CN116595546A - Data encryption method, device, computer equipment and storage medium - Google Patents

Data encryption method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN116595546A
CN116595546A CN202310313276.4A CN202310313276A CN116595546A CN 116595546 A CN116595546 A CN 116595546A CN 202310313276 A CN202310313276 A CN 202310313276A CN 116595546 A CN116595546 A CN 116595546A
Authority
CN
China
Prior art keywords
target
encryption
data
encrypted
metadata
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310313276.4A
Other languages
Chinese (zh)
Inventor
侯东
徐明林
李微
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kingdee Deeking Cloud Computing Co ltd
Original Assignee
Kingdee Deeking Cloud Computing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kingdee Deeking Cloud Computing Co ltd filed Critical Kingdee Deeking Cloud Computing Co ltd
Priority to CN202310313276.4A priority Critical patent/CN116595546A/en
Publication of CN116595546A publication Critical patent/CN116595546A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/30Creation or generation of source code

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Fuzzy Systems (AREA)
  • Mathematical Physics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The application relates to a data encryption method, a data encryption device, computer equipment and a storage medium. The method comprises the following steps: reading metadata corresponding to the target service page to obtain target metadata; determining target data information corresponding to the target service page based on the target metadata; acquiring a target encryption type corresponding to the target data information, and determining data to be encrypted from the target data information based on the target encryption type; based on the target encryption type, reading a target encryption rule corresponding to the target encryption type from a unified configuration area; encrypting the data to be encrypted based on the target encryption rule to generate target encrypted data. By adopting the method, the development efficiency can be improved.

Description

Data encryption method, device, computer equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a data encryption method, apparatus, computer device, and storage medium.
Background
With the continuous development of computer technology, a data encryption technology appears, and privacy information of privacy data is further protected by performing encryption processing on the privacy data.
However, in the conventional technology, encryption display of fields on a page is realized through configuration, the configuration is loaded to a memory when a service is started, and encryption processing is performed on data in a directed manner aiming at the configured page and fields, so that the number of times of matching the page and the fields with the configuration is excessive, and the development efficiency is low.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a data encryption method, apparatus, computer device, and storage medium that enable efficient data encryption, improving development efficiency.
A method of data encryption, the method comprising:
reading metadata corresponding to the target service page to obtain target metadata;
determining target data information corresponding to the target service page based on the target metadata;
acquiring a target encryption type corresponding to the target data information, and determining data to be encrypted from the target data information based on the target encryption type;
based on the target encryption type, reading a target encryption rule corresponding to the target encryption type from a unified configuration area;
encrypting the data to be encrypted based on the target encryption rule to generate target encrypted data.
In one embodiment, reading metadata corresponding to a target service page, and obtaining target metadata includes:
sequentially inquiring the storage areas until the metadata corresponding to the target service page is inquired, wherein the metadata is used as target metadata;
the determining, based on the target metadata, target data information corresponding to the target service page includes:
and acquiring target data information corresponding to the target service page from the storage area of the target metadata.
In one embodiment, the plurality of storage areas sequentially include a local cache area, a distributed cache area and a database, or the plurality of storage areas sequentially include a local cache area and a database, or the plurality of storage areas sequentially include a distributed cache area and a database.
In one embodiment, the unified configuration area includes a distributed cache area and a configuration center area; based on the target encryption type, reading a target encryption rule corresponding to the target encryption type from a unified configuration area, wherein the target encryption rule comprises the following steps:
inquiring the target encryption type from the distributed cache area to obtain a distributed rule inquiry result;
And when the distribution rule query result indicates that the target encryption type exists, reading a target encryption rule corresponding to the target encryption type from the distribution cache area based on the target encryption type.
In one embodiment, the unified configuration area includes a distributed cache area and a configuration center area; based on the target encryption type, reading a target encryption rule corresponding to the target encryption type from a unified configuration area, and further comprising:
when the distribution rule query result is that the target encryption type does not exist, querying the target encryption type from a target unified configuration file corresponding to the configuration center area to obtain a configuration rule query result;
and reading the target encryption rule corresponding to the target encryption type from the target unified configuration file based on the configuration rule query result, wherein the encryption rule stored in the target unified configuration file is applicable to at least two different services.
In one embodiment, the data to be encrypted is a data set of each character string to be encrypted corresponding to the target encryption type, and the target encrypted data is a data set of each character string to be encrypted corresponding to the target encryption type; encrypting the data to be encrypted based on the target encryption rule to generate target encrypted data, including:
Acquiring a forward display number and an end display number based on the target encryption rule;
calculating a target total length corresponding to the character string to be encrypted, determining an encryption starting position based on the forward display number, and determining an encryption end position based on the target total length and the end display number;
and sequentially reading the current character corresponding to the character string to be encrypted from the encryption starting position, replacing the current character with encryption coincidence until the position of the current character is equal to the encryption ending position, and obtaining the target encryption character string corresponding to the character string to be encrypted.
In one embodiment, the method further comprises:
acquiring a preset encryption type corresponding to a development service page, and inquiring the preset encryption type from a database based on the preset encryption type to obtain a preset type inquiring result;
acquiring preset metadata corresponding to the development service page, and storing the preset metadata to obtain a storage result;
and generating a preset result notification based on the preset type query result and the storage result.
A data encryption device, the device comprising:
the metadata reading module is used for reading metadata corresponding to the target service page to obtain target metadata;
The data determining module is used for determining target data information corresponding to the target service page based on the target metadata;
the encrypted data acquisition module is used for acquiring a target encryption type corresponding to the target data information, and determining data to be encrypted from the target data information based on the target encryption type;
the rule determining module is used for reading a target encryption rule corresponding to the target encryption type from the unified configuration area based on the target encryption type;
and the encryption module is used for encrypting the data to be encrypted based on the target encryption rule to generate target encrypted data.
A computer device comprising a memory storing a computer program and a processor which when executing the computer program performs the steps of:
reading metadata corresponding to the target service page to obtain target metadata;
determining target data information corresponding to the target service page based on the target metadata;
acquiring a target encryption type corresponding to the target data information, and determining data to be encrypted from the target data information based on the target encryption type;
Based on the target encryption type, reading a target encryption rule corresponding to the target encryption type from a unified configuration area;
encrypting the data to be encrypted based on the target encryption rule to generate target encrypted data.
A computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
reading metadata corresponding to the target service page to obtain target metadata;
determining target data information corresponding to the target service page based on the target metadata;
acquiring a target encryption type corresponding to the target data information, and determining data to be encrypted from the target data information based on the target encryption type;
based on the target encryption type, reading a target encryption rule corresponding to the target encryption type from a unified configuration area;
encrypting the data to be encrypted based on the target encryption rule to generate target encrypted data.
According to the data encryption method, the data encryption device, the computer equipment and the storage medium, the target metadata are obtained by reading the metadata corresponding to the target service page; determining target data information corresponding to the target service page based on the target metadata; acquiring a target encryption type corresponding to the target data information, and determining data to be encrypted from the target data information based on the target encryption type; based on the target encryption type, reading a target encryption rule corresponding to the target encryption type from a unified configuration area; encrypting the data to be encrypted based on the target encryption rule to generate target encrypted data. The target metadata corresponding to the target service page is read, the target data information corresponding to the target service page is determined based on the target metadata, the target encryption type is further obtained, the data to be encrypted is determined from the target data information based on the target encryption type, the target encryption type corresponding to the target encryption type is read from the unified configuration area, the data to be encrypted is finally encrypted based on the target encryption type to obtain the corresponding target encryption data, the matching times of the page field and the configuration are greatly reduced, the matching of the target encryption type and the configuration is realized to replace the matching of multiple encryption fields and the configuration, and therefore development efficiency is greatly improved.
Drawings
FIG. 1 is an application environment diagram of a data encryption method in one embodiment;
FIG. 2 is a flow chart of a data encryption method in one embodiment;
FIG. 3 is a flow diagram of metadata parsing in one embodiment;
FIG. 4 is a flow diagram of encryption rule reading in one embodiment;
FIG. 5 is a flow chart of encryption rule reading in another embodiment;
FIG. 6 is a flow diagram of data encryption in one embodiment;
FIG. 7 is a flow chart of data presettings in one embodiment;
FIG. 8 is a general flow diagram of data encryption in one embodiment;
FIG. 9 is a timing diagram of development stage data presettings in one embodiment;
FIG. 10 is a flow diagram of data encryption in one embodiment;
FIG. 11 is a schematic diagram of a selection interface in one embodiment;
FIG. 12 is a schematic diagram of an encrypted data display interface in one embodiment;
FIG. 13 is a block diagram showing the structure of a data encryption device in one embodiment;
FIG. 14 is an internal block diagram of a computer device in one embodiment;
fig. 15 is an internal structural view of a computer device in one embodiment.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
The data encryption method provided by the embodiment of the application can be applied to an application environment shown in figure 1. Wherein the terminal 102 communicates with the server 104 via a network. The data storage system may store data that the server 104 needs to process. The data storage system may be integrated on the server 104 or may be located on a cloud or other network server. The terminal 102 is configured to input and display information related to the execution process, and receive notification data related thereto. The server 104 is configured to read metadata corresponding to a target service page to obtain target metadata; determining target data information corresponding to a target service page based on the target metadata; acquiring a target encryption type corresponding to target data information, and determining data to be encrypted from the target data information based on the target encryption type; based on the target encryption type, reading a target encryption rule corresponding to the target encryption type from the unified configuration area; encrypting the data to be encrypted based on the target encryption rule to generate target encrypted data. The terminal 102 may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, internet of things devices, and portable wearable devices. The server 104 may be implemented as a stand-alone server or as a server cluster of multiple servers.
In one embodiment, as shown in fig. 2, a data encryption method is provided, and the method is applied to the server in fig. 1 for illustration, and includes the following steps:
step S200, reading metadata corresponding to the target service page to obtain target metadata.
The target service page refers to a page displayed by the currently logged-in micro service. Metadata is information about the organization of data, the data fields and their relationships, and may be data about data or data describing data. The target metadata refers to corresponding metadata in the target service page.
Specifically, the user can log in to the corresponding micro-service based on the browser, the pages corresponding to different micro-services all have the unique identification corresponding to the micro-service, and the user can log in a plurality of micro-services at the same time, and the corresponding service page is determined according to the unique identification corresponding to the page. After a user enters a target service page, reading metadata of the target service page to obtain target metadata corresponding to the target service page, wherein the target metadata describe data information in the target service page and are used for acquiring the data information corresponding to the target service page from a corresponding storage area through analyzing the target metadata.
Step S202, determining target data information corresponding to the target service page based on the target metadata.
The target data information refers to data for rendering on the target service page, and may be all data information to be displayed on the target service page.
Specifically, the target metadata can be queried in the corresponding storage area according to the target metadata having description effect on the data information corresponding to the target service page, and then the data information corresponding to the target service page is read in the corresponding storage area according to the target metadata. The storage area may be a local cache, a distributed cache area, or a database.
Step S204, a target encryption type corresponding to the target data information is obtained, and the data to be encrypted is determined from the target data information based on the target encryption type.
The target encryption type refers to the data type needing encryption, and can be a mobile phone number, an identity card number, a bank card number and the like. The data to be encrypted refers to the data to be encrypted, and can be the data corresponding to the mobile phone number, the data corresponding to the identity card, the data corresponding to the bank card and the like.
Specifically, after the corresponding target encryption type is selected in the target service page, data consistent with the target encryption type can be determined from the target data information according to the target encryption type, for example, the target encryption type is a mobile phone number, then data each of which is the mobile phone number type can be determined from the target data information, the data set is used as data to be encrypted, the data to be encrypted needs to be encrypted according to an encryption rule corresponding to the target encryption type, and then the encrypted data is displayed on the corresponding target service page.
Step S206, based on the target encryption type, reading the target encryption rule corresponding to the target encryption type from the unified configuration area.
The unified configuration area refers to an area for caching encryption rules, and may be a distributed buffer area, or may be a configuration file of a configuration center, which may be a zookeeper. The target encryption rule refers to an encryption algorithm for encrypting data, which can be an algorithm commonly used for encrypting a mobile phone number, an identity card, a bank card and the like, and can also be an algorithm for performing dynamic desensitization, for example, the common encryption algorithm for the mobile phone only displays the first 3 bits and the last 4 bits, and the rest is replaced by the first 3 bits, that is, the mobile phone number 13012345678 is encrypted and then becomes 130 times 5678 when the privacy data is protected; for another example, the dynamic desensitizing algorithm may only display the last 4 digits of the phone number, which becomes a more protective phone number 5678.
Specifically, in order to improve the response speed of the system, each request sent by the front end is prevented from being inquired by a connection configuration center, an intermediate caching scheme is designed for the purpose, and encryption rules are cached in a distributed buffer area in a distributed caching mode, so that the corresponding reading caching efficiency is improved. When the target encryption rule corresponding to the target encryption type needs to be read, the corresponding cache area is searched according to the read cache speeds corresponding to different areas in the unified configuration area, and when the rule corresponding to the target encryption type does not exist in the area with the higher read speed, the target encryption rule is read in the configuration center with the relatively lower read cache speed.
Step S208, encrypting the data to be encrypted based on the target encryption rule, and generating target encrypted data.
Wherein the target encrypted data refers to the data after having been encrypted.
Specifically, after the corresponding target encryption rule is read, the data to be encrypted is encrypted according to the encryption mode corresponding to the target encryption rule, and the different types of the corresponding target encryption rule can flexibly meet the encryption requirements in various scenes, so that the application dynamics of the algorithm are realized. In addition, after the target encryption data is generated by encrypting the data to be encrypted according to the encryption mode corresponding to the target encryption rule, the target encryption data can be sent to the corresponding terminal so as to realize the display of the encrypted data.
According to the data encryption method, the target service page identification is obtained, the target service page is determined based on the target service page identification, and metadata corresponding to the target service page are read to obtain target metadata; determining target data information corresponding to a target service page based on the target metadata; acquiring a target encryption type corresponding to target data information, and determining data to be encrypted from the target data information based on the target encryption type; based on the target encryption type, reading a target encryption rule corresponding to the target encryption type from the unified configuration area; the target encryption rule is based on encrypting the data to be encrypted to generate target encrypted data, so that the matching times of the page field and the configuration are greatly reduced, the matching of the target encryption type and the configuration is realized to replace the matching of multiple encryption fields and the configuration, and the development efficiency is greatly improved.
In one embodiment, as shown in fig. 3, step S200 includes:
step S300, sequentially inquiring the storage areas until the metadata corresponding to the target service page is inquired, wherein the metadata is used as target metadata.
The storage area refers to an area for storing data, and can be a local cache, a distributed cache area and a database. Local cache refers to memory based on the local environment. The distributed buffer area refers to a storage area for storing data in a distributed cache manner, and may be a dis distributed cache. The distributed cache refers to storing some hot data to a position close to a user and close to an application under a distributed environment or a system, and storing the hot data to faster equipment as much as possible to reduce delay of remote data transmission, and belongs to one of caches in computer applications, which is generally stored in a memory, so that the user or the application does not need to be in a magnetic disk to acquire corresponding data, and the access speed is greatly improved. A database is a repository that organizes, stores and manages data according to a data structure, and is a collection of large amounts of data stored in a computer for a long period of time, organized, sharable, and uniformly managed.
Specifically, according to the characteristics of data access speed priority and the like of the less storage area, the data related to the service page can be stored in different areas, so that the effects of caching data access request response and improving access efficiency are achieved. The local cache access speed is very high, and for some data with low change frequency and low real-time requirement, the data can be placed in the local cache to improve the access speed; in addition, the local cache can reduce data interaction with remote distributed caches such as Redis, so that network I/O overhead is reduced, and time consumption in network communication in the data access process is reduced. Second, the distributed cache area stores a larger amount of data than the local cache and is closer to the user and application, reducing the delay in remote data transfer, as compared to accessing data from the database. Therefore, in order to improve the reading efficiency of the cached data in the execution process and improve the corresponding execution efficiency, the corresponding data in the target service page can be stored into the local cache and the distributed buffer according to the characteristic of the data access priority of the local cache and the distributed buffer, and when the corresponding data needs to be read, whether the data exist in the local cache and the distributed buffer can be inquired successively, so that the effects of reducing the reading pressure of the database and improving the data reading efficiency are achieved.
Step S202 includes: step S302, obtaining target data information corresponding to a target service page from the storage area of the queried target metadata.
Specifically, the storage area of the target metadata can be queried to store target data information of the target service page, the target data information of the corresponding target service page can be determined in the storage area based on the target metadata, and the target data information contains data to be encrypted so as to prepare data for a subsequent process.
In this embodiment, by sequentially querying a plurality of storage areas until metadata corresponding to a target service page is queried, taking the metadata as target metadata, acquiring target data information corresponding to the target service page from the storage area queried for the target metadata, the characteristics of response speed priorities corresponding to the analysis of metadata by different storage areas are better applied, the quick access of the local cache and the distributed cache to data and the difference of data storage are better applied, the problem caused by excessive database access requests is better buffered, and the response speed of the system is further accelerated.
In one embodiment, the plurality of storage areas sequentially comprise a local cache area, a distributed cache area and a database, or the plurality of storage areas sequentially comprise a local cache area and a database, or the plurality of storage areas sequentially comprise a distributed cache area and a database.
In one embodiment, as shown in fig. 4, step S206 includes:
step S400, inquiring the target encryption type from the distributed cache area to obtain a distributed rule inquiring result.
Wherein, the distribution rule query result refers to the result of querying the target encryption type in the distributed buffer.
Specifically, the encryption rules corresponding to various encryption types may be cached in the distributed buffer area, so as to improve the response speed of the system, and when the encryption rules corresponding to the target encryption type cached in the distributed buffer area are not invalid, the target encryption type can be queried; when the encryption rule corresponding to the cached target encryption type is invalid, the query area is converted, and a corresponding distribution rule query result is generated based on different query conditions so as to provide a judgment basis for the execution of the subsequent process.
Step S402, when the distribution rule query result is that the target encryption type exists, reading the target encryption rule corresponding to the target encryption type from the distribution cache area based on the target encryption type.
Specifically, when the target encryption type and the encryption rule corresponding to the target encryption type cached in the distributed cache area are not invalid, determining the encryption rule corresponding to the target encryption type in the distributed cache area according to the target encryption type, and taking the encryption as the target encryption rule, wherein the target encryption rule can be a common encryption algorithm or a dynamic encryption algorithm for setting various different data display positions according to own requirements.
In this embodiment, a distribution rule query result is obtained by querying a target encryption type from a distributed cache region, and when the distribution rule query result is that the target encryption type exists, based on the target encryption type, a target encryption rule corresponding to the target encryption type is read from the distributed cache region, and the characteristic that the stored data in the distributed cache is close to the application is utilized, so that the access speed to the target encryption rule is greatly improved.
In one embodiment, as shown in fig. 5, step S206 further includes:
and S500, when the distribution rule query result is that the target encryption type does not exist, querying the target encryption type from the target unified configuration file corresponding to the configuration center area to obtain the configuration rule query result.
The target unified configuration file refers to a configuration file for storing encryption rules or encryption modes corresponding to different encryption types, and the target unified configuration file is commonly relied on by the business corresponding to each micro-service. The configuration rule query result refers to a result obtained by querying the target encryption type in the target unified configuration file.
Specifically, when the target encryption type does not exist in the distributed buffer, it is indicated that the target encryption type does not exist in the distributed buffer or the cache of the target encryption type in the distributed buffer fails, and at this time, the configuration center needs to be transferred to read the target encryption rule corresponding to the target encryption type. The configuration center can be a zookeeper distributed configuration center, encryption rules corresponding to various encryption types are preset in a target unified configuration file of the configuration center, inquiry can be carried out in the target unified configuration file in a target encryption mode, and a corresponding configuration rule inquiry result is generated so as to provide inquiry judgment basis for a subsequent process.
Step S502, based on the configuration rule query result, reading the target encryption rule corresponding to the target encryption type from the target unified configuration file, wherein the encryption rule stored in the target unified configuration file is applicable to at least two different services.
Specifically, when the configuration rule query result indicates that the target encryption type exists, the preset target encryption mode can be read from the target unified configuration file according to the target encryption mode. In addition, the encryption rule stored in the target unified configuration file can be suitable for a plurality of different services, compared with the situation that different services correspond to different configuration files in the prior art, all services are guaranteed to be in synchronous effect when configuration is changed, the configuration files corresponding to each service are not required to be modified, efficient multiplexing of configuration is achieved, workload of operation and maintenance personnel for modifying a configuration center is reduced to a large extent, the problem that errors are easy to occur when multiple groups of configuration are simultaneously modified is avoided, and development efficiency is improved.
In one embodiment, the encryption rule stored in the target unified configuration file is also applicable to a service, and when only one service depends on the target configuration file, the configuration of the encryption type corresponding to the service and the encryption rule in the target unified configuration file can be realized.
In this embodiment, when the distribution rule query result indicates that the target encryption type does not exist, the target encryption type is queried from the target unified configuration file corresponding to the configuration center area, so as to obtain the configuration rule query result, and based on the configuration rule query result, the target encryption rule corresponding to the target encryption type is read from the target unified configuration file, and the encryption rule stored in the target unified configuration file is applicable to different services to implement configuration of the encryption type and the encryption rule, so that the matching times with the configuration are reduced to a greater extent, the corresponding execution efficiency is improved, and various micro services rely on the same configuration file, the multiplexing rate of the configuration is improved, and the development efficiency is further improved.
In one embodiment, as shown in fig. 6, step S208 includes:
step S600, based on the target encryption rule, the forward display number and the end display number are acquired.
The forward display number refers to the number of the first display data or characters, that is, the number of the first unencrypted data or characters.
Specifically, in addition to presetting a commonly used encryption algorithm/rule, an encryption rule that can be dynamically changed is preset. A pair of parameters start (forward display number) and end (end display number), in the format of (start, end), representing the plaintext display of the front start bit and the rear end bit, and the remaining encrypted display, may be maintained according to the configuration center. For example, the parameters maintained by the mobile phone number are (3, 4), which means that only the first 3 bits and the last 4 bits are displayed, the remaining encryption display is 130 x 5678, and if the parameters are changed to (0, 4), the corresponding effect is 5678.
Step S602, calculating a target total length corresponding to the character string to be encrypted, determining an encryption starting position based on the forward display number, and determining an encryption end position based on the target total length and the end display number.
The character string to be encrypted refers to each character string to be encrypted in the data to be encrypted, and the character string to be encrypted can be, but is not limited to, different mobile phone number character strings, different identity card character strings, different bank card character strings and the like. The target total length refers to the number of characters in the character string to be encrypted. The encryption start position refers to a position corresponding to a first encrypted character in the characters to be encrypted. The encrypted end position refers to the position corresponding to the last encrypted character, and can be obtained by subtracting the end display number from the target total length.
Specifically, the number and the positions of characters displayed in the clear under different conditions are dynamically realized according to actual needs by determining the positions corresponding to the first encrypted character and the positions corresponding to the last encrypted character. In general code writing, 0 may be used as the first subscript position of the character string, and in this embodiment, 1 may be used as the first subscript position of the character string, and the corresponding encryption start position and encryption end position are just the corresponding subscript positions in the character string to be encrypted.
Step S604, reading the current character corresponding to the character string to be encrypted in sequence from the encryption starting position, replacing the current character with encryption until the position of the current character is equal to the encryption ending position, and obtaining the target encryption character string corresponding to the character string to be encrypted.
The encrypted symbol refers to a symbol used to replace the original character, and may be. The target encrypted character string refers to a character string obtained by performing plaintext display on a number of characters corresponding to a forward display number at the beginning and a number of characters corresponding to an end display number at the end in the character string to be encrypted, and replacing the remaining characters with encrypted symbols, for example, the character string to be encrypted is a mobile phone number 13012345678, the forward display number is 2, the end display number is 3, and the corresponding target encrypted character is 13×678.
Specifically, the starting position of encryption can be used as the subscript position corresponding to the character currently read by the character string to be encrypted, then the currently read character is replaced by an encryption symbol to realize the encryption of the character at the position, then the next character is sequentially read, the same encryption symbol is applied to the next character for replacement until the position of the read current character is equal to the end position of encryption, which indicates that the encryption of the character to be encrypted of the character string to be encrypted is realized at the moment, and the characters corresponding to other positions are directly displayed in the clear. In addition, the existing algorithm can only replace the fixed-length characters in the field with encrypted symbols (which may be) such as the mobile phone number can only process the 4 th-7 th characters 130 x 5678, and the dynamic encryption algorithm of this embodiment can implement the replacement of the characters with any length according to the forward display number and the end display number of different groups, for example, 130 x 8 or 130 x 45678, and the bank card and the identity card also support the replacement of the characters with any length.
In this embodiment, the target total length corresponding to the character string to be encrypted is calculated by acquiring the forward display number and the end display number based on the target encryption rule, determining the encryption starting position based on the forward display number, determining the encryption end position based on the target total length and the end display number, sequentially reading the current character corresponding to the character string to be encrypted from the encryption starting position, replacing the current character with encryption until the position of the current character is equal to the encryption end position, and obtaining the target encryption character string corresponding to the character string to be encrypted, thereby realizing a dynamic encryption algorithm, enabling the number of data displayed in plaintext to be selectively set.
In one embodiment, as shown in fig. 7, further comprising:
step S700, obtaining a preset encryption type corresponding to the development service page, and inquiring the preset encryption type from the database based on the preset encryption type to obtain a preset type inquiring result.
The development service page refers to a service page designed by a technician in a development stage. The preset encryption type refers to the type corresponding to various encryption modes, and can be a mobile phone number, an identity card, a bank card and the like. The preset type query result refers to a result for indicating whether the encryption mode corresponding to the encryption type is preset successfully.
Specifically, in the development stage, a technician may open an encryption key corresponding to the development service page, so as to detect whether the corresponding encryption type and the preset of the corresponding encryption mode are completed in the development stage. At this stage, software technicians can choose to develop preset encryption types in the service page, and then the background server queries the preset encryption types in the database according to the preset encryption types so as to return corresponding encryption modes and generate corresponding query results of the preset types. In this embodiment, when the preset encryption type is queried, the system returns a preset encryption mode, where the preset encryption mode may be a preset mobile phone number encryption mode: the front 3 bits and the rear 4 bits are displayed in plaintext, and the other signs are displayed; preset identity card encryption mode: the front 6 bits and the rear 4 bits are displayed in plaintext, and the other signs are displayed; preset bank card number encryption mode: the last 4 bits are shown in plain text, others are shown.
Step S702, obtaining preset metadata corresponding to the development service page, and storing the preset metadata to obtain a storage result.
Wherein the preset metadata refers to metadata required for designing and developing a service page. The save result refers to whether the preset metadata is successfully saved.
Specifically, in order to formally issue the product corresponding to the development service page to the generation environment later, the user can normally apply the service function corresponding to the product, the preset metadata corresponding to the development service page can be stored, the stored storage area can be a local cache, a distributed cache and a database, the user can be facilitated to improve the corresponding data access efficiency when applying the service through the different characteristics of data access speeds, storage data quantity and the like corresponding to different storage areas, and after the preset metadata corresponding to the development service page is successfully stored, a storage result containing whether the storage is successful or not can be generated.
Step S704, generating a preset result notification based on the preset type query result and the storage result.
Wherein the preset result notification refers to a prompt notification for providing technicians with whether the data preset is successful or not.
Specifically, after the inquiry of preset encryption and the preservation of preset metadata are completed in the development stage, a preset result notification containing information about whether the operation is successful or not is generated, the preset result notification can be sent to a target terminal corresponding to the development service page, and the information corresponding to the preset result notification is displayed by the target terminal and is checked by a technician to know that the corresponding operation is completed. If a problem occurs in the corresponding operation process, the preset result notification also contains problem information, so that a technician can solve the corresponding problem according to the problem information.
In this embodiment, the preset encryption type corresponding to the development service page is obtained, the preset encryption type is queried from the database based on the preset encryption type, a preset type query result is obtained, preset metadata corresponding to the development service page is obtained, the preset metadata is stored, a storage result is obtained, and a preset result notification is generated based on the preset type query result and the storage result, so that the query of the encryption mode in the development stage and the storage of the preset metadata are realized, and the access speed of data corresponding to the service page is improved.
In one embodiment, each service micro-service corresponding to the webapp product may be used as a service for a user to log in an application, fig. 8 is a schematic diagram of encrypting data corresponding to each service micro-service when a software developer uses the product, in fig. 8, webapp is a front-end service, scm is a purchase-sale-storage service, bd is a basic data service, and ls is a retail service. Wherein, the purchase-sale-stock service is also called purchase-sale chain service, which refers to the dynamic management process of purchase (purchase) -warehouse (stock) -sale (sale) in the enterprise management process; the basic data service mainly provides and maintains basic data for business use, such as customer data, commodity data, staff data and the like, wherein the basic data contains fields needing encryption; retail services refer to services that sell small amounts of goods directly to consumers from a single point (mall, market, department store, etc.) for their end use. In addition to the business micro services illustrated in fig. 8, there are other types of business micro services for users to use, and there are data to be encrypted corresponding to each of the different business micro services. The user can log in to a plurality of different services corresponding to the product based on the browser, initiate a request for checking privacy data (such as a mobile phone number) on a corresponding service page, analyze metadata of the corresponding service page through a bos engine, acquire data information corresponding to the service page from a local cache, a distributed cache area or a database according to the metadata, read a corresponding encryption rule (encryption rule) from a configuration center zookeeper according to an encryption type corresponding to the privacy data, encrypt data corresponding to a field needing to be encrypted in the analyzed data information based on the encryption rule, obtain encrypted data (encryption data), and then present the encrypted data to the corresponding service page, so that efficient encryption of the privacy data is realized. Fig. 9 is a timing diagram of encryption inquiry and service page metadata storage performed by a software developer in a development stage, and the BOS designer in fig. 9 is a graphical form design tool based on a browser, which can help the software developer to quickly design various types of pages.
In one embodiment, as shown in fig. 10, fig. 10 shows a whole flow chart from web entering to final encrypted data display for a user, in addition, for a user, the user can enter multiple business micro services corresponding to a product at the same time, different business micro services depend on the same configuration file storing encryption rules, only the encryption type and the configuration match successfully, and the data needing to be encrypted in the service pages corresponding to the different business micro services can be encrypted according to the encryption rules configured by the encryption type, namely, the target service page is determined according to the target service page identifier, and the metadata corresponding to the target service page is read to obtain target metadata; determining target data information corresponding to a target service page based on the target metadata; acquiring a target encryption type corresponding to target data information, and determining data to be encrypted from the target data information based on the target encryption type; based on the target encryption type, reading a target encryption rule corresponding to the target encryption type from the unified configuration area; encrypting the data to be encrypted based on the target encryption rule, generating target encrypted data, and presenting the target encrypted data to the corresponding terminal, so that the encryption display of the one-key support sensitive field of the zero code light configuration is realized. The zero code refers to the capability of a user to quickly construct an application program without programming, and through abstraction, encapsulation and integration, the user can realize a certain function through simple operation (such as starting parameters); the light configuration means that configuration parameters of a product server are reduced, and common desensitization scenes are met through a preset scheme; the unified configuration area contains the distributed cache and configuration center of fig. 10, and the desensitization, i.e., encryption, and the desensitization rules, i.e., encryption rules, of fig. 10. Data desensitization, namely data encryption, means that certain sensitive information is subjected to data deformation processing through a certain rule, so that the sensitive privacy data is reliably protected. Fig. 11 and fig. 12 are interface displays of service pages corresponding to products, it can be known from fig. 11 that different encryption types (such as mobile phone numbers, bank cards and identity cards) can be selected, and fig. 12 can be known from fig. 12 that encryption modes corresponding to different encryption types can be different, so that encryption requirements under various scenes can be met. The encryption requirements in various scenes are met, the experience of the user is improved, and the execution efficiency of corresponding operations of various business micro-services is improved; according to the priority characteristics of the Cache efficiency of the local Cache > Redis distributed Cache > database, the problem that metadata can be analyzed relatively frequently by using a Caffeine Cache high-performance Java local Cache component is avoided, and therefore the access speed of data is improved; in addition, the multi-service microservice relies on the same configuration file, and only the encryption type is matched with the configuration, so that the pressure caused by the fact that multiple fields of multiple pages are matched with the configuration in the prior art to encrypt corresponding fields is relieved, and the development efficiency is improved to a great extent.
Based on the same inventive concept, the embodiment of the application also provides a data encryption device for realizing the above related data encryption method. The implementation of the solution provided by the device is similar to the implementation described in the above method, so the specific limitation in one or more embodiments of the data encryption device provided below may refer to the limitation of the data encryption method hereinabove, and will not be repeated herein.
In one embodiment, as shown in fig. 13, there is provided a data encryption apparatus including: a metadata reading module 1300, a data determination module 1302, an encrypted data acquisition module 1304, a rule determination module 1306, and an encryption module 1308, wherein:
the metadata reading module 1300 is configured to read metadata corresponding to the target service page, and obtain target metadata.
The data determining module 1302 is configured to determine, based on the target metadata, target data information corresponding to the target service page.
The encrypted data obtaining module 1304 is configured to obtain a target encryption type corresponding to the target data information, and determine, based on the target encryption type, data to be encrypted from the target data information.
The rule determining module 1306 is configured to read, based on the target encryption type, a target encryption rule corresponding to the target encryption type from a unified configuration area.
An encryption module 1308 is configured to encrypt the data to be encrypted based on the target encryption rule, and generate target encrypted data.
In one embodiment, the data determining module 1300 is further configured to query the multiple storage areas sequentially until the metadata corresponding to the target service page is queried, so as to serve as target metadata. The storage areas sequentially comprise a local cache area, a distributed cache area and a database, or the storage areas sequentially comprise the local cache area and the database, or the storage areas sequentially comprise the distributed cache area and the database.
In one embodiment, the data determining module 1302 is further configured to obtain, from the storage area in which the target metadata is queried, target data information corresponding to the target service page.
In one embodiment, the rule determining module 1306 is further configured to query the target encryption type from the distributed cache area to obtain a distributed rule query result; and when the distribution rule query result indicates that the target encryption type exists, reading a target encryption rule corresponding to the target encryption type from the distribution cache area based on the target encryption type.
In one embodiment, the rule determining module 1306 is further configured to query the target encryption type from a target unified configuration file corresponding to the configuration center area when the distribution rule query result is that the target encryption type does not exist, so as to obtain a configuration rule query result; and reading the target encryption rule corresponding to the target encryption type from the target unified configuration file based on the configuration rule query result, wherein the encryption rule stored in the target unified configuration file is applicable to at least two different services.
In one embodiment, encryption module 1308 is further configured to obtain a forward display number and an end display number based on the target encryption rule; calculating a target total length corresponding to the character string to be encrypted, determining an encryption starting position based on the forward display number, and determining an encryption end position based on the target total length and the end display number; and sequentially reading the current character corresponding to the character string to be encrypted from the encryption starting position, and replacing the current character by encryption until the position of the current character is equal to the encryption ending position, so as to obtain the target encryption character string corresponding to the character string to be encrypted.
In one embodiment, the data encryption device further includes a preset module 1310, configured to obtain a preset encryption type corresponding to the development service page, and query the preset encryption type from the database based on the preset encryption type, to obtain a preset type query result; acquiring preset metadata corresponding to the development service page, and storing the preset metadata to obtain a storage result; and generating a preset result notification based on the preset type query result and the storage result.
Each of the modules in the above-described data encryption apparatus may be implemented in whole or in part by software, hardware, and a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, and the internal structure of which may be as shown in fig. 14. The computer device includes a processor, a memory, an Input/Output interface (I/O) and a communication interface. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface is connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is used to store data related to different types of services. The input/output interface of the computer device is used to exchange information between the processor and the external device. The communication interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a data encryption method.
In one embodiment, a computer device is provided, which may be a terminal, and an internal structure diagram thereof may be as shown in fig. 15. The computer device includes a processor, a memory, an input/output interface, a communication interface, a display unit, and an input means. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface, the display unit and the input device are connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The input/output interface of the computer device is used to exchange information between the processor and the external device. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement a data encryption method. The display unit of the computer device is used for forming a visual picture, and can be a display screen, a projection device or a virtual reality imaging device. The display screen can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be a key, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the structures shown in fig. 14 and 15 are merely block diagrams of portions of structures associated with aspects of the present application and are not intended to limit the computer apparatus to which aspects of the present application may be applied, and that a particular computer apparatus may include more or less components than those shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, a computer device is provided that includes a memory having a computer program stored therein and a processor that when executed implements the steps of the method examples described above.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored which, when executed by a processor, implements the steps of the method embodiments described above.
In one embodiment, a computer program product or computer program is provided that includes computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device performs the steps in the above-described method embodiments.
It should be noted that, the user information (including but not limited to user equipment information, user personal information, etc.) and the data (including but not limited to data for analysis, stored data, presented data, etc.) related to the present application are information and data authorized by the user or sufficiently authorized by each party, and the collection, use and processing of the related data need to comply with the related laws and regulations and standards of the related country and region.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the embodiments provided herein may include at least one of a relational database and a non-relational database. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processor referred to in the embodiments provided in the present application may be a general-purpose processor, a central processing unit, a graphics processor, a digital signal processor, a programmable logic unit, a data processing logic unit based on quantum computing, or the like, but is not limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the application and are described in detail herein without thereby limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of the application should be assessed as that of the appended claims.

Claims (10)

1. A method of encrypting data, the method comprising:
reading metadata corresponding to the target service page to obtain target metadata;
determining target data information corresponding to the target service page based on the target metadata;
acquiring a target encryption type corresponding to the target data information, and determining data to be encrypted from the target data information based on the target encryption type;
Based on the target encryption type, reading a target encryption rule corresponding to the target encryption type from a unified configuration area;
encrypting the data to be encrypted based on the target encryption rule to generate target encrypted data.
2. The method of claim 1, wherein the reading metadata corresponding to the target service page to obtain target metadata includes:
sequentially inquiring the storage areas until the metadata corresponding to the target service page is inquired, wherein the metadata is used as target metadata;
the determining, based on the target metadata, target data information corresponding to the target service page includes:
and acquiring target data information corresponding to the target service page from the storage area of the target metadata.
3. The method of claim 2, wherein the plurality of storage areas sequentially comprise a local cache area, a distributed cache area, and a database, or wherein the plurality of storage areas sequentially comprise a local cache area and a database, or wherein the plurality of storage areas sequentially comprise a distributed cache area and a database.
4. The method of claim 1, wherein the unified configuration area comprises a distributed cache area and a configuration center area; based on the target encryption type, reading a target encryption rule corresponding to the target encryption type from a unified configuration area, wherein the target encryption rule comprises the following steps:
Inquiring the target encryption type from the distributed cache area to obtain a distributed rule inquiry result;
and when the distribution rule query result indicates that the target encryption type exists, reading a target encryption rule corresponding to the target encryption type from the distribution cache area based on the target encryption type.
5. The method according to claim 4, wherein the method further comprises:
when the distribution rule query result is that the target encryption type does not exist, querying the target encryption type from a target unified configuration file corresponding to the configuration center area to obtain a configuration rule query result;
and reading the target encryption rule corresponding to the target encryption type from the target unified configuration file based on the configuration rule query result, wherein the encryption rule stored in the target unified configuration file is applicable to at least two different services.
6. The method according to claim 1, wherein the data to be encrypted is a data set of each character string to be encrypted corresponding to the target encryption type, and the target encrypted data is a data set of each character string to be encrypted corresponding to the target encryption type; encrypting the data to be encrypted based on the target encryption rule to generate target encrypted data, including:
Acquiring a forward display number and an end display number based on the target encryption rule;
calculating a target total length corresponding to the character string to be encrypted, determining an encryption starting position based on the forward display number, and determining an encryption end position based on the target total length and the end display number;
and sequentially reading the current character corresponding to the character string to be encrypted from the encryption starting position, replacing the current character with encryption coincidence until the position of the current character is equal to the encryption ending position, and obtaining the target encryption character string corresponding to the character string to be encrypted.
7. The method according to claim 1, wherein the method further comprises:
acquiring a preset encryption type corresponding to a development service page, and inquiring the preset encryption type from a database based on the preset encryption type to obtain a preset type inquiring result;
acquiring preset metadata corresponding to the development service page, and storing the preset metadata to obtain a storage result;
and generating a preset result notification based on the preset type query result and the storage result.
8. A data encryption device, the device comprising:
The metadata reading module is used for reading metadata corresponding to the target service page to obtain target metadata;
the data determining module is used for determining target data information corresponding to the target service page based on the target metadata;
the encrypted data acquisition module is used for acquiring a target encryption type corresponding to the target data information, and determining data to be encrypted from the target data information based on the target encryption type;
the rule determining module is used for reading a target encryption rule corresponding to the target encryption type from the unified configuration area based on the target encryption type;
and the encryption module is used for encrypting the data to be encrypted based on the target encryption rule to generate target encrypted data.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 7 when the computer program is executed.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 7.
CN202310313276.4A 2023-03-20 2023-03-20 Data encryption method, device, computer equipment and storage medium Pending CN116595546A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310313276.4A CN116595546A (en) 2023-03-20 2023-03-20 Data encryption method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310313276.4A CN116595546A (en) 2023-03-20 2023-03-20 Data encryption method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116595546A true CN116595546A (en) 2023-08-15

Family

ID=87594405

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310313276.4A Pending CN116595546A (en) 2023-03-20 2023-03-20 Data encryption method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116595546A (en)

Similar Documents

Publication Publication Date Title
CN111177302B (en) Service bill processing method, device, computer equipment and storage medium
CN112434015B (en) Data storage method and device, electronic equipment and medium
CN112182004B (en) Method, device, computer equipment and storage medium for checking data in real time
CN104992124A (en) Document safety access method for cloud storage environment
US10169757B1 (en) Scalable data storage and retrieval
CN114547204A (en) Data synchronization method and device, computer equipment and storage medium
CN113010542B (en) Service data processing method, device, computer equipment and storage medium
CN107979595B (en) Private data protection method and gateway system
CN117171108A (en) Virtual model mapping method and system
CN112835863A (en) Processing method and processing device of operation log
CN116595546A (en) Data encryption method, device, computer equipment and storage medium
CN114489770A (en) Gray scale distribution method and device, computer equipment and storage medium
CN110851446B (en) Data table generation method and device, computer equipment and storage medium
CN114004456B (en) Data tag calculation method, device, computer equipment and storage medium
US20210409204A1 (en) Encryption of protected data for transmission over a web interface
CN111339566B (en) Block summarization method, device, computer equipment and storage medium
CN118092972A (en) Thermal updating method, thermal updating device, computer equipment and storage medium
CN114676164A (en) Data caching method and device, computer equipment and storage medium
CN113987322A (en) Index data query method and device, computer equipment and computer program product
CN116827630A (en) Searchable encryption method, device, equipment and storage medium for card service information
US10896193B2 (en) Cache fetching of OLAP based data using client to client relationships and data encoding
CN117010006A (en) Sensitive file scanning method, device, computer equipment and storage medium
CN115687535A (en) Management method and device of relational database
CN117493335A (en) Report processing method, report processing device, report processing equipment, storage medium and computer program product
CN116910115A (en) Group query method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination