CN113468564A - Data processing method and device, electronic equipment and storage medium - Google Patents

Data processing method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN113468564A
CN113468564A CN202110734301.7A CN202110734301A CN113468564A CN 113468564 A CN113468564 A CN 113468564A CN 202110734301 A CN202110734301 A CN 202110734301A CN 113468564 A CN113468564 A CN 113468564A
Authority
CN
China
Prior art keywords
type
modifier
data
function
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110734301.7A
Other languages
Chinese (zh)
Inventor
李艺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huakong Tsingjiao Information Technology Beijing Co Ltd
Original Assignee
Huakong Tsingjiao Information Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huakong Tsingjiao Information Technology Beijing Co Ltd filed Critical Huakong Tsingjiao Information Technology Beijing Co Ltd
Priority to CN202110734301.7A priority Critical patent/CN113468564A/en
Publication of CN113468564A publication Critical patent/CN113468564A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the application provides a data processing method and device, an electronic device and a storage medium, and can solve the problem that in the prior art, the operation is complicated due to the fact that a plurality of preset devices in a multi-party security computing system need to be subjected to targeted configuration documents. Receiving at least one piece of data to be processed; determining a target modifier corresponding to a first device type based on a same prestored document describing the completion modes of a plurality of preset tasks in the multi-party security computing system and the first device type of the target modifier; and calling a function modified by the target modifier to process at least one piece of data to be processed, wherein a plurality of function functions are defined in the document, each function is allowed to be modified by any type of modifier in a plurality of types of modifiers, and the function modified by any type of modifier is used for indicating that a device characterized by any type of modifier is allowed to execute the function.

Description

Data processing method and device, electronic equipment and storage medium
Technical Field
The present application relates to the technical field of multiparty security computing, and in particular, to a data processing method, an apparatus, an electronic device, and a storage medium.
Background
Generally, a multi-party secure computing system needs to complete various preset tasks during work, such as a preprocessing task for data, a ciphertext computing task for data after preprocessing data, and a post-processing task for data after ciphertext computing. The preset tasks are respectively executed in different node devices in the multi-party security computing system. In the existing multi-party secure computing system, only the ciphertext computing task is described, and tasks required to be completed in a plaintext for preprocessing, post-processing and the like need to be described and executed separately in a plaintext task form, that is, documents for describing the completion modes of various preset tasks are mutually independent, that is, one preset task corresponds to one document. In the task execution stage, different documents need to be configured for the types of tasks executed by different node devices in the multi-party secure computing system, so that the operation is complicated, and the working efficiency of the multi-party secure computing system is reduced to a certain extent.
Disclosure of Invention
The embodiment of the application provides a data processing method and device, an electronic device and a storage medium, and can solve the problem that in the prior art, the operation is complicated due to the fact that a plurality of preset task pertinence configuration documents in a multi-party security computing system need to be configured.
In a first aspect, an embodiment of the present application provides a data processing method, where the method is applied to a device of a preset type in a multi-party secure computing system, where the device includes: a data providing device, a ciphertext computing device, or a result receiving device, the method comprising:
receiving at least one piece of data to be processed;
determining a target modifier corresponding to a first device type based on a same prestored document describing the completion modes of a plurality of preset tasks in the multi-party security computing system and the first device type of the multi-party security computing system; wherein, multiple types of modifiers are predefined in the document, and each type of modifier is used for representing one type of equipment;
and calling a function modified by the target modifier to process the at least one piece of data to be processed, wherein a plurality of function functions are defined in the document, different function functions in the plurality of function functions are used for executing different preset tasks in the multi-party secure computing system, each function is allowed to be modified by any type of modifier in the plurality of types of modifiers, and the function modified by any type of modifier is used for indicating that a device characterized by any type of modifier is allowed to execute the function.
In the embodiment of the application, the completion modes of a plurality of preset tasks in the multi-party secure computing system are described in the same document by introducing a combination of modifiers and function functions, that is, each type of modifier is used for characterizing one type of device, one function is used for executing one preset task, and the function modified by any type of modifier is used for indicating that the device characterized by any type of modifier can execute the function to complete the preset task. Therefore, the preset type devices for executing any one of the preset tasks in the multi-party secure computing system can store the document, and in the execution stage of the preset task, the preset type devices only need to determine a corresponding target modifier from the document according to the first device type of the preset type devices, and then call at least one piece of data received by the function modified by the target modifier for processing. In the method, under the condition of ensuring that each preset task can be normally completed, one document is used for describing the completion mode of a plurality of preset tasks in the multi-party security computing system, so that preset type equipment for executing the preset tasks in the multi-party security computing system can configure the same document.
Optionally, when the device is a data providing device or a result receiving device, each piece of data in the at least one piece of data has a corresponding identity, and determining, based on a pre-stored same document describing task completion manners of various stages in the multi-party secure computing system and a first device type of the device, a target modifier corresponding to the first device type includes:
determining at least one first type modifier corresponding to the first device type from the multiple types of modifiers, wherein the at least one first type modifier comprises an identity of target to-be-processed data;
determining the target modifier from the at least one first type modifier based on the identity.
In this embodiment of the application, when a preset type of device is a data providing device or a result receiving device, each received data has a corresponding identity, at this time, at least one first type modifier may be determined from among multiple types of modifiers based on a first device type, where the at least one first type modifier includes an identity of target to-be-processed data, that is, it is defined which data to be processed needs to be processed by a function modified by the first type modifier, and at this time, the target modifier may be determined from the at least one first type modifier quickly according to the identity of each received data.
Optionally, a part of the at least one first-type modifier includes identifiers of a plurality of target data to be processed.
In this embodiment of the application, the received at least one piece of data may have the same processing mode used for part of the data, and then a part of the first-type modifiers in the at least one first-type modifier may include the identity of a plurality of pieces of target data to be processed, that is, the plurality of pieces of data to be processed may be processed based on the function modified by the same modifier, thereby implementing multiplexing of the function in the same document.
Alternatively, the same function is allowed to be modified by at least one type of modifier.
In the embodiment of the present application, for the same function, it may be allowed to be modified by at least one type of modifier, that is, the same function may be used by different types of devices, thereby implementing multiplexing of the function.
In a second aspect, an embodiment of the present application provides a data processing apparatus, where the apparatus includes:
a receiving unit for receiving at least one data to be processed;
the device comprises a determining unit, a judging unit and a processing unit, wherein the determining unit is used for determining a target modifier corresponding to a first equipment type based on the same prestored document describing the completion modes of a plurality of preset tasks in the multi-party security computing system and the first equipment type of the determining unit; wherein, multiple types of modifiers are predefined in the document, and each type of modifier is used for representing one type of equipment;
a processing unit, configured to invoke a function modified by the target modifier to process the at least one piece of data to be processed, where a plurality of function functions are defined in the document, different function functions in the plurality of function functions are used to perform different preset tasks in the multi-party secure computing system, each function is allowed to be modified by any type modifier in the multiple types of modifiers, and the function modified by any type modifier is used to indicate that a device characterized by any type modifier is allowed to execute the function.
Optionally, if the data processing apparatus is a data providing device or a result receiving device, and each data in the at least one data has a corresponding identity, the determining unit is specifically configured to:
determining at least one first type modifier corresponding to the first device type from the multiple types of modifiers, wherein the at least one first type modifier comprises an identity of target to-be-processed data;
determining the target modifier from the at least one first type modifier based on the identity.
Optionally, a part of the at least one first-type modifier includes identifiers of a plurality of target data to be processed.
Alternatively, the same function is allowed to be modified by at least one type of modifier.
In a third aspect, an embodiment of the present invention provides an electronic device, where the electronic device includes a processor and a memory, and the processor is configured to implement the steps of the method according to any one of the embodiments of the first aspect when executing a computer program stored in the memory.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the method according to any one of the embodiments of the first aspect.
In the application, under the condition that each preset task can be normally completed, one document is used for describing the completion mode of a plurality of preset tasks in the multi-party security computing system, so that preset type equipment for executing each preset task in the multi-party security computing system can be configured with the same document (which is equivalent to configuring the same document for each preset task), and compared with the configuration document which needs to be respectively pertinently configured for each type of equipment in the prior art (which is equivalent to configuring the document for each preset task pertinently), the operation process is simplified, meanwhile, the error probability in the configuration process is reduced, and the execution efficiency of the multi-party security computing system and the correctness of the execution result are improved.
Drawings
FIG. 1 provides an architecture diagram of a multi-party secure computing system according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a data processing method according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments.
In multi-party secure computing systems, different tasks are typically performed by different devices. In the prior art, documents describing the completion mode of each plaintext task and each ciphertext task are independent of each other. In the task execution stage, specific configuration documents for different devices are required (i.e. the specific configuration documents for different tasks are also equivalent), which results in a tedious operation and also reduces the task execution efficiency of the multi-party secure computing system.
In view of this, an embodiment of the present application provides a data processing method, in which, under a condition that it is ensured that each preset task can be completed normally, a document is used to describe a completion manner of multiple preset tasks in a multi-party secure computing system, so that preset-type devices for executing the preset tasks in the multi-party secure computing system can configure the same document (which is equivalent to configuring the same document for each preset task), and compared with a configuration document that needs to be respectively targeted for each type of device in the prior art (which is equivalent to configuring the document for each preset task), an operation flow is simplified, meanwhile, a probability of errors in a configuration process is reduced, and execution efficiency of the multi-party secure computing system and correctness of an execution result are improved.
For ease of understanding, an application scenario of the embodiments of the present application is first described. Fig. 1 is a schematic diagram of a multi-party secure computing system according to an embodiment of the present disclosure. Fig. 1 includes a data providing apparatus 101, a ciphertext computing apparatus 102, and a result receiving apparatus 103.
The data providing apparatus 101 is mainly used for receiving external data, for example, the data providing apparatus 101 may receive the data source1, the data source2, the data source3 and the data source4, and the number of external data that the data providing apparatus 101 can receive is not particularly limited. The data providing apparatus 101 may perform a preprocessing task after receiving the external data, for example, the preprocessing task may be to transform the format of the external data or replace an abnormal value in the external data, and the specific content of the preprocessing task is not particularly limited herein.
The ciphertext computing device 102 is mainly configured to receive ciphertext data preprocessed by the data providing device 102, and then perform ciphertext computation on the ciphertext data.
The result receiving device 103 is mainly used for receiving the result data after ciphertext calculation, for example, the result receiving device 103 may receive the data result1, the data result2, and the result data result3, and the number of the result data that can be received by the result receiving device 103 is not particularly limited. The result receiving device 103 may perform a post-processing task after receiving the result data, for example, the post-processing task may be to perform format conversion on the result data or to eliminate some unnecessary data, and the specific content of the post-processing task is not particularly limited herein.
Based on the architecture diagram of the multi-party secure computing system shown in fig. 1, the following describes a technical solution provided by the embodiment of the present application with reference to the accompanying drawings. Referring to fig. 2, an embodiment of the present application provides a data processing method, where a flow of the method is described as follows:
step 201: the preset type of equipment receives at least one piece of data to be processed.
In this embodiment, the preset type of device may be any one of the data providing device 101, the ciphertext computing device 102, or the result receiving device 103.
Specifically, please refer to fig. 1, for the data providing device 101, at least one data may be a part of or all of the data source1, the data source2, the data source3 and the data source4, or may be other data not labeled in fig. 1, which is not limited herein. For the ciphertext computing device 102, the at least one piece of data may be ciphertext data represented by part or all of func1(source1), func1(source2), func2(source3), and func3(source4), and may be other data that is not labeled in fig. 1, which is not limited herein. For the result receiving device 103, the at least one data may be ciphertext data represented by part or all of the result1, the result2, and the result3, and may also be other data not shown in fig. 1, which is not limited herein.
Step 202: the preset type equipment determines a target modifier corresponding to a first equipment type based on a same prestored document describing the completion modes of a plurality of preset tasks in the multi-party safety computing system and the first equipment type of the equipment; multiple types of modifiers are predefined in the document, each type of modifier being used to characterize a type of device.
In the embodiment of the present application, multiple types of modifiers may be defined in the same document, where each type of modifier is used to characterize one type of device, which is equivalent to establishing a correspondence relationship between the modifier and the type of the device. For example, the data providing apparatus 101 is characterized by an "@ pre" modifier, the ciphertext computing apparatus 102 is characterized by an "@ engine" modifier, and the result receiving apparatus 103 is characterized by an "@ post" modifier. Here, the modifiers used for characterizing different device types are only required to ensure that the above-mentioned documents are not duplicated, and the specific contents of the modifiers are not particularly limited herein. It should be understood that the modifier is represented by @ and is an existing Python syntax, and will not be described here.
Meanwhile, considering that a plurality of preset tasks need to be executed in the multi-party secure computing system, for example, the preset tasks may include: a preprocessing task performed by the data providing device 101, a ciphertext computing task performed by the ciphertext computing device 102, and a post-processing task performed by the result receiving device 103. Therefore, a plurality of function functions, for example, func1, func2, func3, are also defined in the above documents, and the number of function functions is not particularly limited, different function functions in the plurality of function functions are used for executing different preset tasks in the multi-party secure computing system, and each function is allowed to be modified by any type of modifier in a plurality of types of modifiers, and then the function modified by any type of modifier is used for indicating that a device characterized by any type of modifier is allowed to execute the function.
It should be understood that, when the ciphertext computing device 102 in the multi-party secure computing system performs the ciphertext computing task, the processing manner of all the received data is the same, that is, only one function needs to be set for the ciphertext computing task in the above document, and the function is modified by the modifier for representing the ciphertext computing device 102, that is, the modifier for representing the ciphertext computing device 102 only appears once in the above document.
In the multi-party secure computing system, the data providing device 101 and the result receiving device 103 have the same processing mechanism when defining the function, taking the data providing device 101 as an example, in at least one piece of data received by the data providing device 101, each piece of data has a corresponding identity, and different pieces of data are distinguished through the identity. And the preprocessing manners adopted by the at least one piece of data may also be different, so that a plurality of function functions are defined in the document for the preprocessing task, each function corresponds to a different type of preprocessing task, and the function functions are all modified by the modifier for characterizing the data providing device 101, that is, the modifier for characterizing the data providing device 101 may appear in the document many times.
Through the process, the completion mode of describing a plurality of preset tasks in the multi-party security computing system is defined in the same document. And then, the documents can be simultaneously configured to preset types of equipment in the multi-party security computing system, namely, each preset type of equipment is configured with the same document.
Under the condition that the completion modes of a plurality of preset tasks in the multi-party security computing system are described by using the same document, each preset task needs to be ensured to be normally completed. The following is a specific description of how to determine the corresponding modifier when performing a task for different preset types of devices.
Firstly, the method comprises the following steps: the predetermined type of device is the ciphertext computing device 102.
In this embodiment, the ciphertext computing device 102 stores the same document describing multiple preset task completion manners in the multi-party secure computing system in advance, and then, based on the device type of the ciphertext computing device, for example, the first device type, a specific type of modifier corresponding to the first device type, that is, a target modifier, may be determined from multiple types of modifiers defined in the document, so that the ciphertext computing device 102 may know what function should be run next, and thus complete the ciphertext computing task of the ciphertext computing device.
Secondly, the method comprises the following steps: the preset type of device is the data providing device 101 or the result receiving device 103, and the data providing device 101 is taken as an example for explanation.
In this embodiment, the data providing device 101 stores the same document describing multiple preset task completion manners in the multi-party secure computing system in advance, and then, based on the device type of itself, for example, the first device type, at least one first type modifier corresponding to the first device type is determined from multiple types of modifiers defined in the document, where the first type modifier includes an identity of the target data to be processed, and on this basis, according to the received identity of the at least one data, the target modifier may be determined from the at least one first type modifier, so that the data providing device 101 may know what function should be executed next, and thus complete the pre-processing task of itself.
Step 203: and calling the function modified by the target modifier to process at least one piece of data to be processed.
In the embodiment of the application, the corresponding target modifier is determined in the preset type of equipment, so that the data received by the equipment can be processed by using the function modified by the target modifier.
As a possible implementation, the device of the preset type calls the function modified by the target modifier to process at least one piece of data to be processed.
In some embodiments, continuing to take the data providing apparatus 101 as an example, in at least one piece of data received by the data providing apparatus 101, the preprocessing manner required for a part of the data is the same, and at this time, if a plurality of identical function functions are defined in the above document, repeated development may be caused, and the operation is cumbersome. Therefore, in this embodiment of the present application, a part of the first-type modifiers in the at least one first-type modifier may include the identifiers of a plurality of target data to be processed, that is, the plurality of data to be processed may all be processed based on the function modified by the same modifier, so as to implement multiplexing of the function in the same document.
For example, continuing to refer to fig. 1, data source1, data source2, data source3 and data source4 are received by data providing apparatus 101, where the data source1 and data source2 correspond to the same preprocessing manner, so that the modifiers used to characterize data providing apparatus 101 may include the identities of two target data to be processed, i.e., @ pre (source1, source2), at the same time, and then both data source1 and data source2 may perform preprocessing tasks with the same function, e.g., func1(source1) and func1(source 2).
In some embodiments, taking the data providing device 101 and the result receiving device 103 as an example, in at least one data received by each of the two types of devices, the processing manners corresponding to partial data are the same, and at this time, if a plurality of identical function functions are defined in the document, repeated development may be caused, and the same document may not be concise enough. Thus, in the embodiments of the present application, the same function is allowed to be modified by at least one type of modifier.
For example, referring to fig. 1, the data source1, data source2, data source3 and data source4 are received by the data providing apparatus 101, and the data result1, data result2 and data result3 are received by the result receiving apparatus 103, and the data source3 and the data result1 are processed in the same way, that is, both the data source3 and the data result1 are processed by the func1 function, and the func1 function can be modified by @ pre (source3) and @ post (result1) at the same time. For another example, the data source4 and the data result2 are processed in the same way, that is, both the data source4 and the data result2 are processed by the func3 function, and at this time, the func3 function can be modified by @ pre (source4) and @ post (result2) at the same time.
The process of executing the corresponding task by each preset type device in the multi-party secure computing system is described below with reference to fig. 1.
For the data providing device 101, storing the same document describing the completion of various preset tasks in the multi-party secure computing system, when receiving at least one processing data, such as data source1, data source2, data source3 and data source4, the data providing device 101 may determine at least one first type modifier from the document based on its first device type, i.e., the data providing device 101 determines which function functions may be run. Each first-type modifier in the at least one first-type modifier comprises an identity of target data to be processed, and then the target modifier is determined from the at least one first-type modifier according to the received identity of the at least one data, and it should be understood that the identity of the target data to be processed included in the target modifier matches with the identity of the currently received at least one data. That is, the data providing apparatus 101 determines a specific function among a plurality of functions allowed to be executed to preprocess the current at least one data. The data providing device 101 may then call a function modified by the target modifier to pre-process at least one data. For example, data source1 and data source2 are preprocessed with function func1, data source3 is preprocessed with function func2, data source4 is preprocessed with function func3, and the result is output to ciphertext computing device 102 after the preprocessing is completed.
For the ciphertext computing device 102, the same document describing the completion manner of multiple preset tasks in the multi-party secure computing system is stored in advance, when at least one piece of data is received, for example, func1(source1), func1(source2), func2(source3) and func3(source4), the ciphertext computing device 102 may determine a target modifier from the document based on its second device type, and then the ciphertext computing device 102 may call a function modified by the target modifier to perform ciphertext computation on the at least one piece of data, and then output the result, for example, data result1, data result2 and data result 3.
For the result receiving device 103, which stores the same document describing the completion of various preset tasks in the multi-party secure computing system in advance, when receiving at least one processing data, for example, data result1, data result2, and data result3, the result receiving device 103 can determine at least one second type modifier from the document based on its own third device type, that is, the result receiving device 103 determines which function functions can be executed. Each of the at least one second-type modifier includes an identity of the target data to be processed, and then the target modifier is determined from the at least one second-type modifier according to the received identity of the at least one data. That is, the result receiving apparatus 103 determines a specific function among the plurality of functions allowed to be executed to perform the post-processing on the current at least one data. The result receiving device 103 may then call a function modified by the target modifier to post-process the at least one data. For example, data result1 is post-processed using function func2, data result2 is post-processed using function func3, and data result3 is post-processed using function func 4. At this point, a plurality of preset tasks of the multi-party secure computing system are all completed.
Referring to fig. 3, based on the same inventive concept, an embodiment of the present application further provides a data processing apparatus, which includes a receiving unit 301, a determining unit 302, and a processing unit 303.
A receiving unit 301, configured to receive at least one piece of data to be processed;
a determining unit 302, configured to determine, based on a same pre-stored document describing a completion manner of a plurality of preset tasks in the multi-party secure computing system and a first device type of the determining unit, a target modifier corresponding to the first device type; the document is predefined with multiple types of modifiers, and each type of modifier is used for representing one type of equipment;
a processing unit 303, configured to invoke a function modified by a target modifier to process at least one piece of data to be processed, where a plurality of function functions are defined in a document, different function functions in the plurality of function functions are used to execute different preset tasks in the multi-party secure computing system, each function is allowed to be modified by any type of modifier in multiple types of modifiers, and the function modified by any type of modifier is used to indicate that a device represented by any type of modifier is allowed to execute the function.
Optionally, if the data processing apparatus is a data providing device or a result receiving device, and each data in at least one data has a corresponding identity, the determining unit 302 is specifically configured to:
determining at least one first type modifier corresponding to a first device type from a plurality of types of modifiers, wherein the at least one first type modifier comprises an identity of target data to be processed;
a target modifier is determined from the at least one first type modifier based on the identity.
Optionally, a part of the at least one first-type modifier includes identifiers of a plurality of target data to be processed.
Alternatively, the same function is allowed to be modified by at least one type of modifier.
Referring to fig. 4, based on the same inventive concept, an embodiment of the present application provides an electronic device, where the electronic device includes at least one processor 401, and the processor 401 is configured to execute a computer program stored in a memory to implement the steps of the data processing method shown in fig. 2 provided by the embodiment of the present invention.
Optionally, the processor 401 may be specifically a central processing unit, a specific ASIC, and may be one or more integrated circuits for controlling the execution of the program.
Optionally, the electronic device may further comprise a memory 402 connected to the at least one processor 401, the memory 402 may comprise ROM, RAM and disk memory. The memory 402 is used for storing data required by the processors 401 during operation, that is, storing instructions executable by the at least one processor 401, and the at least one processor 401 executes the instructions stored in the memory 402 to perform the method shown in fig. 2. The number of the memories 402 is one or more. The memory 402 is also shown in fig. 4, but it should be understood that the memory 402 is not an optional functional block, and is shown in fig. 4 by a dotted line.
The physical devices corresponding to the receiving unit 301, the determining unit 302, and the processing unit 303 may be the processor 401. The electronic device may be configured to perform the method provided by the embodiment shown in fig. 2. Therefore, regarding the functions that can be realized by the functional modules in the electronic device, reference may be made to the corresponding description in the embodiment shown in fig. 2, which is not repeated herein.
Embodiments of the present invention also provide a computer storage medium, where the computer storage medium stores computer instructions, and when the computer instructions are executed on a computer, the computer is caused to execute the method as described in fig. 2.

Claims (10)

1. A data processing method is applied to a preset type of equipment forming a multi-party secure computing system, and the equipment comprises the following steps: a data providing device, a ciphertext computing device, or a result receiving device, the method comprising:
receiving at least one piece of data to be processed;
determining a target modifier corresponding to a first device type based on a same prestored document describing the completion modes of a plurality of preset tasks in the multi-party security computing system and the first device type of the multi-party security computing system; wherein, multiple types of modifiers are predefined in the document, and each type of modifier is used for representing one type of equipment;
and calling a function modified by the target modifier to process the at least one piece of data to be processed, wherein a plurality of function functions are defined in the document, different function functions in the plurality of function functions are used for executing different preset tasks in the multi-party secure computing system, each function is allowed to be modified by any type of modifier in the plurality of types of modifiers, and the function modified by any type of modifier is used for indicating that a device characterized by any type of modifier is allowed to execute the function.
2. The method of claim 1, wherein each of the at least one data has a corresponding identity when the device is a data providing device or a result receiving device, and wherein determining the target modifier corresponding to the first type based on a pre-stored same document describing a task completion manner of each stage in the multi-party secure computing system and the first device type of the target modifier comprises:
determining at least one first type modifier corresponding to the first device type from the multiple types of modifiers, wherein the at least one first type modifier comprises an identity of target to-be-processed data;
determining the target modifier from the at least one first type modifier based on the identity.
3. The method of claim 2, wherein some of the at least one first-type modifiers include identities of a plurality of target pending data.
4. The method of claim 1, wherein the same function is allowed to be modified by at least one type of modifier.
5. A data processing apparatus, characterized in that the apparatus comprises:
a receiving unit for receiving at least one data to be processed;
the device comprises a determining unit, a judging unit and a processing unit, wherein the determining unit is used for determining a target modifier corresponding to a first equipment type based on the same prestored document describing the completion modes of a plurality of preset tasks in the multi-party security computing system and the first equipment type of the determining unit; wherein, multiple types of modifiers are predefined in the document, and each type of modifier is used for representing one type of equipment;
a processing unit, configured to invoke a function modified by the target modifier to process the at least one piece of data to be processed, where a plurality of function functions are defined in the document, different function functions in the plurality of function functions are used to perform different preset tasks in the multi-party secure computing system, each function is allowed to be modified by any type modifier in the multiple types of modifiers, and the function modified by any type modifier is used to indicate that a device characterized by any type modifier is allowed to execute the function.
6. The apparatus according to claim 5, wherein if the data processing apparatus is a data providing device or a result receiving device, and each data in the at least one data has a corresponding identity, the determining unit is specifically configured to:
determining at least one first type modifier corresponding to the first device type from the multiple types of modifiers, wherein the at least one first type modifier comprises an identity of target to-be-processed data;
determining the target modifier from the at least one first type modifier based on the identity.
7. The apparatus as recited in claim 6, wherein some of said at least one first-type modifiers comprise identities of a plurality of target pending data.
8. The apparatus of claim 5, wherein the same function is allowed to be modified by at least one type of modifier.
9. An electronic device, characterized in that the electronic device comprises at least one processor and a memory connected to the at least one processor, the at least one processor being adapted to carry out the steps of the method according to any of claims 1-4 when executing a computer program stored in the memory.
10. A computer-readable storage medium, on which a computer program is stored, characterized in that the execution of the computer program by a processor is to realize the steps of the method according to any of the claims 1-4.
CN202110734301.7A 2021-06-30 2021-06-30 Data processing method and device, electronic equipment and storage medium Pending CN113468564A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110734301.7A CN113468564A (en) 2021-06-30 2021-06-30 Data processing method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110734301.7A CN113468564A (en) 2021-06-30 2021-06-30 Data processing method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113468564A true CN113468564A (en) 2021-10-01

Family

ID=77874283

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110734301.7A Pending CN113468564A (en) 2021-06-30 2021-06-30 Data processing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113468564A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023061295A1 (en) * 2021-10-13 2023-04-20 杭州趣链科技有限公司 Data processing method and apparatus, and electronic device and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160247245A1 (en) * 2013-10-07 2016-08-25 DealTap Group, Inc. Computer system and method for providing a multi-user transaction platform accessible using a mobile device
CN110333867A (en) * 2019-04-19 2019-10-15 矩阵元技术(深圳)有限公司 A kind of Secure calculating data processing method, apparatus and system
US10637659B1 (en) * 2019-03-18 2020-04-28 Alibaba Group Holding Limited Preventing misrepresentation of input data by participants in a secure multi-party computation
CN111832067A (en) * 2020-05-26 2020-10-27 华控清交信息科技(北京)有限公司 Data processing method and device and data processing device
CN111881059A (en) * 2020-08-10 2020-11-03 网易(杭州)网络有限公司 Code file detection method and device and electronic equipment
CN112187862A (en) * 2020-08-31 2021-01-05 华控清交信息科技(北京)有限公司 Task processing method and device for task processing
CN112347329A (en) * 2020-10-28 2021-02-09 杭州安恒信息技术股份有限公司 Data processing method, device, storage medium and equipment
CN112631767A (en) * 2019-10-09 2021-04-09 华控清交信息科技(北京)有限公司 Data processing method, system, device, electronic equipment and readable storage medium
CN112632569A (en) * 2019-10-09 2021-04-09 华控清交信息科技(北京)有限公司 Data processing method, system, device, electronic equipment and readable storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160247245A1 (en) * 2013-10-07 2016-08-25 DealTap Group, Inc. Computer system and method for providing a multi-user transaction platform accessible using a mobile device
US10637659B1 (en) * 2019-03-18 2020-04-28 Alibaba Group Holding Limited Preventing misrepresentation of input data by participants in a secure multi-party computation
CN110333867A (en) * 2019-04-19 2019-10-15 矩阵元技术(深圳)有限公司 A kind of Secure calculating data processing method, apparatus and system
CN112631767A (en) * 2019-10-09 2021-04-09 华控清交信息科技(北京)有限公司 Data processing method, system, device, electronic equipment and readable storage medium
CN112632569A (en) * 2019-10-09 2021-04-09 华控清交信息科技(北京)有限公司 Data processing method, system, device, electronic equipment and readable storage medium
CN111832067A (en) * 2020-05-26 2020-10-27 华控清交信息科技(北京)有限公司 Data processing method and device and data processing device
CN111881059A (en) * 2020-08-10 2020-11-03 网易(杭州)网络有限公司 Code file detection method and device and electronic equipment
CN112187862A (en) * 2020-08-31 2021-01-05 华控清交信息科技(北京)有限公司 Task processing method and device for task processing
CN112347329A (en) * 2020-10-28 2021-02-09 杭州安恒信息技术股份有限公司 Data processing method, device, storage medium and equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023061295A1 (en) * 2021-10-13 2023-04-20 杭州趣链科技有限公司 Data processing method and apparatus, and electronic device and storage medium

Similar Documents

Publication Publication Date Title
WO2017193715A1 (en) Method, device and apparatus for flow scheduling
CN110780870B (en) Service execution method, device, equipment and storage medium
CN111597120B (en) Interface test apparatus, method, electronic device, and computer-readable storage medium
CN110245006B (en) Method, device, equipment and storage medium for processing block chain transaction
CN111143087A (en) Interface calling method and device, storage medium and server
TWI687875B (en) Distributed transaction processing method and device
US9892027B2 (en) Event-driven software testing
CN108762905B (en) Method and device for processing multitask events
CN111381940B (en) Distributed data processing method and device
CN111651365B (en) Automatic interface testing method and device
CN113468564A (en) Data processing method and device, electronic equipment and storage medium
CN111966597B (en) Test data generation method and device
CN111158995B (en) Method and system for realizing cross-system log tracking query based on skywalk and ELK platform
CN108509773B (en) Source code reinforcing method and device
US10474443B2 (en) Code lineage tool
Arts et al. Correct performance of transaction capabilities
CN114564286A (en) Rule engine warning method and rule engine warning system
CN112100077B (en) Transaction testing method and device
CN114371866A (en) Version reconfiguration test method, device and equipment of service system
CN111401020A (en) Interface loading method and system and computing equipment
CN111488403A (en) Data editing method and device, auxiliary editing equipment and storage medium
CN110727537A (en) Method and device for uniformly processing response message, computer equipment and storage medium
CN109634857B (en) Method, device and storage medium for testing page object
CN112235255B (en) Voice data processing method and device and server
CN117149654A (en) System migration testing method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination