CN114301681A - Service data transmission method and device, storage medium and electronic device - Google Patents

Service data transmission method and device, storage medium and electronic device Download PDF

Info

Publication number
CN114301681A
CN114301681A CN202111631110.4A CN202111631110A CN114301681A CN 114301681 A CN114301681 A CN 114301681A CN 202111631110 A CN202111631110 A CN 202111631110A CN 114301681 A CN114301681 A CN 114301681A
Authority
CN
China
Prior art keywords
data
mapping table
service data
data type
parameters
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111631110.4A
Other languages
Chinese (zh)
Inventor
蒋艳军
孙科
王乾
赵轶新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202111631110.4A priority Critical patent/CN114301681A/en
Publication of CN114301681A publication Critical patent/CN114301681A/en
Pending legal-status Critical Current

Links

Images

Abstract

The application discloses a method and a device for transmitting service data, a storage medium and an electronic device, wherein the method comprises the following steps: determining a first mapping table matched with a first data type according to the first data type of the first service data, wherein the first mapping table is used for mapping a first parameter of the first data type to a first parameter group of a second data type; replacing at least part of first parameters in the first service data with corresponding first parameter groups by using a first mapping table to obtain first encrypted data; and sending the first encrypted data to first receiving equipment corresponding to the first service data. By the method and the device, the problem that the safety of business data transmission is poor due to the fact that the encrypted data are easy to crack in a business data transmission method in the related technology is solved.

Description

Service data transmission method and device, storage medium and electronic device
Technical Field
The present application relates to the field of data processing, and in particular, to a method and an apparatus for transmitting service data, a storage medium, and an electronic apparatus.
Background
The rapid spread of the internet has become an important mark of the information age, and anyone can distribute any information through a network at any time and any place. However, while facing the convenience of large amounts of information sharing and acquisition, it also faces the fact that large amounts of data are leaked, tampered, and spoofed.
At present, how to ensure the security of information, the service data transmitted by two communication parties can be encrypted and decrypted by the key negotiated by the two communication parties. However, for the transmission mode of the service data in the related art, since the complexity of the encryption algorithm is not high, the encrypted data is easy to crack, which causes the leakage of the service data, thereby affecting the security of the service data transmission.
Therefore, the transmission method of the business data in the related technology has the problem of poor safety of business data transmission caused by the fact that the encrypted data are easy to crack.
Disclosure of Invention
The embodiment of the application provides a business data transmission method and device, a storage medium and an electronic device, and aims to at least solve the problem that the security of business data transmission is poor due to the fact that encrypted data are easy to crack in a business data transmission method in the related technology.
According to an aspect of the embodiments of the present application, a method for transmitting service data is provided, including: a method for transmitting service data, comprising: determining a first mapping table matched with a first data type of first service data according to the first data type, wherein the first mapping table is used for mapping a first parameter of the first data type to a first parameter group of a second data type; replacing at least part of first parameters in the first service data with corresponding first parameter groups by using the first mapping table to obtain first encrypted data; and sending the first encrypted data to first receiving equipment corresponding to the first service data.
In an exemplary embodiment, before the determining, according to a first data type of first service data, a first mapping table matching the first data type, the method further includes: sending a target request message to a target server, wherein the target request message is used for requesting to acquire a mapping table corresponding to a plurality of first parameters, and the data types of the plurality of first parameters comprise the first data types; receiving the first mapping table corresponding to the plurality of first parameters, where the first mapping table is determined according to the first data type, the first mapping table is used to map each of the plurality of first parameters to one first parameter group of the second data type, and different ones of the plurality of first parameters are mapped to different first parameter groups.
In one exemplary embodiment, after the sending the target request message to the target server, the method further comprises: determining, by the target server, a data type of the plurality of first parameters to be the first data type in response to the received target request message; selecting a mapping table from a plurality of mapping tables corresponding to the first data type by using the first data type to obtain the first mapping table; and sending the first mapping table to target equipment, wherein the target equipment is equipment for sending the target request message.
In one exemplary embodiment, the first mapping table is a checkerboard table; after the selecting a mapping table from a plurality of mapping tables corresponding to the first data type using the first data type to obtain the first mapping table, the method further includes: under the condition that the plurality of first parameters contain target parameters which are not of a preset data type, executing target shift operation on a target row in the first mapping table to obtain a first parameter group to be matched; and executing association operation on the target parameter and the first parameter group to be matched to obtain the updated first mapping table.
In an exemplary embodiment, replacing at least a part of the first parameters in the first service data with the corresponding first parameter group using the first mapping table to obtain first encrypted data includes: according to a target length value, selecting at least part of first parameters from the first parameters contained in the first service data, wherein the target length value is the data length of the replaced encrypted data; and replacing at least part of the first parameters with a corresponding first parameter group by using the first mapping table to obtain the first encrypted data, wherein the first parameters except the at least part of the first parameters in the first service data do not perform replacement operation.
In one exemplary embodiment, the method further comprises: determining the first mapping table matched with the second data type according to the second data type of second service data, wherein the first mapping table is further used for mapping a first parameter group of the second data type to a first parameter of the first data type; replacing at least one first parameter group in the first service data with a corresponding first parameter by using the first mapping table to obtain second encrypted data; and sending the second encrypted data to second receiving equipment corresponding to the second service data.
In one exemplary embodiment, the method further comprises: acquiring third service data to be transmitted; determining a second mapping table matched with a third data type of the third service data according to the third data type, wherein the second mapping table is used for mapping a second parameter of the third data type to a second parameter group of the second data type; replacing at least part of second parameters in the third service data with corresponding second parameter groups by using the second mapping table to obtain third encrypted data; and sending the third encrypted data to third receiving equipment corresponding to the third service data.
In an exemplary embodiment, in the replacing at least part of the parameters in the first service data with the corresponding parameter set using the first mapping table, the method further includes: obtaining the disorder of the parameters contained in the first service data to obtain the disorder service data corresponding to the first service data; and displaying the disordered business data on a target display interface of target equipment, wherein the target equipment is the sending equipment of the first business data.
According to another aspect of the embodiments of the present application, there is also provided a device for transmitting service data, including: a first determining unit, configured to determine, according to a first data type of first service data, a first mapping table matched with the first data type, where the first mapping table is used to map a first parameter of the first data type to a first parameter group of a second data type; a first replacing unit, configured to replace at least part of the first parameters in the first service data with corresponding first parameter groups using the first mapping table, so as to obtain first encrypted data; and the first sending unit is used for sending the first encrypted data to first receiving equipment corresponding to the first service data.
In one exemplary embodiment, the apparatus further comprises: a second sending unit, configured to send a target request message to a target server before determining, according to a first data type of first service data, a first mapping table that matches the first data type, where the target request message is used to request to acquire mapping tables corresponding to a plurality of first parameters, and the data types of the plurality of first parameters include the first data type; a receiving unit, configured to receive the first mapping table corresponding to the plurality of first parameters, where the first mapping table is determined according to the first data type, the first mapping table is used to map each of the plurality of first parameters to one first parameter group of the second data type, and different ones of the plurality of first parameters are mapped to different first parameter groups.
In one exemplary embodiment, the apparatus further comprises: a second determining unit, configured to determine, by the target server, that the data type of the plurality of first parameters is the first data type in response to the received target request message after the target request message is sent to the target server; a selecting unit, configured to select, by using the first data type, a mapping table from multiple mapping tables corresponding to the first data type, to obtain the first mapping table; a third sending unit, configured to send the first mapping table to a target device, where the target device is a device that sends the target request message.
In one exemplary embodiment, the first mapping table is a checkerboard table; the device further comprises: a first executing unit, configured to, after the first data type is used and a mapping table is selected from multiple mapping tables corresponding to the first data type, obtain the first mapping table, and when a target parameter that is not a predetermined data type is included in the multiple first parameters, execute a target shift operation on a target row in the first mapping table, so as to obtain a first parameter group to be matched; and the second execution unit is used for executing association operation on the target parameter and the first parameter group to be matched to obtain the updated first mapping table.
In one exemplary embodiment, the first replacement unit includes: a selecting module, configured to select at least part of the first parameters from the first parameters included in the first service data according to a target length value, where the target length value is a data length of the replaced encrypted data; a replacing module, configured to replace, by using the first mapping table, the at least part of the first parameters with a corresponding first parameter group, to obtain the first encrypted data, where the first service data does not perform a replacing operation on the first parameters except the at least part of the first parameters.
In one exemplary embodiment, the apparatus further comprises: a third determining unit, configured to determine, according to a second data type of second service data, the first mapping table that matches the second data type, where the first mapping table is further configured to map a first parameter group of the second data type to a first parameter of the first data type; a second replacing unit, configured to replace at least one first parameter group in the first service data with a corresponding first parameter by using the first mapping table, so as to obtain second encrypted data; and a fourth sending unit, configured to send the second encrypted data to a second receiving device corresponding to the second service data.
In one exemplary embodiment, the apparatus further comprises: an obtaining unit, configured to obtain third service data to be transmitted; a fourth determining unit, configured to determine, according to a third data type of the third service data, a second mapping table matched with the third data type, where the second mapping table is used to map a second parameter of the second data type to a second parameter group of the third data type; a third replacing unit, configured to replace at least part of the second parameters in the third service data with the corresponding second parameter group using the second mapping table, so as to obtain third encrypted data; a fifth sending unit, configured to send the third encrypted data to a third receiving device corresponding to the third service data.
In one exemplary embodiment, the apparatus further comprises: a third executing unit, configured to, in the process of replacing at least part of parameters in the first service data with corresponding parameter groups using the first mapping table, obtain out-of-order parameters included in the first service data, and obtain out-of-order service data corresponding to the first service data; and the display unit is used for displaying the disordered business data on a target display interface of target equipment, wherein the target equipment is the sending equipment of the first business data.
According to another aspect of the embodiments of the present application, there is also provided a computer-readable storage medium, in which a computer program is stored, where the computer program is configured to execute the transmission method of the service data when running.
According to another aspect of the embodiments of the present application, there is also provided an electronic device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor executes the method for transmitting the service data through the computer program.
In the embodiment of the present application, a first mapping table matched with a first data type is determined according to the first data type of first service data by replacing a parameter of one data type with a parameter group of another data type, where the first mapping table is used to map a first parameter of the first data type to a first parameter group of a second data type; replacing at least part of first parameters in the first service data with corresponding first parameter groups by using a first mapping table to obtain first encrypted data; the first encrypted data is sent to the first receiving device corresponding to the first service data, and a plaintext parameter is replaced by a corresponding ciphertext parameter combination, so that the replacement is not a one-to-one simple replacement, the purpose of improving the difficulty and difficulty of data cracking can be achieved, the technical effect of improving the safety of service data transmission is achieved, and the problem of poor safety of service data transmission caused by the fact that the encrypted data are easy to crack in the service data transmission method in the related technology is solved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise.
Fig. 1 is a schematic diagram of a hardware environment of an alternative service data transmission method according to an embodiment of the present application;
fig. 2 is a schematic flow chart of an alternative service data transmission method according to an embodiment of the present application;
FIG. 3 is a schematic diagram of another alternative checkerboard table in accordance with an embodiment of the present application;
fig. 4 is a block diagram of an alternative service data transmission apparatus according to an embodiment of the present application;
fig. 5 is a block diagram of an alternative electronic device according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
According to an aspect of the embodiments of the present application, a method for transmitting service data is provided. Alternatively, in this embodiment, the transmission method of the service data may be applied to a hardware environment formed by the terminal 102 and the server 104 as shown in fig. 1. As shown in fig. 1, the server 104 is connected to the terminal 102 through a network, and may be configured to provide services (e.g., application services, etc.) for the terminal or a client installed on the terminal, and may be configured with a database on the server or separately from the server, and configured to provide data storage services for the server 104.
The network may include, but is not limited to, at least one of: wired networks, wireless networks. The wired network may include, but is not limited to, at least one of: wide area networks, metropolitan area networks, local area networks, which may include, but are not limited to, at least one of the following: WIFI (Wireless Fidelity), bluetooth. The terminal 102 may not be limited to a PC, a mobile phone, a tablet computer, etc.
The service data transmission method according to the embodiment of the present application may be executed by the server 104, or may be executed by the terminal 102, or may be executed by both the server 104 and the terminal 102. The terminal 102 may execute the service data transmission method according to the embodiment of the present application, or may execute the service data transmission method by a client installed thereon.
Taking the method for transmitting the service data in this embodiment executed by the terminal 102 as an example, fig. 2 is a schematic flow chart of an optional method for transmitting the service data according to the embodiment of the present application, and as shown in fig. 2, the flow of the method may include the following steps:
step S202, determining a first mapping table matched with a first data type of first service data according to the first data type, where the first mapping table is used to map a first parameter of the first data type to a first parameter set of a second data type.
The method for transmitting service data in this embodiment may be used for transmitting service data in the communication field and the information security field, and may be applicable to a scenario related to service transmission. For example, the method can be used in a data encryption scene to ensure the security in the data transmission process.
In the related art, the encryption and decryption algorithms are generally private algorithms, and after an encryption party encrypts data, a secret key needs to be transmitted to a decryption party to decrypt the encrypted data. The corresponding ciphertext letter to a plaintext letter is determined. The decipherer can effectively attack the cryptosystem by analyzing the occurrence frequency of each letter in the ciphertext and combining the letter frequency of the natural language. Therefore, the encryption method of the service data in the related art has the problem that the security of the encrypted data is poor due to the fact that the encrypted data is easy to crack.
In this embodiment, when the first service data is to be transmitted, the terminal device may determine, according to the first service data, an encryption manner matched with the first service data, and optionally, the terminal device may first determine a data type of the first service data, for example, a letter, a number, and the like. According to a first data type of the first service data, a first mapping table matching the first data type may be determined. The first mapping table is used to map a first parameter (e.g., an alphabet) of a first data type to a first parameter set (a combination of numbers) of a second data type. In this case, one plaintext letter may be represented as a plurality of ciphertext data combinations.
The mapping table may be a checkerboard table (which may be a wigginia square matrix) or other tables describing the mapping relationship between the first parameter of the first data type and the first parameter group of the second data type. The chessboard table is corresponding to the chessboard password, and can be a password table, and the chessboard password is a table-lookup encryption method. As shown in fig. 3, the chessboard table records the mapping relationship between letters and number combinations, the number combinations are horizontal and vertical coordinates corresponding to characters in the chessboard table, for example, the number combination corresponding to the lower case letter "a" in the chessboard table is "11", and the number combination corresponding to the lower case letter "y" in the chessboard table is "55".
In this embodiment, a first parameter of the first data type is a parameter that a data type in the first service data is the first data type, for example, the first service data is "ABCDEFG", and the terminal device may determine that the first service data is the data of the alphabetic type, and then determine a checkerboard table matched with the data of the alphabetic type, so as to encrypt "ABCDEFG" according to the checkerboard table.
Alternatively, the number of parameters of the second data type included in the first parameter group may be one or more, for example, the lower case letter "a" may be "11" or "1" in the first mapping table, that is, the number of parameters in the first parameter group is not necessarily more than one. Alternatively, to improve the convenience of data decryption, each first parameter may be mapped to a first parameter group containing the same number of parameters.
It should be noted that the first data type may be a mixed type including a plurality of data types, for example, a data type including capital letters and special symbols (e.g., ABC% D \ F), a data type including lowercase letters and special symbols (e.g., ABC% D \ F), a data type including capital letters and lowercase letters (e.g., abcDdGf), a data type including capital letters, lowercase letters and special symbols (e.g., aBc% D \ F), and so on. Different mapping tables may be corresponded to according to the data type. The first data type and the second data type are different data types. If the first data type is a mixed type of multiple data types, the second data type is different from the multiple data types, so that data encryption and decryption are facilitated.
Step S204, at least part of first parameters in the first service data are replaced by corresponding first parameter groups by using a first chessboard table mapping table, and first encrypted data are obtained.
In this embodiment, after determining the first mapping table, the terminal device may encrypt the first service data according to the first mapping table. The encryption may be encryption of all service data, or encryption of part of service data. The receiving device may determine the mapping table used by default configuration or based on a special identification in the encrypted data.
Optionally, for each first parameter to be encrypted in the first service data, the first parameter group corresponding to the first parameter to be encrypted may be determined by querying the first mapping table, and the corresponding first parameter group is used to replace the first parameter, thereby completing encryption of the first service data.
Step S206, sending the first encrypted data to a first receiving device corresponding to the first service data.
After obtaining the first encrypted data, the terminal device may send the first encrypted data to a first receiving device corresponding to the first service data. The first receiving device may be another terminal device or may be a server. The process of sending the first encrypted data may be directly sending the generated first encrypted data to the first receiving device, or sending the first encrypted data after encapsulating the generated first encrypted data to the first receiving device, which is not limited in this embodiment.
In this embodiment, after receiving the first encrypted data, the first receiving device may determine, according to the mapping table configured by the terminal device and the data type included in the first encrypted data, a first mapping table used for obtaining the first encrypted data, and decrypt the first encrypted data according to the first mapping table to obtain the first service data.
Through the above steps S202 to S206, according to the first data type of the first service data, determining a first mapping table matched with the first data type, where the first mapping table is used to map a first parameter of the first data type to a first parameter group of the second data type; replacing at least part of first parameters in the first service data with corresponding first parameter groups by using a first mapping table to obtain first encrypted data; the first encrypted data is sent to the first receiving device corresponding to the first service data, so that the problem that the security of service data transmission is poor due to the fact that the encrypted data is easy to crack in a service data transmission method in the related technology is solved, and the security of service data transmission is improved.
In an exemplary embodiment, before determining the first mapping table matching the first data type according to the first data type of the first service data, the method further includes:
s11, sending a target request message to a target server, wherein the target request message is used for requesting to acquire a mapping table corresponding to a plurality of first parameters, and the data types of the plurality of first parameters comprise a first data type;
s21, receiving a first mapping table corresponding to a plurality of first parameters returned by the target server, where the first mapping table is determined according to the first data type, the first mapping table is used to map each of the plurality of first parameters to a first parameter group of the second data type, and different ones of the plurality of first parameters are mapped to different first parameter groups.
In this embodiment, the first mapping table may be first acquired from the server before being used. For example, the terminal device may send a target request message to the target server, where the first request message is used to request to obtain a mapping table corresponding to a first data type, for example, to request to obtain a mapping table corresponding to a data type of a letter. In addition, the target request message may also be used to indicate the number of the first parameters used for the service data of the first data type to be encrypted, for example, the number of the letters used is 26. Optionally, in order to provide a suitable mapping table, the target request message may further carry all the first parameters used by the service data of the first data type to be encrypted, so as to facilitate mapping table customization.
After receiving the target request message, the target server may first determine a data type corresponding to the requested mapping table, that is, a first data type, and then allocate the mapping table according to the first data type. For example, the target server may pre-configure a plurality of mapping tables corresponding to the first data type, determine the plurality of mapping tables according to the first data type, and sequentially select or randomly select the mapping tables from the mapping tables to obtain the first mapping table.
Optionally, the target server may further obtain a plurality of first parameters, determine the number of the first parameters included in the plurality of first parameters, and generate an initial mapping table according to the number of the included first parameters, where the number of the first parameter groups to be allocated included in the initial mapping table is not less than the number of the first parameters included in the plurality of first parameters. For example, if the first plurality of parameters is 6 letters, the server may generate an initial checkerboard table having two rows and three columns or three rows and two columns.
The target server may allocate a first parameter group to each of the plurality of first parameters, to obtain a first parameter group corresponding to each first parameter, where the first parameter group corresponding to each first parameter is different; and generating a first mapping table according to the first parameter group corresponding to each first parameter. Here, the first mapping table is used to map each of the plurality of first parameters to one first parameter group of the second data type. For example, 6 letters can be randomly assigned to different positions in the initial checkerboard table, so as to obtain the row punctuation and the vertical punctuation corresponding to each letter, that is, the number combination of each letter.
The target server may send the obtained first mapping table to the terminal device. The terminal device may receive the first mapping table returned by the target server, so as to obtain the first mapping table.
According to the embodiment, the parameters to be encrypted are sent to the server, so that the server can generate the mapping table according to the parameters to be encrypted, and the flexibility and the rationality of the generation of the mapping table are improved.
In an exemplary embodiment, after sending the target request message to the target server, the method further includes:
s21, responding to the received target request message, and determining the data type of the first parameters as a first data type through the target server;
s22, selecting a mapping table from a plurality of mapping tables corresponding to the first data type by using the first data type to obtain a first mapping table;
s23, sending the first mapping table to a target device, where the target device is a device that sends a target request message.
For the target server, after receiving the target request message, the data type of the plurality of first parameters may be determined to be a first data type, such as a letter; then, the first data type is used, and a mapping table is selected from a plurality of mapping tables corresponding to the first data type, so that a first mapping table is obtained. After obtaining the first mapping table, the target server may send the first mapping table to the target device, where the target device is a device that sends the target request message, that is, the terminal device.
Here, each of the plurality of mapping tables is a mapping table that matches the first data type, e.g., is a checkerboard table that corresponds to 26 letters. In different mapping tables, the corresponding relation between the first parameter and the first parameter group is different, so that the safety and the reliability of data encryption can be improved.
For the checkerboard table, the target server (which may also be another device for generating the mapping table) may generate the checkerboard table by: calibrating according to the nodes of the chessboard (i.e. calibrating the parameters corresponding to each node of the chessboard, for example, (1,1) the calibrated parameter is a); establishing an imaging geometric model according to the calibrated parameters so as to obtain a three-dimensional scene reconstructed by the parameters; according to a geometric model of coordinate system imaging, parameters in the coordinate system are mapped to a plane, so that mapping relations among a plurality of parameters are obtained, the mapping relations among the plurality of parameters can be mapped into line punctuations and longitudinal punctuations in a one-to-one correspondence mode through a checkerboard calibration method, encrypted values can be obtained through mutual splicing, and conversion results of various possible bytes of byte substitution are arranged into a checkerboard table.
The geometric model is built according to parameters in a three-dimensional scene, and the mapping parameters are reconstructed to form a secret key. The content of each child node can be matched through a coordinate system for positioning, a new coordinate system is established through a grid, and node coordinates are encrypted through a dictionary to finish encryption.
Illustratively, the element in the state matrix is mapped to a new byte through the checkerboard table, for example, "a" is mapped to "11", and the element of the corresponding row and column of the checkerboard table is taken as the output.
By the embodiment, the allocated mapping table is selected from the plurality of mapping tables according to the data type of the service data to be encrypted, so that the flexibility of mapping table allocation can be improved.
In one exemplary embodiment, the first mapping table is a checkerboard table; after using the first data type and selecting a mapping table from a plurality of mapping tables corresponding to the first data type to obtain a first mapping table, the method further includes:
s31, under the condition that the plurality of first parameters include target parameters which are not in a preset data type, executing target shift operation on a target row in a first mapping table to obtain a first parameter group to be matched;
s32, executing correlation operation to the target parameter and the first parameter group to be matched to obtain the updated first mapping table.
In addition to the first parameters of the first data type, the plurality of first parameters may further include target parameters of a non-first data type, where the data type of the target parameters is not a predetermined data type, and may be some special symbols, such as "". These parameters of the non-predetermined data type do not have a predetermined first set of parameters to correspond to them.
In this embodiment, if the plurality of first parameters includes a target parameter that is not a predetermined data type, a first mapping table may be selected according to the first data type, where the first mapping table is used to indicate a correspondence between the first parameter of the first data type and the first parameter group, for example, a correspondence between 26 letter and number combinations.
After obtaining the first mapping table, the target server may perform an expansion process on the first mapping table, for example, a line shift operation, where the line shift operation may be a step of performing a target shift operation on a target line in the first mapping table to obtain a first parameter group to be matched, and a corresponding relationship between the first parameter in the target line and the first parameter group may change. The target server may perform a correlation operation on the target parameter and the first parameter group to be matched, to obtain an updated first mapping table. If there are multiple target parameters, the association operation can be performed with a certain first parameter group to be matched.
The row shifting is to cyclically shift each row of the state matrix (e.g., the first mapping table), and the shift amount of different state rows may be different. For example, line 0 does not move, line 1 loops left by 1 byte, line 2 loops right by a value of +1, and line 3 loops left by a value of-1.
For example, for the checkerboard table shown in fig. 3, if line 1 is moved to the right by one byte, the number groups corresponding to a-e change, and the letter corresponding to (1,1) is empty, and the five blank number groups of (2,6), (3,6), (4,6), (5,6), (6,6) are newly added. Non-alphabetic special symbols to be encrypted can be placed in these positions, i.e. the special symbols are associated with these blank sets of numbers.
In addition, it should be noted that, if the selected first mapping table includes the first parameter group that is not allocated, the target parameter may also be directly associated with the first parameter group that is not allocated, which is not limited in this embodiment.
By the embodiment, the first parameter group corresponding to the special parameter is allocated to the special parameter by line translation, so that the applicability of the mapping table to the special parameter can be improved.
In an exemplary embodiment, replacing at least a part of the first parameters in the first service data with the corresponding first parameter group using the first mapping table to obtain the first encrypted data includes:
s41, selecting at least part of first parameters from the first parameters contained in the first service data according to the target length value, wherein the target length value is the data length of the replaced encrypted data;
s42, replacing at least part of the first parameters with the corresponding first parameter group using the first mapping table, to obtain first encrypted data, wherein the first parameters except for at least part of the first parameters in the first service data are not replaced.
In this embodiment, for a specific service data, the length of the encrypted data has a certain limitation, for example, for a two-dimensional code, the length of the encrypted data needs to be a fixed length, for example, 15 bytes. The terminal device may first determine a length limit, i.e., a target length value, of the data length of the encrypted data after replacement. And then determining the number of the first parameters to be encrypted according to the number of the first parameters contained in the first service data and the length of the first parameter group corresponding to each first parameter.
For example, the first service data includes 10 letters, the target length value is 15, and each letter is mapped to a number group including two numbers. At this time, it can be determined that the number of letters to be encrypted is 5.
The terminal device may select a certain number of first parameters (i.e., the number of the first parameters to be encrypted) from the first service data according to the number of the first parameters to be encrypted, so as to obtain at least part of the first parameters. After obtaining at least part of the first parameters, the terminal device may replace each of the at least part of the first parameters with a corresponding first parameter group to obtain first encrypted data. Here, the other service data except for at least part of the first parameter in the first service data is not encrypted (for example, the above replacement operation).
For the receiving end, it may first determine the data type of the encrypted service data in the received data, and determine a mapping table used for encrypting the service data according to the determined data type. Then, using the checkerboard table, a decryption operation is performed only on encrypted data therein, in accordance with the data type.
Illustratively, for the checkerboard table shown in FIG. 3, xi6e7f (last character, first column) is the validation code, and according to the checkerboard method, the data before encryption is determined to be: 4542651712, it can be seen that only the tens digits are correspondingly converted and the ones digits are directly submitted.
By the embodiment, the encryption operation is performed on part of the service data in the service data, so that the method and the device can be suitable for service scenes with different requirements, and the applicability of a data encryption mode is improved.
In an exemplary embodiment, the method further includes:
s51, determining a first mapping table matching with a second data type of the second service data according to the second data type, wherein the first mapping table is further configured to map a first parameter set of the second data type to a first parameter of the first data type;
s52, replacing at least one first parameter group in the second service data with a corresponding first parameter by using a first mapping table to obtain second encrypted data;
s53, the second encrypted data is sent to a second receiving device corresponding to the second service data.
In this embodiment, the first mapping table is further configured to map a first parameter set of the second data type to a first parameter of the first data type. When the second service data is to be transmitted, the terminal device may first determine a data type corresponding to the second service data, that is, a second data type, and determine, according to the second data type, that a mapping table corresponding to the second service data is a first mapping table.
Optionally, after determining the first mapping table matched with the second data type, the terminal device may replace at least one first parameter group in the second service data with the corresponding first parameter by using the first mapping table, so as to obtain the second encrypted data. The terminal device may perform grouping processing on the second service data according to the number of bytes included in the first parameter group, may group all the service data, or may determine a data group to be encrypted according to the length required by the encrypted data, that is, obtain the first parameter group to be encrypted. This is not limited in this embodiment.
According to the first mapping table, the terminal device may perform an encryption operation on the first parameter group to be encrypted, and may replace each first parameter group to be encrypted with a corresponding first parameter, thereby obtaining second encrypted data. The obtained second encrypted data may be sent to the corresponding second receiving device in the same or similar manner as in the foregoing embodiment, which is not described herein again. Here, the second receiving device and the first receiving device may be the same device or different devices, which is not limited in this embodiment.
For example, for the checkerboard table shown in fig. 3, the encrypted objects may be lower case letters or a combination of numbers. When the encrypted object is a lowercase letter, the ciphertext is the horizontal and vertical coordinates of the character corresponding to the inside of the password table (i.e. the chessboard table), for example, "a" is encrypted to "11", and "y" is encrypted to "55". If the plaintext data is acdy, the ciphertext is: 11131455. when the encrypted object is a digital combination and the byte 11543361254312 is input during encryption, the element output of looking up the corresponding row and column of the checkerboard table is: atmzvnf. atmzvnf is byte-encrypted data.
Here, the checkerboard table may be searched in advance and in a later row, or may be searched in advance and in a later row, and the last predetermined number of letters are searched in advance and in a later row.
By the embodiment, the same mapping table is used for executing encryption operation for the service data of different data types, so that the number of the stored mapping tables can be saved, and the storage resources are saved.
In an exemplary embodiment, the method further includes:
s61, acquiring third service data to be transmitted;
s62, determining a second mapping table matched with a third data type according to the third data type of the third service data, where the second mapping table is used to map a second parameter of the second data type to a second parameter group of the second data type;
s63, replacing at least part of second parameters in the third service data with corresponding second parameter groups by using a second mapping table to obtain third encrypted data;
s64, the third encrypted data is sent to the first receiving device corresponding to the first service data.
In this embodiment, the target server may encrypt the service data of different data types by using the mapping table corresponding to the service data, and optionally, the target server may obtain third service data to be transmitted, where the data type of the third service data is different from the data type in the mapping relationship recorded in the first mapping table, that is, the third service data is not the first service type, and may also be the second service type.
After the third service data is obtained, the terminal device may determine, according to a third data type of the third service data, a second mapping table matched with the third data type, where the second mapping table is used to map a second parameter of the third data type to a second parameter group of the second data type. The process of determining the second mapping table matched with the third data type according to the third data type of the third service data is similar to the process of determining the first mapping table matched with the first data type according to the first data type of the first service data, which is not described in detail in this embodiment.
Optionally, after determining the second mapping table matched with the third data type, the terminal device may replace at least one second parameter in the third service data with the corresponding second parameter group using the second mapping table, so as to obtain third encrypted data. The process of encrypting the third service data using the second mapping table is similar to the process of encrypting the first service data using the first mapping table in the foregoing embodiment, and details are not repeated here.
After the terminal device obtains the third encrypted data, the terminal device may send the third encrypted data to a third receiving device corresponding to the third service data, and a process of sending the third encrypted data to the third receiving device is similar to a process of sending the first encrypted data to the first receiving device, which is not described herein again.
By the embodiment, different mapping tables are used for encrypting the service data of different data types, so that the safety of data transmission can be improved.
In an exemplary embodiment, in the process of replacing at least part of the parameters in the first service data with the corresponding parameter sets by using the first mapping table, the method further includes:
s71, obtaining the disorder of the parameters contained in the first service data to obtain the disorder service data corresponding to the first service data;
and S72, displaying the service data which is disordered on a target display interface of the target equipment, wherein the target equipment is the sending equipment of the first service data.
In the process of encrypting the service data, the service data before encryption can be peeped, so that the service data is leaked, and the security of the service data is affected. In order to avoid data leakage in the data encryption process, in the process of replacing at least part of parameters in the first service data with corresponding parameter groups by using the first mapping table, the first parameters included in the first service data are subjected to disorder, so that disorder service data corresponding to the first service data are obtained.
The process of obtaining the first service data out of order and the process of encrypting the first service data may be performed synchronously or asynchronously. For example, the first service data may be scrambled before being encrypted, or other manners may be used, which is not limited in this embodiment. After the service data which is out of order is obtained, the terminal device may display the service data which is out of order on a target display interface thereof, where the target device is a sending device of the first service data.
For example, the mapping parameters obtained by the recognition may be scrambled, and a random seed obtained by pseudo-random number may be used instead of the scrambled seed.
According to the embodiment, in the process of encrypting the service data, the service data after the out-of-order acquisition is displayed on the display interface, so that the possibility of leakage of the service data in the encryption process can be reduced, and the safety of the service data is improved.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (e.g., a ROM (Read-Only Memory)/RAM (Random Access Memory), a magnetic disk, an optical disk) and includes several instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the methods according to the embodiments of the present application.
According to another aspect of the embodiments of the present application, there is also provided a service data transmission apparatus for implementing the service data transmission method. Fig. 4 is a block diagram of an optional transmission apparatus for service data according to an embodiment of the present application, and as shown in fig. 4, the apparatus may include:
a first determining unit 402, configured to determine, according to a first data type of first service data, a first mapping table matched with the first data type, where the first mapping table is used to map a first parameter of the first data type to a first parameter group of a second data type;
a first replacing unit 404, connected to the first determining unit 402, configured to replace at least a part of the first parameters in the first service data with the corresponding first parameter group by using a first mapping table, so as to obtain first encrypted data;
and a first sending unit 406, connected to the first replacing unit 404, for sending the first encrypted data to the first receiving device corresponding to the first service data.
It should be noted that the first determining unit 402 in this embodiment may be configured to execute the step S202, the first replacing unit 404 in this embodiment may be configured to execute the step S204, and the first sending unit 406 in this embodiment may be configured to execute the step S206.
Determining, by the module, a first mapping table matched with a first data type according to the first data type of the first service data, where the first mapping table is used to map a first parameter of the first data type to a first parameter group of the second data type; replacing at least part of first parameters in the first service data with corresponding first parameter groups by using a first mapping table to obtain first encrypted data; the first encrypted data is sent to the first receiving equipment corresponding to the first service data, and the problem that the security of service data transmission is poor due to the fact that the encrypted data are easy to crack in a service data transmission method in the related technology is solved.
In an exemplary embodiment, the apparatus further includes:
a second sending unit, configured to send a target request message to a target server before determining, according to a first data type of first service data, a first mapping table matched with the first data type, where the target request message is used to request to acquire mapping tables corresponding to a plurality of first parameters, and the data types of the plurality of first parameters include the first data type;
the receiving unit is configured to receive a first mapping table corresponding to a plurality of first parameters, where the first mapping table is determined according to a first data type, the first mapping table is used to map each of the plurality of first parameters to a first parameter group of a second data type, and different ones of the plurality of first parameters are mapped to different first parameter groups.
In an exemplary embodiment, the apparatus further includes:
a second determining unit, configured to determine, by the target server, the data type of the plurality of first parameters as the first data type in response to the received target request message after sending the target request message to the target server;
the selecting unit is used for selecting a mapping table from a plurality of mapping tables corresponding to the first data type by using the first data type to obtain a first mapping table;
and a third sending unit, configured to send the first mapping table to a target device, where the target device is a device that sends a target request message.
In one exemplary embodiment, the first mapping table is a checkerboard table; the above-mentioned device still includes:
the first execution unit is used for selecting a mapping table from a plurality of mapping tables corresponding to a first data type by using the first data type to obtain a first mapping table, and then executing target shift operation on a target row in the first mapping table under the condition that a plurality of first parameters contain target parameters which are not predetermined data types to obtain a first parameter group to be matched;
and the second execution unit is used for executing correlation operation on the target parameter and the first parameter group to be matched to obtain the updated first mapping table.
In one exemplary embodiment, the first replacement unit includes:
the selecting module is used for selecting at least part of first parameters from the first parameters contained in the first service data according to a target length value, wherein the target length value is the data length of the replaced encrypted data;
and the replacing module is used for replacing at least part of the first parameters with the corresponding first parameter group by using the first mapping table to obtain first encrypted data, wherein the first parameters except for at least part of the first parameters in the first service data do not perform replacing operation.
In an exemplary embodiment, the apparatus further includes:
a third determining unit, configured to determine, according to a second data type of the second service data, a first mapping table that matches the second data type, where the first mapping table is further configured to map a first parameter group of the second data type to a first parameter of the first data type;
a second replacing unit, configured to replace at least one first parameter group in the first service data with a corresponding first parameter by using the first mapping table, so as to obtain second encrypted data;
and the fourth sending unit is used for sending the second encrypted data to second receiving equipment corresponding to the second service data.
In an exemplary embodiment, the apparatus further includes:
an obtaining unit, configured to obtain third service data to be transmitted;
a fourth determining unit, configured to determine, according to a third data type of the third service data, a second mapping table matched with the third data type, where the second mapping table is used to map a second parameter of the third data type to a second parameter group of the second data type;
a third replacing unit, configured to replace at least part of the second parameters in the third service data with the corresponding second parameter group using the second mapping table, so as to obtain third encrypted data;
and a fifth sending unit, configured to send the third encrypted data to a third receiving device corresponding to the third service data.
In an exemplary embodiment, the apparatus further includes:
a third execution unit, configured to, in a process of replacing at least part of parameters in the first service data with corresponding parameter groups using the first mapping table, obtain out-of-order parameters included in the first service data, and obtain out-of-order service data corresponding to the first service data;
and the display unit is used for displaying the disordered business data on a target display interface of the target equipment, wherein the target equipment is first business data sending equipment. .
It should be noted here that the modules described above are the same as the examples and application scenarios implemented by the corresponding steps, but are not limited to the disclosure of the above embodiments. It should be noted that the modules described above as a part of the apparatus may be operated in a hardware environment as shown in fig. 1, and may be implemented by software, or may be implemented by hardware, where the hardware environment includes a network environment.
According to still another aspect of an embodiment of the present application, there is also provided a storage medium. Optionally, in this embodiment, the storage medium may be configured to execute a program code of any one of the service data transmission methods in this embodiment of the present application.
Optionally, in this embodiment, the storage medium may be located on at least one of a plurality of network devices in a network shown in the above embodiment.
Optionally, in this embodiment, the storage medium is configured to store program code for performing the following steps:
s1, determining a first mapping table matched with a first data type according to the first data type of the first service data, wherein the first mapping table is used for mapping a first parameter of the first data type to a first parameter group of the second data type;
s2, replacing at least part of first parameters in the first service data with corresponding first parameter groups by using a first mapping table to obtain first encrypted data;
s3, the first encrypted data is sent to a first receiving device corresponding to the first service data.
Optionally, the specific example in this embodiment may refer to the example described in the above embodiment, which is not described again in this embodiment.
Optionally, in this embodiment, the storage medium may include, but is not limited to: various media capable of storing program codes, such as a U disk, a ROM, a RAM, a removable hard disk, a magnetic disk, or an optical disk.
According to another aspect of the embodiments of the present application, there is also provided an electronic device for implementing the transmission method of service data, where the electronic device may be a server, a terminal, or a combination thereof.
Fig. 5 is a block diagram of an alternative electronic device according to an embodiment of the present application, as shown in fig. 5, including a processor 502, a communication interface 504, a memory 506, and a communication bus 508, wherein the processor 502, the communication interface 504, and the memory 506 are communicated with each other via the communication bus 508, and wherein,
a memory 506 for storing a computer program;
the processor 502, when executing the computer program stored in the memory 506, implements the following steps:
s1, determining a first mapping table matched with a first data type according to the first data type of the first service data, wherein the first mapping table is used for mapping a first parameter of the first data type to a first parameter group of the second data type;
s2, replacing at least part of first parameters in the first service data with corresponding first parameter groups by using a first mapping table to obtain first encrypted data;
s3, the first encrypted data is sent to a first receiving device corresponding to the first service data.
Alternatively, in this embodiment, the communication bus may be a PCI (Peripheral Component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 5, but this is not intended to represent only one bus or type of bus. The communication interface is used for communication between the electronic device and other equipment.
The memory may include RAM, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory. Alternatively, the memory may be at least one memory device located remotely from the processor.
As an example, the memory 506 may include, but is not limited to, a first determining unit 402, a first replacing unit 404, and a first sending unit 406 in the transmission apparatus of the service data. In addition, the device may further include, but is not limited to, other module units in the transmission device of the service data, which is not described in this example again.
The processor may be a general-purpose processor, and may include but is not limited to: a CPU (Central Processing Unit), an NP (Network Processor), and the like; but also a DSP (Digital Signal Processing), an ASIC (Application Specific Integrated Circuit), an FPGA (Field Programmable Gate Array) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments, and this embodiment is not described herein again.
It can be understood by those skilled in the art that the structure shown in fig. 5 is only an illustration, and the device implementing the transmission method of the service data may be a terminal device, and the terminal device may be a terminal device such as a smart phone (e.g., an Android phone, an iOS phone, etc.), a tablet computer, a palm computer, a Mobile Internet Device (MID), a PAD, and the like. Fig. 5 is a diagram illustrating a structure of the electronic device. For example, the electronic device may also include more or fewer components (e.g., network interfaces, display devices, etc.) than shown in FIG. 5, or have a different configuration than shown in FIG. 5.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by a program instructing hardware associated with the terminal device, where the program may be stored in a computer-readable storage medium, and the storage medium may include: flash disk, ROM, RAM, magnetic or optical disk, and the like. The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
The integrated unit in the above embodiments, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in the above computer-readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a storage medium, and including instructions for causing one or more computer devices (which may be personal computers, servers, network devices, or the like) to execute all or part of the steps of the method described in the embodiments of the present application.
In the above embodiments of the present application, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed client may be implemented in other manners. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, and may also be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution provided in the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The foregoing is only a preferred embodiment of the present application and it should be noted that those skilled in the art can make several improvements and modifications without departing from the principle of the present application, and these improvements and modifications should also be considered as the protection scope of the present application.

Claims (11)

1. A method for transmitting service data, comprising:
determining a first mapping table matched with a first data type of first service data according to the first data type, wherein the first mapping table is used for mapping a first parameter of the first data type to a first parameter group of a second data type;
replacing at least part of first parameters in the first service data with corresponding first parameter groups by using the first mapping table to obtain first encrypted data;
and sending the first encrypted data to first receiving equipment corresponding to the first service data.
2. The method of claim 1, wherein before determining the first mapping table matching the first data type according to the first data type of the first service data, the method further comprises:
sending a target request message to a target server, wherein the target request message is used for requesting to acquire a mapping table corresponding to a plurality of first parameters, and the data types of the plurality of first parameters comprise the first data types;
receiving the first mapping table corresponding to the plurality of first parameters, where the first mapping table is determined according to the first data type, the first mapping table is used to map each of the plurality of first parameters to one first parameter group of the second data type, and different ones of the plurality of first parameters are mapped to different first parameter groups.
3. The method of claim 2, wherein after sending the target request message to the target server, the method further comprises:
determining, by the target server, a data type of the plurality of first parameters to be the first data type in response to the received target request message;
selecting a mapping table from a plurality of mapping tables corresponding to the first data type by using the first data type to obtain the first mapping table;
and sending the first mapping table to target equipment, wherein the target equipment is equipment for sending the target request message.
4. The method of claim 2, wherein the first mapping table is a checkerboard table; after the selecting a mapping table from a plurality of mapping tables corresponding to the first data type using the first data type to obtain the first mapping table, the method further includes:
under the condition that the plurality of first parameters contain target parameters which are not of a preset data type, executing target shift operation on a target row in the first mapping table to obtain a first parameter group to be matched;
and executing association operation on the target parameter and the first parameter group to be matched to obtain the updated first mapping table.
5. The method of claim 1, wherein replacing at least a portion of the first parameters in the first service data with a corresponding first parameter set using the first mapping table to obtain first encrypted data, comprises:
according to a target length value, selecting at least part of first parameters from the first parameters contained in the first service data, wherein the target length value is the data length of the replaced encrypted data;
and replacing at least part of the first parameters with a corresponding first parameter group by using the first mapping table to obtain the first encrypted data, wherein the first parameters except the at least part of the first parameters in the first service data do not perform replacement operation.
6. The method of claim 1, further comprising:
determining the first mapping table matched with the second data type according to the second data type of second service data, wherein the first mapping table is further used for mapping a first parameter group of the second data type to a first parameter of the first data type;
replacing at least one first parameter group in the first service data with a corresponding first parameter by using the first mapping table to obtain second encrypted data;
and sending the second encrypted data to second receiving equipment corresponding to the second service data.
7. The method of claim 1, further comprising:
acquiring third service data to be transmitted;
determining a second mapping table matched with a third data type of the third service data according to the third data type, wherein the second mapping table is used for mapping a second parameter of the third data type to a second parameter group of the second data type;
replacing at least part of second parameters in the third service data with corresponding second parameter groups by using the second mapping table to obtain third encrypted data;
and sending the third encrypted data to third receiving equipment corresponding to the third service data.
8. The method according to any of claims 1 to 7, wherein in the replacing at least some parameters in the first service data with corresponding parameter sets using the first mapping table, the method further comprises:
obtaining the disorder of the parameters contained in the first service data to obtain the disorder service data corresponding to the first service data;
and displaying the disordered business data on a target display interface of target equipment, wherein the target equipment is the sending equipment of the first business data.
9. A device for transmitting service data, comprising:
a first determining unit, configured to determine, according to a first data type of first service data, a first mapping table matched with the first data type, where the first mapping table is used to map a first parameter of the first data type to a first parameter group of a second data type; a first replacing unit, configured to replace at least part of the first parameters in the first service data with corresponding first parameter groups using the first mapping table, so as to obtain first encrypted data;
and the first sending unit is used for sending the first encrypted data to first receiving equipment corresponding to the first service data.
10. A computer-readable storage medium, comprising a stored program, wherein the program when executed performs the method of any of claims 1 to 8.
11. An electronic device comprising a memory and a processor, characterized in that the memory has stored therein a computer program, the processor being arranged to execute the method of any of claims 1 to 8 by means of the computer program.
CN202111631110.4A 2021-12-28 2021-12-28 Service data transmission method and device, storage medium and electronic device Pending CN114301681A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111631110.4A CN114301681A (en) 2021-12-28 2021-12-28 Service data transmission method and device, storage medium and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111631110.4A CN114301681A (en) 2021-12-28 2021-12-28 Service data transmission method and device, storage medium and electronic device

Publications (1)

Publication Number Publication Date
CN114301681A true CN114301681A (en) 2022-04-08

Family

ID=80971977

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111631110.4A Pending CN114301681A (en) 2021-12-28 2021-12-28 Service data transmission method and device, storage medium and electronic device

Country Status (1)

Country Link
CN (1) CN114301681A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105447342A (en) * 2014-08-28 2016-03-30 阿里巴巴集团控股有限公司 Script encryption method, script decryption method and engine
CN111865895A (en) * 2020-05-29 2020-10-30 广西博士海意信息科技有限公司 Data secret transmission method and system based on cloud platform
WO2020237868A1 (en) * 2019-05-24 2020-12-03 平安科技(深圳)有限公司 Data transmission method, electronic device, server and storage medium
CN112035827A (en) * 2020-11-03 2020-12-04 腾讯科技(深圳)有限公司 Cipher data processing method, device, equipment and readable storage medium
CN112434231A (en) * 2020-11-05 2021-03-02 北京奇艺世纪科技有限公司 Data processing method and device and electronic equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105447342A (en) * 2014-08-28 2016-03-30 阿里巴巴集团控股有限公司 Script encryption method, script decryption method and engine
WO2020237868A1 (en) * 2019-05-24 2020-12-03 平安科技(深圳)有限公司 Data transmission method, electronic device, server and storage medium
CN111865895A (en) * 2020-05-29 2020-10-30 广西博士海意信息科技有限公司 Data secret transmission method and system based on cloud platform
CN112035827A (en) * 2020-11-03 2020-12-04 腾讯科技(深圳)有限公司 Cipher data processing method, device, equipment and readable storage medium
CN112434231A (en) * 2020-11-05 2021-03-02 北京奇艺世纪科技有限公司 Data processing method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN107786331B (en) Data processing method, device, system and computer readable storage medium
CN109274485B (en) Data encryption method, data authentication method, related equipment and system
CN110912682B (en) Data processing method, device and system
CN107707347A (en) The backup method and device of user key, the introduction method and device of user key
CN103731258A (en) Method and device for generating secret key
CN106651734A (en) Binary two-dimensional code image encryption and decryption method and device
CN110505054B (en) Data processing method, device and equipment based on dynamic white box
US11128455B2 (en) Data encryption method and system using device authentication key
CN114443718A (en) Data query method and system
CN107770407B (en) The image encryption method and device of joint zero watermarking insertion
CN114785524A (en) Electronic seal generation method, device, equipment and medium
CN108334785A (en) A kind of file encrypting method, decryption method and terminal
CN112115461B (en) Equipment authentication method and device, computer equipment and storage medium
CN116455572B (en) Data encryption method, device and equipment
CN116455570B (en) Data processing method, device, computer equipment and storage medium
CN111368322B (en) File decryption method and device, electronic equipment and storage medium
CN116132065A (en) Key determination method, device, computer equipment and storage medium
CN110598427A (en) Data processing method, system and storage medium
CN114301681A (en) Service data transmission method and device, storage medium and electronic device
CN113452513B (en) Key distribution method, device and system
CN111131270B (en) Data encryption and decryption method and device, electronic equipment and storage medium
CN115603907A (en) Method, device, equipment and storage medium for encrypting storage data
CN110365468A (en) Anonymization processing method, device, equipment and storage medium
CN114286131A (en) Transmission method and device for anchor image model file in live broadcast wheat
CN111753318B (en) Multiparty security calculation method, device and system for private data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination