CN115801250A - Data processing method, device and equipment - Google Patents

Data processing method, device and equipment Download PDF

Info

Publication number
CN115801250A
CN115801250A CN202211505535.5A CN202211505535A CN115801250A CN 115801250 A CN115801250 A CN 115801250A CN 202211505535 A CN202211505535 A CN 202211505535A CN 115801250 A CN115801250 A CN 115801250A
Authority
CN
China
Prior art keywords
data
ciphertext
quantum key
processed
receipt
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211505535.5A
Other languages
Chinese (zh)
Inventor
王全新
梁刚
李涛
宋占钰
王楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Unicom Digital Technology Co Ltd
China Unicom Heilongjiang Industrial Internet Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Unicom Digital Technology Co Ltd
China Unicom Heilongjiang Industrial Internet Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd, Unicom Digital Technology Co Ltd, China Unicom Heilongjiang Industrial Internet Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202211505535.5A priority Critical patent/CN115801250A/en
Publication of CN115801250A publication Critical patent/CN115801250A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The application provides a data processing method, a device and equipment, wherein the method comprises the following steps: acquiring a first quantum key, encrypting the data to be processed according to the first quantum key, and determining ciphertext data corresponding to the data to be processed; sending ciphertext data to the terminal equipment and receiving a ciphertext receipt fed back by the terminal equipment; analyzing the ciphertext receipt, determining receipt information, verifying the receipt information, and determining a verification result; if the verification result represents that the receipt information passes verification, an execution ciphertext instruction is sent to the terminal equipment to instruct the terminal equipment to execute the instruction corresponding to the data to be processed, and the data processing process is encrypted based on the quantum entanglement pair which is not limited by the airspace, so that the safety of data transmission and processing is improved.

Description

Data processing method, device and equipment
Technical Field
The present application relates to the field of computer technologies, and in particular, to a data processing method, apparatus, and device.
Background
With the development of modernization, a large number of intelligent devices are applied to the aspects of people's life, and in the application process, a large amount of data are collected and transmitted, so that the safety of data transmission processing is guaranteed to be of utmost importance.
In the prior art, an algorithm is adopted to encrypt the data transmission processing process of various data.
However, in the prior art, the algorithm encryption method needs to consume a large amount of server resources, is easy to crack, and cannot ensure the security of data.
Disclosure of Invention
The application provides a data processing method, a data processing device and data processing equipment, which are used for solving the problem that the safety in the data transmission processing process cannot be ensured.
In a first aspect, the present application provides a data processing method, where the method is applied to a server device, and the method includes:
acquiring a first quantum key, encrypting data to be processed according to the first quantum key, and determining ciphertext data corresponding to the data to be processed;
sending the ciphertext data to a terminal device, and receiving a ciphertext receipt fed back by the terminal device, where the terminal device is configured to parse the ciphertext data according to a second quantum key and feed back the ciphertext receipt, and the first quantum key and the second quantum key are entangled quantum pairs;
analyzing the ciphertext receipt, determining receipt information, verifying the receipt information, and determining a verification result;
and if the verification result represents that the receipt information passes verification, sending an execution ciphertext instruction to the terminal equipment so as to instruct the terminal equipment to execute the instruction corresponding to the data to be processed.
In one possible implementation manner, parsing the ciphertext receipt sent by the terminal device, determining receipt information, performing verification processing on the receipt information, and determining a verification result includes:
analyzing the ciphertext receipt, and determining data receipt information corresponding to the data to be processed and key receipt information corresponding to the second quantum key;
and verifying the data receipt information and the key receipt information to determine a verification result.
In one possible implementation, the performing the verification process on the data receipt information and the key receipt information and determining the verification result includes:
verifying the data receipt information based on the data information of the data to be processed, and verifying the key receipt information based on a quantum entanglement verification module, wherein the data information comprises the data size, the data type and the data content of the data to be processed;
if the data receipt information and the key receipt information are confirmed to pass the verification, the verification result is that the verification passes;
and if the data receipt information is determined to pass the verification, the key receipt information is not verified, or the data receipt information is not verified, the key receipt information is verified, and the verification result is verification failure.
In one possible embodiment, the method further comprises:
if the data receipt information is confirmed to pass the verification, and the key receipt information does not pass the verification, acquiring a new first quantum key, and performing data processing on the data to be processed based on the new first quantum key;
and if the data receipt information is determined not to pass the verification and the key receipt information passes the verification, re-acquiring the data to be processed, and performing data processing based on the re-acquired data to be processed.
In a possible implementation manner, encrypting data to be processed according to the quantum key, and determining ciphertext data corresponding to the data to be processed includes:
analyzing the first quantum key, and determining a random value of the first quantum key in a clear state;
and performing quantum encryption processing on the data to be processed according to the random value, and determining ciphertext data corresponding to the data to be processed.
In a second aspect, the present application provides a data processing method, where the method is applied to a terminal device, and the method includes:
acquiring a second quantum key, and receiving ciphertext data sent by server equipment, wherein the server equipment is used for encrypting data to be processed according to a first quantum key to generate and sending ciphertext data corresponding to the data to be processed, and the first quantum key and the second quantum key are entangled quantum pairs;
according to the second quantum key, analyzing the ciphertext data to determine the data to be processed;
generating a ciphertext receipt according to the second quantum key and the to-be-processed data, and sending the ciphertext receipt to the server device, wherein the server device is further configured to generate and feed back a ciphertext instruction after the ciphertext receipt passes verification;
and receiving the execution ciphertext instruction, and executing the instruction corresponding to the data to be processed according to the execution ciphertext instruction.
In a possible implementation manner, parsing the ciphertext data according to the second quantum key, and determining the to-be-processed data includes:
analyzing the second quantum key, and determining a random value of the second quantum key in a clear state;
and analyzing the ciphertext data according to the random value corresponding to the second quantum key, and determining the data to be processed.
In a possible implementation manner, generating a ciphertext receipt according to the second quantum key and the data to be processed includes:
and encrypting the data to be processed according to the random value of the second quantum key in the clear state to generate the ciphertext receipt, wherein the ciphertext receipt comprises data receipt information corresponding to the data to be processed and key receipt information corresponding to the second quantum key.
In one possible embodiment, the method further comprises:
and if the key receipt information corresponding to the second quantum key is determined not to pass the verification of the server device, acquiring a new second quantum key, and performing data transmission processing on the data to be processed according to the new second quantum key.
In a possible implementation manner, receiving the execution ciphertext instruction, and executing the instruction corresponding to the to-be-processed data according to the execution ciphertext instruction includes:
and receiving and analyzing the execution ciphertext instruction, and controlling a corresponding execution module to execute the instruction corresponding to the data to be processed according to the analyzed execution ciphertext instruction.
In a third aspect, the present application provides a data processing apparatus, where the apparatus is applied to a server device, and the apparatus includes:
the first processing unit is used for acquiring a first quantum key, encrypting data to be processed according to the first quantum key and determining ciphertext data corresponding to the data to be processed;
the second processing unit is configured to send the ciphertext data to a terminal device, and receive a ciphertext receipt fed back by the terminal device, where the terminal device is configured to parse the ciphertext data according to a second quantum key and feed back the ciphertext receipt, and the first quantum key and the second quantum key are entangled quantum pairs;
the third processing unit is used for analyzing the ciphertext receipt, determining receipt information, verifying the receipt information and determining a verification result;
and the sending unit is used for sending an execution ciphertext instruction to the terminal equipment to instruct the terminal equipment to execute the instruction corresponding to the data to be processed if the verification result represents that the receipt information passes the verification.
In a fourth aspect, the present application provides a data processing apparatus, where the apparatus is applied to a terminal device, and the apparatus includes:
the system comprises a first processing unit and a second processing unit, wherein the first processing unit is used for acquiring a second quantum key and receiving ciphertext data sent by server equipment, the server equipment is used for encrypting data to be processed according to a first quantum key to generate and send ciphertext data corresponding to the data to be processed, and the first quantum key and the second quantum key are entangled quantum pairs;
the determining unit is used for analyzing the ciphertext data according to the second quantum key and determining the data to be processed;
the second processing unit is used for generating a ciphertext receipt according to the second quantum key and the data to be processed, and sending the ciphertext receipt to the server device, wherein the server device is further used for generating and feeding back a ciphertext instruction after the ciphertext receipt passes verification;
and the execution unit is used for receiving the execution ciphertext instruction and executing the instruction corresponding to the data to be processed according to the execution ciphertext instruction.
In a fifth aspect, the present application provides a server apparatus comprising: a processor, a memory;
the memory is used for storing computer execution instructions;
the processor is configured to execute the computer executable instructions stored by the memory to implement the method of the first aspect.
In a sixth aspect, the present application provides a terminal device, including: a processor, a memory;
the memory is used for storing computer execution instructions;
the processor is configured to execute the computer-executable instructions stored by the memory to implement the method of the second aspect.
In a seventh aspect, the present application provides a computer-readable storage medium having stored thereon computer-executable instructions for implementing the method according to the first aspect when executed by a processor, or for implementing the method according to the second aspect when executed by a processor.
In an eighth aspect, the present application provides a computer program product comprising a computer program which, when executed by a processor, implements the method according to the first aspect, or which, when executed by a processor, implements the method according to the second aspect.
The data processing method, the device and the equipment provided by the application comprise the following steps: acquiring a first quantum key, encrypting data to be processed according to the first quantum key, and determining ciphertext data corresponding to the data to be processed; sending ciphertext data to the terminal equipment, and receiving a ciphertext receipt fed back by the terminal equipment; analyzing the ciphertext receipt, determining receipt information, verifying the receipt information, and determining a verification result; if the verification result represents that the receipt information passes verification, an execution ciphertext instruction is sent to the terminal equipment to instruct the terminal equipment to execute the instruction corresponding to the data to be processed, and the data processing process is encrypted based on the quantum entanglement pair which is not limited by the airspace, so that the safety of data transmission and processing is improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and, together with the description, serve to explain the principles of the application.
Fig. 1 is a schematic flowchart of a data processing method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of another data processing method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another data processing method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of another data processing apparatus according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a server device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a terminal device according to an embodiment of the present application;
fig. 8 is a block diagram of an electronic device provided in an embodiment of the present application.
Specific embodiments of the present application have been shown by way of example in the drawings and will be described in more detail below. These drawings and written description are not intended to limit the scope of the inventive concepts in any manner, but rather to illustrate the inventive concepts to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. The following description refers to the accompanying drawings in which the same numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
With the development of intellectualization and modernization, a large number of intelligent sensing devices fill the aspects of people's life, such as various human body wearing devices, intelligent home devices and the like, data collected by the devices relate to two aspects of national security and personal privacy, but aiming at the transmission and processing of data, the two ends of the devices and the server lack an efficient encryption method capable of bearing hundreds of millions of levels.
In an example, for a data transmission processing process, various types of sent data are encrypted by a complex algorithm in a conventional encryption means at present, but along with continuous improvement of cracking means, the complexity of the algorithm is also continuously improved, and such an encryption method needs to consume a large amount of server resources and is still likely to be cracked. For example, one malicious software may infect other networked devices with a vulnerability in a webcam or a router and continue to mount attacks on the other devices, posing a significant security risk.
Therefore, the present application provides a data processing method to solve the above technical problems.
The following describes the technical solutions of the present application and how to solve the above technical problems with specific embodiments. These several specific embodiments may be combined with each other below, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Fig. 1 is a schematic flowchart of a data processing method provided in an embodiment of the present application, and is applied to a server device, as shown in fig. 1, the method includes:
101. and acquiring a first quantum key, encrypting the data to be processed according to the first quantum key, and determining ciphertext data corresponding to the data to be processed.
Illustratively, one quantum key in the quantum pair, that is, a first quantum key, is obtained, and the to-be-processed data that needs to be transmitted and processed is encrypted according to the quantum key, so as to determine ciphertext data corresponding to the to-be-processed data.
In one example, the server device includes a quantum cipher text receiving server, a quantum decoding server, a quantum entanglement verification server, a quantum key storage server, a quantum cipher text sending server, a quantum cipher text encryption server, and a device control module, and the quantum cipher text receiving server first stores an acquired second quantum key in the quantum key storage server, then performs quantum cipher text encryption on data to be processed based on the quantum cipher text encryption server according to a first quantum key, and sends the data to be processed through the quantum cipher text sending server after encryption, where the quantum entanglement verification server is configured to verify whether the first quantum key and the second quantum key are in the same entangled state.
In one example, the quantum key distribution device issues quantum pairs, wherein the quantum key distribution center mainly comprises a quantum secret pair generator, a quantum state detector, an entanglement verifier and a secret pair pool. The quantum secret pair is manufactured through the secret pair generator, the quantum state detector and the entanglement verifier are used for verifying the quantum secret pair for multiple times, the quantum secret pair is stored in a secret pair pool after verification is successful, and the quantum secret pair is distributed to server equipment and terminal equipment which need to be verified.
102. And sending the ciphertext data to the terminal equipment, and receiving a ciphertext receipt fed back by the terminal equipment, wherein the terminal equipment is used for analyzing the ciphertext data according to a second quantum key and feeding back the ciphertext receipt, and the first quantum key and the second quantum key are entangled quantum key pairs.
Exemplarily, the server device sends ciphertext data obtained through encryption to the terminal device, and receives a ciphertext receipt fed back by the terminal device after the terminal device analyzes the ciphertext data according to a second quantum key and feeds back the ciphertext receipt, where the first quantum key and the second quantum key are entangled quantum pairs, and the quantum pairs are formed by 1024 quantum entanglements.
In one example, the server device receives a ciphertext receipt using a quantum ciphertext receiving server.
103. And analyzing the ciphertext receipt, determining receipt information, verifying the receipt information and determining a verification result.
Illustratively, according to the second quantum key, the received ciphertext receipt is analyzed, the analyzed ciphertext receipt, that is, receipt information, is determined, the receipt information is verified, and a corresponding verification result, that is, whether verification is passed or not, is determined.
In one example, the ciphertext receipt is parsed according to the second quantum key based on a quantum decoding server in the server device, and the verification result is determined based on a quantum entanglement verification server check in the server device and a verification of the parsed ciphertext receipt by the device control module.
104. And if the verification result represents that the receipt information passes verification, sending an execution ciphertext instruction to the terminal equipment so as to instruct the terminal equipment to execute an instruction corresponding to the data to be processed.
Illustratively, if the verification result indicates that the receipt information passes the verification, an execution ciphertext instruction is generated and sent to the terminal device to instruct the terminal device to execute the instruction corresponding to the data to be processed.
In one example, after the verification is correct, the quantum ciphertext encryption server is used for outputting an execution ciphertext instruction according to the first quantum key encryption execution instruction, and the execution ciphertext instruction is sent to the terminal device through the quantum ciphertext sending server so as to instruct the terminal device to execute an instruction corresponding to the data to be processed.
In summary, the data processing method provided in this embodiment includes the following steps: acquiring a first quantum key, encrypting data to be processed according to the first quantum key, and determining ciphertext data corresponding to the data to be processed; sending ciphertext data to the terminal equipment, and receiving a ciphertext receipt fed back by the terminal equipment; analyzing the ciphertext receipt, determining receipt information, verifying the receipt information, and determining a verification result; if the verification result represents that the receipt information passes verification, an execution ciphertext instruction is sent to the terminal equipment to instruct the terminal equipment to execute an instruction corresponding to the data to be processed, and the data processing process is encrypted based on a quantum entanglement pair which is not limited by a space domain, so that the safety of data transmission and processing is improved.
Fig. 2 is a schematic flowchart of another data processing method provided in an embodiment of the present application, and is applied to a terminal device, and as shown in fig. 2, the method includes:
201. and acquiring a second quantum key, and receiving ciphertext data sent by the server device, wherein the server device is used for encrypting the data to be processed according to the first quantum key to generate and send ciphertext data corresponding to the data to be processed, and the first quantum key and the second quantum key are entangled quantum pairs.
Illustratively, a second quantum key in the quantum pair is obtained and stored, and after the server device encrypts the data to be processed according to the first quantum key to generate and send ciphertext data corresponding to the data to be processed, the ciphertext data sent by the server device is received, where the first quantum key and the second quantum key are entangled quantum pairs.
In one example, the terminal device mainly includes a quantum entanglement verifier, a quantum decoder, a quantum ciphertext receiver, a quantum ciphertext encryptor, a quantum state detector, a quantum key storage and a quantum ciphertext transmitter, wherein the terminal device receives ciphertext data sent by the quantum server through the quantum ciphertext receiver and stores a second quantum key by using the quantum key storage.
In one example, the quantum key distribution device issues quantum pairs, wherein the quantum key distribution center mainly comprises a quantum secret pair generator, a quantum state detector, an entanglement verifier and a secret pair pool. The quantum secret pair is manufactured through the secret pair generator, the quantum state detector and the entanglement verifier are used for verifying the quantum secret pair for multiple times, the quantum secret pair is stored in the secret pair pool after verification is successful, and the quantum secret pair is distributed to server equipment and terminal equipment which need to be verified.
202. And analyzing the ciphertext data according to the second quantum key to determine to-be-processed data.
Illustratively, the terminal device analyzes the received ciphertext data according to the stored second quantum key, and determines plaintext data therein, that is, data to be processed.
In one example, the terminal device detects the clear state of the quantum key in the quantum key memory by using a quantum state detector, and the quantum decoder decodes plaintext data in the ciphertext data by using the random value of the clear state of the key.
203. And generating a ciphertext receipt according to the second quantum key and the data to be processed, and sending the ciphertext receipt to the server equipment, wherein the server equipment is further used for generating and feeding back an execution ciphertext instruction after the ciphertext receipt passes verification.
Illustratively, according to the second quantum key and the data to be processed, a ciphertext receipt is generated and fed back to the server device, wherein the server device is further configured to generate and feed back an execution ciphertext instruction after the ciphertext receipt passes verification.
In one example, the terminal device generates a key receipt based on plaintext data and a second key calculation by using a quantum entanglement verifier and a quantum ciphertext encryptor, and finally transmits the ciphertext receipt to the server by using a quantum ciphertext transmitter.
204. And receiving an execution ciphertext instruction, and executing an instruction corresponding to the data to be processed according to the execution ciphertext instruction.
Illustratively, after the ciphertext receipt passes the verification of the server device, an execution ciphertext instruction sent by the server device is received, and according to the execution ciphertext instruction, an instruction corresponding to the data to be processed is executed, for example, part of functions, switches and the like in the terminal device are turned on or off.
In summary, the data processing method provided in this embodiment includes the following steps: acquiring a second quantum key and receiving ciphertext data sent by the server equipment; according to the second quantum key, the ciphertext data is analyzed and processed, and data to be processed is determined; generating a ciphertext receipt according to the second quantum key and the data to be processed, and sending the ciphertext receipt to the server device; and receiving an execution ciphertext instruction, executing an instruction corresponding to the data to be processed according to the execution ciphertext instruction, and encrypting the data processing process based on the quantum entanglement pair which is not limited by the airspace, so that the safety of data transmission and processing is improved.
Fig. 3 is a schematic flowchart of another data processing method provided in an embodiment of the present application, and as shown in fig. 3, the method includes:
301. the server equipment acquires a first quantum key, analyzes the first quantum key and determines a random value of the first quantum key in a clear state; and the terminal equipment acquires the second quantum key, analyzes the second quantum key and determines the random value of the second quantum key in a clear state, wherein the first quantum key and the second quantum key are entangled quantum pairs.
Illustratively, the server device obtains the first quantum key, analyzes the first quantum key, and determines a random value of the first quantum key in a clear state; and the terminal equipment acquires the second quantum key, analyzes the second quantum key and determines the random value of the second quantum key in a clear state, wherein the first quantum key and the second quantum key are entangled quantum pairs.
In one example, the server device stores the obtained second quantum key in the quantum key storage server, and resolves a random value of the first quantum key in a clear state through the quantum state detection server; and the terminal equipment acquires and stores the second quantum key, and detects the random value of the quantum key in the quantum key storage in the clear state by using the quantum state detector.
302. And the server equipment performs quantum encryption processing on the data to be processed according to the random value and determines ciphertext data corresponding to the data to be processed.
Illustratively, the server device performs quantum encryption processing on the data to be processed according to the random value, and determines ciphertext data corresponding to the data to be processed.
In one example, the server device performs quantum encryption processing on the data to be processed according to the random value of the first quantum key in the clear state obtained by analysis and detection by using a quantum ciphertext encryptor, and determines ciphertext data corresponding to the data to be processed.
303. And the server equipment sends the ciphertext data to the terminal equipment.
Illustratively, the server device transmits ciphertext data obtained by the encryption processing to the terminal device.
304. And the terminal equipment receives the ciphertext data sent by the server equipment, analyzes and processes the ciphertext data according to the random value corresponding to the second quantum key, and determines to-be-processed data.
Illustratively, the terminal device receives ciphertext data sent by the server device, and analyzes the plaintext data in the ciphertext data, that is, to-be-processed data, by using a random value corresponding to a second quantum key based on a quantum decoder, where the first key and the second key are a quantum secret pair in the same quantum entangled state, and thus may decrypt each other.
305. And the terminal equipment encrypts the data to be processed according to the random value of the second quantum key in the clear state to generate a ciphertext receipt.
Illustratively, the terminal device encrypts the data to be processed according to the random value of the second quantum key in the clear state, and generates a ciphertext receipt.
In one example, the terminal device calculates and generates the ciphertext receipt according to the content of the data to be processed and the random value of the second quantum key in the clear state by using the quantum entanglement verifier and the quantum ciphertext encryptor.
306. And sending the ciphertext receipt to the server equipment, wherein the server equipment is also used for generating and feeding back an execution ciphertext instruction after the ciphertext receipt passes verification.
Illustratively, a ciphertext receipt is sent to the server device, which in turn may cause the server device to execute the ciphertext instruction according to the ciphertext receipt feedback.
In one example, the terminal device sends a ciphertext receipt to the server using a quantum ciphertext sender.
307. And the server equipment receives the ciphertext receipt fed back by the terminal equipment.
Illustratively, the server device receives a ciphertext receipt fed back by the terminal device root, wherein the ciphertext receipt is generated by the terminal device based on the received ciphertext data.
308. And the server equipment analyzes the ciphertext receipt and determines data receipt information corresponding to the data to be processed and key receipt information corresponding to the second quantum key.
Illustratively, the ciphertext receipt comprises two parts of encrypted receipt information, and the server device analyzes the ciphertext receipt and determines data receipt information corresponding to the data to be processed and key receipt information corresponding to the second quantum key.
In one example, the server device resolves the plaintext receipt verification code and the quantum key receipt verification code in the ciphertext receipt, i.e. the data receipt information and the key receipt information, from the random value of the first key in the clear state by using the quantum decoding server.
309. And the server equipment carries out verification processing on the data receipt information and the key receipt information and determines a verification result.
In one example, step 309 includes the steps of:
and verifying the data receipt information based on the data information of the data to be processed, and verifying the key receipt information based on the quantum entanglement verification module, wherein the data information comprises the data size, the data type and the data content of the data to be processed.
And if the data receipt information and the key receipt information are confirmed to pass the verification, the verification result is that the verification is passed.
And if the data receipt information is determined to pass the verification, the key receipt information is not verified, or the data receipt information is not verified, the key receipt information is verified, and the verification result is verification failure.
Exemplarily, the data receipt information is verified based on the data information of the data to be processed, and the key receipt information is verified based on the quantum entanglement verification module, wherein the data information includes the data size, the data type and the data content of the data to be processed; if the data receipt information and the key receipt information are confirmed to pass the verification, the verification result is that the verification is passed; if the data receipt information is determined to pass the verification, the key receipt information is not verified, or the data receipt information is not verified, the key receipt information is verified, and the verification result is that the verification fails, wherein if the data receipt information is not verified, the data size, the data type and the data content of the data to be processed are not in accordance with the original data; if the key receipt information is not verified, it is indicated that an entangled state between the first quantum key and the second quantum key has a problem.
In one example, the server device verifies the quantum key receipt verification code obtained by analyzing the ciphertext receipt by using the quantum entanglement verification server, verifies the plaintext receipt verification code obtained by analyzing the ciphertext receipt by using the device control center, and determines the verification result.
310. And if the verification result represents that the receipt information passes the verification, the server equipment sends an execution ciphertext instruction to the terminal equipment so as to instruct the terminal equipment to execute the instruction corresponding to the data to be processed.
For example, this step is referred to as step 104, and is not described again.
311. And the terminal equipment receives and analyzes the execution ciphertext instruction, and controls the corresponding execution module to execute the instruction corresponding to the data to be processed according to the analyzed execution ciphertext instruction.
Illustratively, after the ciphertext receipt is verified by the server device, an execution ciphertext instruction sent by the server device is received, and the execution ciphertext instruction is analyzed by the quantum decryptor to determine the validity of the execution ciphertext instruction, so as to control the corresponding execution module to execute an instruction corresponding to the data to be processed, for example, to turn on or turn off a part of functions, switches and the like in the terminal device.
In summary, the data processing method provided in this embodiment includes the following steps: distributing the quantum secret pair to server equipment and terminal equipment, and encrypting the data to be processed by the server equipment according to a first quantum key in the quantum secret pair to determine ciphertext data corresponding to the data to be processed; sending ciphertext data to the terminal equipment, analyzing the ciphertext data and generating a corresponding ciphertext receipt by the terminal equipment according to a second quantum key in the quantum key pair, receiving and analyzing the ciphertext receipt fed back by the terminal equipment by the server equipment, determining receipt information, performing verification processing on the receipt information, and determining a verification result; if the verification result represents that the receipt information passes verification, an execution ciphertext instruction is sent to the terminal equipment to indicate the terminal equipment to execute an instruction corresponding to the data to be processed, the process encrypts the data by using quantum entanglement which is not influenced by distance to form a quantum ciphertext for transmission, and the safety and the attack resistance of data communication are improved.
One or more embodiments of the present application may further include:
and if the server equipment determines that the data receipt information passes the verification and the key receipt information does not pass the verification, the server equipment acquires a new first quantum key, the terminal equipment acquires a new second quantum key, and the data to be processed is processed based on the new first quantum key and the new second quantum key.
And if the server equipment determines that the data receipt information is not verified and the key receipt information is verified, the server equipment acquires the data to be processed again and performs data processing based on the acquired data to be processed.
Exemplarily, if the server device determines that the data receipt information passes the verification and the key receipt information does not pass the verification, it indicates that the entanglement state between the first quantum key and the second quantum key has a problem, so that a new quantum secret pair is issued to the server device and the terminal device again, that is, the server device acquires the new first quantum key, the terminal device acquires the new second quantum key, and performs data processing on the data to be processed based on the new first quantum key and the new second quantum key; if the server device determines that the data receipt information is not verified, it indicates that the data size, the data type and the data content of the data to be processed do not conform to the original data, that is, the data is incomplete or wrong, the server device re-acquires the data to be processed, and performs data processing based on the re-acquired data to be processed.
Fig. 4 is a schematic structural diagram of a data processing apparatus provided in an embodiment of the present application, where the apparatus is applied to a server device, and as shown in fig. 4, the apparatus includes:
the first processing unit 41 is configured to obtain a first quantum key, encrypt data to be processed according to the first quantum key, and determine ciphertext data corresponding to the data to be processed.
And a second processing unit 42, configured to send the ciphertext data to the terminal device, and receive a ciphertext receipt fed back by the terminal device, where the terminal device is configured to parse the ciphertext data according to a second quantum key and feed back the ciphertext receipt, and the first quantum key and the second quantum key are entangled quantum pairs.
And a third processing unit 43, configured to parse the ciphertext receipt, determine receipt information, perform verification processing on the receipt information, and determine a verification result.
And the sending unit 44 is configured to send an execution ciphertext instruction to the terminal device if the verification result indicates that the receipt information passes the verification, so as to instruct the terminal device to execute an instruction corresponding to the to-be-processed data.
In one example, the third processing unit 43 includes:
and the first analysis subunit is used for analyzing the ciphertext receipt and determining data receipt information corresponding to the data to be processed and key receipt information corresponding to the second quantum key.
And the verification subunit is used for performing verification processing on the data receipt information and the key receipt information and determining a verification result.
In one example, the verification subunit is specifically configured to:
and verifying the data receipt information based on the data information of the data to be processed, and verifying the key receipt information based on the quantum entanglement verification module, wherein the data information comprises the data size, the data type and the data content of the data to be processed.
And if the data receipt information and the key receipt information are confirmed to pass the verification, the verification result is that the verification is passed.
And if the data receipt information is determined to pass the verification, the key receipt information is not verified, or the data receipt information is not verified, the key receipt information is verified, and the verification result is verification failure.
In one example, the apparatus further comprises:
and the first obtaining unit is used for obtaining a new first quantum key if the data receipt information is verified and the key receipt information is not verified, and performing data processing on the data to be processed based on the new first quantum key.
And the second acquisition unit is used for acquiring the data to be processed again and processing the data based on the acquired data to be processed if the data receipt information is determined not to pass the verification and the key receipt information passes the verification.
In one example, the first processing unit 41 includes:
and the second analysis subunit is used for analyzing the first quantum key and determining the random value of the first quantum key in the clear state.
And the encryption subunit is used for performing quantum encryption processing on the data to be processed according to the random value and determining ciphertext data corresponding to the data to be processed.
Fig. 5 is a schematic structural diagram of another data processing apparatus provided in an embodiment of the present application, where the apparatus is applied to a terminal device, and as shown in fig. 5, the apparatus includes:
the first processing unit 51 is configured to obtain a second quantum key, and receive ciphertext data sent by a server device, where the server device is configured to encrypt data to be processed according to the first quantum key to generate and send ciphertext data corresponding to the data to be processed, and the first quantum key and the second quantum key are entangled quantum pairs.
And the determining unit 52 is configured to perform parsing processing on the ciphertext data according to the second quantum key, and determine to-be-processed data.
And the second processing unit 53 is configured to generate a ciphertext receipt according to the second quantum key and the data to be processed, and send the ciphertext receipt to the server device, where the server device is further configured to generate and feed back an execution ciphertext instruction after the ciphertext receipt passes verification.
And the execution unit 54 is configured to receive the execution ciphertext instruction, and execute the instruction corresponding to the data to be processed according to the execution ciphertext instruction.
In one example, the determining unit 52 includes:
and the first analysis subunit is used for analyzing the second quantum key and determining the random value of the second quantum key in the clear state.
And the second analysis subunit is used for analyzing the ciphertext data according to the random value corresponding to the second quantum key to determine the data to be processed.
In an example, the second processing unit 53 is specifically configured to:
and encrypting the data to be processed according to the random value of the second quantum key in the clear state to generate a ciphertext receipt, wherein the ciphertext receipt comprises data receipt information corresponding to the data to be processed and key receipt information corresponding to the second quantum key.
In one example, the apparatus further comprises:
and the obtaining unit is used for obtaining a new second quantum key if the key receipt information corresponding to the second quantum key is determined not to pass the verification of the server equipment, and performing data transmission processing on the data to be processed according to the new second quantum key.
In one example, the execution unit 54 is specifically configured to:
and receiving and analyzing the execution ciphertext instruction, and controlling the corresponding execution module to execute the instruction corresponding to the data to be processed according to the analyzed execution ciphertext instruction.
Fig. 6 is a schematic structural diagram of a server device according to an embodiment of the present application, and as shown in fig. 5, the server device includes: a memory 61, a processor 62;
a memory 61; a memory for storing instructions executable by the processor 62.
Wherein the processor 62 is configured to perform the method as provided in any of the embodiments above.
Fig. 7 is a schematic structural diagram of a terminal device according to an embodiment of the present application, and as shown in fig. 7, the terminal device includes: a memory 71, a processor 72;
a memory 71; a memory for storing instructions executable by processor 72.
Wherein the processor 72 is configured to perform the method as provided in any of the embodiments described above.
Fig. 8 is a block diagram of an electronic device, which may be a server device, a terminal device, a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like, according to an embodiment of the present application.
The apparatus 800 may include one or more of the following components: processing component 802, memory 804, power component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814, and communications component 816.
The processing component 802 generally controls overall operation of the device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 802 may include one or more processors 820 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interaction between the processing component 802 and other components. For example, the processing component 802 may include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operations at the apparatus 800. Examples of such data include instructions for any application or method operating on device 800, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power components 806 provide power to the various components of device 800. The power components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the apparatus 800.
The multimedia component 808 includes a screen that provides an output interface between the device 800 and the user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 800 is in an operation mode, such as a photographing mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the apparatus 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signal may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 814 includes one or more sensors for providing various aspects of state assessment for the device 800. For example, the sensor assembly 814 may detect the open/closed state of the device 800, the relative positioning of components, such as a display and keypad of the device 800, the sensor assembly 814 may also detect a change in position of the device 800 or a component of the device 800, the presence or absence of user contact with the device 800, the orientation or acceleration/deceleration of the device 800, and a change in temperature of the device 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate communications between the apparatus 800 and other devices in a wired or wireless manner. The device 800 may access a wireless network based on a communication standard, such as WiFi,2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 816 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, ultra Wideband (UWB) technology, bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors, or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 804 comprising instructions, executable by the processor 820 of the device 800 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
A non-transitory computer-readable storage medium, in which instructions, when executed by a processor of a terminal device, enable the terminal device to perform a split screen processing method of the terminal device.
The present application further provides a computer program product comprising: a computer program, stored in a readable storage medium, from which at least one processor of the electronic device can read the computer program, the at least one processor executing the computer program causing the electronic device to perform the solution provided by any of the embodiments described above.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (16)

1. A data processing method is applied to a server device, and the method comprises the following steps:
acquiring a first quantum key, encrypting data to be processed according to the first quantum key, and determining ciphertext data corresponding to the data to be processed;
sending the ciphertext data to a terminal device, and receiving a ciphertext receipt fed back by the terminal device, where the terminal device is configured to parse the ciphertext data according to a second quantum key and feed back the ciphertext receipt, and the first quantum key and the second quantum key are entangled quantum pairs;
analyzing the ciphertext receipt, determining receipt information, verifying the receipt information, and determining a verification result;
and if the verification result represents that the receipt information passes verification, sending an execution ciphertext instruction to the terminal equipment so as to instruct the terminal equipment to execute the instruction corresponding to the data to be processed.
2. The method of claim 1, wherein parsing the ciphertext receipt sent by the terminal device, determining receipt information, and performing verification processing on the receipt information to determine a verification result comprises:
analyzing the ciphertext receipt, and determining data receipt information corresponding to the data to be processed and key receipt information corresponding to the second quantum key;
and verifying the data receipt information and the key receipt information to determine a verification result.
3. The method of claim 2, wherein performing validation processing on the data receipt information and the key receipt information to determine a validation result comprises:
verifying the data receipt information based on the data information of the data to be processed, and verifying the key receipt information based on a quantum entanglement verification module, wherein the data information comprises the data size, the data type and the data content of the data to be processed;
if the data receipt information and the key receipt information are confirmed to pass the verification, the verification result is that the verification passes;
and if the data receipt information is determined to pass the verification, the key receipt information is not verified, or the data receipt information is not verified, the key receipt information is verified, and the verification result is verification failure.
4. The method of claim 3, further comprising:
if the data receipt information is verified, and the key receipt information is not verified, acquiring a new first quantum key, and performing data processing on the data to be processed based on the new first quantum key;
and if the data receipt information is determined not to pass the verification and the key receipt information passes the verification, re-acquiring the data to be processed, and performing data processing based on the re-acquired data to be processed.
5. The method according to any one of claims 1 to 4, wherein encrypting the data to be processed according to the quantum key, and determining ciphertext data corresponding to the data to be processed comprises:
analyzing the first quantum key, and determining a random value of the first quantum key in a clear state;
and performing quantum encryption processing on the data to be processed according to the random value, and determining ciphertext data corresponding to the data to be processed.
6. A data processing method is applied to a terminal device, and comprises the following steps:
acquiring a second quantum key, and receiving ciphertext data sent by server equipment, wherein the server equipment is used for encrypting data to be processed according to a first quantum key to generate and sending ciphertext data corresponding to the data to be processed, and the first quantum key and the second quantum key are entangled quantum pairs;
according to the second quantum key, analyzing the ciphertext data to determine the data to be processed;
generating a ciphertext receipt according to the second quantum key and the to-be-processed data, and sending the ciphertext receipt to the server device, wherein the server device is further configured to generate and feed back a ciphertext instruction after the ciphertext receipt passes verification;
and receiving the execution ciphertext instruction, and executing the instruction corresponding to the data to be processed according to the execution ciphertext instruction.
7. The method according to claim 6, wherein parsing the ciphertext data according to the second quantum key to determine the to-be-processed data comprises:
analyzing the second quantum key, and determining a random value of the second quantum key in a clear state;
and analyzing the ciphertext data according to the random value corresponding to the second quantum key, and determining the data to be processed.
8. The method of claim 7, wherein generating a ciphertext receipt from the second quantum key and the data to be processed comprises:
and encrypting the data to be processed according to the random value of the second quantum key in a clear state to generate the ciphertext receipt, wherein the ciphertext receipt comprises data receipt information corresponding to the data to be processed and key receipt information corresponding to the second quantum key.
9. The method of claim 8, further comprising:
and if the key receipt information corresponding to the second quantum key is determined not to pass the verification of the server device, acquiring a new second quantum key, and performing data transmission processing on the data to be processed according to the new second quantum key.
10. The method according to any one of claims 6 to 9, wherein receiving the execution ciphertext instruction and executing the instruction corresponding to the data to be processed according to the execution ciphertext instruction comprises:
and receiving and analyzing the execution ciphertext instruction, and controlling a corresponding execution module to execute the instruction corresponding to the data to be processed according to the analyzed execution ciphertext instruction.
11. A data processing apparatus, wherein the apparatus is applied to a server device, the apparatus comprising:
the first processing unit is used for acquiring a first quantum key, encrypting data to be processed according to the first quantum key and determining ciphertext data corresponding to the data to be processed;
the second processing unit is configured to send the ciphertext data to a terminal device, and receive a ciphertext receipt fed back by the terminal device, where the terminal device is configured to parse the ciphertext data according to a second quantum key and feed back the ciphertext receipt, and the first quantum key and the second quantum key are entangled quantum pairs;
the third processing unit is used for analyzing the ciphertext receipt, determining receipt information, verifying the receipt information and determining a verification result;
and the sending unit is used for sending an execution ciphertext instruction to the terminal equipment if the verification result indicates that the receipt information passes the verification so as to instruct the terminal equipment to execute the instruction corresponding to the data to be processed.
12. A data processing apparatus, wherein the apparatus is applied to a terminal device, and the apparatus comprises:
the system comprises a first processing unit, a second processing unit and a server device, wherein the first processing unit is used for acquiring a second quantum key and receiving ciphertext data sent by the server device, the server device is used for encrypting data to be processed according to a first quantum key to generate and send ciphertext data corresponding to the data to be processed, and the first quantum key and the second quantum key are entangled quantum pairs;
the determining unit is used for analyzing the ciphertext data according to the second quantum key to determine the data to be processed;
the second processing unit is used for generating a ciphertext receipt according to the second quantum key and the data to be processed, and sending the ciphertext receipt to the server device, wherein the server device is further used for generating and feeding back a ciphertext instruction after the ciphertext receipt passes verification;
and the execution unit is used for receiving the execution ciphertext instruction and executing the instruction corresponding to the data to be processed according to the execution ciphertext instruction.
13. A server device, comprising: a processor, a memory;
the memory is used for storing computer execution instructions;
the processor is configured to execute the memory-stored computer-executable instructions to implement the method of any of claims 1-5.
14. A terminal device, comprising: a processor, a memory;
the memory is used for storing computer execution instructions;
the processor is configured to execute the memory-stored computer-executable instructions to implement the method of any of claims 6-10.
15. A computer-readable storage medium having stored therein computer-executable instructions for performing the method of any one of claims 1-5 when executed by a processor, or for performing the method of any one of claims 6-10 when executed by a processor.
16. A computer program product, characterized in that it comprises a computer program which, when executed by a processor, implements the method of any one of claims 1-5, or which, when executed by a processor, implements the method of any one of claims 6-10.
CN202211505535.5A 2022-11-29 2022-11-29 Data processing method, device and equipment Pending CN115801250A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211505535.5A CN115801250A (en) 2022-11-29 2022-11-29 Data processing method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211505535.5A CN115801250A (en) 2022-11-29 2022-11-29 Data processing method, device and equipment

Publications (1)

Publication Number Publication Date
CN115801250A true CN115801250A (en) 2023-03-14

Family

ID=85442583

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211505535.5A Pending CN115801250A (en) 2022-11-29 2022-11-29 Data processing method, device and equipment

Country Status (1)

Country Link
CN (1) CN115801250A (en)

Similar Documents

Publication Publication Date Title
US9819652B2 (en) Information interaction methods and devices
CN109146470B (en) Method and device for generating payment code
KR101733599B1 (en) Method, apparatus, program, and recording medium for binding token key to account
CN104955031A (en) Information transmission method and device
CN104967511A (en) Processing method for enciphered data, and apparatus thereof
JP6163610B2 (en) Forgery prevention verification method, apparatus, program, and recording medium
CN106060098B (en) Processing method, processing unit and the processing system of identifying code
EP3182746A1 (en) Method and apparatus for transmitting routing information
KR20150135742A (en) Method and device for sending information in voice service
CN105281907A (en) Encrypted data processing method and apparatus
CN104980919B (en) The acquisition methods and equipment of information of network service
CN114221764A (en) Public key updating method, device and equipment based on block chain
CN113055169B (en) Data encryption method and device, electronic equipment and storage medium
CN112115464B (en) Unlocking processing method and device, electronic equipment and storage medium
CN105120452A (en) Information transmission method, device and system
CN114221788B (en) Login method, login device, electronic equipment and storage medium
CN107302519B (en) Identity authentication method and device for terminal equipment, terminal equipment and server
CN115801250A (en) Data processing method, device and equipment
CN109104361B (en) Instant messaging method, instant messaging device, electronic equipment and storage medium
CN113812103B (en) Management message frame transmission method, device and storage medium
CN110493186B (en) Function state adjusting method and device
CN116167065A (en) Data security encryption and security decryption method for ciphertext database
CN114139134A (en) Program upgrading method, device and equipment for terminal equipment
CN107318148B (en) Wireless local area network access information storage method and device
CN113595740A (en) Data transmission method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination