CN111767564B - Data replacement method and device and electronic equipment - Google Patents
Data replacement method and device and electronic equipment Download PDFInfo
- Publication number
- CN111767564B CN111767564B CN202010913317.XA CN202010913317A CN111767564B CN 111767564 B CN111767564 B CN 111767564B CN 202010913317 A CN202010913317 A CN 202010913317A CN 111767564 B CN111767564 B CN 111767564B
- Authority
- CN
- China
- Prior art keywords
- data
- interaction party
- data interaction
- party
- replacement
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention provides a data replacement method, a data replacement device and electronic equipment, wherein the method comprises the following steps: acquiring data interaction side data to be subjected to data replacement, wherein the data interaction side data comprises: data of a first data interaction party and data of a second data interaction party; according to a preset rule, matching data of a first data interaction party with data of a second data interaction party to obtain data to be subjected to data replacement in the first data interaction party; setting authority and encrypting data to be subjected to data replacement in a first data interaction party to obtain converted data; and sending the converted data to a second data interaction party. According to the embodiment of the invention, two data interaction parties can be prevented from directly performing data interaction, converted data obtained through permission setting and encryption processing is sent, and the converted data has the use permission, so that the data is prevented from being leaked, and the safety of the data can be improved.
Description
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a data replacement method, an apparatus, and an electronic device.
Background
With the development of big data technology, in the field of digital customer operation, enterprise customers need more compliant user portrait data to enrich the dimensionality of self-owned user portraits and increase the richness of data related to the user portrait dimensionality, and further need multi-dimensional data supplement of self-owned user portraits by multi-party external data.
The method for data replacement among the existing enterprises comprises the following steps: the enterprise sends the user image data to another enterprise needing data replacement, and the other enterprise also sends the user image data to the enterprise.
However, in practical applications, the user portrait data of an enterprise belongs to a core data asset, and after the enterprise sends the user portrait data to another enterprise needing data replacement, the existing data replacement method cannot ensure that the other enterprise is safe and does not have the problem of data leakage, that is, the existing data replacement method has a data security risk.
Disclosure of Invention
The embodiment of the invention aims to provide a data replacement method, a data replacement device and electronic equipment, so that data are prevented from being leaked, and the safety of the data is improved. The specific technical scheme is as follows:
in a first aspect, an embodiment of the present invention provides a data replacement method, which is applied to a secure room system, and the method includes:
acquiring data interaction side data to be subjected to data replacement, wherein the data interaction side data comprises: data of a first data interaction party and data of a second data interaction party; the first data interaction party is used for providing data of data replacement, and the second data interaction party is used for receiving the data of data replacement;
according to a preset rule, matching the data of the first data interaction party with the data of the second data interaction party to obtain data to be subjected to data replacement in the first data interaction party;
setting authority and encrypting the data to be subjected to data replacement in the first data interaction party to obtain converted data;
and sending the converted data to the second data interaction party.
Optionally, the data interaction side data includes: identification of the data interaction party, and user portrait data of the data interaction party; the step of obtaining data interaction side data to be subjected to data replacement comprises the following steps:
the method comprises the steps of periodically obtaining encrypted data of a first data interaction party and encrypted data of a second data interaction party, wherein the data of the first data interaction party comprises an identifier of the first data interaction party and user portrait data of the first data interaction party; the data of the second data interactor includes an identification of the second data interactor and user representation data of the second data interactor.
Optionally, the data interaction side data includes: the identification of the data interaction party and the user portrait data newly added by the data interaction party; the step of obtaining data interaction side data to be subjected to data replacement comprises the following steps:
periodically acquiring encrypted data of a first data interaction party and encrypted data of a second data interaction party, wherein the data of the first data interaction party comprises an identifier of the first data interaction party and newly-added user portrait data of the first data interaction party; the data of the second data interaction party comprises the identification of the second data interaction party and the user portrait data newly added by the second data interaction party.
Optionally, before matching the data of the first data interaction party with the data of the second data interaction party according to a preset rule to obtain data to be subjected to data replacement in the first data interaction party, the method further includes:
and decrypting the acquired data of the first data interaction party and the acquired data of the second data interaction party to be subjected to data replacement.
