processor, and updating the second database by using the fourth database.
8. An apparatus for data processing, comprising:
the first receiving module is used for receiving a target demand task sent by a data receiving party and a first database corresponding to the target demand task;
the first acquisition module is used for acquiring a first target demand database corresponding to the target demand task by using the first database;
the processing module is used for determining that the first database cannot obtain the task result report of the target demand task according to the target demand, obtaining a second key of a second database in a data provider front-end processor, encrypting the first database of the target demand through the second key to obtain a third database, and sending the third database and the target demand task to the data provider front-end processor;
the second receiving module is used for receiving the encrypted target demand database obtained by the data provider front-end processor by using the third database and the target demand task and decrypting the encrypted target demand database;
and the second acquisition module is used for acquiring a task result report of the target demand task according to the decrypted target demand database and sending the acquired task result report to the data receiver.
9. An electronic device, comprising: a processor, a memory and a bus, the memory storing machine-readable instructions executable by the processor, the processor and the memory communicating over the bus when the electronic device is operating, the machine-readable instructions when executed by the processor performing the steps of the method of any of claims 6 to 7.
10. A computer-readable storage medium, having stored thereon a computer program which, when being executed by a processor, is adapted to carry out the steps of the method according to any one of claims 6 to 7.
CN201910811207.XA 2019-08-30 2019-08-30 Data processing method, device and system Active CN110502915B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910811207.XA CN110502915B (en) 2019-08-30 2019-08-30 Data processing method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910811207.XA CN110502915B (en) 2019-08-30 2019-08-30 Data processing method, device and system

Publications (2)

Publication Number Publication Date
CN110502915A CN110502915A (en) 2019-11-26
CN110502915B true CN110502915B (en) 2021-07-30

Family

ID=68590591

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910811207.XA Active CN110502915B (en) 2019-08-30 2019-08-30 Data processing method, device and system

Country Status (1)

Country Link
CN (1) CN110502915B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111797167B (en) * 2020-07-02 2023-05-16 中国联合网络通信集团有限公司 Data synchronization system and method and data processing center

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103064933A (en) * 2012-12-24 2013-04-24 华为技术有限公司 Data query method and system
CN103838849A (en) * 2014-02-13 2014-06-04 北京数字天域科技股份有限公司 Information query method, device and system and data processing method and device
CN106603549A (en) * 2016-12-28 2017-04-26 上海优刻得信息科技有限公司 Data exchange method and system based on cryptograph
CN108268799A (en) * 2017-12-28 2018-07-10 上海数据交易中心有限公司 Data query system and method, storage medium, terminal
CN110008753A (en) * 2019-04-12 2019-07-12 长春嘉诚信息技术股份有限公司 A kind of data processing method and system in business datum Sensitive Domain

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10255445B1 (en) * 2006-11-03 2019-04-09 Jeffrey E. Brinskelle Identifying destinations of sensitive data
JP5200807B2 (en) * 2008-09-19 2013-06-05 富士通株式会社 Mobile terminal, data management system and program
US20110013775A1 (en) * 2009-07-17 2011-01-20 Chih-Lin Hu System and method of mobile content sharing and delivery in an integrated network environment
CN106445936A (en) * 2015-08-05 2017-02-22 中国移动通信集团福建有限公司 Data processing method and equipment
CN113139009B (en) * 2017-10-23 2024-09-10 创新先进技术有限公司 Data auditing method and device
CN108337249A (en) * 2018-01-19 2018-07-27 论客科技(广州)有限公司 A kind of data safe transmission method, system and device
CN108304733B (en) * 2018-01-23 2020-06-02 深圳大普微电子科技有限公司 Encrypted data searching method and data storage system capable of encrypted searching
CN108712385A (en) * 2018-04-18 2018-10-26 平安科技(深圳)有限公司 Data capture method, device, computer equipment and storage medium
CN109726592B (en) * 2018-12-31 2021-02-23 联动优势科技有限公司 Data sandbox processing method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103064933A (en) * 2012-12-24 2013-04-24 华为技术有限公司 Data query method and system
CN103838849A (en) * 2014-02-13 2014-06-04 北京数字天域科技股份有限公司 Information query method, device and system and data processing method and device
CN106603549A (en) * 2016-12-28 2017-04-26 上海优刻得信息科技有限公司 Data exchange method and system based on cryptograph
CN108268799A (en) * 2017-12-28 2018-07-10 上海数据交易中心有限公司 Data query system and method, storage medium, terminal
CN110008753A (en) * 2019-04-12 2019-07-12 长春嘉诚信息技术股份有限公司 A kind of data processing method and system in business datum Sensitive Domain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
大数据的开发应用和保护;雷璟等;《中国电子科学研究院学报》;20180228(第1期);全文 *

Also Published As

Publication number Publication date
CN110502915A (en) 2019-11-26

Similar Documents

Publication Publication Date Title
CN108734028B (en) Data management method based on block chain, block chain link point and storage medium
CN106790156B (en) Intelligent device binding method and device
CN110457945B (en) List query method, query party device, service party device and storage medium
CN110400164B (en) Data determining method and device, storage medium and electronic device
WO2020233049A1 (en) Data authorization method and apparatus of blockchain system, storage medium, and electronic device
TW202015378A (en) Cryptographic operation method, method for creating work key, and cryptographic service platform and device
CN107248980B (en) Mobile application recommendation system and method with privacy protection function under cloud service
TW202011712A (en) Cryptographic operation and working key creation method and cryptographic service platform and device
CN114143108B (en) Session encryption method, device, equipment and storage medium
KR20150045790A (en) Method and Apparatus for authenticating and managing an application using trusted platform module
CN111914264A (en) Index creation method and device, and data verification method and device
US10129025B2 (en) Binding data to a network in the presence of an entity with revocation capabilities
CN113824553A (en) Key management method, device and system
CN113726515B (en) UKEY-based key processing method, storage medium and electronic device
CN110502915B (en) Data processing method, device and system
CN114912105A (en) Data storage method, device, system, equipment, medium and product
CN115118520B (en) Data processing method, device and server
CN111093194A (en) Edge computing virtual base station management method and device based on block chain
CN110598427A (en) Data processing method, system and storage medium
CN116166749A (en) Data sharing method and device, electronic equipment and storage medium
CN113992393B (en) Method, apparatus, system, and medium for model update for vertical federal learning
CN108141462B (en) Method and system for database query
CN115391795A (en) Data processing method, related device and medium
CN112637233A (en) Safe averaging method based on multi-user data
CN111459899A (en) Log sharing method and device and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant