CN114760063A - Home decoration data processing method, system, storage medium and equipment - Google Patents
Home decoration data processing method, system, storage medium and equipment Download PDFInfo
- Publication number
- CN114760063A CN114760063A CN202210267568.4A CN202210267568A CN114760063A CN 114760063 A CN114760063 A CN 114760063A CN 202210267568 A CN202210267568 A CN 202210267568A CN 114760063 A CN114760063 A CN 114760063A
- Authority
- CN
- China
- Prior art keywords
- key
- information
- funding
- database
- data processing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000005034 decoration Methods 0.000 title claims abstract description 37
- 238000003672 processing method Methods 0.000 title claims abstract description 15
- 238000012545 processing Methods 0.000 claims abstract description 30
- 238000000034 method Methods 0.000 claims abstract description 27
- 230000006854 communication Effects 0.000 claims description 12
- 238000004891 communication Methods 0.000 claims description 11
- 238000004590 computer program Methods 0.000 claims description 11
- 238000012163 sequencing technique Methods 0.000 claims description 4
- 238000001914 filtration Methods 0.000 claims description 3
- 230000008901 benefit Effects 0.000 abstract description 3
- 238000007726 management method Methods 0.000 description 9
- 230000000717 retained effect Effects 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000014759 maintenance of location Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 206010044565 Tremor Diseases 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a home decoration data processing method, a home decoration data processing system, a storage medium and home decoration data processing equipment. The method comprises the following steps: acquiring client funding information acquired by a third party funding platform through https funding api; sending a key acquisition request to a key database through a key query api to the information leaving the resources according to the sensitive data type; receiving a key returned by the key database and calling an encryption algorithm to generate a ciphertext for the information left; and storing the ciphertext to a resource reservation database. The method and the system reduce the database leakage risk in the plaintext storage data of the sensitive data at the system level, and reduce the legal risk of a decoration company caused by leakage of user information and huge economic benefit loss caused by the legal risk.
Description
Technical Field
The invention relates to the field of data processing, in particular to a home decoration data processing method, a home decoration data processing system, a storage medium and home decoration data processing equipment.
Background
Most decoration companies in the market put decoration services on a third-party platform at present, a client pushes sensitive data information (including a mobile phone number, a name, an address, decoration time, plan decoration cost and the like) to the decoration companies through authorization, and a back-end system during decoration work can display the information in a clear text by default. Due to the complex decoration scene, a plurality of designers and a plurality of construction managers are required to follow in decoration will of a client, sensitive data leakage risks exist in the communication process, in addition, database leakage risks also exist in system-level sensitive data plaintext storage data, and finally huge economic benefit loss and legal risks can be caused by decoration companies, so that the home decoration industry is particularly important for protecting sensitive information of the client.
Disclosure of Invention
In view of the above-mentioned shortcomings of the prior art, it is an object of the present invention to provide a method, system, storage medium and device for processing home decoration funding data, which solve the above problems in the prior art.
To achieve the above and other related objects, the present invention provides a method for processing homedress refuge data, comprising: acquiring client funding information acquired by a third party funding platform through an https funding api; sending a key acquisition request to a key database through a key query api according to the sensitive data type for the information leaving the resources; receiving a key returned by the key database and calling an encryption algorithm to generate a ciphertext for the information left; and storing the ciphertext to a resource reservation database.
In an embodiment of the present invention, the method further includes: the customer information includes: name, mobile phone number, decoration style and overall budget; defining a sensitive data type registration key for the information to be retained according to the service type and acquiring the key; generating a corresponding key for the customer information according to the sensitive data type; and storing the key in the key database in a distributed mode.
In an embodiment of the present invention, the method further includes: converting the information of the reserved data into a hexadecimal numerical value; and calling a corresponding AES symmetric encryption algorithm scheme according to the length of the generated key to generate a ciphertext for the information.
In an embodiment of the present invention, the method further includes: and generating the key by using the server IP, the database name, the table name, the field name and the random number as parameters through an MD5 algorithm, wherein the number of the random number cannot be lower than N.
In an embodiment of the present invention, the method further includes: receiving a request for business personnel to check the plaintext of the information left; verifying the identity, the authority and the checking quantity information of the service personnel; sending the key acquisition request to a key management module according to the sensitive data type of the funding information; after receiving the key, extracting a ciphertext in the resource reserving database; an AES symmetric decryption algorithm is called through a secret key to be converted into a plaintext; and recording the plaintext record of the information left by the service personnel as log.
In an embodiment of the present invention, the method further includes: further comprising, before sending the key acquisition request: establishing a server ip mutual access white list; adding authentication parameters to the head part of the key request information data, wherein the authentication parameters comprise a request id, a service serial number and a time stamp; setting an effective time length k min for the timestamp; filtering the authentication parameters with byte type and empty parameter values, and sequencing according to the natural sequence of the authentication parameters; connecting the authentication parameters and the corresponding parameter values thereof to combine to generate a first character string; and generating the authentication signature from the first character string by using an MD5 algorithm.
In an embodiment of the present invention, the method further includes the key management module verifying the validity of the request information after receiving the key acquisition request: judging whether the key acquisition request information sending ip is in a white list or not; verifying the authentication parameter sequencing and signature method; and judging whether the receiving time is within the effective duration according to the timestamp.
To achieve the above and other related objects, the present invention provides a home furnishing funding data processing system, comprising: the data acquisition module is used for acquiring client refund information acquired by a third-party refund platform through https refund api and acquiring a key for the refund information according to the type of sensitive data; a key management module for generating the key and managing the key; the data processing module is used for receiving the key returned by the key database and calling an encryption algorithm to generate a ciphertext for the information left; and the storage database module is used for storing the key and the ciphertext.
To achieve the above and other related objects, the present invention provides a computer-readable storage medium, in which a computer program is stored, and the computer program is loaded and executed by a processor to implement the home furnishing resize data processing method.
To achieve the above and other related objects, the present invention provides an electronic device comprising: a processor, a memory, and a communication interface; wherein the memory is for storing a computer program; the processor is used for loading and executing the computer program to enable the electronic equipment to execute the home decoration funding data processing method; the communication interface is used for realizing communication between the access device and other equipment.
As described above, according to the home decoration data processing method, system, storage medium and device provided by the present invention, the data leakage problem caused by storing the customer data information in the plaintext is encrypted with high precision, and the key is stored by the distributed system, so that the personnel checking the data information is prevented from obtaining the sensitive information in the application, and the home decoration data processing method, system, storage medium and device are easy to implement.
Drawings
Fig. 1 is a schematic flow chart illustrating a home decoration funding data processing method according to an embodiment of the invention.
FIG. 2 is a block diagram of a home furnishing funding data processing system according to an embodiment of the invention.
Fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the invention.
Detailed Description
The following embodiments of the present invention are provided by way of specific examples, and other advantages and effects of the present invention will be readily apparent to those skilled in the art from the disclosure herein. The invention is capable of other and different embodiments and of being practiced or of being carried out in various ways, and its several details are capable of modification in various respects, all without departing from the spirit and scope of the present invention. It should be noted that the features in the following embodiments and examples may be combined with each other without conflict. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present invention, and the components related to the present invention are only shown in the drawings rather than drawn according to the number, shape and size of the components in actual implementation, and the type, quantity and proportion of the components in actual implementation may be changed freely, and the layout of the components may be more complicated.
In order to solve the problem that database data leakage caused by uncontrollable reasons exists in a database and a file of a home decoration system due to the fact that a large amount of client remaining data is stored in a plaintext form in the prior art, the invention provides a home decoration remaining data processing method, a home decoration remaining data processing system, a storage medium and equipment.
As shown in fig. 1, the present embodiment provides a home decoration funding data processing method, which includes the following steps:
s11: and obtaining the client funding information obtained by the third-party funding platform through the https funding api.
Specifically, personal information such as names, mobile phone numbers, decoration styles, overall budgets and the like reserved by users on third-party platforms such as enterprise platform official networks, trembles, fast hands, microblogs and the like is obtained through the https funding api.
S12: and sending a key acquisition request to a key database through a key query api according to the sensitive data type for the information leaving the resources.
Specifically, firstly, a sensitive data type is defined for the information to be retained in advance according to a service type, and then a registration key is applied to the key management module.
Further, a corresponding key is generated according to the sensitive data type of the client funding information. In detail, the server ip (host), the database name (schema), the table name (table), the field name (column), and the random number are used as parameters to generate the secret key through the MD5 algorithm, wherein the number of the random number cannot be lower than N, for example: the Key generation rule is String keyStr ═ Host + schema + table + column + random number (uuid 64 bit), and Key ═ md5 (keyStr).
Further, the keys are stored in a distributed manner in a key database.
Preferably, the key is persisted and the creation time and the identity of whether or not to change is recorded.
Secondly, a key acquisition request is sent to the inquiry api provided by the key management module through the sensitive data type of the funding information. Before sending the acquisition request, processing the original request information data: firstly, adding an authentication parameter at a head part of key request information data, wherein the authentication parameter comprises a request id, a service serial number, a timestamp and other necessary parameters, and then setting an effective duration kmin for the timestamp, for example, setting the effective duration 3 minutes for the timestamp.
Furthermore, the type of the filtering parameter is byte type, the parameter value is empty authentication parameter, and the type of the parameter is not added into the header part of the request information and is not transmitted to the gateway. And then sorting according to the natural sequence of the authentication parameters, connecting the authentication parameters and the corresponding parameter values to combine and generate a first character string, for example, combining the sorted parameters and the corresponding values into a format of 'parameter-parameter value', and connecting the parameters by using & characters, wherein the generated character string is the character string to be signed.
Further, the first string is generated into an authentication signature using the MD5 algorithm.
Preferably, after receiving the key obtaining request, the key management module verifies the validity of the request information: the method comprises the steps of establishing a server ip mutual access white list for a requesting party and a requested party in advance, judging whether a request information source ip is in the white list or not after key request information is received, verifying authentication parameters in the request information if the request information source ip is in the white list, and returning request failure if the request information source ip is not in the white list.
Further, after receiving the key request, verifying the authentication parameters in the request message according to the sorting order and the signature method, and if the sorting order or the signature method of the authentication parameters is different from the agreement, failing to verify.
Preferably, after the authentication parameter and the signature are successfully verified, whether the receiving time is within a preset effective duration of the timestamp called by the addition request parameter is judged, if so, the verification is successful, and if not, the verification fails.
S13: and receiving a key returned by the key database and calling an encryption algorithm to generate a ciphertext for the leave-standing information.
Specifically, the obtained client information is converted into a hexadecimal numerical value, and then a corresponding AES symmetric encryption algorithm scheme is called according to the length of the generated key to generate a ciphertext for the information. For example: if the key length is 16 bits, the data of the reserved plaintext of the hexadecimal numerical value is encrypted by adopting 16-bit AES-128 which gives consideration to performance and security attributes, and the encryption is carried out by using algorithms such as byte substitution, row shifting, column confusion or round keys.
S14: and storing the ciphertext to a funding database.
Specifically, the encrypted data retention information is stored in a data retention database.
Further, when the service needs to check the information-left plaintext, a request for checking the information-left plaintext is received. And after receiving the request, firstly verifying the identity, the authority and the checking quantity information of the service personnel.
Further, when the user identity, the authority and the amount of the information for requesting to view the reserved information all meet the request, then the key is obtained according to the sensitive data type of the reserved information for requesting to view, the data processing of the key obtaining request is the same as that in the step S12, and after the key management module verifies that the key obtaining request is correct, the key is extracted from the key database and returned.
Further, after receiving the key, extracting the ciphertext information stored in the resource-reserving database, and then calling a decryption interface through the key to convert the ciphertext information into plaintext by adopting an AES symmetric decryption algorithm.
Preferably, the service personnel is recorded to view the plaintext record of the leave information as log, so that when a problem occurs, the source is conveniently found.
All or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with a computer program. Based on this understanding, the present invention also provides a computer program product comprising one or more computer instructions. The computer instructions may be stored in a computer readable storage medium. The computer-readable storage medium can be any available medium that a computer can store or a data storage device, such as a server, a data center, etc., that is integrated with one or more available media.
Referring to fig. 2, the present embodiment provides a home decoration refuge data processing system 20, which is installed in an electronic device as a piece of software to execute the home decoration refuge data processing method according to the foregoing method embodiment when running. Since the technical principle of the embodiment of the system is similar to that of the embodiment of the method, repeated description of the same technical details is omitted.
The home decoration funding data processing system 20 of the present embodiment specifically includes: a data acquisition module 21, a key management module 22, a data processing module 23, and a storage database module 24. The data acquisition module 21 is configured to acquire, through the https credentialing api, client credentialing information acquired by a third-party credentialing platform, and acquire a secret key for the credentialing information according to a sensitive data type; the key management module 22 is configured to generate the key and manage the key, where managing the key includes verifying a key request authentication parameter, and returning the key after the verification is successful; the data processing module 23 is configured to receive a key returned by the key database, invoke an encryption algorithm to generate a ciphertext from the information retained, and further perform data processing of adding an authentication parameter to the key acquisition request information and generate a signature; the storage database module 24 is used for storing the key and the ciphertext, and particularly for storing the key in a distributed manner.
It should be understood by those skilled in the art that the division of the modules in the embodiment of fig. 2 is only a logical division, and the actual implementation may be wholly or partially integrated into one or more physical entities. And the modules can be realized in a form that all the modules are called by the processing element through software, can also be realized in a form that all the modules are called by the hardware, can also be realized in a form that part of the modules are called by the processing element through software, and can also be realized in a form that part of the modules are called by the hardware. For example, the data processing module 23 may be a separate processing element, or may be integrated in a chip, or may be stored in a memory in the form of program codes, and the functions of the data processing module 23 are called and executed by a certain processing element. The other modules are implemented similarly. The processing element described herein may be an integrated circuit having signal processing capabilities. In implementation, each step of the above method or each module above may be implemented by an integrated logic circuit of hardware in a processor element or an instruction in the form of software.
Referring to fig. 3, the embodiment provides an electronic device, which may be a portable computer, a smart phone, a tablet computer, or the like. In detail, the electronic device comprises at least, connected by a bus 31: a memory 32, a processor 33, and a communication interface 34, wherein the communication interface 34 is used for implementing communication between the data access apparatus and other devices, the memory 32 is used for storing computer programs, and the processor 33 is used for executing the computer programs stored in the memory 32 to execute all or part of the steps in the foregoing method embodiments.
The above-mentioned system bus may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The system bus may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus. The communication interface is used for realizing communication between the database access device and other equipment (such as a client, a read-write library and a read-only library). The Memory may include a Random Access Memory (RAM), and may further include a non-volatile Memory (non-volatile Memory), such as at least one disk Memory.
The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; the Integrated Circuit may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, or discrete hardware components.
In summary, the home decoration data processing method, system, storage medium and device provided by the invention aim at the problem of data leakage caused by storing customer data information in plaintext, and avoid user information being extracted, checked and forwarded at will by encrypting the customer data information, extracting plaintext information for limited auditing and storing keys in a distributed manner, thereby achieving higher safety performance and being easy to implement. Therefore, the invention effectively overcomes various defects in the prior art and has high industrial utilization value.
The foregoing embodiments are merely illustrative of the principles and utilities of the present invention and are not intended to limit the invention. Those skilled in the art can modify or change the above-described embodiments without departing from the spirit and scope of the present invention. Accordingly, it is intended that all equivalent modifications or changes which may be made by those skilled in the art without departing from the spirit and scope of the present invention as defined in the appended claims.
Claims (10)
1. A home decoration refund data processing method is characterized by comprising the following steps:
acquiring client funding information acquired by a third party funding platform through an https funding api;
sending a key acquisition request to a key database through a key query api according to the sensitive data type for the information leaving the resources;
receiving a key returned by the key database and calling an encryption algorithm to generate a ciphertext for the information leaving the data;
and storing the ciphertext to a funding database.
2. The method of claim 1, further comprising:
the client information comprises: name, mobile phone number, decoration style and overall budget;
defining a sensitive data type registration key for the information to be reserved according to the service type;
generating a corresponding key according to the sensitive data type of the client funding information;
and storing the key in the key database in a distributed mode.
3. The method of claim 2, further comprising:
converting the information of the reserved data into a hexadecimal numerical value;
and calling a corresponding AES symmetric encryption algorithm scheme according to the length of the generated key to generate a ciphertext for the information.
4. The method of claim 2, further comprising:
And generating the key by using the MD5 algorithm by taking the server IP, the database name, the table name, the field name and the random number as parameters, wherein the number of the random number cannot be lower than N.
5. The method of claim 1, further comprising:
receiving a request for business personnel to check the plaintext of the information left;
verifying the identity, the authority and the checking quantity information of the service personnel;
sending the key acquisition request to a key management module according to the sensitive data type of the funding information;
after receiving the key, extracting a ciphertext in the resource reserving database;
an AES symmetric decryption algorithm is called through a secret key to be converted into a plaintext;
and recording the plaintext record of the information left by the service personnel as log.
6. The method of claim 5, further comprising, prior to sending the key acquisition request:
establishing a server ip mutual access white list;
adding authentication parameters to the head part of the key request information data, wherein the authentication parameters comprise a request id, a service serial number and a time stamp;
setting an effective time length k min for the timestamp;
filtering the authentication parameters with byte type and empty parameter values, and sequencing according to the natural sequence of the authentication parameters;
Connecting the authentication parameters and the corresponding parameter values thereof to combine to generate a first character string;
the first string is generated into an authentication signature using the MD5 algorithm.
7. The method of claim 6, further comprising a key management module verifying the validity of the requested information after receiving the key acquisition request:
judging whether the key acquisition request information sending ip is in a white list or not;
verifying the authentication parameter sequencing and signature method;
and judging whether the receiving time is within the effective duration according to the timestamp.
8. A home improvement data processing system, said system comprising:
the data acquisition module is used for acquiring the client funding information acquired by the third-party funding platform through the https funding api and acquiring a key for the funding information according to the type of sensitive data;
a key management module for generating the key and managing the key;
the data processing module is used for receiving the key returned by the key database and calling an encryption algorithm to generate a ciphertext for the information left;
and the storage database module is used for storing the secret key and the ciphertext.
9. A computer-readable storage medium, in which a computer program is stored, which, when loaded and executed by a processor, carries out a method of processing homedress funding data according to any one of claims 1 to 7.
10. An electronic device, comprising: a processor, a memory, and a communication interface; wherein,
the memory is used for storing a computer program;
the processor is used for loading and executing the computer program to enable the electronic equipment to execute the home decoration funding data processing method according to any one of claims 1 to 7;
the communication interface is used for realizing communication between the access device and other equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210267568.4A CN114760063A (en) | 2022-03-18 | 2022-03-18 | Home decoration data processing method, system, storage medium and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210267568.4A CN114760063A (en) | 2022-03-18 | 2022-03-18 | Home decoration data processing method, system, storage medium and equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114760063A true CN114760063A (en) | 2022-07-15 |
Family
ID=82326505
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210267568.4A Pending CN114760063A (en) | 2022-03-18 | 2022-03-18 | Home decoration data processing method, system, storage medium and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114760063A (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106934299A (en) * | 2015-12-29 | 2017-07-07 | 北京明朝万达科技股份有限公司 | A kind of Database Encrypt System and method |
US20190147170A1 (en) * | 2017-11-16 | 2019-05-16 | Intuit Inc. | Processing data queries in a logically sharded data store |
CN110839004A (en) * | 2018-08-16 | 2020-02-25 | 北京京东尚科信息技术有限公司 | Method and device for access authentication |
CN111935094A (en) * | 2020-07-14 | 2020-11-13 | 北京金山云网络技术有限公司 | Database access method, device, system and computer readable storage medium |
US20200394317A1 (en) * | 2019-06-14 | 2020-12-17 | Kenneth White | Systems and methods for client-side and field-level encryption with dynamic schema databases |
CN112685755A (en) * | 2020-12-30 | 2021-04-20 | 石化盈科信息技术有限责任公司 | Database encryption and decryption method and device, storage medium and electronic equipment |
CN112988888A (en) * | 2021-02-19 | 2021-06-18 | 平安科技(深圳)有限公司 | Key management method, key management device, electronic equipment and storage medium |
US11212264B1 (en) * | 2019-05-30 | 2021-12-28 | Wells Fargo Bank, N.A. | Systems and methods for third party data protection |
CN113886418A (en) * | 2021-09-28 | 2022-01-04 | 支付宝(杭州)信息技术有限公司 | Data processing method and device, electronic equipment and machine-readable storage medium |
WO2022052665A1 (en) * | 2020-09-14 | 2022-03-17 | 中兴通讯股份有限公司 | Wireless terminal and interface access authentication method for wireless terminal in uboot mode |
-
2022
- 2022-03-18 CN CN202210267568.4A patent/CN114760063A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106934299A (en) * | 2015-12-29 | 2017-07-07 | 北京明朝万达科技股份有限公司 | A kind of Database Encrypt System and method |
US20190147170A1 (en) * | 2017-11-16 | 2019-05-16 | Intuit Inc. | Processing data queries in a logically sharded data store |
CN110839004A (en) * | 2018-08-16 | 2020-02-25 | 北京京东尚科信息技术有限公司 | Method and device for access authentication |
US11212264B1 (en) * | 2019-05-30 | 2021-12-28 | Wells Fargo Bank, N.A. | Systems and methods for third party data protection |
US20200394317A1 (en) * | 2019-06-14 | 2020-12-17 | Kenneth White | Systems and methods for client-side and field-level encryption with dynamic schema databases |
CN111935094A (en) * | 2020-07-14 | 2020-11-13 | 北京金山云网络技术有限公司 | Database access method, device, system and computer readable storage medium |
WO2022052665A1 (en) * | 2020-09-14 | 2022-03-17 | 中兴通讯股份有限公司 | Wireless terminal and interface access authentication method for wireless terminal in uboot mode |
CN112685755A (en) * | 2020-12-30 | 2021-04-20 | 石化盈科信息技术有限责任公司 | Database encryption and decryption method and device, storage medium and electronic equipment |
CN112988888A (en) * | 2021-02-19 | 2021-06-18 | 平安科技(深圳)有限公司 | Key management method, key management device, electronic equipment and storage medium |
CN113886418A (en) * | 2021-09-28 | 2022-01-04 | 支付宝(杭州)信息技术有限公司 | Data processing method and device, electronic equipment and machine-readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021003980A1 (en) | Blacklist sharing method and apparatus, computer device and storage medium | |
CN110266764B (en) | Gateway-based internal service calling method and device and terminal equipment | |
US11290446B2 (en) | Access to data stored in a cloud | |
WO2021003977A1 (en) | Default information query method and apparatus, and computer device and storage medium | |
CN111476573B (en) | Account data processing method, device, equipment and storage medium | |
US11695740B2 (en) | Anonymization method and apparatus, device, and storage medium | |
US12028458B2 (en) | Systems and methods for user identity | |
WO2024011863A1 (en) | Communication method and apparatus, sim card, electronic device, and terminal device | |
CN109286620A (en) | Method for managing user right, system, equipment and computer readable storage medium | |
CN110266653B (en) | Authentication method, system and terminal equipment | |
CN113129008B (en) | Data processing method, device, computer readable medium and electronic equipment | |
CN110890979B (en) | Automatic deployment method, device, equipment and medium for fort machine | |
CN110955909B (en) | Personal data protection method and block link point | |
CN117113392A (en) | Private data processing method, device, computer equipment and storage medium | |
CN110602051B (en) | Information processing method based on consensus protocol and related device | |
KR102517001B1 (en) | System and method for processing digital signature on a blockchain network | |
CN103559430A (en) | Application account management method and device based on android system | |
CN106453273B (en) | A kind of information insurance management system and method based on cloud | |
CN106534047A (en) | Information transmitting method and apparatus based on Trust application | |
CN114760063A (en) | Home decoration data processing method, system, storage medium and equipment | |
CN110995437B (en) | ETC system-based user information input method, device, equipment and storage medium | |
KR102602086B1 (en) | Operation server for safe phone service using qr code and its operation method | |
CN110941745A (en) | Electronic contract management method and device, storage medium and electronic equipment | |
CN107517177B (en) | Interface authorization method and device | |
CN108076458B (en) | Method and device for binding TF password card and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20220715 |