CN113794738B - Data processing method and device, electronic equipment and storage medium - Google Patents

Data processing method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN113794738B
CN113794738B CN202111351445.0A CN202111351445A CN113794738B CN 113794738 B CN113794738 B CN 113794738B CN 202111351445 A CN202111351445 A CN 202111351445A CN 113794738 B CN113794738 B CN 113794738B
Authority
CN
China
Prior art keywords
data
target
format information
target data
encryption processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111351445.0A
Other languages
Chinese (zh)
Other versions
CN113794738A (en
Inventor
姜国庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Cloud Computing Ltd
Original Assignee
Alibaba Cloud Computing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Cloud Computing Ltd filed Critical Alibaba Cloud Computing Ltd
Priority to CN202111351445.0A priority Critical patent/CN113794738B/en
Publication of CN113794738A publication Critical patent/CN113794738A/en
Application granted granted Critical
Publication of CN113794738B publication Critical patent/CN113794738B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the application provides a data processing method, a data processing device, an electronic device and a storage medium, wherein the method can be applied to a first end, and comprises the following steps: receiving data format information of target data to be transmitted from a second end, and acquiring associated data according to the data format information to form an associated table, wherein the associated table comprises the target data; performing first encryption processing on the associated data to form first intermediate data, transmitting the first intermediate data to a second end, performing second encryption processing on the first intermediate data by the second end to obtain first data, and returning the first data to the first end; the second end carries out second encryption processing on target data to be transmitted to form second intermediate data; receiving second intermediate data from the second end, and performing first encryption processing on the second intermediate data to form second data; determining common data in the first data and the second data to screen target data corresponding to the common data from the association table; data security can be improved.

Description

Data processing method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a data processing method, a data processing apparatus, an electronic device, and a storage medium.
Background
In order to ensure the security of data transmission between different networks, the data of a sending end is usually transmitted to a receiving end by means of encrypted transmission, so that the receiving end uses the data.
The specific process of encrypted transmission comprises the following steps: and encrypting the data to be transmitted by the key at the transmitting end to obtain encrypted data. Then, the sending end can send the encrypted data to the receiving end and share the secret key to the receiving end; after receiving the encrypted data, the receiving end can decrypt the encrypted data according to the key shared by the sending end to obtain the data.
However, in the data transmission process between the sending end and the receiving end, the encrypted data and the secret key may be intercepted by a third party, and the third party can decrypt the encrypted data, which easily causes the data to be obtained by the third party, and the data security is poor.
Disclosure of Invention
The embodiment of the application provides a data processing method for improving data security.
Correspondingly, the embodiment of the application also provides a data processing device, an electronic device and a storage medium, which are used for ensuring the realization and the application of the system.
In order to solve the above problem, an embodiment of the present application discloses a data processing method, which is applied to a first end, and the method includes: receiving data format information of target data to be transmitted from a second end, and acquiring associated data according to the data format information to form an associated table, wherein the associated table comprises the target data; performing first encryption processing on the associated data to form first intermediate data, transmitting the first intermediate data to a second end, performing second encryption processing on the first intermediate data by the second end to obtain first data, and returning the first data to the first end; the second end carries out second encryption processing on target data to be transmitted to form second intermediate data; receiving second intermediate data from the second end, and performing first encryption processing on the second intermediate data to form second data; and determining common data in the first data and the second data to screen target data corresponding to the common data from the association table.
Optionally, the association table includes identification information of associated data, and the screening of the target data corresponding to the common data from the association table includes: and acquiring target identification information corresponding to the common data, and screening corresponding associated data from the association table as target data according to the target identification information.
Optionally, the data format information includes data items, and the acquiring of the associated data includes: establishing a data acquisition task corresponding to each data item; and executing the data acquisition task, and adding a data value to the data item to form association data so as to form an association table.
Optionally, the data item includes an enumeration item, and the method further includes: the enumeration data is configured for the enumerated items to form associated data.
Optionally, the acquiring the associated data includes: and receiving a screening condition for screening the associated data from the second end, and acquiring the associated data according to the screening condition and the data format information.
In order to solve the above problem, an embodiment of the present application discloses a data processing method applied to a second end, where the method includes: sending data format information of target data to be transmitted to a first end, wherein the first end acquires associated data according to the data format information to form an associated table, and the associated table comprises the target data; receiving first intermediate data formed by performing first encryption processing on the associated data from the first end, and performing second encryption processing to form first data so as to return the first data to the first end; the method comprises the steps of obtaining transmission data, carrying out second encryption processing to form second intermediate data, and transmitting the second intermediate data to a first end, carrying out first encryption processing on the second intermediate data by the first end to form second data, determining common data in the first data and the second data, and screening out target data corresponding to the common data from an association table, wherein the transmission data comprise target data to be transmitted.
Optionally, the method further includes: and sending a screening condition for screening the associated data to the first end so that the first end screens the associated data according to the screening condition.
Optionally, the method further includes: providing a data sharing page, wherein the data sharing page comprises a data selection control; determining target data to be transmitted according to the triggering of the data selection control, and generating at least one data format information; and acquiring an information selection instruction of the data format information, determining the selected target data format information, and transmitting the target data format information to the first end.
Optionally, the method further includes: analyzing the target data to generate at least one screening condition, and displaying the screening condition on a data sharing page; obtaining a condition selection instruction for the screening condition, and determining the selected target screening condition to transmit the target screening condition to the first end.
Optionally, the method further includes the step of determining transmission data: acquiring target data to be transmitted, and determining disturbance data except for associated data; and determining transmission data according to the target data and the disturbance data.
In order to solve the above problem, an embodiment of the present application discloses a data processing apparatus, where the apparatus includes: the associated data acquisition module is used for receiving the data format information of the target data to be transmitted from the second end and acquiring the associated data according to the data format information to form an associated table, wherein the associated table comprises the target data; the first data acquisition module is used for carrying out first encryption processing on the associated data to form first intermediate data and transmitting the first intermediate data to the second end, and the second end carries out second encryption processing on the first intermediate data to obtain first data and returns the first data to the first end; the second end carries out second encryption processing on target data to be transmitted to form second intermediate data; the second data acquisition module is used for receiving second intermediate data from the second end and carrying out first encryption processing on the second intermediate data to form second data; and the target data acquisition module is used for determining common data in the first data and the second data so as to screen out target data corresponding to the common data from the association table.
In order to solve the above problem, an embodiment of the present application discloses a data processing apparatus, where the apparatus includes: the data format sending module is used for sending data format information of target data to be transmitted to a first end, and the first end acquires associated data according to the data format information to form an associated table, wherein the associated table contains the target data; the first data sending module is used for receiving first intermediate data formed by performing first encryption processing on the associated data from the first end, performing second encryption processing on the first intermediate data to form first data and returning the first data to the first end; the second data sending module is used for obtaining the transmission data, carrying out second encryption processing to form second intermediate data, and transmitting the second intermediate data to the first end, the first end carries out first encryption processing on the second intermediate data to form second data, common data in the first data and the second data are determined, so that target data corresponding to the common data are screened out from the association table, and the transmission data comprise target data to be transmitted.
In order to solve the above problem, an embodiment of the present application discloses an electronic device, including: a processor; and a memory having executable code stored thereon, which when executed, causes the processor to perform the method of any of the above embodiments.
To address the above issues, embodiments of the present application disclose one or more machine-readable media having executable code stored thereon that, when executed, cause a processor to perform a method as described in any of the above embodiments.
Compared with the prior art, the embodiment of the application has the following advantages:
in the embodiment of the application, the first end can receive the data format information of the target data to be transmitted from the second end, determine the associated data containing the target data according to the data format information to form an associated table, and then encrypt the associated data of the first end at the first end and the second end respectively in sequence to form the secondarily encrypted first data; and sequentially encrypting the target data of the second end at the second end and the first end respectively to form second data subjected to secondary encryption. Then, common data in the first data and the second data can be determined, and target data corresponding to the common data can be screened out from the association table. In the embodiment of the application, the first end can screen out the associated data containing the target data by using the data format information of the target data, and carry out secondary encryption, so that common analysis is carried out by combining the target data subjected to secondary encryption, and the target data is extracted from the unencrypted associated data according to the common data; compared with a method for acquiring target data through encryption and decryption, the method provided by the embodiment of the application does not perform a decryption process on the encrypted data, and can improve the security of the data.
Drawings
FIG. 1 is a schematic flow chart diagram of a data processing method according to an embodiment of the present application;
FIG. 2 is a schematic flow chart diagram of a data processing method according to another embodiment of the present application;
FIG. 3 is a schematic flow chart diagram of a data processing method according to yet another embodiment of the present application;
FIG. 4 is a schematic flow chart diagram of a data processing method according to yet another embodiment of the present application;
FIG. 5 is a schematic flow chart diagram of a data processing method according to yet another embodiment of the present application;
FIG. 6 is a block diagram of a data processing apparatus according to an embodiment of the present application;
FIG. 7 is a schematic block diagram of a data processing apparatus according to another embodiment of the present application;
fig. 8 is a schematic structural diagram of an exemplary apparatus provided in one embodiment of the present application.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, the present application is described in further detail with reference to the accompanying drawings and the detailed description.
The embodiment of the application can be applied to data synchronization scenes among different networks, and specifically, in the embodiment of the application, a data owner can transmit related information of target data to a data user, so that the data user can determine the target data to be used at a first end according to the related information, and the target data can be used.
Specifically, as shown in fig. 1, for convenience of description, a data using party may be understood as a first end, a data owning party may be understood as a second end, a gatekeeper exists between the first end and the second end, the gatekeeper is an information security device that connects two independent host systems using a solid-state switch read-write medium with multiple control functions, and in the embodiment of the present application, data transmission between the first end and the second end may be completed through the gatekeeper. In this embodiment of the application, the second end may determine target data (e.g., target data a in fig. 1) to be transmitted, and send data format information of the target data to the first end, and after receiving the data format information, the first end may screen out associated data (e.g., data a and data b in fig. 1) including the target data according to the data format information to form an association table (e.g., association table 1 in fig. 1). The data format information may include a plurality of data items, and the data items may be understood as data types, for example, the target data is personal information, and the data types may include information such as name, native place, contact way, and the like. The data items are used to obtain corresponding data values (character, data, etc. information) to form associated data. In addition, the data items may also include enumerated items which can be filled through enumeration so as to form associated data through an enumerated mode, for example, for a data item with an adult or not, the associated data can be determined through enumerating two options of an adult and a minor, and combining information of other data items; as another example, for data that characterizes whether a health risk exists, the associated data may be determined by enumerating both healthy and unhealthy options, in combination with information from other data items. After the association data is added to the association table, the embodiment of the application may also configure identification information for the association data, so as to distinguish different association data by the identification information.
After determining the association table, the first end may perform first encryption processing on the association data in the association table to form first intermediate data, and transmit the first intermediate data to the second end, and the second end performs second encryption processing on the first intermediate data to form first data, so as to return the first data to the first end. In addition, after the second end transmits the data format information to the first end, the second end may also acquire disturbance data (such as disturbance data c in fig. 1) having the same data format as the target data, combine the disturbance data into transmission data (including target data a and disturbance data c), and form a table (such as association table 2 in fig. 1), where the disturbance data is data other than the association data. Then, the second end may perform a second encryption process on the data in the association table 2 to form second intermediate data, and transmit the second intermediate data to the first end, and the first end performs a first encryption process on the second intermediate data to form second data. The first encryption processing and the second encryption processing may be understood as transformation processing of data, the number of times of the transformation processing may be one or multiple times, and the scheme may transform the data by using a key, for example, a first key may be configured at the first end to perform the first encryption processing on the data (the associated data and the second intermediate data) by using the first key; the second key may be configured at the second end to perform a second encryption process on the data (the transmission data and the first intermediate data) by the second key. According to the scheme, the data encrypted for the first time and the data encrypted for the second time do not need to be decrypted, so that the key in the first end and the key in the second end can be independent of each other, and the safety of the data is improved.
After the first end acquires the twice-encrypted first data and the twice-encrypted second data, the first end may perform common analysis on the first data and the second data to determine common encrypted data, acquire identification information corresponding to the common encrypted data, and then search corresponding associated data from the association table through the identification information to serve as target data. In an optional embodiment, after the target data is determined, a processing step (which may be understood as an algorithm, a conversion method, or a combination with other data) of the target data may be preset at the first end to process the target data to obtain a processing result.
In addition, in order to determine the target data more quickly by the first end, in the embodiment of the present application, the data amount of the associated data in the association table may also be reduced, specifically, the second end may send the screening condition to the first end in addition to sending the data format information to the first end, so as to reduce the data amount of the associated data in the association table through the screening condition. In this case, the filtering condition may be determined according to the target data, in one example, the filtering condition may be understood as a filtering condition for at least one data item in the data format information, and taking the target data as personal information (including information such as name and age), the filtering condition may include an age filtering condition, a surname filtering condition, and the like. The screening condition may also be other screening conditions, for example, the first end may include a plurality of databases for storing different data, and the screening condition may be a database screening condition to obtain associated data from the database meeting the database screening condition. For example, in the public security system, the second end of the second area may send data format information and filtering conditions (a database corresponding to the missing person of the first area is specified) of the target data (personal information of the criminals in the second area) to the first end of the first area, so that the first end may obtain the associated data from the database of the missing person according to the filtering conditions, and further filter the target data (personal information of the criminals in the second area) from the associated data through the twice-encrypted first data and the twice-encrypted second data so as to perform corresponding processing.
The data sharing page can be provided at the second end so that a user at the second end can select target data to be transmitted, specifically, the data sharing page can include a data selection control, the user can trigger the data selection control to determine the target data to be transmitted, analyze the target data and determine at least one type of data format information, and the user can select the data format information to determine the data format information transmitted to the first end. In addition, the screening conditions corresponding to the target data can be analyzed and displayed to the user in the data sharing page, and the user can select the screening conditions to determine the screening conditions transmitted to the first end. In addition, the embodiment of the application can configure a shared service base at the first end and the second end respectively, so that transmission of data format information, encrypted data and other information is completed through the shared service base.
In the embodiment of the application, the associated data includes target data to be transmitted and other data with the same format as the target data, and the transmission data includes the target data to be transmitted and disturbance data, so that the embodiment of the application can determine common data (corresponding to the target data) in the first data (associated data after secondary encryption) and the second data (transmission data after secondary encryption), and acquire the associated data corresponding to the common data from the association table (unencrypted associated data) as the target data to use the target data. Compared with a method for acquiring target data through encryption and decryption, the method provided by the embodiment of the application does not perform a decryption process on the encrypted data, so that the key of the first end and the key of the second end can be independent of each other, the first end does not need to know the key of the second end, and the data security is improved.
The embodiment of the application can be applied to a data synchronization scene among different networks, a data owner can send data format information of target data to be synchronized to a data user, the data user determines associated information containing the target data according to the data format information, then the associated data and the target data can be secondarily encrypted through respective keys of the data owner and the data user to form first data and second data, and the data user screens the target data to be used from the unencrypted associated data according to common data between the first data and the second data. The embodiment of the application is an improvement on a data synchronization process, so the embodiment of the application can be applied to a data synchronization scene of various types of data among different networks, for example, the embodiment of the application can be applied to a data synchronization scene of medical related data, education related data, e-commerce related data, traffic related data, and related data (such as personal information) of various organizations (such as government organizations, enterprise organizations, and the like), and can perform safer data synchronization across networks.
For example, the embodiment of the application can be applied to the scenario of processing the relevant data in the public security system, in the public security system, data can be transmitted between a first system in a first area and a second system in a second area, the first system (data owner) can determine target data to be transmitted (such as personal information of newly-added criminals), and transmits the data format information of the target data to a second system (data user), the second system screens out the associated data according to the data format information, in addition, in order to reduce the data volume of the associated data (improve the data transmission efficiency), the first system can also transmit screening conditions (such as limiting screening from a database of missing people) to the second system, so that the second system screens out the associated data (e.g., the missing population information of the second area) according to the data format information and the screening condition. Then, the second system and the first system encrypt the associated data and the target data for the second time to obtain the first data and the second data, and the target data (the personal information of the criminal) to be used is screened out from the unencrypted associated data by the data using party according to the common data between the first data and the second data.
For another example, the embodiment of the present application may be applied to a scenario of processing education-related data, in which a student may migrate from a first area to a second area for entrance (the first area needs to delete a student), and accordingly, the second system in the second area may send data format information of the education-related data (such as the student data) to the first area, so that the first system in the first area screens out associated data, and performs secondary encryption on the associated data and the education-related data through the first system and the second system, respectively, so that the first system may screen out the education-related data (the student data) from the unencrypted associated data through the secondary encryption of the associated data and the education-related data, and delete the education-related data.
For another example, the embodiment of the present application may be applied to a data transmission scenario among different departments in a company organization, where a second end of a second department may send data format information of target data to be transmitted to a first end of a first department, the first end screens out associated data according to the data format information, and then, the associated data and the target data are respectively encrypted for the second time through the first end and the second end, so that the target data is screened out from the unencrypted associated data through shared data in the associated data and the target data encrypted for the second time at the first end, and the target data is processed.
The embodiment of the present application provides a data processing method, which can be applied to a first end, where the first end can be understood as a data user, and the first end can interact with a second end (which can be understood as a data owner) to determine target data according to information interacted with the second end, so as to improve data security, specifically, as shown in fig. 2, the method includes:
step 202, receiving data format information of target data to be transmitted from the second end, and acquiring associated data according to the data format information to form an associated table, wherein the associated table comprises the target data. In the embodiment of the application, the second end can determine target data to be transmitted and determine data format information of the target data, then the second end transmits the data format information to the first end, and after the first end receives the data format information, the first end acquires associated data according to the data format information to form an association table, wherein the associated data acquired by the first end contains the target data and other data, so that the target data in the associated data can be determined in a subsequent screening (screening through common data) mode. In this embodiment of the application, the first end may obtain the associated data from the first database, and the second end may obtain the target data from the second database, in an optional embodiment, the first database and the second database may be two independent databases, in another optional embodiment, the first database and the second database may also be the same database, the first end may screen out the associated data through a screening condition, and the second end may determine the associated data according to the screening condition, so as to determine disturbance data other than the associated data.
Specifically, as an optional embodiment, the data format information is composed of data items, and the acquiring of the associated data includes: establishing a data acquisition task corresponding to each data item; and executing the data acquisition task, and adding a data value to the data item to form association data so as to form an association table. The data items are used to obtain corresponding data values to form associated data. In addition, the data item may further include an enumeration item that may be filled through enumeration, so as to form associated data in an enumeration manner, specifically, as an optional embodiment, the data item includes the enumeration item, and the method further includes: the enumeration data is configured for the enumerated items to form associated data. The method and the device for generating the association data can generate the association data which is not originally contained in the first end at the first end in an enumeration mode, so that the method and the device for generating the association data can be applied to more scenes. For example, the target data in the second end may be personal health information (e.g. health or unhealthy), the second end may transmit data format information including an enumeration item to the first end, and the first end may determine the association data by enumerating both healthy and unhealthy items and combining information of other data items (e.g. personal name, contact information, etc.). Therefore, in the subsequent screening process, the associated data corresponding to the target data in the second end is screened out, and the target data is transmitted from the second end to the first end.
In addition, in order to transmit the target data more quickly, the embodiment of the present application may further reduce the data amount of the associated data in the association table, and specifically, as an optional embodiment, the acquiring the associated data includes: and receiving a screening condition for screening the associated data from the second end, and acquiring the associated data according to the screening condition and the data format information. The second end may send the screening condition to the first end to reduce the data amount of the associated data in the association table through the screening condition, and reduce the data amount of the first end performing the first encryption processing, so as to improve the transmission efficiency of the target data.
After determining the association table, the first end may perform, in step 204, a first encryption process on the association data to form first intermediate data, and transmit the first intermediate data to the second end, where the second end performs a second encryption process on the first intermediate data to obtain first data, and returns the first data to the first end; and the second end carries out second encryption processing on the target data to be transmitted to form second intermediate data. The first end may also receive second intermediate data from the second end and perform the first encryption process on the second intermediate data to form second data in step 206. The first encryption process may be understood as a first transform process performed on the data, and the second encryption process may be understood as a second transform process performed on the data. For example, in an alternative embodiment, the data may be changed by a key, and specifically, the first key may be configured at the first end to perform a first encryption process on the data (the association data and the second intermediate data) by the first key; the second key may be configured at the second end to perform a second encryption process on the data (the transmission data and the first intermediate data) by the second key.
In the embodiment of the present application, the associated data and the transmission data may be encrypted for the second time, so that in step 208, common data in the first data and the second data is determined, so as to screen out target data corresponding to the common data from the association table. The associated data includes target data to be transmitted and other data (e.g., data b in the example shown in fig. 1) having the same format as the target data (e.g., data a in the example shown in fig. 1), and the transmission data includes the target data to be transmitted and disturbance data (e.g., data c in the example shown in fig. 1), so that the embodiment of the present application may determine common data (corresponding to the target data) in the first data (associated data after secondary encryption) and the second data (transmission data after secondary encryption), and obtain associated data corresponding to the common data from the association table (unencrypted associated data) as the target data, so as to use the target data.
Specifically, as an optional embodiment, the association table includes identification information about the associated data, and the screening of the associated table for the target data corresponding to the common data includes: and acquiring target identification information corresponding to the common data, and screening corresponding associated data from the association table as target data according to the target identification information. After the associated data is added to the association table, the embodiment of the application may further configure identification information for the associated data, and may enable the first intermediate data after the first encryption to carry the identification information, and enable the first data obtained by the second encryption to carry the identification information, so that after the common data is determined, the unencrypted associated data may be obtained from the associated data by using the identification information corresponding to the common data as the target data. By means of the method and the device, the first end does not need to decrypt the encrypted first data, the target data can be obtained from the association table in a mode of determining common data shared by the first data and the second data, and safety of data transmission can be improved.
In this embodiment of the application, the first end may receive data format information of target data to be transmitted from the second end, determine associated data including the target data according to the data format information, and form an association table, and then, the first end may perform first encryption processing on the associated data to form first intermediate data, send the first intermediate data to the second end, perform second encryption processing on the second end to form second-encrypted first data, and return the second-encrypted first data to the first end. The second end may perform second encryption processing on target data to be transmitted to form second intermediate data, transmit the second intermediate data to the first end, and perform first encryption processing on the first end to form second data subjected to secondary encryption. After the twice-encrypted first data and the twice-encrypted second data are determined, common data in the first data and the second data can be determined, and target data corresponding to the common data can be screened out from the association table. In the embodiment of the application, the first end can use the data format information of the target data to screen out the associated data containing the target data, perform secondary encryption, perform common analysis by combining the target data subjected to secondary encryption, extract the target data from the associated data according to the common data, and transmit the target data at the second end to the first end.
On the basis of the foregoing embodiments, an embodiment of the present application provides a data processing method, which can be applied to a first end, specifically, as shown in fig. 3, the method includes:
and step 302, receiving data format information and screening conditions of target data to be transmitted from the second end.
And 304, acquiring associated data according to the screening condition and the data format information to form an associated table, wherein the associated table comprises target data and comprises identification information of the associated data. As an optional embodiment, the data format information is composed of data items, and the obtaining of the associated data includes: establishing a data acquisition task corresponding to each data item; and executing the data acquisition task, and adding a data value to the data item to form association data so as to form an association table. As an optional embodiment, the data item includes an enumeration item, and the method further includes: the enumeration data is configured for the enumerated items to form associated data.
Step 306, performing first encryption processing on the associated data to form first intermediate data, transmitting the first intermediate data to the second end, performing second encryption processing on the first intermediate data by the second end to obtain first data, and returning the first data to the first end; and the second end carries out second encryption processing on the target data to be transmitted to form second intermediate data.
Step 308, receiving the second intermediate data from the second end, and performing a first encryption process on the second intermediate data to form second data.
And step 310, common data in the first data and the second data are determined.
And 312, acquiring target identification information corresponding to the common data, and screening corresponding associated data from the association table as target data according to the target identification information.
In this embodiment of the application, the first end may receive, from the second end, the data format information and the screening condition of the target data to be transmitted, determine associated data including the target data according to the data format information and the screening condition, and form an association table, and the first end may configure identification information for the associated data in the association table. Then, the first end may perform a first encryption process on the associated data to form first intermediate data, send the first intermediate data to the second end, perform a second encryption process on the second end to form second-encrypted first data, and return the second-encrypted first data to the first end. The second end may perform second encryption processing on target data to be transmitted to form second intermediate data, transmit the second intermediate data to the first end, and perform first encryption processing on the first end to form second data subjected to secondary encryption. After the twice-encrypted first data and the twice-encrypted second data are determined, common data in the first data and the second data can be determined, target identification information of the common data is obtained, and associated data corresponding to the target identification information is screened out from the association table to serve as the target data.
On the basis of the foregoing embodiments, an embodiment of the present application provides a data processing method, which can be applied to a second end, where the second end can be understood as a data owner, and the second end can interact with a first end (a data consumer) to send information related to target data to be transmitted to the first end, so that the first end determines the target data, specifically, as shown in fig. 4, the method includes:
step 402, sending data format information of target data to be transmitted to a first end, wherein the first end acquires associated data according to the data format information to form an associated table, and the associated table comprises the target data. The second end can determine target data to be transmitted and send data format information of the target data to the first end, so that the first end screens out associated data containing the target data according to the data format information. In addition, in order to improve the data transmission efficiency, in the embodiment of the present application, a screening condition may also be sent to the first end, and specifically, as an optional embodiment, the method further includes: and sending a screening condition for screening the associated data to the first end so that the first end screens the associated data according to the screening condition. Through the screening condition, the associated data can be further screened, so that the associated data with a part having poor association degree with the target data is removed, the data volume of the associated data needing to be subjected to secondary encryption is reduced, and the data processing efficiency is improved.
In order to facilitate the user at the second end to transmit the target data to the first end, in the embodiment of the present application, a data sharing page may be provided at the second end, so that the user performs an operation in the data sharing page to determine the target data to be transmitted. Specifically, as an optional embodiment, the method further includes: providing a data sharing page, wherein the data sharing page comprises a data selection control; determining target data to be transmitted according to the triggering of the data selection control, and generating at least one data format information; and acquiring an information selection instruction of the data format information, determining the selected target data format information, and transmitting the target data format information to the first end.
In the embodiment of the application, a user can trigger the data selection control in the data sharing page to determine target data to be transmitted, then the second end can analyze data items contained in the target data to generate at least one piece of data format information and display the data format information in the data sharing page, and the user can determine the data format information transmitted to the first end by selecting the data format information. In addition, in the embodiment of the present application, in addition to the data format information may be generated by identifying the data item of the target data, the embodiment of the present application may also generate the data format information by a manual editing method, and a user may edit at least one data item in the data sharing page to form the data format information and transmit the data format information.
In addition, in this embodiment of the present application, a plurality of filtering conditions may be displayed in the data sharing page, so that the user selects the filtering conditions and transmits the selected filtering conditions to the first end, specifically, as an optional embodiment, the method further includes: analyzing the target data to generate at least one screening condition, and displaying the screening condition on a data sharing page; obtaining a condition selection instruction for the screening condition, and determining the selected target screening condition to transmit the target screening condition to the first end. In the embodiment of the application, the user can also manually edit the screening conditions in the data sharing page, and the screening conditions are transmitted to the first end, so that the associated data are further screened through the screening conditions, and the data processing efficiency is improved.
After receiving the data format information, the first end may filter out corresponding associated data to form an associated table, and then, the first end may perform a first encryption process on the associated data in the associated table to form first intermediate data and transmit the first intermediate data to the second end, and in step 404, the second end receives the first intermediate data formed after performing the first encryption process on the associated data from the first end and performs a second encryption process to form first data, so as to return the first data to the first end. The second end may further obtain the transmission data in step 406, perform a second encryption process to form second intermediate data, and transmit the second intermediate data to the first end, where the first end performs a first encryption process on the second intermediate data to form second data, and determines common data in the first data and the second data to screen out target data corresponding to the common data from the association table.
In order to improve the security of data transmission, in the embodiment of the present application, in addition to adding target data to transmission data, disturbance data other than associated data may also be added, and specifically, as an optional embodiment, the method further includes a step of determining transmission data: acquiring target data to be transmitted, and determining disturbance data except for associated data; and determining transmission data according to the target data and the disturbance data. According to the method and the device, the second encryption processing can be carried out on the disturbance data except the target data and the associated data to form second intermediate data, and therefore the target data and the disturbance data can be obtained after the second intermediate data are leaked and decrypted, so that the leakage probability of important data (target data) can be reduced, and the safety of the data is improved.
The implementation manner of this embodiment is similar to that of the above embodiment, and the detailed implementation manner of the above embodiment may be referred to, and is not described herein again.
In the embodiment of the application, the second end can determine target data to be transmitted, and transmit data format information of the target data to the first end, the first end can determine associated data including the target data according to the data format information to form an association table, then, the first end can perform first encryption processing on the associated data to form first intermediate data, and send the first intermediate data to the second end, perform second encryption processing on the second end to form second encrypted first data, and return the second encrypted first data to the first end. The second end may perform second encryption processing on target data to be transmitted to form second intermediate data, transmit the second intermediate data to the first end, and perform first encryption processing on the first end to form second data subjected to secondary encryption. After determining the twice-encrypted first data and the twice-encrypted second data, the first end may determine common data in the first data and the second data, and screen out target data corresponding to the common data from the association table. In the embodiment of the application, the first end does not decrypt the encrypted target data, so that the data security can be improved.
On the basis of the foregoing embodiments, the present application provides a data processing method, which can be applied to the second end, specifically, as shown in fig. 5, the method includes:
step 502, providing a data sharing page, wherein the data sharing page comprises a data selection control.
Step 504, determining target data to be transmitted according to the triggering of the data selection control, and generating at least one data format information.
Step 506, an information selection instruction for the data format information is obtained, and the selected target data format information is determined so as to transmit the target data format information to the first end.
Step 508, sending a screening condition for screening the associated data to the first end so that the first end screens the associated data according to the screening condition, and the first end acquires the associated data according to the data format information and the screening condition to form an associated table, wherein the associated table contains the target data.
Step 510, receiving first intermediate data formed by performing first encryption processing on the associated data from the first end, and performing second encryption processing to form first data so as to return the first data to the first end;
and step 512, determining disturbance data except the associated data.
And step 514, determining transmission data according to the target data and the disturbance data.
And 516, performing second encryption processing on the transmission data to form second intermediate data, transmitting the second intermediate data to the first end, performing first encryption processing on the second intermediate data by the first end to form second data, and determining common data in the first data and the second data so as to screen out target data corresponding to the common data from the association table.
In the embodiment of the application, a data sharing page can be provided at the second end, a user can trigger a data selection control in the data sharing page, target data to be transmitted is determined, at least one data format information and at least one screening condition are generated, the user can select the data format information and the screening condition, the selected data format information and the screening condition are sent to the first end, the first end can determine associated data containing the target data according to the data format information to form an association table, then the first end can perform first encryption processing on the associated data to form first intermediate data, the first intermediate data is sent to the second end, second encryption processing is performed on the second end to form second encrypted first data, and the second encrypted first data is returned to the first end. The second end can obtain the target data and the disturbance data to form transmission data, second encryption processing is carried out on the transmission data to form second intermediate data, the second intermediate data is transmitted to the first end, first encryption processing is carried out on the first end, and second encrypted second data is formed. After determining the twice-encrypted first data and the twice-encrypted second data, the first end may determine common data in the first data and the second data, and screen out target data corresponding to the common data from the association table.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the embodiments are not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the embodiments. Further, those skilled in the art will also appreciate that the embodiments described in the specification are presently preferred and that no particular act is required of the embodiments of the application.
On the basis of the foregoing embodiment, this embodiment further provides a data processing apparatus, and with reference to fig. 6, the data processing apparatus may specifically include the following modules:
the associated data obtaining module 602 is configured to receive data format information of the target data to be transmitted from the second end, and obtain associated data according to the data format information to form an associated table, where the associated table includes the target data.
The first data obtaining module 604 is configured to perform first encryption processing on the associated data to form first intermediate data, and transmit the first intermediate data to the second end, where the second end performs second encryption processing on the first intermediate data to obtain first data, and returns the first data to the first end; and the second end carries out second encryption processing on the target data to be transmitted to form second intermediate data.
The second data obtaining module 606 is configured to receive the second intermediate data from the second end, and perform the first encryption processing on the second intermediate data to form second data.
And the target data acquisition module 608 is configured to determine common data in the first data and the second data, so as to screen out target data corresponding to the common data from the association table.
In summary, in the embodiment of the present application, the first end may receive the data format information of the target data to be transmitted from the second end, determine the associated data including the target data according to the data format information, and form the association table, and then, the first end may perform a first encryption process on the associated data to form first intermediate data, send the first intermediate data to the second end, perform a second encryption process on the second end to form second-encrypted first data, and return the second-encrypted first data to the first end. The second end may perform second encryption processing on target data to be transmitted to form second intermediate data, transmit the second intermediate data to the first end, and perform first encryption processing on the first end to form second data subjected to secondary encryption. After the twice-encrypted first data and the twice-encrypted second data are determined, common data in the first data and the second data can be determined, and target data corresponding to the common data can be screened out from the association table. In the embodiment of the application, the first end can use the data format information of the target data to screen out the associated data containing the target data, perform secondary encryption, perform common analysis by combining the target data subjected to secondary encryption, extract the target data from the associated data according to the common data, and transmit the target data at the second end to the first end.
On the basis of the foregoing embodiment, this embodiment further provides a data processing apparatus, which may specifically include the following modules:
and the data format acquisition processing module is used for receiving the data format information and the screening condition of the target data to be transmitted from the second end.
And the associated data acquisition processing module is used for acquiring associated data according to the screening condition and the data format information to form an associated table, wherein the associated table comprises target data, and the associated table comprises identification information of the associated data.
The first data acquisition processing module is used for carrying out first encryption processing on the associated data to form first intermediate data and transmitting the first intermediate data to the second end, and the second end carries out second encryption processing on the first intermediate data to obtain first data and returns the first data to the first end; and the second end carries out second encryption processing on the target data to be transmitted to form second intermediate data.
And the second data acquisition processing module is used for receiving the second intermediate data from the second end and carrying out first encryption processing on the second intermediate data to form second data.
And the common data acquisition processing module is used for determining common data in the first data and the second data.
And the target data acquisition processing module is used for acquiring target identification information corresponding to the common data and screening corresponding associated data from the association table as target data according to the target identification information.
In this embodiment of the application, the first end may receive, from the second end, the data format information and the screening condition of the target data to be transmitted, determine associated data including the target data according to the data format information and the screening condition, and form an association table, and the first end may configure identification information for the associated data in the association table. Then, the first end may perform a first encryption process on the associated data to form first intermediate data, send the first intermediate data to the second end, perform a second encryption process on the second end to form second-encrypted first data, and return the second-encrypted first data to the first end. The second end may perform second encryption processing on target data to be transmitted to form second intermediate data, transmit the second intermediate data to the first end, and perform first encryption processing on the first end to form second data subjected to secondary encryption. After the twice-encrypted first data and the twice-encrypted second data are determined, common data in the first data and the second data can be determined, target identification information of the common data is obtained, and associated data corresponding to the target identification information is screened out from the association table to serve as the target data.
On the basis of the foregoing embodiment, this embodiment further provides a data processing apparatus, and with reference to fig. 7, the data processing apparatus may specifically include the following modules:
the data format sending module 702 is configured to send data format information of target data to be transmitted to a first end, where the first end obtains associated data according to the data format information to form an association table, where the association table includes the target data.
The first data sending module 704 is configured to receive, from the first end, first intermediate data formed by performing first encryption processing on the associated data, and perform second encryption processing to form first data, so as to return the first data to the first end.
The second data sending module 706 is configured to obtain the transmission data, perform second encryption processing to form second intermediate data, and transmit the second intermediate data to the first end, where the first end performs first encryption processing on the second intermediate data to form second data, and determines common data in the first data and the second data, so as to screen out target data corresponding to the common data from the association table.
In summary, in the embodiment of the present application, the second end may determine target data to be transmitted, and transmit data format information of the target data to the first end, and the first end may determine associated data including the target data according to the data format information to form an association table, and then the first end may perform a first encryption process on the associated data to form first intermediate data, and send the first intermediate data to the second end, and perform a second encryption process on the second end to form second encrypted first data, and return the second encrypted first data to the first end. The second end may perform second encryption processing on target data to be transmitted to form second intermediate data, transmit the second intermediate data to the first end, and perform first encryption processing on the first end to form second data subjected to secondary encryption. After determining the twice-encrypted first data and the twice-encrypted second data, the first end may determine common data in the first data and the second data, and screen out target data corresponding to the common data from the association table. In the embodiment of the application, the first end does not decrypt the encrypted target data, so that the data security can be improved.
On the basis of the foregoing embodiment, this embodiment further provides a data processing apparatus, which may specifically include the following modules:
and the shared page providing and processing module is used for providing a data shared page, and the data shared page comprises a data selection control.
And the target data determination processing module is used for determining the target data to be transmitted according to the triggering of the data selection control and generating at least one data format information.
And the data format selection processing module is used for acquiring an information selection instruction of the data format information, determining the selected target data format information and transmitting the target data format information to the first end.
And the screening condition sending and processing module is used for sending screening conditions for screening the associated data to the first end so that the first end screens the associated data according to the screening conditions, and the first end acquires the associated data according to the data format information and the screening conditions to form an associated table, wherein the associated table contains the target data.
The first data return processing module is used for receiving first intermediate data formed by performing first encryption processing on the associated data from the first end, performing second encryption processing on the first intermediate data to form first data and returning the first data to the first end;
and the disturbance data acquisition and processing module is used for determining disturbance data except the associated data.
And the transmission data acquisition processing module is used for determining transmission data according to the target data and the disturbance data.
And the second intermediate data transmission processing module is used for carrying out second encryption processing on the transmission data to form second intermediate data and transmitting the second intermediate data to the first end, the first end carries out first encryption processing on the second intermediate data to form second data, and common data in the first data and the second data are determined so as to screen out target data corresponding to the common data from the association table.
In the embodiment of the application, a data sharing page can be provided at the second end, a user can trigger a data selection control in the data sharing page, target data to be transmitted is determined, at least one data format information and at least one screening condition are generated, the user can select the data format information and the screening condition, the selected data format information and the screening condition are sent to the first end, the first end can determine associated data containing the target data according to the data format information to form an association table, then the first end can perform first encryption processing on the associated data to form first intermediate data, the first intermediate data is sent to the second end, second encryption processing is performed on the second end to form second encrypted first data, and the second encrypted first data is returned to the first end. The second end can obtain the target data and the disturbance data to form transmission data, second encryption processing is carried out on the transmission data to form second intermediate data, the second intermediate data is transmitted to the first end, first encryption processing is carried out on the first end, and second encrypted second data is formed. After determining the twice-encrypted first data and the twice-encrypted second data, the first end may determine common data in the first data and the second data, and screen out target data corresponding to the common data from the association table.
The present application further provides a non-transitory, readable storage medium, where one or more modules (programs) are stored, and when the one or more modules are applied to a device, the device may execute instructions (instructions) of method steps in this application.
Embodiments of the present application provide one or more machine-readable media having instructions stored thereon, which when executed by one or more processors, cause an electronic device to perform the methods as described in one or more of the above embodiments. In the embodiment of the application, the electronic device includes a server, a terminal device and other devices.
Embodiments of the present disclosure may be implemented as an apparatus, which may comprise a server (cluster), a terminal, etc., electronic device, using any suitable hardware, firmware, software, or any combination thereof, in a desired configuration. Fig. 8 schematically illustrates an example apparatus 800 that may be used to implement various embodiments described herein.
For one embodiment, fig. 8 illustrates an example apparatus 800 having one or more processors 802, a control module (chipset) 804 coupled to at least one of the processor(s) 802, a memory 806 coupled to the control module 804, a non-volatile memory (NVM)/storage 808 coupled to the control module 804, one or more input/output devices 810 coupled to the control module 804, and a network interface 812 coupled to the control module 804.
The processor 802 may include one or more single-core or multi-core processors, and the processor 802 may include any combination of general-purpose or special-purpose processors (e.g., graphics processors, application processors, baseband processors, etc.). In some embodiments, the apparatus 800 can be used as a server, a terminal, or the like in the embodiments of the present application.
In some embodiments, the apparatus 800 may include one or more computer-readable media (e.g., the memory 806 or the NVM/storage 808) having instructions 814 and one or more processors 802 that, in conjunction with the one or more computer-readable media, are configured to execute the instructions 814 to implement modules to perform the actions described in this disclosure.
For one embodiment, the control module 804 may include any suitable interface controller to provide any suitable interface to at least one of the processor(s) 802 and/or any suitable device or component in communication with the control module 804.
The control module 804 may include a memory controller module to provide an interface to the memory 806. The memory controller module may be a hardware module, a software module, and/or a firmware module.
The memory 806 may be used, for example, to load and store data and/or instructions 814 for the apparatus 800. For one embodiment, memory 806 may include any suitable volatile memory, such as suitable DRAM. In some embodiments, the memory 806 may comprise a double data rate type four synchronous dynamic random access memory (DDR4 SDRAM).
For one embodiment, the control module 804 may include one or more input/output controllers to provide an interface to the NVM/storage 808 and input/output device(s) 810.
For example, the NVM/storage 808 may be used to store data and/or instructions 814. NVM/storage 808 may include any suitable non-volatile memory (e.g., flash memory) and/or may include any suitable non-volatile storage device(s) (e.g., one or more Hard Disk Drives (HDDs), one or more Compact Disc (CD) drives, and/or one or more Digital Versatile Disc (DVD) drives).
The NVM/storage 808 may include storage resources that are part of the device on which the apparatus 800 is installed or it may be accessible by the device and may not necessarily be part of the device. For example, the NVM/storage 808 may be accessible over a network via the input/output device(s) 810.
Input/output device(s) 810 may provide an interface for apparatus 800 to communicate with any other suitable device, input/output devices 810 may include communication components, audio components, sensor components, and so forth. The network interface 812 may provide an interface for the device 800 to communicate over one or more networks, and the device 800 may wirelessly communicate with one or more components of a wireless network according to any of one or more wireless network standards and/or protocols, such as access to a communication standard-based wireless network, such as WiFi, 2G, 3G, 4G, 5G, etc., or a combination thereof.
For one embodiment, at least one of the processor(s) 802 may be packaged together with logic for one or more controller(s) (e.g., memory controller module) of the control module 804. For one embodiment, at least one of the processor(s) 802 may be packaged together with logic for one or more controller(s) of the control module 804 to form a System In Package (SiP). For one embodiment, at least one of the processor(s) 802 may be integrated on the same die with logic for one or more controller(s) of the control module 804. For one embodiment, at least one of the processor(s) 802 may be integrated on the same die with logic of one or more controllers of the control module 804 to form a system on a chip (SoC).
In various embodiments, the apparatus 800 may be, but is not limited to being: a server, a desktop computing device, or a mobile computing device (e.g., a laptop computing device, a handheld computing device, a tablet, a netbook, etc.), among other terminal devices. In various embodiments, the apparatus 800 may have more or fewer components and/or different architectures. For example, in some embodiments, device 800 includes one or more cameras, a keyboard, a Liquid Crystal Display (LCD) screen (including a touch screen display), a non-volatile memory port, multiple antennas, a graphics chip, an Application Specific Integrated Circuit (ASIC), and speakers.
The detection device can adopt a main control chip as a processor or a control module, sensor data, position information and the like are stored in a memory or an NVM/storage device, a sensor group can be used as an input/output device, and a communication interface can comprise a network interface.
An embodiment of the present application further provides an electronic device, including: a processor; and a memory having executable code stored thereon that, when executed, causes the processor to perform a method as described in one or more of the embodiments of the application.
Embodiments of the present application also provide one or more machine-readable media having executable code stored thereon that, when executed, cause a processor to perform a method as described in one or more of the embodiments of the present application.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present application have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all such alterations and modifications as fall within the true scope of the embodiments of the application.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The foregoing detailed description has provided a data processing method, a data processing apparatus, an electronic device, and a storage medium, and the principles and embodiments of the present application are described herein using specific examples, which are only used to help understand the method and the core ideas of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (12)

1. A data processing method, applied to a first side, the method comprising:
receiving data format information of target data to be transmitted from a second end, and acquiring associated data according to the data format information to form an associated table, wherein the associated table comprises the target data;
performing first encryption processing on the associated data to form first intermediate data, transmitting the first intermediate data to a second end, performing second encryption processing on the first intermediate data by the second end to obtain first data, and returning the first data to the first end; the second end carries out second encryption processing on target data to be transmitted to form second intermediate data;
receiving second intermediate data from the second end, and performing first encryption processing on the second intermediate data to form second data;
and determining common data in the first data and the second data to screen target data corresponding to the common data from the association table.
2. The method according to claim 1, wherein the association table includes identification information about associated data, and the screening of the association table for target data corresponding to the common data comprises:
and acquiring target identification information corresponding to the common data, and screening corresponding associated data from the association table as target data according to the target identification information.
3. The method of claim 1, wherein the data format information is composed of data items, and the obtaining the associated data comprises:
establishing a data acquisition task corresponding to each data item;
and executing the data acquisition task, and adding a data value to the data item to form association data so as to form an association table.
4. The method of claim 3, wherein the data item contains an enumeration item, the method further comprising:
the enumeration data is configured for the enumerated items to form associated data.
5. The method of claim 1, wherein the obtaining the association data comprises:
and receiving a screening condition for screening the associated data from the second end, and acquiring the associated data according to the screening condition and the data format information.
6. A data processing method applied to a second end, the method comprising:
sending data format information of target data to be transmitted to a first end, wherein the first end acquires associated data according to the data format information to form an associated table, and the associated table comprises the target data;
receiving first intermediate data formed by performing first encryption processing on the associated data from the first end, and performing second encryption processing to form first data so as to return the first data to the first end;
the method comprises the steps of obtaining transmission data, carrying out second encryption processing to form second intermediate data, and transmitting the second intermediate data to a first end, carrying out first encryption processing on the second intermediate data by the first end to form second data, determining common data in the first data and the second data, and screening out target data corresponding to the common data from an association table, wherein the transmission data comprise target data to be transmitted.
7. The method of claim 6, further comprising:
and sending a screening condition for screening the associated data to the first end so that the first end screens the associated data according to the screening condition.
8. The method of claim 7, further comprising:
providing a data sharing page, wherein the data sharing page comprises a data selection control;
determining target data to be transmitted according to the triggering of the data selection control, and generating at least one data format information;
and acquiring an information selection instruction of the data format information, determining the selected target data format information, and transmitting the target data format information to the first end.
9. The method of claim 8, further comprising:
analyzing the target data to generate at least one screening condition, and displaying the screening condition on a data sharing page;
obtaining a condition selection instruction for the screening condition, and determining the selected target screening condition to transmit the target screening condition to the first end.
10. The method of claim 6, further comprising the step of determining the transmission data:
acquiring target data to be transmitted, and determining disturbance data except for associated data;
and determining transmission data according to the target data and the disturbance data.
11. An electronic device, comprising: a processor; and
a memory having executable code stored thereon that, when executed, causes the processor to perform the method of any of claims 1-10.
12. One or more machine-readable media having executable code stored thereon that, when executed, causes a processor to perform the method of any of claims 1-10.
CN202111351445.0A 2021-11-16 2021-11-16 Data processing method and device, electronic equipment and storage medium Active CN113794738B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111351445.0A CN113794738B (en) 2021-11-16 2021-11-16 Data processing method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111351445.0A CN113794738B (en) 2021-11-16 2021-11-16 Data processing method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113794738A CN113794738A (en) 2021-12-14
CN113794738B true CN113794738B (en) 2022-02-08

Family

ID=78955136

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111351445.0A Active CN113794738B (en) 2021-11-16 2021-11-16 Data processing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113794738B (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106911661B (en) * 2016-09-23 2020-04-28 阿里巴巴集团控股有限公司 Short message verification method, device, client, server and system
CN108197485B (en) * 2018-01-29 2020-08-18 世纪龙信息网络有限责任公司 Terminal data encryption method and system and terminal data decryption method and system
US11316907B2 (en) * 2019-12-06 2022-04-26 EMC IP Holding Company LLC System and method for secure communication channel establishment
CN112887297B (en) * 2021-01-22 2022-09-02 支付宝(杭州)信息技术有限公司 Privacy-protecting differential data determining method, device, equipment and system
CN113360923A (en) * 2021-06-03 2021-09-07 北京融数联智科技有限公司 Data interaction method, device and system and electronic equipment

Also Published As

Publication number Publication date
CN113794738A (en) 2021-12-14

Similar Documents

Publication Publication Date Title
CN110011954B (en) Homomorphic encryption-based biological identification method, device, terminal and business server
CN112787976B (en) Data encryption, decryption and sharing method, device, system and storage medium
US20150381588A1 (en) File Sharing Method and Apparatus
US20180246940A1 (en) User social-relationship identification apparatus, method, and terminal device
CN110569281A (en) Block chain transaction query method and system
CN105577379A (en) Information processing method and apparatus thereof
US20170364691A1 (en) Method and System for Controlling Encryption of Information and Analyzing Information as well as Terminal
US9967097B2 (en) Method and system for converting data in an electronic device
CN106817358B (en) Encryption and decryption method and device for user resources
CN110597877A (en) Block chain transaction processing method and device
CN111191100B (en) Government information processing method, government information processing device and computer readable storage medium
CN107104923B (en) Account binding and service processing method and device
CN110390641B (en) Image desensitizing method, electronic device and storage medium
CN109886047B (en) File encryption processing method and device
CN111490995A (en) Model training method and device for protecting privacy, data processing method and server
CN111294361A (en) Workflow data encryption method and system
CN113794738B (en) Data processing method and device, electronic equipment and storage medium
US9282331B2 (en) Image processing method and electronic device
CN109308647B (en) Method, equipment and system for realizing commodity information binding and commodity ordering
CN115730346A (en) Privacy data processing method based on longitudinal federal learning, electronic device and medium
US20150302059A1 (en) Content recommendation apparatus and the method thereof
CN107832464B (en) Data bleaching method and device
CN105472545A (en) Bluetooth automatic connecting method, master device, slave device and system
CN114124469B (en) Data processing method, device and equipment
CN108962398A (en) Information for hospital acquisition methods and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40064010

Country of ref document: HK