Optionally, the data interaction side data further includes: relationship data of a data interaction party, the relationship data of the data interaction party comprising: the data source corresponding to the user portrait data of the data interaction party or the user identification associated with the user portrait data of the data interaction party, wherein the user identification is used for identifying the user portrait data of different users;
the step of matching the data of the first data interaction party with the data of the second data interaction party according to a preset rule to obtain the data to be subjected to data replacement in the first data interaction party comprises the following steps:
and matching the user portrait data of the first data interaction party with the same data source with the user portrait data of the second data interaction party, or matching the user portrait data of the first data interaction party with the same user identification with the user portrait data of the second data interaction party to obtain the data to be subjected to data replacement in the first data interaction party.
Optionally, the step of sending the converted data to the second data interaction party includes:
and sending the converted data to the second data interaction party by using a File Transfer Protocol (FTP), or sending the converted data to the second data interaction party in real time through an Application Program Interface (API).
In a second aspect, an embodiment of the present invention provides a data replacement device, which is applied to a secure room system, where the device includes:
the acquisition module is used for acquiring data interaction side data to be subjected to data replacement, wherein the data interaction side data comprises: data of a first data interaction party and data of a second data interaction party; the first data interaction party is used for providing data of data replacement, and the second data interaction party is used for receiving the data of data replacement;
the matching module is used for matching the data of the first data interaction party with the data of the second data interaction party according to a preset rule to obtain data to be subjected to data replacement in the first data interaction party;
the conversion module is used for carrying out authority setting and encryption processing on data to be subjected to data replacement in the first data interaction party to obtain converted data;
and the sending module is used for sending the converted data to the second data interaction party.
Optionally, the data interaction side data includes: identification of the data interaction party, and user portrait data of the data interaction party; the acquisition module is specifically configured to:
the method comprises the steps of periodically obtaining encrypted data of a first data interaction party and encrypted data of a second data interaction party, wherein the data of the first data interaction party comprises an identifier of the first data interaction party and user portrait data of the first data interaction party; the data of the second data interactor includes an identification of the second data interactor and user representation data of the second data interactor.
Optionally, the data interaction side data includes: the identification of the data interaction party and the user portrait data newly added by the data interaction party; the acquisition module is specifically configured to:
periodically acquiring encrypted data of a first data interaction party and encrypted data of a second data interaction party, wherein the data of the first data interaction party comprises an identifier of the first data interaction party and newly-added user portrait data of the first data interaction party; the data of the second data interaction party comprises the identification of the second data interaction party and the user portrait data newly added by the second data interaction party.
Optionally, the apparatus further comprises:
and the decryption module is used for decrypting the acquired data of the first data interaction party and the acquired data of the second data interaction party, which are to be subjected to data replacement.
Optionally, the data interaction side data further includes: relationship data of a data interaction party, the relationship data of the data interaction party comprising: the data source corresponding to the user portrait data of the data interaction party or the user identification associated with the user portrait data of the data interaction party, wherein the user identification is used for identifying the user portrait data of different users;
the matching module is specifically configured to: and matching the user portrait data of the first data interaction party with the same data source with the user portrait data of the second data interaction party, or matching the user portrait data of the first data interaction party with the same user identification with the user portrait data of the second data interaction party to obtain the data to be subjected to data replacement in the first data interaction party.
Optionally, the sending module is specifically configured to:
and sending the converted data to the second data interaction party by using a File Transfer Protocol (FTP), or sending the converted data to the second data interaction party in real time through an Application Program Interface (API).
In a third aspect, an embodiment of the present invention provides an electronic device, which includes a processor and a machine-readable storage medium, where the machine-readable storage medium stores machine-executable instructions capable of being executed by the processor, and the processor executes the machine-executable instructions to implement the method steps of the data replacement method provided in the first aspect.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed by a processor, the method steps of the data replacement method provided in the first aspect are implemented.
In a fifth aspect, embodiments of the present invention further provide a computer program product containing instructions, which when run on a computer, cause the computer to perform the method steps of the data replacement method provided in the first aspect.
The embodiment of the invention has the following beneficial effects:
the data replacement method, the data replacement device and the electronic equipment provided by the embodiment of the invention are applied to a safe room system, and can be used for matching the data of a first data interaction party with the data of a second data interaction party according to a preset rule to obtain the data to be subjected to data replacement in the first data interaction party. And then carry out authority setting and encryption processing to the data that wait to carry out data replacement in the first data interaction side, obtain the data after the conversion, send the data after the conversion to second data interaction side again, avoided two data interaction sides to directly carry out data interaction, and what send is the data after the conversion that obtains through authority setting and encryption processing, the data after this conversion has the use authority to avoid data to be revealed, can improve the security of data.
Of course, not all of the advantages described above need to be achieved at the same time in the practice of any one product or method of the invention.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other embodiments can be obtained by using the drawings without creative efforts.
Fig. 1 is a schematic flow chart of a data replacement method according to an embodiment of the present invention;
FIG. 2 is a diagram illustrating an example of data replacement according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a data replacement device according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to solve the problem of potential data security risks existing in the existing data replacement method, an embodiment of the invention provides a data replacement method, which is applied to a safe room system, and the method comprises the following steps:
acquiring data interaction side data to be subjected to data replacement, wherein the data interaction side data comprises: data of a first data interaction party and data of a second data interaction party; the first data interaction party is used for providing data of data replacement, and the second data interaction party is used for receiving the data of data replacement;
according to a preset rule, matching the data of the first data interaction party with the data of the second data interaction party to obtain data to be subjected to data replacement in the first data interaction party;
setting authority and encrypting the data to be subjected to data replacement in the first data interaction party to obtain converted data;
and sending the converted data to the second data interaction party.
The data replacement method provided by the embodiment of the invention is applied to a safe room system, and can match the data of a first data interaction party with the data of a second data interaction party according to a preset rule to obtain the data to be subjected to data replacement in the first data interaction party. And then carry out authority setting and encryption processing to the data that wait to carry out data replacement in the first data interaction side, obtain the data after the conversion, send the data after the conversion to second data interaction side again, avoided two data interaction sides to directly carry out data interaction, and what send is the data after the conversion that obtains through authority setting and encryption processing, the data after this conversion has the use authority to avoid data to be revealed, can improve the security of data.
The following describes a data replacement method provided by an embodiment of the present invention in detail:
the data replacement method provided by the embodiment of the invention can be applied to a safe room system, and the safe room system can be a server. The safe house is a secure data query matching environment which is constructed in the network environment of an enterprise and stores enterprise data and only allows limited access.
The data replacement object applied to the safety house system in the embodiment of the invention can be different enterprises, different clients in a home network and the like, and illustratively, the different clients in the home network can be a plurality of mobile phones, tablet computers, televisions and the like in use. When the data replacement object is a different enterprise, the secure room system may be a server corresponding to the data party providing the data replacement, may also be a server corresponding to the data party receiving the data replacement, and may also be a server for which a third party has security assurance.
As shown in fig. 1, fig. 1 is a schematic flow chart of a data replacement method according to an embodiment of the present invention, where the method may include:
s101, data interaction side data to be subjected to data replacement are obtained.
In this embodiment of the present invention, the data interaction side data may include: the data of the first data interaction party and the data of the second data interaction party are provided, the first data interaction party is used for providing the data of the data replacement, and the second data interaction party is used for receiving the data of the data replacement. In practical applications, there may be a plurality of data interaction parties participating in data replacement, and in the embodiment of the present invention, a first data interaction party and a second data interaction party are taken as an example for description.
In the embodiment of the present invention, the first data interaction party and the second data interaction party participating in data replacement may upload respective data to the secure room system in advance, so that the secure room system obtains data of the first data interaction party and data of the second data interaction party to be subjected to data replacement.
As an optional implementation manner of the embodiment of the present invention, the first data interaction party and the second data interaction party may upload respective data to the secure room system using an FTP (File Transfer Protocol).
As an optional implementation manner of the embodiment of the present invention, the data interaction side data may further include: the step of obtaining the data of the data interaction party to be subjected to data replacement in step S101 may include:
and periodically acquiring the encrypted data of the first data interaction party and the encrypted data of the second data interaction party to be subjected to data replacement. The data of the first data interaction party comprises an identification of the first data interaction party and user portrait data of the first data interaction party; the data of the second data interactor includes an identification of the second data interactor and user representation data of the second data interactor.
In the embodiment of the invention, the first data interaction party can upload the encrypted identifier of the first data interaction party and the user portrait data of the first data interaction party to the secure room system periodically, and the second data interaction party can upload the encrypted identifier of the second data interaction party and the user portrait data of the second data interaction party to the secure room system periodically, so that the secure room system can acquire the encrypted data of the first data interaction party and the encrypted data of the second data interaction party to be subjected to data replacement periodically, and the data stored in the secure room system is kept consistent with the data of the first data interaction party and the data of the second data interaction party.
For example, in the embodiment of the present invention, the period of uploading data by the first data interaction party and the second data interaction party may be one day, one week, one month, or the like, and the data encryption mode may be set according to actual requirements. In the embodiment of the present invention, the period of data uploading and the data encryption mode are not specifically limited.
In the embodiment of the present invention, the identifier of the data interaction party may be, for example, a business name or a code number. The user representation data of the data interaction party can be user data of multiple dimensions contained in the enterprise, such as user gender, age, income and expenditure situations of basic dimensions, television and movie preferences of media preference dimensions, online shopping preferences of consumption preference dimensions and the like.
As an optional implementation manner of the embodiment of the present invention, the data interaction side data may further include: the step of obtaining the data of the data interaction party to be subjected to data replacement in step S101 may include, correspondingly, the step of identifying the data interaction party and the newly added user portrait data of the data interaction party:
and periodically acquiring the encrypted data of the first data interaction party and the encrypted data of the second data interaction party to be subjected to data replacement. The data of the first data interaction party comprises an identifier of the first data interaction party and user portrait data newly added by the first data interaction party; the data of the second data interaction party comprises the identification of the second data interaction party and the user portrait data added by the second data interaction party.
In the embodiment of the invention, the first data interaction party can periodically upload the encrypted identifier of the first data interaction party and the user portrait data newly added to the first data interaction party to the secure house system, and the second data interaction party can periodically upload the encrypted identifier of the second data interaction party and the user portrait data newly added to the second data interaction party to the secure house system, so that the secure house system can periodically acquire the encrypted data of the first data interaction party and the encrypted data of the second data interaction party to be subjected to data replacement.
In the embodiment of the invention, the data interaction party periodically uploads the newly added user portrait data to the safe room system, and compared with full data uploading, the data amount uploaded each time is reduced, so that the data uploading time is reduced, and meanwhile, network resources are saved.
Referring to fig. 1, S102, according to a preset rule, matching data of a first data interaction party with data of a second data interaction party to obtain data to be subjected to data replacement in the first data interaction party.
In this embodiment of the present invention, the secure room system may be encrypted data uploaded by a first data interaction party and a second data interaction party, and correspondingly, before matching data of the first data interaction party with data of the second data interaction party according to a preset rule to obtain data to be subjected to data replacement in the first data interaction party, the secure room system may further include:
and decrypting the acquired data of the first data interaction party and the acquired data of the second data interaction party to be subjected to data replacement.
In the embodiment of the present invention, a manner of decrypting data of the first data interaction party and data of the second data interaction party corresponds to a manner of encrypting data of the first data interaction party and data of the second data interaction party, which is not described herein again.
In the embodiment of the invention, the rules pre-established by the first data interaction party and the second data interaction party can be stored in the safety house system, and then when data replacement is needed, the data of the first data interaction party and the data of the second data interaction party are automatically matched directly according to the pre-stored rules to obtain the data to be subjected to data replacement in the first data interaction party, so that the process of automatically scheduling data matching is realized.
Illustratively, the rule pre-established by the first data interaction party and the second data interaction party may be a contract of data usage rights established between the first data interaction party and the second data interaction party, and the like.
As an optional implementation manner of the embodiment of the present invention, the data interaction side data may further include: relationship data of the data interaction party, the relationship data of the data interaction party may include: the data source corresponding to the user representation data of the data interaction party, or a user identifier associated with the user representation data of the data interaction party, the user identifier being used to identify the user representation data of different users.
For example, the data source corresponding to the user image data of the data interaction party may be the device from which the user image data of the data interaction party is obtained or the device from which the user image data is transmitted, i.e. the association relationship between the user image data of the data interaction party and the device from which the user image data is obtained, for example, the user image data of the data interaction party a is from device B, the user image data of the data interaction party C is from device B, or the user image data of the data interaction party C is from device H. The user identification associated with the user representation data of the data interaction party may be which user the user representation data belongs to in the data interaction party, i.e. an association between the user representation data and the user in the data interaction party.
Correspondingly, as an optional implementation manner of the embodiment of the present invention, the step of matching, according to a preset rule, the data of the first data interaction party with the data of the second data interaction party in step S102 to obtain the data to be subjected to data replacement in the first data interaction party may include:
and matching the user portrait data of the first data interaction party with the same data source with the user portrait data of the second data interaction party, or matching the user portrait data of the first data interaction party with the same user identification with the user portrait data of the second data interaction party to obtain data to be subjected to data replacement in the first data interaction party.
Illustratively, the identifier of the first data interaction party is a, the identifier of the second data interaction party is C, the user image data of the data interaction party a originates from the device B, the user image data of the data interaction party C originates from the device B, the user image data of the data interaction party a originating from the device B and the user image data of the data interaction party C may be matched to obtain user image data that is present in the data interaction party a but not present in the data interaction party C, and the matched user image data may be determined as data to be subjected to data replacement in the data interaction party a.
Or matching the user portrait data of the data interaction party A with the user portrait data of the data interaction party C to obtain the user portrait data which is present in the data interaction party A but not present in the data interaction party C, and determining the matched user portrait data as the data to be subjected to data replacement in the data interaction party A.
Referring to fig. 1, in S103, authority setting and encryption processing are performed on data to be subjected to data replacement in the first data interaction party, so as to obtain converted data.
In the embodiment of the invention, the authority setting and encryption processing are carried out on the data to be subjected to data replacement in the first data interaction party obtained by matching, so that the converted data is obtained, and then the converted data is sent to the data interaction party receiving the data replacement. Illustratively, permission setting can be performed on data to be subjected to data replacement in the first data interaction party, so that only part of users with permission can view and use the data after the second data interaction party receives the data with permission setting, and data leakage is avoided. The encryption process may be the same as the encryption process of the encrypted data uploaded by the data interaction party.
And S104, sending the converted data to a second data interaction party.
As an optional implementation manner of the embodiment of the present invention, the converted data may be sent to the second data interaction party by using a file transfer protocol FTP, or the converted data may be sent to the second data interaction party in real time by using an application program interface API.
In the embodiment of the present invention, if the data amount corresponding to the converted data is relatively large, the converted data may be sent to the second data interaction party by using FTP, and if the data amount corresponding to the converted data is relatively small, the converted data may be sent to the second data interaction party in real time by using an Application Programming Interface (API), so as to implement near-real-time data replacement of the data interaction party.
The data replacement method provided by the embodiment of the invention is applied to a safe room system, and can match the data of a first data interaction party with the data of a second data interaction party according to a preset rule to obtain the data to be subjected to data replacement in the first data interaction party. And then carry out authority setting and encryption processing to the data that wait to carry out data replacement in the first data interaction side, obtain the data after the conversion, send the data after the conversion to second data interaction side again, avoided two data interaction sides to directly carry out data interaction, and what send is the data after the conversion that obtains through authority setting and encryption processing, the data after this conversion has the use authority to avoid data to be revealed, can improve the security of data.
Illustratively, as shown in fig. 2, fig. 2 is a schematic diagram of an example of data replacement provided by the embodiment of the present invention. The safe room system is located at a certain data interaction party, data in a server cluster of the data interaction party can be directly obtained, the client represents another data interaction party, and the client can upload user portrait data to the safe room system through the FTP protocol channel. The security house system matches data in the server cluster with data of the client according to preset rules, wherein the matching can be user portrait data with the same data source or user portrait data with the same user identification to obtain data to be subjected to data replacement in the server cluster, and performs authority setting and encryption processing on the data to be subjected to data replacement in the server cluster to obtain converted data, and then sends the converted data to the client.
For example, when the secure house system according to the embodiment of the present invention is applied to a home, the secure house system may be a server. The server may obtain data in each electronic device in the home, and specifically, each electronic device (for example, a mobile phone) may periodically (for one hour, etc.) upload incremental data in the period to the server through the FTP protocol channel. The server matches data in different electronic devices, and in The matching process, data in different electronic devices D and E associated with OTT (Over The Top, internet television) can be matched to obtain data to be subjected to data replacement in D. And then, performing authority setting and encryption processing on the data to be subjected to data replacement in the step D to obtain converted data, and sending the converted data to the electronic device E, or playing the data to be subjected to data replacement in the step D on an OTT to realize data sharing.
Corresponding to the foregoing data replacement method, an embodiment of the present invention further provides a data replacement device. Fig. 3 is a schematic structural diagram of a data replacement device according to an embodiment of the present invention, which is applied to a secure room system, and the data replacement device may include:
an obtaining module 201, configured to obtain data interaction side data to be subjected to data replacement, where the data interaction side data includes: data of a first data interaction party and data of a second data interaction party; the first data interaction party is used for providing data of the data replacement, and the second data interaction party is used for receiving the data of the data replacement.
The matching module 202 is configured to match the data of the first data interaction party with the data of the second data interaction party according to a preset rule, so as to obtain data to be subjected to data replacement in the first data interaction party.
The conversion module 203 is configured to perform permission setting and encryption processing on data to be subjected to data replacement in the first data interaction party, so as to obtain converted data.
And a sending module 204, configured to send the converted data to the second data interaction party.
The data replacement device provided by the embodiment of the invention is applied to a safe room system, and can match the data of a first data interaction party with the data of a second data interaction party according to a preset rule to obtain the data to be subjected to data replacement in the first data interaction party. And then carry out authority setting and encryption processing to the data that wait to carry out data replacement in the first data interaction side, obtain the data after the conversion, send the data after the conversion to second data interaction side again, avoided two data interaction sides to directly carry out data interaction, and what send is the data after the conversion that obtains through authority setting and encryption processing, the data after this conversion has the use authority to avoid data to be revealed, can improve the security of data.
Optionally, the data interaction party data includes: identification of the data interaction party, and user portrait data of the data interaction party; the obtaining module 201 is specifically configured to:
the method comprises the steps of periodically obtaining encrypted data of a first data interaction party and encrypted data of a second data interaction party, wherein the data of the first data interaction party comprises an identifier of the first data interaction party and user portrait data of the first data interaction party; the data of the second data interactor includes an identification of the second data interactor and user representation data of the second data interactor.
Optionally, the data interaction party data includes: the identification of the data interaction party and the user portrait data newly added by the data interaction party; the obtaining module 201 is specifically configured to:
periodically acquiring encrypted data of a first data interaction party and encrypted data of a second data interaction party, wherein the data of the first data interaction party comprises an identifier of the first data interaction party and newly-added user portrait data of the first data interaction party; the data of the second data interaction party comprises the identification of the second data interaction party and the user portrait data added by the second data interaction party.
Optionally, the apparatus may further include:
and the decryption module is used for decrypting the acquired data of the first data interaction party and the acquired data of the second data interaction party, which are to be subjected to data replacement.
Optionally, the data interaction party data further comprises: the relationship data of the data interaction party comprises: the data source corresponding to the user representation data of the data interaction party, or a user identifier associated with the user representation data of the data interaction party, the user identifier being used to identify the user representation data of different users.
The matching module 202 is specifically configured to: and matching the user portrait data of the first data interaction party with the same data source with the user portrait data of the second data interaction party, or matching the user portrait data of the first data interaction party with the same user identification with the user portrait data of the second data interaction party to obtain data to be subjected to data replacement in the first data interaction party.
Optionally, the sending module 204 is specifically configured to:
and the converted data is sent to a second data interaction party by using a File Transfer Protocol (FTP), or the converted data is sent to the second data interaction party in real time through an Application Program Interface (API).
The embodiment of the present invention further provides an electronic device, as shown in fig. 4, which includes a processor 301, a communication interface 302, a memory 303, and a communication bus 304, where the processor 301, the communication interface 302, and the memory 303 complete mutual communication through the communication bus 304,
a memory 303 for storing a computer program;
the processor 301 is configured to implement the steps of the data replacement method provided by the embodiment of the present invention when executing the program stored in the memory 303, and achieve the same technical effect.
According to the electronic device provided by the embodiment of the invention, the data of the first data interaction party and the data of the second data interaction party can be matched according to the preset rule, so that the data to be subjected to data replacement in the first data interaction party is obtained. And then carry out authority setting and encryption processing to the data that wait to carry out data replacement in the first data interaction side, obtain the data after the conversion, send the data after the conversion to second data interaction side again, avoided two data interaction sides to directly carry out data interaction, and what send is the data after the conversion that obtains through authority setting and encryption processing, the data after this conversion has the use authority to avoid data to be revealed, can improve the security of data.
The communication bus mentioned in the above server device may be a PCI (Peripheral Component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface is used for communication between the electronic equipment and other equipment.
The Memory may include a RAM (Random Access Memory) or an NVM (Non-Volatile Memory), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also a DSP (Digital Signal Processing), an ASIC (Application Specific Integrated Circuit), an FPGA (Field Programmable Gate Array) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component.
In another embodiment of the present invention, a computer-readable storage medium is further provided, in which a computer program is stored, and the computer program, when executed by a processor, implements the steps of any one of the above-mentioned data replacement methods, and achieves the same technical effects.
In another embodiment of the present invention, a computer program product containing instructions is provided, which when run on a computer, causes the computer to perform the steps of any one of the above-mentioned data replacement methods, and achieve the same technical effects.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber, DSL (Digital Subscriber Line)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., a floppy Disk, a hard Disk, a magnetic tape), an optical medium (e.g., a DVD (Digital Versatile Disk)), or a semiconductor medium (e.g., an SSD (Solid State Disk)), etc.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the device/electronic apparatus embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and for the relevant points, reference may be made to some descriptions of the method embodiments.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention shall fall within the protection scope of the present invention.
Claims (9)
1. A data replacement method is applied to a safe room system, and comprises the following steps:
acquiring data interaction side data to be subjected to data replacement, wherein the data interaction side data comprises: data of a first data interaction party and data of a second data interaction party; the first data interaction party is used for providing data of data replacement, and the second data interaction party is used for receiving the data of data replacement;
according to a preset rule, matching the data of the first data interaction party with the data of the second data interaction party to obtain data to be subjected to data replacement in the first data interaction party;
setting authority and encrypting the data to be subjected to data replacement in the first data interaction party to obtain converted data;
sending the converted data to the second data interaction party;
wherein the data interaction side data comprises: relationship data of a data interaction party, the relationship data of the data interaction party comprising: the data source corresponding to the user portrait data of the data interaction party or the user identification associated with the user portrait data of the data interaction party, wherein the user identification is used for identifying the user portrait data of different users;
the step of matching the data of the first data interaction party with the data of the second data interaction party according to a preset rule to obtain the data to be subjected to data replacement in the first data interaction party comprises the following steps:
and matching the user portrait data of the first data interaction party with the same data source with the user portrait data of the second data interaction party, or matching the user portrait data of the first data interaction party with the same user identification with the user portrait data of the second data interaction party to obtain the data to be subjected to data replacement in the first data interaction party.
2. The method of claim 1, wherein the data interactor data comprises: identification of the data interaction party, and user portrait data of the data interaction party; the step of obtaining data interaction side data to be subjected to data replacement comprises the following steps:
the method comprises the steps of periodically obtaining encrypted data of a first data interaction party and encrypted data of a second data interaction party, wherein the data of the first data interaction party comprises an identifier of the first data interaction party and user portrait data of the first data interaction party; the data of the second data interactor includes an identification of the second data interactor and user representation data of the second data interactor.
3. The method of claim 1, wherein the data interactor data comprises: the identification of the data interaction party and the user portrait data newly added by the data interaction party; the step of obtaining data interaction side data to be subjected to data replacement comprises the following steps:
periodically acquiring encrypted data of a first data interaction party and encrypted data of a second data interaction party, wherein the data of the first data interaction party comprises an identifier of the first data interaction party and newly-added user portrait data of the first data interaction party; the data of the second data interaction party comprises the identification of the second data interaction party and the user portrait data newly added by the second data interaction party.
4. The method according to claim 2 or 3, wherein before the data of the first data interaction party is matched with the data of the second data interaction party according to a preset rule to obtain the data to be subjected to data replacement in the first data interaction party, the method further comprises:
and decrypting the acquired data of the first data interaction party and the acquired data of the second data interaction party to be subjected to data replacement.
5. The method of claim 1, wherein the step of sending the converted data to the second data interactor comprises:
and sending the converted data to the second data interaction party by using a File Transfer Protocol (FTP), or sending the converted data to the second data interaction party in real time through an Application Program Interface (API).
6. A data replacement device is characterized by being applied to a safe room system, and the device comprises:
the acquisition module is used for acquiring data interaction side data to be subjected to data replacement, wherein the data interaction side data comprises: data of a first data interaction party and data of a second data interaction party; the first data interaction party is used for providing data of data replacement, and the second data interaction party is used for receiving the data of data replacement;
the matching module is used for matching the data of the first data interaction party with the data of the second data interaction party according to a preset rule to obtain data to be subjected to data replacement in the first data interaction party;
the conversion module is used for carrying out authority setting and encryption processing on data to be subjected to data replacement in the first data interaction party to obtain converted data;
the sending module is used for sending the converted data to the second data interaction party;
wherein the data interaction side data comprises: relationship data of a data interaction party, the relationship data of the data interaction party comprising: the data source corresponding to the user portrait data of the data interaction party or the user identification associated with the user portrait data of the data interaction party, wherein the user identification is used for identifying the user portrait data of different users;
the matching module is specifically configured to: and matching the user portrait data of the first data interaction party with the same data source with the user portrait data of the second data interaction party, or matching the user portrait data of the first data interaction party with the same user identification with the user portrait data of the second data interaction party to obtain the data to be subjected to data replacement in the first data interaction party.
7. The apparatus of claim 6, wherein the sending module is specifically configured to:
and sending the converted data to the second data interaction party by using a File Transfer Protocol (FTP), or sending the converted data to the second data interaction party in real time through an Application Program Interface (API).
8. An electronic device is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor and the communication interface are used for realizing mutual communication by the memory through the communication bus;
a memory for storing a computer program;
a processor for implementing the method steps of any one of claims 1 to 5 when executing a program stored in the memory.
9. A computer-readable storage medium, characterized in that a computer program is stored in the computer-readable storage medium, which computer program, when being executed by a processor, carries out the method steps of any one of the claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010913317.XA CN111767564B (en) | 2020-09-03 | 2020-09-03 | Data replacement method and device and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010913317.XA CN111767564B (en) | 2020-09-03 | 2020-09-03 | Data replacement method and device and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111767564A CN111767564A (en) | 2020-10-13 |
CN111767564B true CN111767564B (en) | 2020-11-27 |
Family
ID=72729230
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010913317.XA Active CN111767564B (en) | 2020-09-03 | 2020-09-03 | Data replacement method and device and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111767564B (en) |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8588150B2 (en) * | 2008-08-07 | 2013-11-19 | Qualcomm Incorporated | RNTI-dependent scrambling sequence initialization |
CN105337682B (en) * | 2014-05-26 | 2018-10-12 | 联想(北京)有限公司 | A kind of method and device of transmission data |
CN105610953B (en) * | 2015-12-31 | 2019-07-23 | 深圳市优户科技有限公司 | A kind of distribution type data synchronous system and method |
CN109271454B (en) * | 2018-10-26 | 2021-02-02 | 金蝶软件(中国)有限公司 | Data synchronization method and network equipment |
CN111611318A (en) * | 2020-06-08 | 2020-09-01 | 杭州复杂美科技有限公司 | Data access method, device and storage medium |
-
2020
- 2020-09-03 CN CN202010913317.XA patent/CN111767564B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN111767564A (en) | 2020-10-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7357141B2 (en) | Salutation Protocol System and Method for Communicating Using a Private Overlay Peer-to-Peer Network | |
CN110521172B (en) | Method and system for processing ephemeral content messages | |
US11798012B2 (en) | Systems and methods for anonymous behavioral-based records identification | |
US20210026976A1 (en) | Systems and methods of gesture triggered automatic erasure on a private network | |
US10986095B2 (en) | Systems and methods for controlling network access | |
US10417434B2 (en) | Method, apparatus, and computer-readable medium for data exchange | |
US10778648B2 (en) | Systems and methods for regional data storage and data anonymization | |
US8387148B2 (en) | Secure rights protection for broadcast mobile content | |
CN110457629A (en) | Permission processing, authority control method and device | |
US11671531B1 (en) | Techniques for managing communications between devices | |
CN110719284B (en) | Data sharing method and related equipment | |
CN111767564B (en) | Data replacement method and device and electronic equipment | |
US9043880B1 (en) | Directory service user exportation system | |
US20200374255A1 (en) | Communication and Conversation between Individuals and Service Providers | |
CN107210992B (en) | Uploading and downloading data between a secure data system and an external data system | |
Gowda | BDOSN: Privacy-aware Blockchain based Decentralized OSNs | |
US20160259949A1 (en) | System and interface supporting safe sharing of content on social media services | |
US20240015035A1 (en) | Systems and methods for modifying pending blockchain operations | |
CN115310919A (en) | Data cooperation method and device, electronic equipment and storage medium | |
Nist et al. | NIST Special Publication 800-63 Electronic Authentication Guideline | |
EP3026618A1 (en) | Method and apparatus for controlling access to user profiles | |
TWM512180U (en) | A cloud system for digital television |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |