CN113742774A - Data processing method and device, readable medium and electronic equipment - Google Patents

Data processing method and device, readable medium and electronic equipment Download PDF

Info

Publication number
CN113742774A
CN113742774A CN202111034240.XA CN202111034240A CN113742774A CN 113742774 A CN113742774 A CN 113742774A CN 202111034240 A CN202111034240 A CN 202111034240A CN 113742774 A CN113742774 A CN 113742774A
Authority
CN
China
Prior art keywords
data
target
target data
byte
processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111034240.XA
Other languages
Chinese (zh)
Other versions
CN113742774B (en
Inventor
郁晟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zitiao Network Technology Co Ltd
Original Assignee
Beijing Zitiao Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zitiao Network Technology Co Ltd filed Critical Beijing Zitiao Network Technology Co Ltd
Priority to CN202111034240.XA priority Critical patent/CN113742774B/en
Publication of CN113742774A publication Critical patent/CN113742774A/en
Application granted granted Critical
Publication of CN113742774B publication Critical patent/CN113742774B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The present disclosure relates to a data processing method, an apparatus, a readable medium, and an electronic device, the method comprising: acquiring target data; performing byte processing on the target data to obtain byte data corresponding to the target data; compressing the byte data to obtain a target array variable; and generating a target data interface according to a target execution program containing the target array variable, wherein the target data interface is used for a client to acquire the target data. That is to say, the present disclosure stores the target data in the form of the target array variable in the target execution program, and the client may obtain the target data through the target data interface, so that the target data may be prevented from being directly stolen and decrypted, thereby improving the security of the data.

Description

Data processing method and device, readable medium and electronic equipment
Technical Field
The present disclosure relates to the field of internet technologies, and in particular, to a data processing method, an apparatus, a readable medium, and an electronic device.
Background
With the rapid development of internet technology, activities such as transaction, query, and information storage performed through a network platform are favored by more and more users due to the advantages of low cost and high efficiency. However, in network activities, in order to protect information and property security of users and prevent information leakage, the public has an increasing demand for information security.
In the related art, important data such as a key can be stored in a local or a server in an encrypted file form, but the existing file data encryption method simply encrypts all contents in a file to obtain a ciphertext, and the ciphertext is easy to intercept and decrypt to obtain plaintext contents, so that the data security is low.
Disclosure of Invention
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
In a first aspect, the present disclosure provides a data processing method, the method comprising:
acquiring target data;
performing byte processing on the target data to obtain byte data corresponding to the target data;
compressing the byte data to obtain a target array variable;
and generating a target data interface according to a target execution program containing the target array variable, wherein the target data interface is used for a client to acquire the target data.
In a second aspect, a data processing method is disclosed, the method comprising:
receiving a target data interface calling request sent by a client;
executing a target execution program corresponding to the target data interface according to the target data interface calling request so as to analyze a target array variable in the target execution program to obtain target data;
and sending the target data to the client.
In a third aspect, the present disclosure provides a data processing apparatus, the apparatus comprising:
the target data acquisition module is used for acquiring target data;
the byte processing module is used for carrying out byte processing on the target data to obtain byte data corresponding to the target data;
the compression processing module is used for compressing the byte data to obtain a target array variable;
and the data interface generating module is used for generating a target data interface according to a target execution program containing the target array variable, and the target data interface is used for a client to obtain the target data.
In a fourth aspect, the present disclosure provides a data processing apparatus, the apparatus comprising:
the calling request receiving module is used for receiving a target data interface calling request sent by a client;
the program execution module is used for executing a target execution program corresponding to the target data interface according to the target data interface calling request so as to analyze a target array variable in the target execution program to obtain target data;
and the data sending module is used for sending the target data to the client.
In a fifth aspect, the present disclosure provides a computer readable medium having stored thereon a computer program which, when executed by a processing apparatus, performs the steps of the method of the first aspect of the present disclosure, or which, when executed by a processing apparatus, performs the steps of the method of the second aspect of the present disclosure.
In a sixth aspect, the present disclosure provides an electronic device comprising:
a storage device having a computer program stored thereon;
processing means for executing the computer program in the storage means to carry out the steps of the method of the first aspect of the disclosure or to carry out the steps of the method of the second aspect of the disclosure.
According to the technical scheme, the method comprises the steps of obtaining target data, performing byte processing on the target data to obtain byte data corresponding to the target data, performing compression processing on the byte data to obtain a target array variable, and generating a target data interface according to a target execution program containing the target array variable, wherein the target data interface is used for a client to obtain the target data. That is to say, the present disclosure stores the target data in the form of the target array variable in the target execution program, and the client may obtain the target data through the target data interface, so that the target data may be prevented from being directly stolen and decrypted, thereby improving the security of the data.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows.
Drawings
The above and other features, advantages and aspects of various embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. Throughout the drawings, the same or similar reference numbers refer to the same or similar elements. It should be understood that the drawings are schematic and that elements and features are not necessarily drawn to scale. In the drawings:
FIG. 1 is a flow diagram illustrating a method of data processing in accordance with an exemplary embodiment;
FIG. 2 is a flow diagram illustrating another data processing method in accordance with an exemplary embodiment;
FIG. 3 is a block diagram illustrating a data processing apparatus according to an exemplary embodiment;
FIG. 4 is a schematic block diagram of a second data processing apparatus according to an example embodiment;
FIG. 5 is a schematic block diagram of a third data processing apparatus according to an example embodiment;
FIG. 6 is a schematic diagram illustrating a fourth data processing apparatus in accordance with an exemplary embodiment;
FIG. 7 is a block diagram illustrating an electronic device in accordance with an example embodiment.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be understood that the various steps recited in the method embodiments of the present disclosure may be performed in a different order, and/or performed in parallel. Moreover, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present disclosure is not limited in this respect.
The term "include" and variations thereof as used herein are open-ended, i.e., "including but not limited to". The term "based on" is "based, at least in part, on". The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment"; the term "some embodiments" means "at least some embodiments". Relevant definitions for other terms will be given in the following description.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence relationship of the functions performed by the devices, modules or units.
It is noted that references to "a", "an", and "the" modifications in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will recognize that "one or more" may be used unless the context clearly dictates otherwise.
The names of messages or information exchanged between devices in the embodiments of the present disclosure are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
Fig. 1 is a flowchart illustrating a data processing method according to an exemplary embodiment, where an execution subject of the method may be a terminal device or a server, and the disclosure is not limited thereto, and as shown in fig. 1, the method may include:
and S101, acquiring target data.
The target data may be account information, a key, and the like, which cannot be leaked.
And S102, performing byte processing on the target data to obtain byte data corresponding to the target data.
In this step, the target data may be subjected to byte processing by a byte processing method in the prior art to obtain the byte data corresponding to the target data, where the byte data may be a binary code corresponding to the target data.
Before performing byte processing on the target data, the target data may be divided into a plurality of data groups according to a preset length, for each data group, data in the data group is subjected to disorder arrangement to obtain a disorder data group corresponding to the data group, a real serial number of the data in the disorder data group is stored in a serial number array, and then the data in each disorder data group, the real serial number in each serial number array and the data length of the target data are subjected to byte processing to obtain the byte data. The preset length may be 32 bytes or 48 bytes, and the present disclosure does not limit the specific value of the preset length.
For example, if the target data is M, and the length of M is 128 bytes, after grouping M with the length of 32 bytes, 4 data groups can be obtained: a data group a, a data group B, a data group C, and a data group D. For the a data group, data in the a data group may be subjected to disorder arrangement to obtain a disorder data group a1 corresponding to the a data group, the disorder arrangement may be random arrangement, and then, the true sequence number of the data in the a1 disorder data group after the disorder arrangement may be stored in the sequence number array P, for example, the true sequence number of the data in the a1 data group may be 20, 3, 12, 31, 5 … … 7, 19, the 20 th data in the a1 data group is arranged at the forefront, and the 19 th data is arranged at the rearmost. The processing of the data sets B, C and D is the same as the data set A and will not be described herein.
Obtaining the out-of-order data group A1 and the sequence number array P corresponding to the A data groupAOut-of-order data group B1 corresponding to data group B and sequence number array PBOut-of-order data group C1 corresponding to data group C and sequence number array PCThe out-of-order data group D1 and the sequence number array P corresponding to the data group DDThereafter, the data in the out-of-order data set A1, the out-of-order data set B1, the out-of-order data set C1, and the out-of-order data set D1 may be individually addressedEach data is processed by byte, and the serial number array P is respectively processedASequence number array PBSequence number array PCSequence number array PDThe real serial numbers in the target data are subjected to byte processing, the data length of the target data is subjected to byte processing, and finally, the byte data corresponding to the target data are obtained.
Before performing byte processing on the data in each out-of-order data group, the real serial number in each serial number array and the data length of the target data to obtain the byte data, the data in each out-of-order data group can be encrypted to obtain out-of-order encrypted data groups, the real serial number in each serial number array is encrypted to obtain serial number encrypted arrays, and then the data in each out-of-order encrypted data group, the real serial number in each serial number encrypted array and the data length of the target data are subjected to byte processing to obtain the byte data.
By way of example, continuing with the above example of the target data M, the out-of-order data set A1 and the sequence number array P are obtainedAThen, each data in the out-of-order data group A1 can be encrypted to obtain an out-of-order encrypted data group A2 corresponding to the data group A, and the sequence number array P can be encryptedAEach real serial number in the sequence number group P is encrypted to obtain the serial number array PACorresponding sequence number encryption array P1A
In a possible implementation manner, for each target sub-data in each out-of-order data group, an exclusive or processing result of the target sub-data and a next sub-data after the target sub-data is used as encrypted data corresponding to the target sub-data, where the target sub-data includes sub-data except a last sub-data in the out-of-order data group.
For example, taking the out-of-order data group a1 as an example, the sub-data may be the data content corresponding to each byte in the out-of-order data group a1, the out-of-order data group a1 may be traversed from the first byte of the out-of-order data group a1, the traversed variable is denoted as a, and the data content is denoted as M [ id [ ] d][a]Id represents the number of the out-of-order data set, for example, the number corresponding to the out-of-order data set A1 is 1,the code corresponding to the out-of-order data set B1 is 2, the code corresponding to the out-of-order data set C1 is 3, and the code corresponding to the out-of-order data set D1 is 4. For any target subdata M [ id ]][a]Encrypted data M [ id ]][a]=M[id][a]xor M[id][a+1]. Sequence number array PAThe encryption method of (2) can refer to the encryption mode of the out-of-order data group a1, and is not described herein.
S103, compressing the byte data to obtain a target array variable.
In this step, after the byte data corresponding to the target data is obtained, the byte data may be compressed by a compression processing method in the prior art, so as to obtain the target array variable.
And S104, generating a target data interface according to the target execution program containing the target array variable.
The target data interface is used for the client to obtain the target data.
In this step, the target execution program is configured to analyze the target array variable to obtain the target data, and an analysis process of the target execution program on the target data variable may be preset according to an acquisition process of the target array variable. For example, when the data encryption method is xor, the scrambled data group and the sequence number encrypted array may be decrypted by an xor reverse volume to obtain a scrambled data group corresponding to the scrambled data group and a sequence number array corresponding to the sequence number encrypted array, and when decryption is performed, M [ id ] [ a ] ═ M [ id ] [ a-1] xor M [ id ] [ a-1], taking the target data in step S102 as an example. Then, after the scrambled data group and the serial number encrypted array are decrypted, the data in the scrambled data group can be sequenced according to the real serial number in the serial number array to obtain a plurality of data groups corresponding to the target data, and finally, the data groups are spliced according to the serial numbers of the data groups to obtain the target data.
Further, after the target executive program is determined, the function name corresponding to the target executive program may be used as the target data interface.
By adopting the method, the target data can be encrypted, byte-processed and compressed in advance to obtain the target array variable corresponding to the target data, and the target array variable can be stored in the target execution program in the form of codes, so that the target data can be prevented from being directly stolen and decrypted, and the safety of the data is improved.
Fig. 2 is a flowchart illustrating another data processing method according to an exemplary embodiment, where an execution subject of the method may be a terminal device or a server, and the disclosure is not limited thereto, and as shown in fig. 2, the method may include:
s201, receiving a target data interface calling request sent by a client.
The target data interface calling request can be used for acquiring target data; the client may be an application program on the terminal device, or may be a client corresponding to the server, and the type of the client is not limited in the present disclosure.
In this step, when the client is an application program on the terminal device, and the client needs to obtain the target data, a target data interface call request may be sent, and the terminal device may call a corresponding target execution program according to the target data interface call request; when the client is a client corresponding to the server, the client may send a target data interface call request to the server when the client needs to obtain the target data.
S202, according to the target data interface calling request, calling a target execution program corresponding to the target data interface to analyze a target array variable in the target execution program to obtain the target data.
In this step, different target data may correspond to different target execution programs, and different target data may also correspond to the same target execution program. Under the condition that different target data correspond to different target execution programs, after a target data interface calling request sent by the client is received, the target execution program corresponding to the target data can be called according to the target data interface calling request, and the target array variable corresponding to the target data is analyzed through the target execution program to obtain the target data; under the condition that different target data correspond to the same target executive program, after a target data interface call request sent by the client is received, the target executive program corresponding to the target data can be called according to the target data interface call request, and the target executive program can acquire a target array variable corresponding to the target data according to parameters carried in the target data interface call request and analyze the target array variable to obtain the target data.
It should be noted that, in order to further improve the data security, after receiving a target data interface call request sent by a client, the target data interface call request may send a target array variable corresponding to the target data to the preset parsing virtual machine, and the preset parsing virtual machine may call a target execution program corresponding to the target data to parse the target array variable to obtain the target data. Wherein the preset parsing virtual machine may be an X86 virtual machine implemented by a high-level language, and the preset parsing virtual machine may include a heap, a stack, a register, a symbolic flag, a code segment, a data segment, and a line logic. For example, the preset parsing virtual machine may be preset in the terminal device.
The target execution program may be pre-stored in the preset parsing virtual machine, and after the target execution program parses the target array variable to obtain the target data, the target data may be stored in a heap of the preset parsing virtual machine, and then the target data may be obtained through an external function.
And S203, sending the target data to the client.
In this step, after the target execution program analyzes the target array variable to obtain the target data, the target data may be sent to the client.
By adopting the method, the target array variable corresponding to the target data can be stored in the target execution program in advance, and after the target data interface call request sent by the client is received, the target array variable can be analyzed through the target execution program to obtain the target analysis program corresponding to the target data.
Fig. 3 is a schematic diagram illustrating a structure of a data processing apparatus according to an exemplary embodiment, which may include, as shown in fig. 3:
a target data acquiring module 301, configured to acquire target data;
a byte processing module 302, configured to perform byte processing on the target data to obtain byte data corresponding to the target data;
a compression processing module 303, configured to perform compression processing on the byte data to obtain a target array variable;
a data interface generating module 304, configured to generate a target data interface according to the target execution program including the target array variable, where the target data interface is used for a client to obtain the target data.
Accordingly, fig. 4 is a schematic structural diagram illustrating a second data processing apparatus according to an exemplary embodiment, and as shown in fig. 4, the apparatus further includes:
a dividing module 305, configured to divide the target data into a plurality of data groups according to a preset length;
the sorting module 306 is configured to perform disorder sorting on the data in the data group for each data group to obtain a disorder data group corresponding to the data group, and store the real serial number of the data in the disorder data group in a serial number array;
the byte processing module 302 is further configured to:
and performing byte processing on the data in each out-of-order data group, the real serial number in each serial number array and the data length of the target data to obtain the byte data.
Accordingly, fig. 5 is a schematic structural diagram of a third data processing apparatus according to an exemplary embodiment, and as shown in fig. 5, the apparatus further includes:
a data encryption module 307, configured to encrypt data in each out-of-order data group to obtain an out-of-order encrypted data group;
the sequence number encryption module 308 is configured to encrypt the real sequence number in each sequence number array to obtain a sequence number encrypted array;
the byte processing module 302, further configured to:
and performing byte processing on the data in each out-of-order encrypted data group, the real serial number in each serial number encrypted array and the data length of the target data to obtain the byte data.
Accordingly, the data encryption module 307 is further configured to:
and for each target subdata in each disordered data group, performing XOR processing on the target subdata and the next subdata after the target subdata to obtain encrypted data corresponding to the target subdata, wherein the target subdata comprises subdata except the last subdata in the disordered data group.
By the device, the target data can be encrypted, byte-processed and compressed in advance to obtain the target array variable corresponding to the target data, and the target array variable can be stored in a target execution program in a code form, so that the target data can be prevented from being directly stolen and decrypted, and the safety of the data is improved.
Fig. 6 is a schematic structural diagram illustrating a fourth data processing apparatus according to an exemplary embodiment, which includes, as shown in fig. 6:
a calling request receiving module 601, configured to receive a target data interface calling request sent by a client;
a program executing module 602, configured to execute a target executing program corresponding to the target data interface according to the target data interface call request, so as to analyze a target array variable in the target executing program to obtain target data;
a data sending module 603, configured to send the target data to the client.
Correspondingly, the target executive program is stored in a preset analysis unit; the program execution module 602 is further configured to:
sending the target array variable to the preset analysis unit according to the target data interface calling request;
and executing a target execution program corresponding to the target data interface through the preset analysis unit to analyze the target array variable to obtain the target data.
By the device, the target array variable corresponding to the target data can be stored in the target execution program in advance, and after the target data interface call request sent by the client is received, the target array variable can be analyzed through the target execution program to obtain the target analysis program corresponding to the target data.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
Referring now to FIG. 7, shown is a schematic diagram of an electronic device 700 suitable for use in implementing embodiments of the present disclosure. The terminal device in the embodiments of the present disclosure may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a vehicle terminal (e.g., a car navigation terminal), and the like, and a stationary terminal such as a digital TV, a desktop computer, and the like. The electronic device shown in fig. 7 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 7, electronic device 700 may include a processing means (e.g., central processing unit, graphics processor, etc.) 701 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)702 or a program loaded from storage 708 into a Random Access Memory (RAM) 703. In the RAM 703, various programs and data necessary for the operation of the electronic apparatus 700 are also stored. The processing device 701, the ROM 702, and the RAM 703 are connected to each other by a bus 704. An input/output (I/O) interface 705 is also connected to bus 704.
Generally, the following devices may be connected to the I/O interface 705: input devices 706 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 707 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 708 including, for example, magnetic tape, hard disk, etc.; and a communication device 709. The communication means 709 may allow the electronic device 700 to communicate wirelessly or by wire with other devices to exchange data. While fig. 7 illustrates an electronic device 700 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program carried on a non-transitory computer readable medium, the computer program containing program code for performing the method illustrated by the flow chart. In such embodiments, the computer program may be downloaded and installed from a network via the communication means 709, or may be installed from the storage means 708, or may be installed from the ROM 702. The computer program, when executed by the processing device 701, performs the above-described functions defined in the methods of the embodiments of the present disclosure.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network Protocol, such as HTTP (HyperText Transfer Protocol), and may interconnect with any form or medium of digital data communication (e.g., a communications network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: acquiring target data; performing byte processing on the target data to obtain byte data corresponding to the target data; compressing the byte data to obtain a target array variable; and generating a target data interface according to a target execution program containing the target array variable, wherein the target data interface is used for a client to acquire the target data.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: receiving a target data interface calling request sent by a client; executing a target execution program corresponding to the target data interface according to the target data interface calling request so as to analyze a target array variable in the target execution program to obtain target data; and sending the target data to the client.
Computer program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including but not limited to an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules described in the embodiments of the present disclosure may be implemented by software or hardware. The name of a module does not in some cases constitute a limitation of the module itself, and for example, a target data acquisition module may also be described as a "module that acquires target data".
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), systems on a chip (SOCs), Complex Programmable Logic Devices (CPLDs), and the like.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
Example 1 provides, in accordance with one or more embodiments of the present disclosure, a data processing method, including: acquiring target data; performing byte processing on the target data to obtain byte data corresponding to the target data; compressing the byte data to obtain a target array variable; and generating a target data interface according to a target execution program containing the target array variable, wherein the target data interface is used for a client to acquire the target data.
Example 2 provides the method of example 1, and before performing byte processing on the target data to obtain the byte data corresponding to the target data, the method further includes: dividing the target data into a plurality of data groups according to a preset length; for each data group, carrying out disorder arrangement on the data in the data group to obtain a disorder data group corresponding to the data group, and storing the real serial number of the data in the disorder data group in a serial number array; the performing byte processing on the target data to obtain the byte data corresponding to the target data includes: and performing byte processing on the data in each out-of-order data group, the real serial number in each serial number array and the data length of the target data to obtain the byte data.
Example 3 provides the method of example 2, before performing byte processing on the data in each out-of-order data group, the real sequence number in each sequence number array, and the data length of the target data to obtain the byte data, the method further includes: encrypting the data in each out-of-order data group to obtain an out-of-order encrypted data group; encrypting the real serial number in each serial number array to obtain a serial number encrypted array; the byte processing of the data in each out-of-order data group, the real sequence number in each sequence number array and the data length of the target data to obtain the byte data comprises: and carrying out byte processing on the data in each out-of-order encrypted data group, the real serial number in each serial number encrypted array and the data length of the target data to obtain the byte data.
Example 4 provides the method of example 3, where the target data includes a plurality of sub-data, and the encrypting the data in each out-of-order data group to obtain an out-of-order encrypted data group includes: and for each target subdata in each disordered data group, performing XOR processing on the target subdata and the next subdata after the target subdata to obtain encrypted data corresponding to the target subdata, wherein the target subdata comprises subdata except the last subdata in the disordered data group.
Example 5 provides, in accordance with one or more embodiments of the present disclosure, a data processing method, including: receiving a target data interface calling request sent by a client; executing a target execution program corresponding to the target data interface according to the target data interface calling request so as to analyze a target array variable in the target execution program to obtain target data; and sending the target data to the client.
Example 6 provides the method of example 5, the target executive being stored in a preset parsing unit, according to one or more embodiments of the present disclosure; the executing a target execution program corresponding to the target data interface according to the target data interface calling request to analyze a target array variable in the target execution program, and obtaining target data includes: sending the target array variable to the preset analysis unit according to the target data interface calling request; and executing a target execution program corresponding to the target data interface through the preset analysis unit to analyze the target array variable to obtain the target data.
Example 7 provides, in accordance with one or more embodiments of the present disclosure, a data processing apparatus comprising: the target data acquisition module is used for acquiring target data; the byte processing module is used for carrying out byte processing on the target data to obtain byte data corresponding to the target data; the compression processing module is used for compressing the byte data to obtain a target array variable; and the data interface generating module is used for generating a target data interface according to a target execution program containing the target array variable, and the target data interface is used for a client to obtain the target data.
Example 8 provides, in accordance with one or more embodiments of the present disclosure, a data processing apparatus comprising: the calling request receiving module is used for receiving a target data interface calling request sent by a client; the program execution module is used for executing a target execution program corresponding to the target data interface according to the target data interface calling request so as to analyze a target array variable in the target execution program to obtain target data; and the data sending module is used for sending the target data to the client.
Example 9 provides, in accordance with one or more embodiments of the present disclosure, a computer readable medium having stored thereon a computer program that, when executed by a processing apparatus, implements the steps of the method of any one of examples 1-4, or that, when executed by a processing apparatus, implements the steps of the method of any one of examples 5-6.
Example 10 provides, in accordance with one or more embodiments of the present disclosure, an electronic device comprising: a storage device having a computer program stored thereon; processing means for executing the computer program in the storage means to carry out the steps of the method of any one of examples 1 to 4 or to carry out the steps of the method of any one of examples 5 to 6.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the disclosure herein is not limited to the particular combination of features described above, but also encompasses other embodiments in which any combination of the features described above or their equivalents does not depart from the spirit of the disclosure. For example, the above features and (but not limited to) the features disclosed in this disclosure having similar functions are replaced with each other to form the technical solution.
Further, while operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order. Under certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these should not be construed as limitations on the scope of the disclosure. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims. With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.

Claims (10)

1. A method of data processing, the method comprising:
acquiring target data;
performing byte processing on the target data to obtain byte data corresponding to the target data;
compressing the byte data to obtain a target array variable;
and generating a target data interface according to a target execution program containing the target array variable, wherein the target data interface is used for a client to acquire the target data.
2. The method according to claim 1, wherein before performing byte processing on the target data to obtain the byte data corresponding to the target data, the method further comprises:
dividing the target data into a plurality of data groups according to a preset length;
for each data group, carrying out disorder arrangement on the data in the data group to obtain a disorder data group corresponding to the data group, and storing the real serial number of the data in the disorder data group in a serial number array;
the performing byte processing on the target data to obtain the byte data corresponding to the target data includes:
and performing byte processing on the data in each out-of-order data group, the real serial number in each serial number array and the data length of the target data to obtain the byte data.
3. The method of claim 2, wherein before performing byte processing on the data in each out-of-order data group, the real sequence number in each sequence number array, and the data length of the target data to obtain the byte data, the method further comprises:
encrypting the data in each out-of-order data group to obtain an out-of-order encrypted data group;
encrypting the real serial number in each serial number array to obtain a serial number encrypted array;
the byte processing of the data in each out-of-order data group, the real sequence number in each sequence number array and the data length of the target data to obtain the byte data comprises:
and carrying out byte processing on the data in each out-of-order encrypted data group, the real serial number in each serial number encrypted array and the data length of the target data to obtain the byte data.
4. The method of claim 3, wherein the target data comprises a plurality of sub-data, and the encrypting the data in each out-of-order data set to obtain an out-of-order encrypted data set comprises:
and for each target subdata in each disordered data group, performing XOR processing on the target subdata and the next subdata after the target subdata to obtain encrypted data corresponding to the target subdata, wherein the target subdata comprises subdata except the last subdata in the disordered data group.
5. A method of data processing, the method comprising:
receiving a target data interface calling request sent by a client;
executing a target execution program corresponding to the target data interface according to the target data interface calling request so as to analyze a target array variable in the target execution program to obtain target data;
and sending the target data to the client.
6. The method of claim 5, wherein the target executive is stored in a preset parsing unit; the executing a target execution program corresponding to the target data interface according to the target data interface calling request to analyze a target array variable in the target execution program, and obtaining target data includes:
sending the target array variable to the preset analysis unit according to the target data interface calling request;
and executing a target execution program corresponding to the target data interface through the preset analysis unit to analyze the target array variable to obtain the target data.
7. A data processing apparatus, characterized in that the apparatus comprises:
the target data acquisition module is used for acquiring target data;
the byte processing module is used for carrying out byte processing on the target data to obtain byte data corresponding to the target data;
the compression processing module is used for compressing the byte data to obtain a target array variable;
and the data interface generating module is used for generating a target data interface according to a target execution program containing the target array variable, and the target data interface is used for a client to obtain the target data.
8. A data processing apparatus, characterized in that the apparatus comprises:
the calling request receiving module is used for receiving a target data interface calling request sent by a client;
the program execution module is used for executing a target execution program corresponding to the target data interface according to the target data interface calling request so as to analyze a target array variable in the target execution program to obtain target data;
and the data sending module is used for sending the target data to the client.
9. A computer-readable medium, on which a computer program is stored, which, when being executed by processing means, carries out the steps of the method of any one of claims 1 to 4, or which, when being executed by processing means, carries out the steps of the method of any one of claims 5 to 6.
10. An electronic device, comprising:
a storage device having a computer program stored thereon;
processing means for executing the computer program in the storage means to carry out the steps of the method of any one of claims 1 to 4 or to carry out the steps of the method of any one of claims 5 to 6.
CN202111034240.XA 2021-09-03 2021-09-03 Data processing method and device, readable medium and electronic equipment Active CN113742774B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111034240.XA CN113742774B (en) 2021-09-03 2021-09-03 Data processing method and device, readable medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111034240.XA CN113742774B (en) 2021-09-03 2021-09-03 Data processing method and device, readable medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN113742774A true CN113742774A (en) 2021-12-03
CN113742774B CN113742774B (en) 2024-02-09

Family

ID=78735691

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111034240.XA Active CN113742774B (en) 2021-09-03 2021-09-03 Data processing method and device, readable medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN113742774B (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1146122A (en) * 1995-07-07 1997-03-26 汤姆森消费电子有限公司 Apparatus and method for authenticating transmitted applications in interative information system
CN1195806A (en) * 1997-02-27 1998-10-14 株式会社东芝 Image processing device and its processing method
CN1309837A (en) * 1998-07-17 2001-08-22 株式会社建伍 BS digital broadcasting receiver
US20030113029A1 (en) * 2001-08-21 2003-06-19 Sony Corporation Skim encoding method for compression of a two dimensional array of data
CN1601431A (en) * 1999-03-03 2005-03-30 索尼公司 Data processing device, data processing method, terminal, transmission method for data processing device
CN1729689A (en) * 2002-12-20 2006-02-01 松下电器产业株式会社 Data stream format conversion method and recording method for the same
CN101350624A (en) * 2008-09-11 2009-01-21 中国科学院计算技术研究所 Method for compressing Chinese text supporting ANSI encode
US20170032409A1 (en) * 2014-06-25 2017-02-02 Groupon, Inc. Graph-based compression of data records
CN107592207A (en) * 2016-07-07 2018-01-16 中兴通讯股份有限公司 A kind of network management business management method and network management business managing device
CN109274731A (en) * 2018-09-04 2019-01-25 北京京东金融科技控股有限公司 Deployment, call method and the device of web services based on multi-tenant technology
CN110633575A (en) * 2019-09-19 2019-12-31 腾讯云计算(北京)有限责任公司 Data encryption method, device, equipment and storage medium
CN110928931A (en) * 2020-02-17 2020-03-27 深圳市琦迹技术服务有限公司 Sensitive data processing method and device, electronic equipment and storage medium
CN111930534A (en) * 2020-07-29 2020-11-13 北京字节跳动网络技术有限公司 Data calling method and device and electronic equipment
CN111949746A (en) * 2020-08-18 2020-11-17 北京字节跳动网络技术有限公司 Data processing method and device, electronic equipment and computer readable medium
CN112402983A (en) * 2020-08-03 2021-02-26 上海幻电信息科技有限公司 Game result verification method and system

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1146122A (en) * 1995-07-07 1997-03-26 汤姆森消费电子有限公司 Apparatus and method for authenticating transmitted applications in interative information system
CN1195806A (en) * 1997-02-27 1998-10-14 株式会社东芝 Image processing device and its processing method
CN1309837A (en) * 1998-07-17 2001-08-22 株式会社建伍 BS digital broadcasting receiver
CN1601431A (en) * 1999-03-03 2005-03-30 索尼公司 Data processing device, data processing method, terminal, transmission method for data processing device
US20030113029A1 (en) * 2001-08-21 2003-06-19 Sony Corporation Skim encoding method for compression of a two dimensional array of data
CN1729689A (en) * 2002-12-20 2006-02-01 松下电器产业株式会社 Data stream format conversion method and recording method for the same
CN101350624A (en) * 2008-09-11 2009-01-21 中国科学院计算技术研究所 Method for compressing Chinese text supporting ANSI encode
US20170032409A1 (en) * 2014-06-25 2017-02-02 Groupon, Inc. Graph-based compression of data records
CN107592207A (en) * 2016-07-07 2018-01-16 中兴通讯股份有限公司 A kind of network management business management method and network management business managing device
CN109274731A (en) * 2018-09-04 2019-01-25 北京京东金融科技控股有限公司 Deployment, call method and the device of web services based on multi-tenant technology
CN110633575A (en) * 2019-09-19 2019-12-31 腾讯云计算(北京)有限责任公司 Data encryption method, device, equipment and storage medium
CN110928931A (en) * 2020-02-17 2020-03-27 深圳市琦迹技术服务有限公司 Sensitive data processing method and device, electronic equipment and storage medium
CN111930534A (en) * 2020-07-29 2020-11-13 北京字节跳动网络技术有限公司 Data calling method and device and electronic equipment
CN112402983A (en) * 2020-08-03 2021-02-26 上海幻电信息科技有限公司 Game result verification method and system
CN111949746A (en) * 2020-08-18 2020-11-17 北京字节跳动网络技术有限公司 Data processing method and device, electronic equipment and computer readable medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陶星辰: "基于AES加密的无线音视频传输系统设计及应用", 中国优秀硕士学位论文全文数据库信息科技辑, no. 06, pages 136 - 116 *

Also Published As

Publication number Publication date
CN113742774B (en) 2024-02-09

Similar Documents

Publication Publication Date Title
CN111177801B (en) Signature method and device of electronic document, storage medium and electronic equipment
CN110516462B (en) Method and apparatus for encrypting data
CN113742709B (en) Information processing method and device, readable medium and electronic equipment
CN110851210A (en) Interface program calling method, device, equipment and storage medium
CN112329044A (en) Information acquisition method and device, electronic equipment and computer readable medium
CN111130805B (en) Secure transmission method, electronic device, and computer-readable storage medium
CN116010678B (en) Method, device and equipment for inquiring trace
CN114499893B (en) Bidding file encryption and evidence storage method and system based on block chain
CN110602700A (en) Seed key processing method and device and electronic equipment
CN113742774B (en) Data processing method and device, readable medium and electronic equipment
CN114491421A (en) File encryption method, file processing method, file encryption device, file processing device, readable medium and electronic equipment
CN113032345A (en) File processing method, device, terminal and non-transitory storage medium
CN113961931A (en) Adb tool using method and device and electronic equipment
CN112468470B (en) Data transmission method and device and electronic equipment
CN111314320B (en) Communication method, terminal, server and system based on HTTP
CN111835846B (en) Information updating method and device and electronic equipment
CN112149168B (en) File data encryption method and device and electronic equipment
CN110619218B (en) Method and apparatus for generating information
CN114615001B (en) Data frame encryption method, data frame decryption method and related equipment
CN112214549B (en) File feature code generation method and device and electronic equipment
CN116702169B (en) Data encryption migration method, electronic device and computer readable medium
CN116318686B (en) Data encryption transmission method and device, electronic equipment and storage medium
CN116720201A (en) Method, device and computer medium for encrypting and analyzing data at supply end
CN115758433A (en) Code encryption method and device, storage medium and electronic equipment
CN112149168A (en) File data encryption method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant