CN114430336B - Method and device for displaying decrypted data, storage medium and computer equipment - Google Patents

Method and device for displaying decrypted data, storage medium and computer equipment Download PDF

Info

Publication number
CN114430336B
CN114430336B CN202111570241.6A CN202111570241A CN114430336B CN 114430336 B CN114430336 B CN 114430336B CN 202111570241 A CN202111570241 A CN 202111570241A CN 114430336 B CN114430336 B CN 114430336B
Authority
CN
China
Prior art keywords
decrypted data
displaying
data
preset
character
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111570241.6A
Other languages
Chinese (zh)
Other versions
CN114430336A (en
Inventor
宋晓亮
何世伟
田野
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Luyi Technology Co ltd
Original Assignee
Chengdu Luyi Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Luyi Technology Co ltd filed Critical Chengdu Luyi Technology Co ltd
Priority to CN202111570241.6A priority Critical patent/CN114430336B/en
Publication of CN114430336A publication Critical patent/CN114430336A/en
Application granted granted Critical
Publication of CN114430336B publication Critical patent/CN114430336B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Controls And Circuits For Display Device (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a method and a device for displaying decrypted data, a storage medium and computer equipment, relates to the technical field of information, and mainly aims to improve the efficiency and accuracy of displaying the decrypted data. The method comprises the following steps: responding to a decryption data display instruction, and acquiring decryption data to be displayed; judging whether the decrypted data contains preset characters or not; if the preset character is included, displaying the decrypted data according to a first target display form corresponding to the preset character; and if the preset character is not contained, displaying the decrypted data in a second target display form. The application is suitable for displaying the decrypted data.

Description

Method and device for displaying decrypted data, storage medium and computer equipment
Technical Field
The present application relates to the field of information technologies, and in particular, to a method and apparatus for displaying decrypted data, a storage medium, and a computer device.
Background
In daily work, a user always sends a request to a server, meanwhile, the server returns a response to the request sent by the user, in order to prevent the data carried in the request and the response from being leaked or tampered, encryption processing is needed to be carried out on the data, meanwhile, in the process of sending the request and the response, a tester sometimes needs to decrypt the data, and compares the displayed decrypted data with the data before encryption to verify the correctness of the encrypted data, and based on the correctness, the display form of the decrypted data plays a vital role in the verification result of the data.
At present, the decrypted data is usually displayed according to a display form corresponding to the decrypted data selected manually. However, this method requires that the user knows the format corresponding to the data before encryption in advance, and selects the corresponding display mode to display the decrypted data according to the format corresponding to the data before encryption, so that the efficiency of displaying the decrypted data is low, and meanwhile, if the staff knows the format of the data before encryption, the wrong display mode is selected to display the decrypted data, so that the decrypted data is displayed in error.
Disclosure of Invention
The application provides a method and a device for displaying decrypted data, a storage medium and computer equipment, which mainly aim to improve the efficiency and accuracy of displaying the decrypted data.
According to a first aspect of the present application, there is provided a presentation method of decrypted data, comprising:
responding to a decryption data display instruction, and acquiring decryption data to be displayed;
judging whether the decrypted data contains preset characters or not;
if the preset character is included, displaying the decrypted data according to a first target display form corresponding to the preset character;
and if the preset character is not contained, displaying the decrypted data in a second target display form.
According to a second aspect of the present application there is provided a display device for decrypting data, comprising:
the acquisition unit is used for responding to the decryption data display instruction and acquiring decryption data to be displayed;
the judging unit is used for judging whether the decrypted data contains preset characters or not;
the first display unit is used for displaying the decrypted data according to a first target display form corresponding to the preset character if the preset character is included;
and the second display unit is used for displaying the decrypted data in a second target display form if the preset characters are not included.
According to a third aspect of the present application, there is provided a computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
responding to a decryption data display instruction, and acquiring decryption data to be displayed;
judging whether the decrypted data contains preset characters or not;
if the preset character is included, displaying the decrypted data according to a first target display form corresponding to the preset character;
and if the preset character is not contained, displaying the decrypted data in a second target display form.
According to a fourth aspect of the present application there is provided a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of:
responding to a decryption data display instruction, and acquiring decryption data to be displayed;
judging whether the decrypted data contains preset characters or not;
if the preset character is included, displaying the decrypted data according to a first target display form corresponding to the preset character;
and if the preset character is not contained, displaying the decrypted data in a second target display form.
According to the method, the device, the storage medium and the computer equipment for displaying the decrypted data, compared with the mode that the display form corresponding to the decrypted data is selected manually at present and the decrypted data is displayed according to the selected display form, the method and the device for displaying the decrypted data acquire the decrypted data to be displayed by responding to a decrypted data display instruction; judging whether the decrypted data contains preset characters or not; if the preset character is included, displaying the decrypted data according to a first target display form corresponding to the preset character; and if the preset character is not contained, displaying the decrypted data by adopting a second target display form, thereby judging whether the decrypted data contains the preset character or not, if so, displaying the decrypted data according to a first target display form corresponding to the preset character, and if not, displaying the decrypted data by adopting the second target display form, thereby improving the efficiency of displaying the decrypted data, and meanwhile, avoiding the situation that the decrypted data is displayed by adopting a display mode which is wrong due to negligence of staff, and improving the accuracy of displaying the decrypted data.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. In the drawings:
fig. 1 is a flowchart of a method for displaying decrypted data according to an embodiment of the present application;
FIG. 2 is a flowchart of another method for decrypting data according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a display device for decrypting data according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of another display device for decrypting data according to an embodiment of the present application;
fig. 5 shows a schematic physical structure of a computer device according to an embodiment of the present application.
Detailed Description
The application will be described in detail hereinafter with reference to the drawings in conjunction with embodiments. It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other.
At present, the efficiency of displaying the decrypted data is low by manually selecting a display mode of the decrypted data, and moreover, the decrypted data is likely to be displayed by selecting an incorrect display mode due to negligence of staff, so that the decrypted data is likely to be displayed incorrectly.
In order to solve the above problem, an embodiment of the present application provides a method for displaying decrypted data, as shown in fig. 1, where the method includes:
101. and responding to the decrypted data display instruction, and acquiring the decrypted data to be displayed.
The decrypted data may be data obtained by decrypting encrypted data in a request sent by the user to the server, and data obtained by decrypting encrypted data returned by the server to the user in response to the request sent by the user.
For the embodiment of the application, in order to overcome the situations of low display efficiency and low display accuracy of decrypted data in the prior art, the embodiment of the application displays the decrypted data according to the first target display form corresponding to the preset character if the preset character is included by judging whether the decrypted data contains the preset character or not, and displays the decrypted data by adopting the second target display form if the preset character is not included, thereby improving the efficiency of displaying the decrypted data, and simultaneously avoiding the situation that the decrypted data is displayed in a display mode which is wrong due to the negligence of staff, and improving the accuracy of displaying the decrypted data. The embodiment of the application is mainly applied to a scene for displaying the decrypted data, and the execution main body of the embodiment of the application is a device or equipment capable of displaying the decrypted data, and can be particularly arranged at the side of a client or a server.
Specifically, when a user sends a request to a server, obtaining encrypted data carried in the request, decrypting the encrypted data to obtain decrypted data corresponding to the request, at the same time, the server returns a response to the request of the user, can obtain the encrypted data carried in the response, decrypts the encrypted data carried in the response to obtain decrypted data corresponding to the response, clicks a display button in a data display system, namely, a data display instruction corresponding to the decrypted data is triggered, when the data display instruction is received, firstly, whether the decrypted data contains preset characters or not is needed to be judged, if the preset characters are contained, the decrypted data is displayed according to a first target display form corresponding to the preset characters, and if the preset characters are not contained, the decrypted data is displayed according to a second target display form, so that the display efficiency of the encrypted data is improved.
102. And judging whether the decrypted data contains preset characters or not.
For the embodiment of the present application, after receiving a data display instruction corresponding to decrypted data, based on the decrypted data carried in the data display instruction, it is required to determine whether the decrypted data includes preset characters such as [ {.+ -.), {.+ -. Times, +, =etc., if the preset characters are included, the decrypted data is displayed according to the preset characters corresponding to the first target display form, and if the preset characters are not included, the decrypted data is displayed by adopting the second target display form, so that the efficiency of displaying the decrypted data is improved, and meanwhile, the situation that the decrypted data is displayed by a display mode that an error is selected due to negligence of a staff is avoided, so that the accuracy of displaying the decrypted data is improved.
103. And if the preset character is included, displaying the decrypted data according to a first target display form corresponding to the preset character.
For the embodiment of the application, after judging whether the decrypted data contains preset characters such as [ {.}, +, =and the like, if the preset characters are contained, determining a first target display form corresponding to the preset characters, displaying the decrypted data based on the first target display form, if the preset characters are not contained, determining that the data before encryption belongs to the data in a common format, displaying the decrypted data by adopting a second target display form, thereby judging whether the decrypted data contains the preset characters, if the preset characters are contained, displaying the decrypted data according to the first target display form corresponding to the preset characters, and if the preset characters are not contained, displaying the decrypted data by adopting the second target display form, so that the efficiency of displaying the decrypted data is improved, and meanwhile, the condition that the decrypted data is displayed in a wrong mode due to negligence of selection of staff is avoided, and the accuracy of displaying the decrypted data is improved.
104. And if the preset character is not contained, displaying the decrypted data in a second target display form.
For the embodiment of the application, if the decrypted data does not contain the preset character, the encrypted data corresponding to the decrypted data is determined to be the data in the common format, and the decrypted data is displayed in the second target display form corresponding to the common format, so that whether the decrypted data contains the preset character or not is judged, if the preset character is contained, the decrypted data is displayed according to the first target display form corresponding to the preset character, and if the preset character is not contained, the decrypted data is displayed in the second target display form, so that the display efficiency of the decrypted data is improved, and meanwhile, the situation that the decrypted data is displayed in a display mode which is wrong due to careless selection of staff can be avoided, and the display accuracy of the decrypted data is improved.
According to the method for displaying the decrypted data, compared with the mode that the display form corresponding to the decrypted data is selected manually at present and the decrypted data is displayed according to the selected display form, the method for displaying the decrypted data obtains the decrypted data to be displayed by responding to a decrypted data display instruction; judging whether the decrypted data contains preset characters or not; if the preset character is included, displaying the decrypted data according to a first target display form corresponding to the preset character; and if the preset character is not contained, displaying the decrypted data by adopting a second target display form, thereby judging whether the decrypted data contains the preset character or not, if so, displaying the decrypted data according to a first target display form corresponding to the preset character, and if not, displaying the decrypted data by adopting the second target display form, thereby improving the efficiency of displaying the decrypted data, and meanwhile, avoiding the situation that the decrypted data is displayed by adopting a display mode which is wrong due to negligence of staff, and improving the accuracy of displaying the decrypted data.
Further, in order to better illustrate the above process of displaying the decrypted data, as a refinement and extension to the above embodiment, an embodiment of the present application provides another method for displaying the decrypted data, as shown in fig. 2, where the method includes:
201. and responding to the decrypted data display instruction, and acquiring the decrypted data to be displayed.
For the embodiment of the application, in order to display the decrypted data, a Fiddler decryption plug-in is required to be configured first, a configuration mode of ini is adopted to configure the Fiddler decryption plug-in, the Fiddler_plug in.ini configuration file comprises a Sectionname, the Sectionname is used for marking a node name, each Sectionname node comprises an Rname, the Rname represents a domain name to be matched, the Fiddler_plug in.ini configuration file also comprises a key, the key represents a key corresponding to the encrypted data, the configuration file also comprises an Encfield, the Encfield has a function of reading encrypted data in request information or response information, the configuration file of ini is used for acquiring encrypted data in request information or response information, the decryption plug-in is also configured next, decryTools. Plug-in is configured in the ini configuration file for decrypting the encrypted data, finally the decryption data plug-in the ini configuration file is required to be configured in the display, the DeqTools. Plug-in the form is configured in the ini configuration file, the DeqFox is configured in the form of a form of directly displaying the decryption result of the tree, and the display is also required to be used for displaying the result in the form of the DeqFox.
Specifically, when a user sends a request to a server, starting a Fiddler system, firstly utilizing a packet grabbing tool such as Fiddler to grab http/https and other request information, reading each section name field in Fiddler_plug in.ini, traversing a name below each field, namely reading a domain name below each node in Fiddler_plug in.ini, matching the domain name with the domain name in the request information, if so, the encrypted data in the request message is read by using the Encfield plug-in, for example, the domain names of the request message sent by the user like the server are www.a.b.c.d and www.a.f.c, the domain name configured under the section name node in the Fiddler plug-in is www.a.f.c, the domain name sent by the user is subjected to word segmentation processing, so that each word is w/w/w/a/b/c/d and w/w/a/f/c, at the same time, the domain name under the dictionary name node is www.a.f.c, the obtained words are w/w/w/a/f/c, the number of identical words in the words corresponding to the user request information and the domain name under the dictionary name node is calculated, the maximum number of identical words is determined in the number of identical words, the domain name corresponding to the maximum number of identical words is the domain name matched with the domain name under the dictionary name node, at the same time, if the domain name in the request information is not matched with the domain name under the dictionary name node, the request information is released, the data in the request information are not necessarily all encrypted data, for example, part of information in the get request information belongs to encrypted data, all information in body request information is encrypted data, response information returned by a server is the encrypted data as a whole, a corresponding regular expression can be formed by utilizing a format corresponding to the get request information, whether the request information is the get request information or not is judged by utilizing the formed regular expression, if the request information belongs to the get request information, part of data in the get request information belongs to the encrypted data, the encrypted data in the request information can be read by utilizing an Encfield plugin, and the method for specifically reading the encrypted data is that the current request information is used by utilizing a split method of string? The method comprises the steps of performing split once to obtain an array A, wherein a part of index=1 in the array A is a carrying parameter part, then performing split on the parameter part to obtain an array B by using a 'and' traversing the array B, obtaining a part containing EncField+ '=' index, performing split on the part again by using 'and' to obtain encrypted data, if the request information is body request information, determining that all data in the request information are encrypted data, acquiring the whole body information, specifically acquiring the encrypted data in the body is firstly entered into a public byte body, firstly judging whether decFlag is a true, continuing to judge whether ishasdesoft is a true, continuing to judge whether mdyBoth is a true, if the request is a true, continuing to judge whether a body size is larger than 0, if the request information is a body request information, determining that all data in the body is a body request information, sequentially, if the body information is a body request information, determining that all data in the request information is a body is a clear, continuing to decrypt, if the body information is a clear request, transmitting a cipher key, continuing to a decryption value, if the body information is a cipher text, and a visual response is required to be transmitted, and if the cipher text is a value, and a cipher text is required to be successfully transmitted.
Further, based on the decrypted data, a data display button in the Fiddler system is triggered, a data display instruction corresponding to the decrypted data is received, whether the decrypted data carried in the data display instruction contains preset characters or not is judged, if the decrypted data contains the preset characters, the decrypted data is displayed according to a first target display form corresponding to the preset characters, and if the decrypted data does not contain the preset characters, the decrypted data is displayed in a second target display form.
202. And judging whether the decrypted data contains preset characters or not.
For the embodiment of the present application, after obtaining the decrypted data carried in the data display instruction, it is necessary to determine whether the decrypted data is damaged, based on which the method includes: determining a first hash value of pre-encryption data corresponding to the decrypted data and a second hash value corresponding to the decrypted data; judging whether the first hash value is equal to the second hash value; and if the first hash value is equal to the second hash value, determining that the decrypted data is not damaged.
Specifically, because the hash value corresponding to each data is unique, that is, if there is a slight change, the hash values corresponding to the two data are different, based on this, in order to determine whether the decrypted data is damaged, it is necessary to calculate a first hash value corresponding to the pre-encrypted data corresponding to the decrypted data, and calculate a second hash value corresponding to the decrypted data, then determine whether the first hash value is equal to the second hash value, if the first hash value is not equal to the second hash value, it is necessary to decrypt the encrypted data again, if the first hash value is equal to the second hash value, it is necessary to determine whether the decrypted data is not damaged, and if the decrypted data is not damaged, it is necessary to determine whether the decrypted data includes a preset character, based on this, step 202 specifically includes: constructing a preset regular expression based on a format corresponding to the preset character; and judging whether the decrypted data contains the preset character or not by using the preset regular expression.
Specifically, a corresponding preset regular expression can be constructed according to the special format of preset characters such as [ {..x ], -, and the preset regular expression is utilized to detect and mark preset characters in the decrypted data, if the preset regular expression is utilized to detect that the decrypted data contains the preset characters, the decrypted data is displayed according to a first target display form corresponding to the preset characters, if the preset characters are not contained, a second target display form is utilized to display the decrypted data, therefore, whether the decrypted data contains preset characters or not is judged, if the preset characters are contained, the decrypted data is displayed according to a first target display form corresponding to the preset characters, and if the preset characters are not contained, the decrypted data is displayed according to a second target display form, so that the decryption data display efficiency is improved, and meanwhile, the decrypted data can be prevented from being displayed in a mode of error selection by staff, and the precision of displaying the decrypted data is improved.
203. And if the preset character is the first target character, displaying the decrypted data by using a tree display form.
For the embodiment of the present application, if the decrypted data includes the first target character, it is determined that node data such as a parent node, a child node, etc. exists in the decrypted data, and then a data display form corresponding to the first target character is a tree display form, and the tree display form is adopted to display the decrypted data, so that a inspector can compare the decrypted data with the data before encryption, thereby checking the accuracy of the decrypted data.
204. And if the preset character is the second target character, displaying the decrypted data by using a form display form.
For the embodiment of the present application, if the decrypted data includes the second target character, it is determined that a key-value pair of a key and a value exists in the decrypted data, for example, the decrypted data is key1=value1 & key2=value2 & key3=value3, and it is determined that the decrypted data belongs to data in a table form, that is, a data display form corresponding to the second target character is a table display form, and finally the decrypted data is displayed in the table display form, based on this, step 204 specifically includes: acquiring an attribute field and a corresponding field value in the decrypted data; determining column information corresponding to the table based on the attribute fields and the number of the fields corresponding to the attribute fields; determining row information corresponding to the table based on the field value and the number of the field values corresponding to the field value; and displaying the decrypted data in the form of table display based on the column information and the row information corresponding to the table.
Specifically, in order to display the decrypted data in a form of table display, the number of rows and columns of a table need to be determined, and the data in the table need to be determined, and based on this, the method includes firstly obtaining an attribute field in the decrypted data and a field value corresponding to the attribute field, and specifically, the method for obtaining the attribute field and the field value includes: acquiring an attribute field in the decrypted data by using a first preset function; and acquiring a field value corresponding to the attribute field from the decrypted data by using a second preset function.
Specifically, firstly, a key, namely an attribute field, in decrypted data is acquired by adopting an entayset function, then, a value corresponding to the key, namely a field value corresponding to the attribute field, is acquired by utilizing a get function, and an execution statement of the attribute field and the corresponding field value is specifically acquired as follows:
after the attribute fields and the field values corresponding to the attribute fields in the decrypted data are acquired, header information of each column corresponding to the table and column numbers corresponding to the table are determined based on the attribute fields and the field numbers corresponding to the attribute fields, data corresponding to the lower surfaces of all the attribute fields in the table are determined based on the field values, and the number of rows in the table is determined based on the field values corresponding to the field values, so that row information and column information in the table can be determined, and finally the decrypted data are displayed in the table display form based on the row information and the column information.
205. And if the preset character is not contained, displaying the decrypted data in a second target display form.
For the embodiment of the present application, if the decrypted data does not include the first target character or the second target character, it is determined that the decrypted data belongs to data in a common form, and the decrypted data is displayed in an original display form corresponding to the decrypted data, and based on this, if the decrypted data does not include the preset character, step 205 specifically includes: and displaying the decrypted data by adopting an original display form, wherein the original display form is a common display form corresponding to the data after the encrypted data is decrypted.
Specifically, if the decrypted data does not include the first target character or the second target character, the decrypted data is not formatted, that is, the decrypted data is displayed in an original display form, so that whether the decrypted data includes a preset character or not is judged, if the decrypted data includes the preset character, the decrypted data is displayed according to a first target display form corresponding to the preset character, and if the decrypted data does not include the preset character, the decrypted data is displayed in a second target display form, so that the efficiency of displaying the decrypted data is improved, and meanwhile, the situation that the decrypted data is displayed in a display mode which is wrong due to careless selection of staff can be avoided, and the accuracy of displaying the decrypted data is improved.
According to the other method for displaying the decrypted data, compared with the mode that the display form corresponding to the decrypted data is selected manually at present and the decrypted data is displayed according to the selected display form, the method for displaying the decrypted data acquires the decrypted data to be displayed by responding to a decrypted data display instruction; judging whether the decrypted data contains preset characters or not; if the preset character is included, displaying the decrypted data according to a first target display form corresponding to the preset character; and if the preset character is not contained, displaying the decrypted data by adopting a second target display form, thereby judging whether the decrypted data contains the preset character or not, if so, displaying the decrypted data according to a first target display form corresponding to the preset character, and if not, displaying the decrypted data by adopting the second target display form, thereby improving the efficiency of displaying the decrypted data, and meanwhile, avoiding the situation that the decrypted data is displayed by adopting a display mode which is wrong due to negligence of staff, and improving the accuracy of displaying the decrypted data.
Further, as a specific implementation of fig. 1, an embodiment of the present application provides a device for displaying decrypted data, as shown in fig. 3, where the device includes: an acquisition unit 31, a judgment unit 32, a first display unit 33, and a second display unit 34.
The obtaining unit 31 may be configured to obtain, in response to the decrypted data displaying instruction, decrypted data to be displayed.
The judging unit 32 may be configured to judge whether the decrypted data includes a predetermined character.
The first display unit 33 may be configured to display the decrypted data according to a first target display form corresponding to the preset character if the preset character is included.
The second display unit 34 may be configured to display the decrypted data in a second target display form if the preset character is not included.
In a specific application scenario, in order to verify the accuracy of the decrypted data, the apparatus further comprises a determining unit 35, as shown in fig. 4.
The determining unit 35 may be configured to determine a first hash value of the pre-encryption data corresponding to the decrypted data and a second hash value corresponding to the decrypted data.
The determining unit 32 may be further configured to determine whether the first hash value is equal to the second hash value.
The determining unit 35 may specifically be configured to determine that the decrypted data is not damaged if the first hash value is equal to the second hash value.
In a specific application scenario, in order to determine whether the decrypted data includes a preset character, the determining unit 32 includes a constructing module 321 and a determining module 322.
The construction module 321 may be configured to construct a preset regular expression based on a format corresponding to the preset character.
The determining module 322 may be configured to determine whether the decrypted data includes the preset character according to the preset regular expression.
In a specific application scenario, in order to display the decrypted data in a first target display form, the first display unit 33 may be specifically configured to display the decrypted data in a tree display form if the preset character is the first target character; and if the preset character is the second target character, displaying the decrypted data by using a form display form.
For the embodiment of the present application, in order to display the decrypted data in a form of a table, the first display unit 33 includes an obtaining module 331, a determining module 332, and a display module 333.
The obtaining module 331 may be configured to obtain an attribute field and a field value corresponding to the attribute field in the decrypted data.
The determining module 332 may be configured to determine column information corresponding to the table based on the attribute field and the number of fields corresponding to the attribute field.
The determining module 332 may be further configured to determine row information corresponding to the table based on the field value and the number of field values corresponding to the field value.
The display module 333 may be configured to display the decrypted data in the form of a table display based on the column information and the row information corresponding to the table.
In a specific application scenario, in order to obtain the attribute field and the corresponding field value in the decrypted data, the obtaining module 331 may be specifically configured to obtain the attribute field in the decrypted data by using a first preset function; and acquiring a field value corresponding to the attribute field from the decrypted data by using a second preset function.
In a specific application scenario, in order to display the decrypted data in the second target display form, the second display unit 34 may be specifically configured to display the decrypted data in the original display form.
It should be noted that, other corresponding descriptions of each functional module related to the display device for decrypting data provided by the embodiment of the present application may refer to corresponding descriptions of the method shown in fig. 1, and are not repeated herein.
Based on the above method as shown in fig. 1, correspondingly, the embodiment of the present application further provides a computer readable storage medium, on which a computer program is stored, which when being executed by a processor, implements the following steps: responding to a decryption data display instruction, and acquiring decryption data to be displayed; judging whether the decrypted data contains preset characters or not; if the preset character is included, displaying the decrypted data according to a first target display form corresponding to the preset character; and if the preset character is not contained, displaying the decrypted data in a second target display form.
Based on the embodiment of the method shown in fig. 1 and the device shown in fig. 3, the embodiment of the application further provides a physical structure diagram of a computer device, as shown in fig. 5, where the computer device includes: a processor 41, a memory 42, and a computer program stored on the memory 42 and executable on the processor, wherein the memory 42 and the processor 41 are both arranged on a bus 43, the processor 41 performing the following steps when said program is executed: responding to a decryption data display instruction, and acquiring decryption data to be displayed; judging whether the decrypted data contains preset characters or not; if the preset character is included, displaying the decrypted data according to a first target display form corresponding to the preset character; and if the preset character is not contained, displaying the decrypted data in a second target display form.
According to the technical scheme, the decryption data to be displayed is obtained by responding to the decryption data display instruction; judging whether the decrypted data contains preset characters or not; if the preset character is included, displaying the decrypted data according to a first target display form corresponding to the preset character; and if the preset character is not contained, displaying the decrypted data by adopting a second target display form, thereby judging whether the decrypted data contains the preset character or not, if so, displaying the decrypted data according to a first target display form corresponding to the preset character, and if not, displaying the decrypted data by adopting the second target display form, thereby improving the efficiency of displaying the decrypted data, and meanwhile, avoiding the situation that the decrypted data is displayed by adopting a display mode which is wrong due to negligence of staff, and improving the accuracy of displaying the decrypted data.
It will be appreciated by those skilled in the art that the modules or steps of the application described above may be implemented in a general purpose computing device, they may be concentrated on a single computing device, or distributed across a network of computing devices, they may alternatively be implemented in program code executable by computing devices, so that they may be stored in a memory device for execution by computing devices, and in some cases, the steps shown or described may be performed in a different order than that shown or described, or they may be separately fabricated into individual integrated circuit modules, or multiple modules or steps within them may be fabricated into a single integrated circuit module for implementation. Thus, the present application is not limited to any specific combination of hardware and software.
The above description is only of the preferred embodiments of the present application and is not intended to limit the present application, but various modifications and variations can be made to the present application by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (8)

1. A method of displaying decrypted data, comprising:
responding to a decryption data display instruction, and acquiring decryption data to be displayed;
judging whether the decrypted data contains preset characters or not;
if the preset character is included, displaying the decrypted data according to a first target display form corresponding to the preset character;
if the preset character is not contained, displaying the decrypted data in a second target display form;
the displaying the decrypted data according to the first target display form corresponding to the preset character includes:
configuring a ReqDecJSON.cs plugin and a ReqDecWebForms plugin in an ini configuration file;
if the preset character is a first target character, calling the ReqDecJSON.cs plug-in for displaying the decrypted data by using a tree display form;
if the preset character is a second target character, calling the ReqDecWebForms plugin for displaying the decrypted data in a form display form;
wherein the displaying the decrypted data using a form display form includes:
acquiring an attribute field and a corresponding field value in the decrypted data;
determining column information corresponding to the table based on the attribute fields and the number of the fields corresponding to the attribute fields;
determining row information corresponding to the table based on the field value and the number of the field values corresponding to the field value;
and displaying the decrypted data in the form of table display based on the column information and the row information corresponding to the table.
2. The method of claim 1, wherein prior to said determining whether the decrypted data contains a predetermined character, the method further comprises:
determining a first hash value of pre-encryption data corresponding to the decrypted data and a second hash value corresponding to the decrypted data;
judging whether the first hash value is equal to the second hash value;
and if the first hash value is equal to the second hash value, determining that the decrypted data is not damaged.
3. The method according to claim 1, wherein the determining whether the decrypted data includes a predetermined character comprises:
constructing a preset regular expression based on a format corresponding to the preset character;
and judging whether the decrypted data contains the preset character or not by using the preset regular expression.
4. The method according to claim 1, wherein said obtaining the attribute field and its corresponding field value in the decrypted data comprises:
acquiring an attribute field in the decrypted data by using a first preset function;
and acquiring a field value corresponding to the attribute field from the decrypted data by using a second preset function.
5. The method of claim 1, wherein the presenting the decrypted data in the second target presentation form comprises:
and displaying the decrypted data in an original display form.
6. A display device for decrypting data, comprising:
the acquisition unit is used for responding to the decryption data display instruction and acquiring decryption data to be displayed;
the judging unit is used for judging whether the decrypted data contains preset characters or not;
the first display unit is used for displaying the decrypted data according to a first target display form corresponding to the preset character if the preset character is included;
the second display unit is used for displaying the decrypted data in a second target display form if the preset characters are not included;
the first display unit is specifically configured to configure a reqdecjson. Cs plug-in and a reqdecwebform. Cs plug-in an ini configuration file; if the preset character is a first target character, calling the ReqDecJSON.cs plug-in for displaying the decrypted data by using a tree display form; if the preset character is a second target character, calling the ReqDecWebForms plugin for displaying the decrypted data in a form display form;
the first display unit is specifically configured to obtain an attribute field and a field value corresponding to the attribute field in the decrypted data; determining column information corresponding to the table based on the attribute fields and the number of the fields corresponding to the attribute fields; determining row information corresponding to the table based on the field value and the number of the field values corresponding to the field value; and displaying the decrypted data in the form of table display based on the column information and the row information corresponding to the table.
7. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 5.
8. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the computer program when executed by the processor implements the steps of the method according to any one of claims 1 to 5.
CN202111570241.6A 2021-12-21 2021-12-21 Method and device for displaying decrypted data, storage medium and computer equipment Active CN114430336B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111570241.6A CN114430336B (en) 2021-12-21 2021-12-21 Method and device for displaying decrypted data, storage medium and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111570241.6A CN114430336B (en) 2021-12-21 2021-12-21 Method and device for displaying decrypted data, storage medium and computer equipment

Publications (2)

Publication Number Publication Date
CN114430336A CN114430336A (en) 2022-05-03
CN114430336B true CN114430336B (en) 2023-10-03

Family

ID=81311968

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111570241.6A Active CN114430336B (en) 2021-12-21 2021-12-21 Method and device for displaying decrypted data, storage medium and computer equipment

Country Status (1)

Country Link
CN (1) CN114430336B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102968286A (en) * 2011-09-01 2013-03-13 重庆重邮信科通信技术有限公司 Method, device and system for data transmission and tracking
CN104506515A (en) * 2014-12-17 2015-04-08 北京极科极客科技有限公司 Firmware protection method and firmware protection device
CN108804639A (en) * 2018-06-04 2018-11-13 平安科技(深圳)有限公司 Method for exhibiting data, electronic equipment and computer readable storage medium
CN110069678A (en) * 2019-04-12 2019-07-30 中国银行股份有限公司 A kind of data processing method and device
CN113590997A (en) * 2020-12-30 2021-11-02 绿盟科技集团股份有限公司 Data display method and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040103369A1 (en) * 2002-11-26 2004-05-27 Sonoco Development, Inc. Method and apparatus for displaying data in a web page
AU2011201360B2 (en) * 2010-03-25 2016-10-27 Rl Solutions Systems and methods for creating a form for receiving data relating to a health care incident

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102968286A (en) * 2011-09-01 2013-03-13 重庆重邮信科通信技术有限公司 Method, device and system for data transmission and tracking
CN104506515A (en) * 2014-12-17 2015-04-08 北京极科极客科技有限公司 Firmware protection method and firmware protection device
CN108804639A (en) * 2018-06-04 2018-11-13 平安科技(深圳)有限公司 Method for exhibiting data, electronic equipment and computer readable storage medium
CN110069678A (en) * 2019-04-12 2019-07-30 中国银行股份有限公司 A kind of data processing method and device
CN113590997A (en) * 2020-12-30 2021-11-02 绿盟科技集团股份有限公司 Data display method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于Python的求职信息采集分析系统设计与实现;关鑫洁;黄思奇;位磊;;计算机时代(03);全文 *

Also Published As

Publication number Publication date
CN114430336A (en) 2022-05-03

Similar Documents

Publication Publication Date Title
US20190020630A1 (en) Encrypted query-based access to data
US8862537B1 (en) Selective structure preserving obfuscation
US8983912B1 (en) Data collection and transmission
US10263850B2 (en) Network testing device for automated topology validation
ES2716025T3 (en) Procedure that uses a mobile terminal to implement a cloud search
CN109561106B (en) Ship communication message real-time analysis and filtering method
US10621209B1 (en) Automatic parser generation
CN104732159B (en) A kind of document handling method and device
CN109587110A (en) A kind of weak passwurd detection method, device, computer equipment and service server
CN104601325A (en) Data encryption method, device, equipment and system and data decryption method, device, equipment and system
CN110929291A (en) Method and device for accessing text file and computer readable storage medium
CN109977684A (en) A kind of data transmission method, device and terminal device
CN108418679B (en) Method and device for processing secret key under multiple data centers and electronic equipment
CN114430336B (en) Method and device for displaying decrypted data, storage medium and computer equipment
CN105791283A (en) Circle range search method specific to encrypted spatial data
CN107172165B (en) Data synchronization method and device
CN115567212A (en) File processing method and device, computer equipment and computer readable storage medium
CN112153046A (en) Data encryption and data decryption method, related equipment and storage medium
CN107851165B (en) Key system, key client and key management method
CN112559825B (en) Service processing method, device, computing equipment and medium
CN109815426A (en) Page info detection method and device, terminal and computer readable storage medium
CN110661759B (en) Access detection method and device
CN117251883B (en) Data reliability verification method, device, computer equipment and storage medium
CN112906017B (en) Processing method, device and server for encrypted data test
CN115001833B (en) Login method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant