CN115757191A - Data processing method and device - Google Patents

Data processing method and device Download PDF

Info

Publication number
CN115757191A
CN115757191A CN202310010720.5A CN202310010720A CN115757191A CN 115757191 A CN115757191 A CN 115757191A CN 202310010720 A CN202310010720 A CN 202310010720A CN 115757191 A CN115757191 A CN 115757191A
Authority
CN
China
Prior art keywords
rule
execution
data
rule execution
chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310010720.5A
Other languages
Chinese (zh)
Other versions
CN115757191B (en
Inventor
周俊君
李静连
周辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Qianjun Network Technology Co ltd
Original Assignee
Guangzhou Qianjun Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Qianjun Network Technology Co ltd filed Critical Guangzhou Qianjun Network Technology Co ltd
Priority to CN202310010720.5A priority Critical patent/CN115757191B/en
Publication of CN115757191A publication Critical patent/CN115757191A/en
Application granted granted Critical
Publication of CN115757191B publication Critical patent/CN115757191B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application provides a data processing method and a device, when an encryption or decryption algorithm needs to be debugged, a debugging tool of electronic equipment can be started, a data processing interface is output, a data input area, a rule editing area, an action execution area and a result display area are displayed on the data processing interface, input data to be processed are directly displayed in the data input area, the execution algorithm of a rule execution block and the selective editing of a character set are performed in the rule editing area, and a rule execution chain is obtained by sequentially combining at least one rule execution block and displayed in the rule editing area; and performing execution triggering operation in the action execution area, starting from a first rule execution block of a rule execution chain, processing the data to be processed at least according to the corresponding execution algorithm and the character set to obtain a corresponding data processing result, and displaying the corresponding data processing result in a result display area.

Description

Data processing method and device
Technical Field
The present application relates to the field of computer technologies, and in particular, to a data processing method and apparatus.
Background
In order to ensure the security and consistency of data transmission, a data encryption rule agreed by both data transceivers in advance can be adopted, and after the service data to be transmitted is encrypted, the service data is transmitted to a data receiving terminal for decryption, so that the required service data is obtained, and the corresponding service interaction requirements are met.
Therefore, in the service development process, a developer needs to manually write a code to realize a required data encryption rule according to a pre-agreed encryption requirement, and load the code into a service application program for debugging so as to determine whether the data encryption rule can ensure that the transmitted service data cannot be tampered in the data transmission process.
In the process of encrypting and transmitting the transmitted service data by using the data encryption rule, the encrypted files obtained by the data transceiver and the data transceiver are different, so that the whole service application program is often required to be operated, the debugging of the data encryption rule is realized, the process is very troublesome, and the debugging efficiency is greatly influenced.
Disclosure of Invention
In order to solve the above problem, the embodiments of the present application provide the following technical solutions:
in one aspect, the present application provides a data processing method, including:
outputting a data processing interface, and displaying a data input area, a rule editing area, an action execution area and a result display area on the data processing interface;
responding to data input operation, and displaying the input data to be processed in the data input area;
displaying the edited rule execution chain in the rule editing area in response to a rule editing operation; the rule execution chain is composed of at least one rule execution block in sequence, and each rule execution block comprises a selected execution algorithm and a character set;
responding to the execution triggering operation of the action execution area, starting from a first rule execution block of the rule execution chain, and processing the data to be processed at least according to the corresponding execution algorithm and the character set to obtain a corresponding data processing result;
and displaying the data processing result in the result display area.
Optionally, the displaying, in response to the rule editing operation, the edited rule execution chain in the rule editing area includes:
responding to an editing triggering operation of a first rule execution block to be defined, and displaying at least one candidate execution algorithm and a candidate character set in a rule editing area;
responding to respective selection operations of the candidate execution algorithm and the candidate character set to obtain an execution algorithm and a character set of the first rule execution block;
responding to the rule execution block adding operation, and displaying a next rule execution block to be defined in the rule editing area;
responding to the editing operation of the next rule execution block to be defined to obtain an execution algorithm and a character set of the next rule execution block;
and sequentially combining the defined rule execution blocks to obtain a rule execution chain aiming at the data to be processed.
Optionally, in the process of responding to the editing operation of any rule execution block to be defined, the method further includes:
selecting a rule execution chain aiming at the data to be processed from at least one stored candidate rule execution chain;
determining the rule execution blocks contained in the selected rule execution chain as the currently defined rule execution blocks;
and/or the presence of a gas in the gas,
determining that the selected execution algorithm belongs to a preset type algorithm, and displaying candidate additional information corresponding to the rule execution block to be defined in the rule editing area;
responding to the selection operation of the candidate additional information to obtain the additional information of the corresponding rule execution block.
Optionally, the method further includes:
responding to the import triggering operation of the action execution area, and outputting an execution algorithm import interface on the data processing interface;
responding to the input operation of the import address of the execution algorithm import interface, and importing the input custom execution algorithm;
and storing the self-defined execution algorithm as a candidate execution algorithm.
Optionally, starting from the first rule execution block of the rule execution chain, processing the to-be-processed data according to at least the corresponding execution algorithm and the character set to obtain a corresponding data processing result, where the processing method includes:
processing the data to be processed at least according to the corresponding execution algorithm and the character set from a first rule execution block of the rule execution chain to obtain first processed data;
sequentially inputting the first processing data into a next rule execution block of the rule execution chain, and processing the first processing data at least according to the execution algorithm of the next rule execution block to obtain second processing data;
and determining the next currently input rule execution block as the last rule execution block of the rule execution chain, and performing format conversion processing on the output processing data according to the corresponding character set to obtain a data processing result of the data to be processed.
Optionally, starting from a first rule execution block of the rule execution chain, processing the to-be-processed data according to at least the corresponding execution algorithm and the character set to obtain first processed data, where the processing includes:
starting from a first rule execution block of the rule execution chain, carrying out format conversion processing on the data to be processed according to the corresponding character set to obtain byte data to be processed;
according to the execution algorithm of the first rule execution block, encrypting or decrypting the byte data to be processed to obtain first processed data;
the determining that the currently input next rule execution block is the last rule execution block of the rule execution chain, and performing format conversion processing on the output processing data according to the corresponding character set to obtain a data processing result of the data to be processed includes:
and determining the next currently input rule execution block as the last rule execution block of the rule execution chain, and performing format conversion processing on the output processing data according to the corresponding character set to obtain a visual data processing result.
Optionally, if the currently input rule execution block further includes additional information, processing the to-be-processed data according to at least the corresponding execution algorithm and the character set, starting from the first rule execution block of the rule execution chain, to obtain first processed data, further including:
carrying out format conversion on the additional information according to the character set of the currently input rule execution block to obtain additional byte data;
executing the execution algorithm of the block according to the currently input rule, and encrypting or decrypting the additional byte data;
under the condition that the next rule execution block input currently is determined to be the last rule execution block of the rule execution chain, carrying out format conversion processing on the processed additional byte data according to the character set of the rule execution block input currently to obtain visual additional information;
the visualization data processing result comprises visualization data processed according to the data to be processed and additional information of the visualization.
Optionally, the method further includes:
responding to the rule saving operation of the action execution area, and configuring a corresponding execution chain identifier for the edited rule execution chain;
and storing the rule execution chain configured with the execution chain identifier.
Optionally, the method further includes:
outputting a rule storage interface, and displaying the rule execution chains corresponding to the stored execution chain identifications on the rule storage interface;
responding to the restoration triggering operation of any rule execution chain displayed on the rule storage interface, and displaying the execution algorithm and the character set of each rule execution block contained in the triggered rule execution chain in the rule editing area;
and responding to the updating and editing operation of any rule execution block displayed in the rule editing area, updating the corresponding rule execution chain according to the edited rule execution block, and storing the updated rule execution chain.
In another aspect, the present application further provides a data processing apparatus, including:
the data processing interface output module is used for outputting a data processing interface, and displaying a data input area, a rule editing area, an action execution area and a result display area on the data processing interface;
the data input module to be processed is used for responding to data input operation and displaying the input data to be processed in the data input area;
the rule execution chain editing module is used for responding to rule editing operation and displaying the edited rule execution chain in the rule editing area; the rule execution chain is composed of at least one rule execution block in sequence, and each rule execution block comprises a selected execution algorithm and a character set;
the data processing module is used for responding to the execution triggering operation of the action execution area, starting from a first rule execution block of the rule execution chain, and processing the data to be processed at least according to the corresponding execution algorithm and the character set to obtain a corresponding data processing result;
and the data processing result display module is used for displaying the data processing result in the result display area.
Therefore, the application provides a data processing method and a device, when an encryption or decryption algorithm needs to be debugged, a debugging tool of electronic equipment can be started, a data processing interface is output, a data input area, a rule editing area, an action execution area and a result display area are displayed on the data processing interface, the input data to be processed are directly displayed in the data input area, the execution algorithm of a rule execution block and the selective editing of a character set are performed in the rule editing area, and the obtained at least one rule execution block is sequentially combined to obtain a rule execution chain which is displayed in the rule editing area; and executing trigger operation in the action execution area, starting from a first rule execution block of a rule execution chain, processing the data to be processed at least according to the corresponding execution algorithm and the character set to obtain a corresponding data processing result, and displaying the corresponding data processing result in a result display area.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
FIG. 1 is a schematic diagram of an alternative system architecture of an application environment suitable for the data processing method proposed in the present application;
fig. 2 is a schematic diagram of a hardware structure of an alternative example of an electronic device suitable for the data processing method proposed in the present application;
FIG. 3 is a schematic flow chart diagram of an alternative example of the data processing method proposed in the present application;
FIG. 4 is a schematic diagram of an alternative data processing interface suitable for use in the data processing method proposed in the present application;
FIG. 5 is a schematic flow chart diagram of yet another alternative example of the data processing method presented in the present application;
FIG. 6 is a schematic diagram of an alternative data processing interface suitable for use in the data processing method proposed in the present application;
FIG. 7 is a schematic diagram of an alternative data processing interface suitable for use in the data processing method proposed in the present application;
FIG. 8 is a schematic flow chart diagram of yet another alternative example of the data processing method presented in the present application;
FIG. 9 is a schematic flow chart diagram of yet another alternative example of the data processing method set forth in the present application;
FIG. 10 is a schematic diagram of an optional execution algorithm import interface suitable for use in the data processing method proposed in the present application;
FIG. 11 is a schematic flow chart diagram of yet another alternative example of the data processing method set forth in the present application;
FIG. 12 is a schematic diagram of a rule storage interface displaying stored rule execution chains for use in the data processing method of the present application;
fig. 13 is a schematic structural diagram of an alternative example of the data processing apparatus proposed in the present application;
fig. 14 is a schematic structural diagram of still another alternative example of the data processing apparatus proposed in the present application.
Detailed Description
For the technical problems described in the background art, for example, in the service interaction application, in order to ensure that the service data transmitted in the interaction process is not tampered, various ways such as an asymmetric Encryption Algorithm (e.g., message-Digest Algorithm, MD5 for short, information Digest Algorithm) and a symmetric Encryption Algorithm (e.g., advanced Encryption Standard, AES for short, advanced Encryption Standard, etc.) are usually adopted for Encryption verification.
The sending end encrypts the service data to be transmitted by using an asymmetric encryption algorithm to obtain an encrypted file, and then the encrypted file and the service data can be transmitted to the receiving end in a string mode.
The sending end encrypts the service data to be transmitted by using a symmetric encryption algorithm, sends the obtained encrypted file to the receiving end, and the receiving end decrypts the received encrypted file by using the symmetric encryption algorithm, wherein if the service data is obtained by successful decryption, the transmitted service data is not tampered. For other encryption verification implementation manners, the encryption verification implementation manner may be determined according to a calculation principle of a corresponding encryption algorithm, and details of the application are not described herein.
Since the encryption verification process is a part of the business application logic, in order to improve debugging efficiency in the business application development process, the encryption and decryption logic corresponding to the data encryption rule is extracted for debugging, so that a corresponding code file needs to be rewritten or the code file needs to be directly copied for debugging, but the code file cannot be uniformly stored, so that the code file needs to be reprocessed according to the mode when the verification fails every time, and debugging efficiency is affected.
In order to improve the debugging efficiency of the application of the data encryption rule in the development process, the application provides a tool supporting the customized encryption rule, so that developers can select one or more required encryption and decryption algorithms from the tool to form the required data encryption rule, and the required data encryption rule is used for realizing the encryption processing of the data to be encrypted. For the custom construction process of the data encryption rule, reference may be made to the description of the corresponding part of the following embodiments, and the detailed description of the present application is omitted here.
The technical solutions in the embodiments of the present application will be described below clearly and completely with reference to the drawings in the embodiments of the present application, and it should be understood that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, which is a schematic diagram of an alternative system structure of an application environment suitable for the data processing method provided in the present application, as shown in fig. 1, the system may include an electronic device 110 and a server 120, where:
the electronic device 110 may be a smartphone, a tablet computer, a wearable device, a netbook, an Augmented Reality (AR) device, a Virtual Reality (VR) device, a smart transportation device, a desktop computer, or other terminals, and the application does not limit the product type of the electronic device 110. In this embodiment, the electronic device 110 may install an application program (which may be referred to as a debugging tool) capable of providing a debugging service of a data encryption rule (which includes an encryption/decryption algorithm of business data) in business development, may execute the data processing method provided in this application, and custom and quickly configure the data encryption rule for the encryption/decryption processing of the business data to be encrypted/decrypted (i.e., the data to be processed), so as to implement the processing of the business data, and display the obtained data processing result, and the implementation process may refer to the description of the corresponding part in the following embodiment.
In practical application of the present application, a debugging tool installed in the electronic device 110 may provide execution algorithms such as encryption/decryption algorithms, custom encryption/decryption algorithms, and the like commonly used in the field, so that, in a service development process, encryption/decryption operations on service data need to be debugged, service data to be processed may be uploaded to the debugging tool, and a developer/a debugger may directly select one or more execution algorithms required for this debugging from a plurality of execution algorithms of the debugging tool, determine an execution sequence of each execution algorithm, and combine other execution information to quickly form a rule execution chain (i.e., a data encryption rule) for processing the service data this time, so as to implement processing on the service data.
The server 120 may be a service device supporting a data processing service of a debugging tool, may be an independent physical server, may be a server cluster integrated by a plurality of physical servers, and may be a cloud server supporting a cloud computing service. In practical applications, the server 120 may support the operation of a debugging tool to implement online processing of the service data, and in this process, the server 120 may support the operation of each execution algorithm described above, and implement encryption/decryption processing of the service data by using more sufficient computing resources of the server 120.
Optionally, each execution algorithm that the debugging tool can provide may also be provided by an independent algorithm library (i.e., a database server), and the algorithm library may be connected to the server 120, so that after a developer determines a rule execution chain using the debugging tool, when the service data is processed by using each rule execution block included in the rule execution chain, the server may call a corresponding execution algorithm from the algorithm library according to the selected execution algorithm identifier, so as to implement encryption/decryption processing on the service data, and the implementation process is not described in detail in this application.
In still other embodiments, the execution algorithms supported by the debugging tool may be loaded or the execution algorithms may be stored in advance when the debugging tool is installed in the electronic device 110 corresponding to the information used for processing the service data, such as the execution algorithms described above, so that the electronic device 110 does not need to be networked, and the debugging tool may be directly started to implement processing of the service data. It can be seen that the application environment of the data processing method is not limited in the present application, and may be determined according to the network condition of the electronic device 110 used by the developer.
It should be noted that, in practical applications, the system structure of the application environment applicable to the data processing method provided in the present application is not limited to the composition structure shown in fig. 1, and may further include other devices such as a database, a monitoring device, a service system, and the like according to practical requirements, which are not listed in the present application.
Referring to fig. 2, a schematic diagram of a hardware structure of an alternative example of an electronic device suitable for the data processing method proposed in the present application is shown, where the electronic device may include, but is not limited to: a communication module 21, a display 22, a memory 23, and a processor 24, wherein:
the number of the communication module 21, the display 22, the memory 23 and the processor 24 may be at least one, and the communication module 21, the display 22, the memory 23 and the processor 24 may be connected to a communication bus of an electronic device to implement communication connection therebetween, so as to meet data interaction requirements.
The communication module 21 may include a communication module capable of implementing data interaction by using a wireless communication network, such as a WIFI module, a 5G/6G (fifth generation mobile communication network/sixth generation mobile communication network) module, a GPRS module, and the like, and the communication module 21 may further include a communication interface for implementing data interaction between internal components of an electronic device, such as a USB interface, a serial/parallel port, an I/O port, and the like, and the specific content included in the communication module 21 is not limited in this application.
The display 22 may include a display panel, such as a touch display panel, for outputting various interfaces for implementing the data processing method of the present application, and may also detect various input operations executed on the interfaces, implement an interactive operation, display a data processing result, and the like, and the present application does not describe the type of the display 22 and the display principle thereof in detail. The input operation for each displayed interface can be realized by any input component such as a keyboard, a mouse, a sound pickup and the like, and the input mode can be determined according to the operation habit of the user, which is not limited in the application.
The memory 23 may be used to store programs implementing the data processing methods described in the method embodiments below; the processor 24 may load and execute the program stored in the memory to implement the steps of the data processing method described in the corresponding method embodiment below, and the detailed implementation process may refer to the description of the corresponding parts of the embodiment below, which is not described in detail herein.
In the embodiment of the present application, the memory 23 may include a high-speed random access memory, and may further include a nonvolatile memory, such as at least one magnetic disk storage device or other volatile solid-state storage device. The processor 24 may be a Central Processing Unit (CPU), an application-specific integrated circuit (ASIC), a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device.
It should be understood that the structure of the electronic device shown in fig. 2 does not constitute a limitation of the electronic device in the embodiment of the present application, and in practical applications, the electronic device may include more components than those shown in fig. 2, or some components may be combined. At least one output component such as a display, speaker, vibration mechanism, light, etc.; an antenna; a sensor module; power modules or other input components, etc., which are not listed herein.
In conjunction with the above description of the system architecture of the application environment and the hardware structure of the electronic device included in the system architecture, the data processing method executed by the application environment will be described below, but the implementation manner described in the method embodiment below is not limited, and the data processing method can be adaptively and flexibly adjusted according to actual situations.
Fig. 3 is a schematic flow chart of an optional example of the data processing method proposed in the present application, where the method may be executed by an electronic device, and in combination with the above description of the technical solution of the present application, the electronic device may use the above debugging tool supporting the customized encryption and decryption rules, such as an application program/client, and as shown in fig. 3, the method may include:
step S31, outputting a data processing interface, and displaying a data input area, a rule editing area, an action execution area and a result display area on the data processing interface;
in the embodiment of the application, in order to solve the problem that technicians relate to efficiency of encryption and decryption operation debugging in the development process, the technicians can start a debugging tool in electronic equipment or log in a debugging platform in a webpage mode in the development and debugging process, and output a data processing interface through a display of the electronic equipment, namely an execution panel for realizing custom debugging of data encryption rules.
Since the execution panel provided by the present application can provide a conventional encryption or decryption algorithm, and can also edit a plurality of same or different encryption or decryption algorithms to form a rule execution chain, as shown in fig. 4, a data processing interface diagram output by an electronic device can display a data input area, a rule editing area, an action execution area, and a result display area, but is not limited to the layout manner of these areas shown in fig. 4, and a developer of a debugging tool can perform adaptive adjustment according to actual needs.
The data input area in the data processing interface can be used for indicating to input data to be processed, namely a text file to be encrypted; the rule editing area can be used for indicating the user-defined editing of at least one execution algorithm, character set and other contents required by the operation of each rule execution block forming the rule execution chain; the action execution area can be used for indicating triggering of an execution operation, a storage operation of the edited rule execution chain, a calling operation of the calling and storage rule execution chain and the like; the structure display area is used for displaying a data processing result obtained by executing a rule execution chain on the input data to be processed. Of course, for other editing operation modes of the debugging tool, the data processing interface may further include other display areas, which is not described in detail herein by way of example.
Step S32, responding to data input operation, and displaying the input data to be processed in a data input area;
in combination with the above description of the data input area, a technician may directly perform a touch operation on the data input area in the data processing interface, for example, perform a click operation on the data input area, if the data input area displays an input button, click the input button, output a data input panel, select or input a storage address of the to-be-processed data to be processed in the to-be-processed data selection box in the data input panel, display at least one data file stored under the storage address in the data input panel, select at least one data file thereof as the to-be-processed data to be uploaded to the debugging tool, and display a file identifier and/or data content of the uploaded to-be-processed data in the data input area, but is not limited to the above manner of uploading to-be-processed data described in this embodiment.
Step S33, responding to the rule editing operation, and displaying the edited rule execution chain in the rule editing area;
in the embodiment of the present application, the customized rule execution chain may be sequentially composed of at least one rule execution block (i.e., encryption/decryption block), so that a technician may customize and edit the execution algorithm, the character set, and other contents required by each rule execution block in the rule editing area.
In the process of defining the rule execution chain, the rule execution blocks to be sequentially executed may be edited according to the content of a required data encryption rule (which may include at least one encryption or decryption algorithm), as shown in fig. 4, when each rule execution block is customized, the execution algorithm required by the rule execution block and the character set char set (character codes used in the data format processing process, the content included in the rule execution block is not limited by the present application) may be selected in the execution algorithm editing box, after the editing of the rule execution block is completed, the "+" flag may be clicked to add the editing box of the next rule execution block in the rule editing area, continue editing the contents of the execution algorithm and the character set of the rule execution block, and repeat the editing in this way until the editing of all rule execution blocks is completed, and a plurality of rule execution blocks obtained by editing are sequentially combined to obtain the rule execution chain for processing the currently input data to be processed.
Optionally, in the process of editing any one of the rule execution blocks, a stored historical rule execution chain may also be directly selected as a rule execution block for current editing, and the stored historical rule execution chain is sequentially combined with other edited rule execution blocks to form a rule execution chain for editing the to-be-processed data at this time.
In addition, in the process of editing each rule execution block, including but not limited to selection of contents such as an execution algorithm and a character set, depending on the type of the selected execution algorithm, it may also be necessary to edit an additional Key value, so as to subsequently implement processing of data to be processed accordingly.
Therefore, in a development and debugging scene, after a technician starts a debugging tool by using electronic equipment, the data to be processed in a target scene can be flexibly selected directly on an output data processing interface, the rule execution blocks for performing encryption/decryption processing on the data to be processed at each time are defined and edited by selecting an encryption/decryption algorithm of the debugging tool and are sequentially combined to form a rule execution chain for representing a data encryption rule, the technician is not required to write codes by hand to form the data encryption rule, the data encryption rule obtaining efficiency is greatly improved, code errors caused by hand errors are avoided, the correct reliability of the data encryption rule is ensured, and the debugging efficiency and the reliability are further improved.
Step S34, responding to the execution trigger operation of the action execution area, starting from a first rule execution block of a rule execution chain, processing the data to be processed at least according to the corresponding execution algorithm and the character set, and obtaining a corresponding data processing result;
according to the method described above, after the rule execution chain is customized and edited, after the content of each rule execution block included in the defined and edited rule execution chain is determined to be correct, a trigger operation may be executed in the action execution area, for example, a "Run" button displayed in the action execution area shown in fig. 4 is clicked, a debugging tool of the electronic device may start to process the uploaded data to be processed using the content of the first rule execution block in the rule execution chain customized and, for example, perform data format conversion processing on the data to be processed using a character set, and then process the processed data using the execution algorithm of the first rule execution block to obtain a data processing result corresponding to the first rule execution block.
Then, the data processing result obtained by the first rule execution block can be used as the input data of the next rule execution block (i.e. determined according to the combination sequence of the multiple rule execution blocks in the rule execution chain), and the input data is continuously processed by using the content of the next rule execution block, so that the execution of each rule execution block is advanced until the last rule execution block in the rule execution chain is executed, and the final data processing result of the data to be processed is obtained. The processing procedure of each rule execution block on the input data may be determined according to the above custom editing content, and the embodiment of the present application is not described in detail herein.
And step S35, displaying the data processing result in the result display area.
In order to ensure that the finally obtained data processing result is a visual result, namely a result which can be understood by a technical person, the character set of the last rule execution block can be used for carrying out format conversion on the data processing result after algorithm execution processing, and after the visual data processing result is obtained, the data processing result is sent to a result display area to be displayed, whether the data encryption rule of the custom editing meets the actual requirement or not is known, if the data encryption rule does not meet the actual requirement, the data encryption rule can be quickly adjusted according to the custom editing mode described above, codes do not need to be written again, and the debugging efficiency is greatly improved.
Referring to fig. 5, which is a flowchart illustrating a further optional example of the data processing method proposed in the present application, this embodiment may describe an optional detailed implementation manner of the data processing method proposed above, and as shown in fig. 5, the method may include:
step S51, outputting a data processing interface, and displaying a data input area, a rule editing area, an action execution area and a result display area on the data processing interface;
step S52, responding to data input operation, and displaying the input data to be processed in a data input area;
regarding the implementation process of step S51 and step S52, reference may be made to the description of the corresponding parts of the above embodiments, and the present embodiment is not described in detail.
In still other embodiments, the data input area may be a text editing box, and the user triggers the data input area to enter an editing state, so that the user pastes the copied pending data target into the text editing box for display, without using another file as a carrier, but is not limited to this implementation manner of uploading the pending data.
Step S53, responding to the editing triggering operation of the first rule execution block to be defined, and displaying at least one candidate execution algorithm and a candidate character set in a rule editing area;
step S54, responding to the respective selection operation of the candidate execution algorithm and the candidate character set to obtain the execution algorithm and the character set of the first rule execution block;
in the encryption/decryption process, byte format data is usually used as input data and output results, and data to be processed uploaded by technicians is usually text data such as various characters, special symbol punctuations and the like, so that a specific character set is required to be used for carrying out format conversion on the uploaded text data to obtain byte data of corresponding contents, and the obtained byte format processing results are converted into visual and understandable text data.
Based on this, referring to the data processing interface shown in fig. 4, at least one rule execution block may be displayed by default in the rule editing area, and the editing area of each rule execution block may at least include an Algorithm editing area and a character set editing area, so that the first rule execution block that is edited to form a rule execution chain required by the current Encryption/decryption debugging, that is, the rule execution block on the top layer displayed in the rule editing area, may trigger the Algorithm editing area therein to output at least one candidate execution Algorithm, such as Message-Digest Algorithm (Message Digest Algorithm) Encode, base64 (binary data is represented based on 64 printable characters) Encode, base64 Decode (decoding AES), advanced Encryption Standard (Advanced Encryption Standard) Encode, AES Decode, URL (uniform resource locator, uniform resource locator system) Encode, HMAC (Hash-based Authentication Message), authentication Message (Authentication Message), and so on a Hash Algorithm, and the like, and may also obtain a security Algorithm in a manner that the signature/decryption Algorithm 256 is not limited in advance, or may be used for decryption Algorithm decryption by a person who applies for signature-signature Algorithm decryption Algorithm in advance.
In this way, the technician can select the required execution algorithm from the displayed candidate execution algorithms according to actual requirements. Similarly, the Character Set editing area of the first rule execution block may be triggered to display at least one candidate Character Set, such as UTF-8 (Universal Character Set/Unicode Transformation Format, 8-bit Character Set that conforms to the Unicode standard), ASCII characters, etc., for a technician to select a desired Character Set char Set.
Step S55, responding to the rule execution block adding operation, and displaying the next rule execution block to be defined in the rule editing area;
step S56, responding to the editing operation of the next rule execution block to be defined, and obtaining the execution algorithm and the character set of the next rule execution block;
according to the method described above, after the selection and editing operation of the information such as the execution algorithm and the character set char set of each displayed rule execution block is performed in the order from the top layer to the bottom layer of the rule editing area, other rule execution blocks need to be further edited in sequence, for this reason, as shown in fig. 4, an execution block addition button "+" in the rule editing area may be triggered, and a rule execution block to be defined is additionally displayed below the displayed bottom layer rule execution block, as shown in fig. 6, and then, the execution algorithm and the character set of the rule execution block added this time may still be edited according to the above-described editing manner of the execution algorithm and the character set of the first rule execution block, and the implementation process is not described in detail in this application.
The types of the candidate execution algorithms and the candidate character sets for each rule execution block may be the same, as shown in fig. 6 and the above listed candidates, so that the technician can select the required execution algorithms and character sets from the displayed candidates according to the encryption/decryption processing requirements and the data format conversion requirements of the rule execution block to be edited this time. Of course, in still other embodiments, a technician may also directly input the execution algorithm and the character set constituting the rule execution block in the corresponding edit box according to the encryption/decryption processing requirement and the data format conversion requirement, and the implementation process is not described in detail in this application.
In still other embodiments, during editing a plurality of rule execution blocks in the manner described above, if an edited or default rule execution block has an error, a corresponding execution block deletion identifier "x" may be directly triggered, and a corresponding rule execution block displayed in the rule editing area is deleted in response to a deletion editing operation on any rule execution block. Optionally, if the execution sequence of the multiple rule execution blocks displayed in the rule editing area is incorrect, the displayed ordering of the rule execution blocks from the top layer to the bottom layer may also be dynamically adjusted, and the implementation process is not described in detail.
Step S57, each defined rule execution block is combined in sequence to obtain a rule execution chain aiming at the data to be processed;
step S58, responding to the execution trigger operation of the action execution area, starting from a first rule execution block of the rule execution chain, and processing the data to be processed at least according to a corresponding execution algorithm and a character set to obtain first processed data;
step S59, inputting the first processing data into a next rule execution block of the rule execution chain in sequence, and processing the first processing data at least according to an execution algorithm of the next rule execution block to obtain second processing data;
step S510, determining that the next rule execution block currently input is the last rule execution block of the rule execution chain, and performing format conversion processing on output processing data according to the corresponding character set to obtain a data processing result of the data to be processed;
according to the method described above, after a plurality of rule execution blocks are edited by a user, the rule execution blocks may be combined in order from the top layer to the bottom layer to form a rule execution chain, that is, an encryption execution chain including a plurality of encryption algorithms or a decryption execution chain including a plurality of decryption algorithms, and after the contents and the order of the rule execution blocks included in the rule execution chain are determined to be correct, an execution button of an action execution area, such as "Run", may be triggered, and the attached data to be processed may be sequentially encrypted (i.e., encoded)/decrypted (i.e., decoded) according to the order of the plurality of rule execution blocks in the rule execution chain edited by the user.
Specifically, according to the ordering of the multiple rule execution blocks in the rule execution chain, the data to be processed may be input to the first rule execution block, format conversion is performed on the data to be processed using a character set included in the first rule execution block, and the obtained byte data is input to an execution algorithm to be encrypted or decrypted, so as to obtain first processed data (byte format data); then, the first processed data is used as input data of the next rule execution block (i.e. the second rule execution block) in the sequence, and the first processed data is encrypted or decrypted (in accordance with the encryption or decryption type of the rule execution chain) by the execution algorithm of the next rule execution block, so as to obtain second processed data.
If the rule execution block is not the last rule execution block of the rule execution chain, the output processing data can be input into the next rule execution block (i.e. the fourth rule execution block) for processing according to the method described above; if the third rule execution block is the last rule execution block of the rule execution chain, format conversion can be performed on the output processing data (namely, byte data obtained by processing the input data by the execution algorithm) according to the character set contained in the third rule execution block, so that a visual and understandable data processing result is obtained.
Step S511 displays the data processing result in the result display area.
Therefore, the rule execution blocks of the rule execution chain can be edited in the rule editing area in a user-defined mode, the execution codes of the rule execution blocks do not need to be written manually, the rule execution chain of the data encryption rule representing the data to be processed through multiple times of encryption or decryption can be obtained quickly and accurately, then the execution operation is triggered, the data to be processed can be automatically processed in sequence according to the multiple rule execution blocks contained in the rule execution chain, the obtained data processing result is output, the encryption/decryption rule is debugged, and the debugging efficiency is greatly improved.
In still other embodiments proposed in the present application, referring to an interface schematic diagram of a further optional example of the data processing interface shown in fig. 7, in the process of customizing each Rule execution block of the Rule execution chain, a Rule execution chain for data to be processed may be selected from at least one stored candidate Rule execution chain (such as a previously debugged historical Rule execution chain), as shown in fig. 7, a lower triangle in an algorithm editing box is touched, a Saved Rule (Call Saved Rule) is selected and called from candidates of an output algorithm drop box, a chain identifier (such as an execution chain name) of the candidate Rule execution chain called this time may be displayed in an identifier box below a Rule execution block of the Saved Rule execution chain, as shown in fig. 7, e.g., "alchemisign" and the like, and the present application does not display a selection operation manner of the candidate Rule execution chain.
And then, the rule execution blocks included in the selected rule execution chain can be determined as the currently defined rule execution blocks, so that the rule execution blocks are combined with other self-defined rule execution blocks to form the rule execution chain for the data to be processed, and the rule execution blocks included in the selected candidate rule execution chain are directly redefined and edited one by one in comparison with the rule execution block definition editing mode described above, so that the definition efficiency of the rule execution chain for the self-defined editing of the data to be processed at this time is improved.
Therefore, the debugging tool operated by the electronic equipment provides a calling mode for the stored rule execution chain, and the stored rule execution chain is used as a rule execution block of other rule execution chains by referring to the calling mode.
In further embodiments of the present application, in the process of customizing each rule execution block of the rule execution chain, if it is determined that the selected execution algorithm belongs to the preset type of algorithm, the electronic device may select additional information (such as a candidate additional Key value) required for running the execution algorithm from candidate additional information (corresponding to the rule execution block to be defined) displayed in the rule editing area, and may respond to the selection operation on the candidate additional information to obtain additional information, such as an additional Key value, of the corresponding rule execution block.
Therefore, the preset type algorithm may refer to an execution algorithm that can be realized only by using some additional information when the execution algorithm processes data to be processed (i.e., data in a byte format), and may be determined according to an operation principle of each encryption/decryption algorithm. For example, the Md5 algorithm may directly encrypt the received byte data; however, in the AES algorithm, the received data to be processed needs to be encrypted/decrypted by using a corresponding additional Key value (which needs to be converted into a Key value in a byte format by using a character set), so that the AES algorithm belongs to a preset type algorithm, but the Md5 algorithm does not belong to the preset type algorithm, and certainly, the preset type algorithm proposed in the present application is not limited to the AES algorithm.
Based on this, for the above-described implementation method starting from the first rule execution block of the rule execution chain, in the process of processing the input data by any rule execution block, processing the input data to be processed at least according to the corresponding execution algorithm and the character set, and obtaining the corresponding processing data may include, but is not limited to, the flow shown in fig. 8:
s81, determining that the execution algorithm of the first rule execution block does not belong to a preset type algorithm, and performing format conversion processing on input data to be processed according to a corresponding character set to obtain byte data to be processed;
s82, according to the execution algorithm of the first rule execution block, carrying out encryption processing on byte data to be processed to obtain first processing data;
s83, inputting the first processing data into a second rule execution block, determining that the corresponding execution algorithm belongs to a preset type algorithm, and performing format conversion on the additional information of the execution algorithm according to the corresponding character set to obtain additional byte data;
step S84, executing the execution algorithm of the block according to a second rule, and encrypting the first processed data and the additional byte data to obtain second processed data;
step S85, determining that the second rule execution block is not the last rule execution block of the rule execution chain, and inputting the second processing data into a third rule execution block;
step S86, determining that the execution algorithm of the third rule execution block does not belong to the preset type algorithm, and encrypting the second processed data according to the corresponding execution algorithm to obtain third processed data;
and step S87, determining that the third rule execution block is the last rule execution block of the rule execution chain, and performing format conversion processing on the third processed data and the additional byte data according to the corresponding character set to obtain a visualized data processing result.
Therefore, in the process of processing input data by each rule execution block in the rule execution chain, if the execution algorithm of the rule execution block needs to add a Key value (i.e. text form additional information), the rule execution block is the first rule execution block, and needs to use the character set contained in the rule execution block to perform format conversion on the added Key value; if the rule execution block is not the first rule execution block, since the received input data (i.e., the processing data output by the last rule execution block) is byte data, it is not necessary to perform format conversion using the character set included therein, and the input data is directly encrypted using an encryption algorithm.
For the last rule execution block, the character set of the last rule execution block is also used, the processed byte data of the processed data to be processed is converted into a visualized text (namely, visualized information processed for the data to be processed), and the additional byte data is converted into visualized additional information (namely, a visualized Key text).
In some embodiments, if the custom-edited rule execution chain includes one rule execution block, format conversion processing needs to be performed on the to-be-processed data and the additional information according to the character set of the rule execution chain under the condition that the execution algorithm included in the rule execution chain needs the additional information to obtain corresponding byte data, then the to-be-processed byte data and the additional byte data are encrypted by using the execution algorithm, and the obtained processing result is converted into a visual text including visual additional information and visual information processed for the to-be-processed data.
It is understood that the rule execution chain for debugging may be the above encryption rule execution chain, or may also be a decryption rule execution chain, and in this case, the execution algorithm of the rule execution block included in the rule execution chain may be a decryption algorithm, so that the processing procedure of the data to be processed is similar to the encryption processing procedure of the above embodiment, and the detailed description is not given in this application.
Based on the description of the above embodiments, the execution algorithm in the custom editing rule execution block may be a conventional encryption/decryption algorithm that a debugging tool has, and if the algorithms do not meet the requirements, the debugging tool also supports the custom execution algorithm, and after the defined execution algorithm is imported, the execution algorithm required by each rule execution block is selected according to the execution algorithm editing and selecting operation described above.
Therefore, in the custom process of executing the algorithm, the abstract program interface Codified defined by the debugging tool can be used for realizing:
public interface Codified {
String name(); byte[] run(Charset charset, byte[] target, byte[] key); }
it can be seen that, the present application may create a Java class, and this class inherits a program interface Codified, defines a run method in the program interface, and may receive three types of parameters, namely, a character set char set, a to-be-processed data target (for example, to-be-processed data pasted in a data input area, corresponding byte data extracted through the char set, or output data of a rule execution block in a rule execution chain), and additional information Key. Based on the following can be shown but not limited to this example:
public class CodifiedImpl implements Codified {
@Override
public String name() {
return "encryption algorithm name";
}
@Override
public byte[] run(Charset charset, byte[] target, byte[] key) {
v/performing encryption/decryption operation on input byte data, and returning operated byte result
return new byte[0];
}
}
After writing a Java class according to the method described above, an import button in the action execution area (e.g., a folder icon in the action execution area in the data processing interface described above) can be clicked to select a custom execution algorithm for import. Based on this, on the basis of the data processing method described in the above embodiment, as shown in fig. 9, the method may further include:
step S91, responding to the import triggering operation of the action execution area, and outputting an execution algorithm import interface on a data processing interface;
s92, responding to the input operation of the import address of the import interface of the execution algorithm, and importing the input custom execution algorithm;
and step S93, storing the custom execution algorithm as a candidate execution algorithm.
Referring to the schematic diagram of the execution algorithm import interface shown in fig. 10, a technician may select a Java file of a defined Java class, that is, a code file of a custom execution algorithm, and may select an identifier such as a file name thereof, including but not limited to the selection import manner of the input import address described in this embodiment, and after determining the custom execution algorithm to be imported, may click to confirm the import operation, for example, click an "OK" button, and save the custom execution algorithm as a candidate execution algorithm to a memory. Then, according to the above scheme, when the technician selects an execution algorithm for any rule execution block, the displayed candidate execution algorithms include a custom execution algorithm.
It should be noted that the customized execution algorithm includes, but is not limited to, the definition of the technician itself, and the technician using the debugging tool may also send the customized execution algorithm to the server, so that when other technicians use the debugging tool to perform online debugging, the customized execution algorithm of other technicians may also be obtained, and the implementation process is not described in detail.
Referring to fig. 11, a schematic flow chart of yet another optional example of the data processing method proposed in the present application is shown, in practical applications, a rule execution chain customized and edited according to the above-described method may be saved and then reused, and therefore, on the basis of the data processing method described in the above embodiment, as shown in fig. 11, the method may further include:
step S111, responding to the rule saving operation of the action execution area, and configuring corresponding execution chain identification for the edited rule execution chain;
step S112, storing the rule execution chain configured with the execution chain identifier;
in combination with the data processing interface described in the above figure, after customizing any rule execution chain according to the above-described method, a "save current rule" button displayed in the action execution area may request to save the currently customized rule execution chain, so that the electronic device may output a rule execution chain storage configuration interface in response to the rule saving operation to configure an execution chain identifier of the rule execution chain, and then may associate and store the rule execution chain with the configured execution chain identifier, where the storage manner is not limited.
Step S113, outputting a rule storage interface, and displaying the rule execution chain corresponding to each execution chain identifier stored in the rule storage interface;
for the rule execution chains stored in the debugging tool, the rule execution chains may be uniformly displayed in the result storage panel, a display area of the stored rule panel in the debugging interface is triggered, and the rule storage interface is output, as shown in fig. 12, the stored rule execution chains may be displayed in the rule storage interface, and each rule execution chain is configured with a corresponding execution chain identifier, but the display method is not limited to the display manner of the stored rule execution chain shown in fig. 12.
Step S114, responding to the restoration triggering operation of any rule execution chain displayed on the rule storage interface, and displaying the execution algorithm and the character set of each rule execution block contained in the triggered rule execution chain in a rule editing area;
step S115, in response to the update editing operation on any rule execution block displayed in the rule editing area, updates the corresponding rule execution chain according to the rule execution block obtained by editing, and stores the updated rule execution chain.
When a technician wants to check the content of each rule execution block included in a certain rule execution chain, the technician may perform a restoration triggering operation on any rule execution chain displayed on the rule storage interface, and for example, click a folder identifier in front of the rule execution chain, the content of each rule execution block included in the rule execution chain may be presented in the rule editing area, so that the content of each rule execution block may be updated and edited according to the above-described customized editing operation manner, the updated rule execution chain is stored, and the implementation process of the present application is not described in detail.
Referring to fig. 13, a schematic structural diagram of an alternative example of the data processing apparatus proposed in the present application may include:
a data processing interface output module 131, configured to output a data processing interface, where a data input area, a rule editing area, an action execution area, and a result display area are displayed on the data processing interface;
a to-be-processed data input module 132, configured to respond to a data input operation and display the input to-be-processed data in the data input area;
a rule execution chain editing module 133, configured to respond to a rule editing operation, and display an edited rule execution chain in the rule editing area; the rule execution chain is composed of at least one rule execution block in sequence, and each rule execution block comprises a selected execution algorithm and a character set;
a data processing module 134, configured to respond to an execution trigger operation on the action execution region, start from a first rule execution block of the rule execution chain, and process the to-be-processed data according to at least the corresponding execution algorithm and the character set, so as to obtain a corresponding data processing result;
a data processing result display module 135, configured to display the data processing result in the result display area.
In some embodiments, as shown in fig. 14, the rule execution chain editing module 133 may include:
a first display unit 1331, configured to display at least one candidate execution algorithm and a candidate character set in the rule editing area in response to an editing trigger operation of a first rule execution block to be defined;
a first selecting unit 1332, configured to obtain an execution algorithm and a character set of the first rule execution block in response to respective selection operations on the candidate execution algorithm and the candidate character set;
a rule execution block adding unit 1334, configured to respond to a rule execution block adding operation, and display a next rule execution block to be defined in the rule editing area;
a second selecting unit 1335, configured to respond to an editing operation on the next rule execution block to be defined, to obtain an execution algorithm and a character set of the next rule execution block;
a rule execution chain obtaining unit 1336, configured to sequentially combine the defined rule execution blocks to obtain a rule execution chain for the data to be processed.
Optionally, in the process of responding to the editing operation of any rule execution block to be defined, the apparatus may further include:
the rule execution chain selection module is used for selecting a rule execution chain aiming at the data to be processed from at least one stored candidate rule execution chain;
the first determining module is used for determining the rule execution blocks contained in the selected rule execution chain as the currently defined rule execution blocks;
and/or the presence of a gas in the gas,
the candidate attachment information display module is used for determining that the selected execution algorithm belongs to a preset type algorithm and displaying candidate attachment information corresponding to the rule execution block to be defined in the rule editing area;
and the additional information obtaining module is used for responding to the selection operation of the candidate additional information to obtain the additional information of the corresponding rule execution block.
In still other embodiments, the apparatus may further include:
the execution algorithm import interface output module is used for responding to import trigger operation of the action execution area and outputting an execution algorithm import interface on the data processing interface;
the execution algorithm import module is used for responding to the import address input operation of the execution algorithm import interface and importing the input custom execution algorithm;
and the execution algorithm storage module is used for storing the self-defined execution algorithm as a candidate execution algorithm.
Based on the above description of the embodiments, as shown in fig. 14, the data processing module 134 may include:
a first processing unit 1341, configured to, starting from a first rule execution block of the rule execution chain, process the to-be-processed data according to at least the corresponding execution algorithm and the character set, so as to obtain first processed data;
a second processing unit 1342, configured to sequentially input the first processed data into a next rule execution block of the rule execution chain, and process the first processed data according to the execution algorithm of the next rule execution block at least to obtain second processed data;
the format conversion processing unit 1343 is configured to determine that a next rule execution block currently input is a last rule execution block of the rule execution chain, and perform format conversion processing on output processing data according to a corresponding character set to obtain a data processing result of the data to be processed.
Optionally, the first processing unit 1341 may include:
a byte data to be processed obtaining unit, configured to perform, starting from a first rule execution block of the rule execution chain, format conversion processing on the data to be processed according to the corresponding character set, so as to obtain byte data to be processed;
the rule processing unit is used for encrypting or decrypting the byte data to be processed according to the execution algorithm of the first rule execution block to obtain first processed data;
based on this, the format conversion processing unit 1343 may include:
and the visualization conversion processing unit is used for determining the next currently input rule execution block as the last rule execution block of the rule execution chain, and performing format conversion processing on the input processing data according to the corresponding character set to obtain a visualization data processing result.
Optionally, if the currently input rule execution block further includes additional information, the first processing unit 1341 may further include:
an additional byte data obtaining unit, configured to perform format conversion on the additional information according to the currently input character set of the rule execution block to obtain additional byte data;
the encryption/decryption processing unit is used for executing the execution algorithm of the block according to the currently input rule and encrypting or decrypting the additional byte data;
a visualized additional information obtaining unit, configured to, when it is determined that the currently input next rule execution block is the last rule execution block of the rule execution chain, perform format conversion processing on the processed additional byte data according to the character set of the currently input rule execution block, to obtain visualized additional information;
the visualization data processing result includes visualization data processed for the data to be processed, and additional information of the visualization.
Based on the above description of the embodiments, the apparatus may further include:
the execution chain identifier configuration module is used for responding to the rule storage operation of the action execution area and configuring the corresponding execution chain identifier for the edited rule execution chain;
and the rule execution chain storage module is used for storing the rule execution chain configured with the execution chain identifier.
Based on this, the above apparatus may further include:
the rule storage interface output module is used for outputting a rule storage interface, and displaying the rule execution chains corresponding to the stored execution chain identifications on the rule storage interface;
the rule execution chain restoration triggering module is used for responding to restoration triggering operation of any rule execution chain displayed on the rule storage interface and displaying an execution algorithm and a character set of each rule execution block contained in the triggered rule execution chain in the rule editing area;
and updating the rule execution chain, which is used for responding to the updating and editing operation of any rule execution block displayed in the rule editing area, updating the corresponding rule execution chain according to the edited rule execution block, and storing the updated rule execution chain.
It should be noted that, various modules, units, and the like in the foregoing apparatus embodiments may be stored in a memory as program modules, and the processor may execute the program modules stored in the memory to implement corresponding functions, or may be implemented by combining the program model and hardware, and for the functions implemented by the program modules and their combinations and the achieved technical effects, reference may be made to the description of corresponding parts in the foregoing method embodiments, and this embodiment is not described in detail again.
The embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored, and the computer program is loaded and executed by a processor to implement each step of the data processing method, where a specific implementation process may refer to descriptions of corresponding parts in the foregoing embodiment, and details are not described in this embodiment.
Finally, it should be noted that, with respect to the above-described embodiments, the terms "a," "an," "the," and/or "the" are not intended to refer to the singular, but may include the plural, unless the context clearly dictates otherwise. In general, the terms "comprises" and "comprising" merely indicate that steps and elements are included which are explicitly identified, that the steps and elements do not form an exclusive list, and that a method or apparatus may include other steps or elements. An element defined by the phrase "comprising a component of ' 8230 ' \8230; ' does not exclude the presence of additional identical elements in the process, method, article, or apparatus that comprises the element.
Wherein in the description of the embodiments of the present application, "/" indicates an inclusive meaning, for example, a/B may indicate a or B; "and/or" herein is merely an association describing an associated object, and means that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, in the description of the embodiments of the present application, "a plurality" means two or more than two.
This application is directed to terms such as "first," "second," and the like, which are used for descriptive purposes only to distinguish one operation, element, or module from another operation, element, or module and do not necessarily require or imply any actual relationship or order between such elements, operations, or modules. And are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated, whereby a feature defined as "first" or "second" may explicitly or implicitly include one or more of such features.
In addition, in the present specification, the embodiments are described in a progressive or parallel manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments can be referred to each other. The device, the electronic device, the system and the storage medium disclosed by the embodiment correspond to the method disclosed by the embodiment, so that the description is relatively simple, and the relevant points can be referred to the description of the method part.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the disclosure. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A method of data processing, the method comprising:
outputting a data processing interface, and displaying a data input area, a rule editing area, an action execution area and a result display area on the data processing interface;
responding to data input operation, and displaying the input data to be processed in the data input area;
displaying the edited rule execution chain in the rule editing area in response to a rule editing operation; the rule execution chain is composed of at least one rule execution block in sequence, and each rule execution block comprises a selected execution algorithm and a character set;
responding to the execution trigger operation of the action execution area, starting from a first rule execution block of the rule execution chain, and processing the data to be processed at least according to the corresponding execution algorithm and the character set to obtain a corresponding data processing result;
and displaying the data processing result in the result display area.
2. The method of claim 1, wherein displaying the edited rule execution chain in the rule edit area in response to a rule edit operation comprises:
responding to an editing triggering operation of a first rule execution block to be defined, and displaying at least one candidate execution algorithm and a candidate character set in a rule editing area;
responding to respective selection operations of the candidate execution algorithm and the candidate character set to obtain an execution algorithm and a character set of the first rule execution block;
responding to the rule execution block adding operation, and displaying a next rule execution block to be defined in the rule editing area;
responding to the editing operation of the next rule execution block to be defined to obtain an execution algorithm and a character set of the next rule execution block;
and sequentially combining the defined rule execution blocks to obtain a rule execution chain aiming at the data to be processed.
3. The method according to claim 2, wherein during the editing operation of the block executed in response to any rule to be defined, further comprising:
selecting a rule execution chain aiming at the data to be processed from at least one stored candidate rule execution chain;
determining the rule execution blocks contained in the selected rule execution chain as the currently defined rule execution blocks;
and/or the presence of a gas in the gas,
determining that the selected execution algorithm belongs to a preset type algorithm, and displaying candidate additional information corresponding to the rule execution block to be defined in the rule editing area;
responding to the selection operation of the candidate additional information to obtain the additional information of the corresponding rule execution block.
4. The method of claim 2, further comprising:
responding to the import triggering operation of the action execution area, and outputting an execution algorithm import interface on the data processing interface;
responding to the input operation of the import address of the execution algorithm import interface, and importing the input custom execution algorithm;
and storing the self-defined execution algorithm as a candidate execution algorithm.
5. The method according to any one of claims 1 to 4, wherein the processing the data to be processed starting from a first rule execution block of the rule execution chain according to at least the corresponding execution algorithm and the character set to obtain a corresponding data processing result, comprises:
processing the data to be processed at least according to the corresponding execution algorithm and the character set from a first rule execution block of the rule execution chain to obtain first processed data;
sequentially inputting the first processing data into a next rule execution block of the rule execution chain, and processing the first processing data at least according to the execution algorithm of the next rule execution block to obtain second processing data;
and determining the next currently input rule execution block as the last rule execution block of the rule execution chain, and performing format conversion processing on the output processing data according to the corresponding character set to obtain a data processing result of the data to be processed.
6. The method according to claim 5, wherein said processing the data to be processed starting from a first rule execution block of the rule execution chain according to at least the corresponding execution algorithm and the character set to obtain first processed data comprises:
starting from a first rule execution block of the rule execution chain, carrying out format conversion processing on the data to be processed according to the corresponding character set to obtain byte data to be processed;
performing the execution algorithm of the execution block according to the first rule, and encrypting or decrypting the byte data to be processed to obtain first processed data;
the determining that the currently input next rule execution block is the last rule execution block of the rule execution chain, and performing format conversion processing on the output processing data according to the corresponding character set to obtain a data processing result of the data to be processed includes:
and determining the next currently input rule execution block as the last rule execution block of the rule execution chain, and performing format conversion processing on the output processing data according to the corresponding character set to obtain a visual data processing result.
7. The method according to claim 6, wherein if the currently input rule execution block further includes additional information, said processing the data to be processed starting from a first rule execution block of the rule execution chain at least according to the corresponding execution algorithm and the character set to obtain first processed data, further comprising:
carrying out format conversion on the additional information according to the character set of the currently input rule execution block to obtain additional byte data;
executing the execution algorithm of the block according to the currently input rule, and encrypting or decrypting the additional byte data;
under the condition that the next rule execution block input currently is determined to be the last rule execution block of the rule execution chain, carrying out format conversion processing on the processed additional byte data according to the character set of the rule execution block input currently to obtain visual additional information;
the visualized data processing result comprises visualized data processed aiming at the data to be processed and visualized additional information.
8. The method according to any one of claims 1-4, further comprising:
responding to the rule saving operation of the action execution area, and configuring a corresponding execution chain identifier for the edited rule execution chain;
and storing the rule execution chain configured with the execution chain identifier.
9. The method of claim 8, further comprising:
outputting a rule storage interface, and displaying the rule execution chains corresponding to the stored execution chain identifications on the rule storage interface;
responding to the restoration triggering operation of any rule execution chain displayed on the rule storage interface, and displaying the execution algorithm and the character set of each rule execution block contained in the triggered rule execution chain in the rule editing area;
and responding to the updating and editing operation of any rule execution block displayed in the rule editing area, updating the corresponding rule execution chain according to the edited rule execution block, and storing the updated rule execution chain.
10. A data processing apparatus, characterized in that the apparatus comprises:
the data processing interface output module is used for outputting a data processing interface, and displaying a data input area, a rule editing area, an action execution area and a result display area on the data processing interface;
the data input module to be processed is used for responding to data input operation and displaying the input data to be processed in the data input area;
the rule execution chain editing module is used for responding to rule editing operation and displaying the edited rule execution chain in the rule editing area; the rule execution chain is composed of at least one rule execution block in sequence, and each rule execution block comprises a selected execution algorithm and a character set;
the data processing module is used for responding to the execution trigger operation of the action execution area, starting from a first rule execution block of the rule execution chain, and processing the data to be processed at least according to the corresponding execution algorithm and the character set to obtain a corresponding data processing result;
and the data processing result display module is used for displaying the data processing result in the result display area.
CN202310010720.5A 2023-01-05 2023-01-05 Data processing method and device Active CN115757191B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310010720.5A CN115757191B (en) 2023-01-05 2023-01-05 Data processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310010720.5A CN115757191B (en) 2023-01-05 2023-01-05 Data processing method and device

Publications (2)

Publication Number Publication Date
CN115757191A true CN115757191A (en) 2023-03-07
CN115757191B CN115757191B (en) 2023-05-16

Family

ID=85348202

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310010720.5A Active CN115757191B (en) 2023-01-05 2023-01-05 Data processing method and device

Country Status (1)

Country Link
CN (1) CN115757191B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040156501A1 (en) * 2003-02-07 2004-08-12 Patrick Zuili Font level encryption method and apparatus
US20060188098A1 (en) * 2005-02-21 2006-08-24 Seiko Epson Corporation Encryption/decryption device, communication controller, and electronic instrument
US20080170693A1 (en) * 2007-01-16 2008-07-17 Terence Spies Format-preserving cryptographic systems
JP2011053749A (en) * 2009-08-31 2011-03-17 Renesas Electronics Corp Debugging method, debugging device and translator program
JP2011151690A (en) * 2010-01-24 2011-08-04 Michito Miyazaki Encryption key management system
US20110289325A1 (en) * 2010-05-19 2011-11-24 Innostor Technology Corporation Data encryption device for storage medium
CN109918880A (en) * 2017-12-13 2019-06-21 华为终端有限公司 The method, apparatus and terminal device of data encryption or decryption
CN110941467A (en) * 2019-11-06 2020-03-31 第四范式(北京)技术有限公司 Data processing method, device and system
CN111913998A (en) * 2020-09-11 2020-11-10 北京百度网讯科技有限公司 Data processing method, device, equipment and storage medium
CN112214210A (en) * 2020-09-01 2021-01-12 北京中电飞华通信有限公司 Logistics business rule engine and configuration method, device, equipment and storage medium thereof
CN112948843A (en) * 2021-01-27 2021-06-11 维沃移动通信有限公司 Encryption method, encryption device, electronic equipment and medium
WO2022247790A1 (en) * 2021-05-24 2022-12-01 深圳Tcl新技术有限公司 Data management method and apparatus, device and storage medium
CN115525578A (en) * 2022-11-23 2022-12-27 广州市千钧网络科技有限公司 Form generation method and device, electronic equipment and storage medium

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040156501A1 (en) * 2003-02-07 2004-08-12 Patrick Zuili Font level encryption method and apparatus
US20060188098A1 (en) * 2005-02-21 2006-08-24 Seiko Epson Corporation Encryption/decryption device, communication controller, and electronic instrument
US20080170693A1 (en) * 2007-01-16 2008-07-17 Terence Spies Format-preserving cryptographic systems
JP2011053749A (en) * 2009-08-31 2011-03-17 Renesas Electronics Corp Debugging method, debugging device and translator program
JP2011151690A (en) * 2010-01-24 2011-08-04 Michito Miyazaki Encryption key management system
US20110289325A1 (en) * 2010-05-19 2011-11-24 Innostor Technology Corporation Data encryption device for storage medium
CN109918880A (en) * 2017-12-13 2019-06-21 华为终端有限公司 The method, apparatus and terminal device of data encryption or decryption
CN110941467A (en) * 2019-11-06 2020-03-31 第四范式(北京)技术有限公司 Data processing method, device and system
CN112214210A (en) * 2020-09-01 2021-01-12 北京中电飞华通信有限公司 Logistics business rule engine and configuration method, device, equipment and storage medium thereof
CN111913998A (en) * 2020-09-11 2020-11-10 北京百度网讯科技有限公司 Data processing method, device, equipment and storage medium
CN112948843A (en) * 2021-01-27 2021-06-11 维沃移动通信有限公司 Encryption method, encryption device, electronic equipment and medium
WO2022161406A1 (en) * 2021-01-27 2022-08-04 维沃移动通信有限公司 Encryption method and apparatus, electronic device, and medium
WO2022247790A1 (en) * 2021-05-24 2022-12-01 深圳Tcl新技术有限公司 Data management method and apparatus, device and storage medium
CN115525578A (en) * 2022-11-23 2022-12-27 广州市千钧网络科技有限公司 Form generation method and device, electronic equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
乔子芮: "基于MFC的AES可视化试验平台的设计与实现" *
李艳俊;李彦兵;毛明;欧海文;: "简化AES的设计和可视化实现" *

Also Published As

Publication number Publication date
CN115757191B (en) 2023-05-16

Similar Documents

Publication Publication Date Title
TWI672648B (en) Business process method and device, data share system, and storage medium
CN108234539B (en) File uploading, downloading and transmitting method and device
US10754634B1 (en) Customized application package with context specific token
CN113779444B (en) Interface development method, zero code engine and zero code data interface development system
US20120226823A1 (en) Document distribution system and method
CN106843978B (en) SDK access method and system
CN109391673A (en) A kind of method, system and the terminal device of management update file
US8892897B2 (en) Method for generating and detecting auditable passwords
CN111597567B (en) Data processing method, data processing device, node equipment and storage medium
CN109241009B (en) Method for preventing file from being repeatedly uploaded and control method and device thereof
CN112788012A (en) Log file encryption method and device, storage medium and electronic equipment
CN109818957B (en) Intelligent contract calling method, device and system based on visual interface
CN112380464A (en) Short link generation method and related equipment
CN107168765A (en) A kind of method and system of remote compilation software
CN114564757A (en) Data auditing method, device and equipment of block chain and readable storage medium
CN111222153B (en) Application program authority management method and device and storage medium
CN112416395A (en) Hot repair updating method and device
KR20210091327A (en) Batch processing method, apparatus, electronic device and readable storage medium of applet
CN115757191B (en) Data processing method and device
CN116112457A (en) Method, device, computer equipment and storage medium for notifying message
WO2019019650A1 (en) Website data processing method and apparatus, website data processing platform and storage medium
WO2021077862A1 (en) File synchronization method and device
CN113760727A (en) Interface regression testing method and device
CN114117388A (en) Device registration method, device registration apparatus, electronic device, and storage medium
CN112632588A (en) Text encryption method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant