CN116720201A - Method, device and computer medium for encrypting and analyzing data at supply end - Google Patents

Method, device and computer medium for encrypting and analyzing data at supply end Download PDF

Info

Publication number
CN116720201A
CN116720201A CN202310572959.1A CN202310572959A CN116720201A CN 116720201 A CN116720201 A CN 116720201A CN 202310572959 A CN202310572959 A CN 202310572959A CN 116720201 A CN116720201 A CN 116720201A
Authority
CN
China
Prior art keywords
identification code
encryption
service
supply end
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310572959.1A
Other languages
Chinese (zh)
Inventor
戎袁杰
宋志伟
张兵
谢鑫
魏亚楠
朱文立
杨子彤
陈曦
苏冰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Information and Telecommunication Co Ltd
Beijing Guodiantong Network Technology Co Ltd
State Grid Materials Co Ltd
Original Assignee
State Grid Information and Telecommunication Co Ltd
Beijing Guodiantong Network Technology Co Ltd
State Grid Materials Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Information and Telecommunication Co Ltd, Beijing Guodiantong Network Technology Co Ltd, State Grid Materials Co Ltd filed Critical State Grid Information and Telecommunication Co Ltd
Priority to CN202310572959.1A priority Critical patent/CN116720201A/en
Publication of CN116720201A publication Critical patent/CN116720201A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Abstract

The embodiment of the disclosure discloses a method, equipment and a computer medium for encrypting and analyzing data at a supply end. One embodiment of the method comprises the following steps: the service analysis terminal constructs an encryption supply end identification code information list according to the encryption supply end identification code set and the encryption service name set; the user terminal responds to the received encrypted supply terminal identification code information list and performs conversion processing on each encrypted supply terminal identification code information in the encrypted supply terminal identification code information list so as to generate a converted encrypted supply terminal identification code information list; the user terminal constructs an encryption contrast service information list according to the private key and the contrast service information set; and the service analysis terminal constructs an analysis supply terminal identification code information list according to the encryption contrast service information list and the conversion encryption supply terminal identification code information list, and sends the analysis supply terminal identification code information list to the user terminal. The embodiment improves the success rate of data matching and shortens the checking time.

Description

Method, device and computer medium for encrypting and analyzing data at supply end
Technical Field
The embodiment of the disclosure relates to the technical field of computers, in particular to a method, equipment and a computer medium for encrypting and analyzing data at a supply end.
Background
When the multi-party service data is statistically analyzed, the service data of each party needs to be checked and matched due to different data owned by each party. At present, the business data of each party is checked and matched in the following general mode: business personnel check and match the business data of each party one by one.
However, with the above method, there are generally the following technical problems:
firstly, when the condition of missing or misprinting of the mark exists, the data matching is difficult to succeed, and the matching time is wasted;
secondly, due to certain sensitivity of the data, the business personnel check and match the business data of each party one by one, so that the data leakage is easy to cause;
third, missing data is not marked, resulting in difficulty in supplementing missing data.
The above information disclosed in this background section is only for enhancement of understanding of the background of the inventive concept and, therefore, may contain information that does not form the prior art that is already known to those of ordinary skill in the art in this country.
Disclosure of Invention
The disclosure is in part intended to introduce concepts in a simplified form that are further described below in the detailed description. The disclosure is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Some embodiments of the present disclosure propose a supply-side data encryption parsing method, an electronic device, and a computer-readable medium to solve one or more of the technical problems mentioned in the background section above.
In a first aspect, some embodiments of the present disclosure provide a method for encrypting and parsing data at a supply end, the method including: the user terminal randomly generates a key pair and sends a public key included in the key pair to an associated service analysis terminal, wherein the key pair comprises a public key and a private key; the service analysis terminal responds to the public key sent by the user terminal, and encrypts a service name and a service identification code included in each service information of the service information set of the service end to generate an encrypted service name and an encrypted service identification code set to obtain an encrypted service name set and an encrypted service identification code set; the service analysis terminal constructs an encryption supply end identification code information list according to the encryption supply end identification code set and the encryption service name set, and sends the encryption supply end identification code information list to the user terminal; the user terminal responds to the received encryption supply end identification code information list and carries out conversion processing on each encryption supply end identification code information in the encryption supply end identification code information list so as to generate a conversion encryption supply end identification code information list; the user terminal constructs an encryption comparison service information list according to the private key and the comparison service information set, and sends the encryption comparison service information list and the conversion encryption supply end identification code information list to the service analysis terminal; the service analysis terminal builds an analysis supply end identification code information list according to the encryption contrast service information list and the conversion encryption supply end identification code information list, and sends the analysis supply end identification code information list to the user terminal; and the user terminal performs addition processing on the analysis supply end identification code information list.
In a second aspect, some embodiments of the present disclosure provide an electronic device comprising: one or more processors; a storage device having one or more programs stored thereon, which when executed by one or more processors causes the one or more processors to implement the method described in any of the implementations of the first aspect above.
In a third aspect, some embodiments of the present disclosure provide a computer readable medium having a computer program stored thereon, wherein the program, when executed by a processor, implements the method described in any of the implementations of the first aspect above.
The above embodiments of the present disclosure have the following advantageous effects: by the method for encrypting and analyzing the data at the supply end, which is disclosed by the embodiment of the invention, the success rate of data matching is improved, and the checking time is shortened. Specifically, the reason why the collation matching time is wasted is that: when there is a case of identification omission or misplacement, it is difficult for data matching to succeed. Based on this, the provisioning side data encryption parsing method of some embodiments of the present disclosure first, the user terminal randomly generates a key pair and transmits a public key included in the key pair to the associated service parsing terminal. Wherein the key pair comprises a public key and a private key. Therefore, the encrypted communication between the user terminal and the service analysis terminal is facilitated. And secondly, the service analysis terminal responds to the public key sent by the user terminal, and encrypts the service name and the service identification code included in each service information of the service information set of the service end to generate an encrypted service name and an encrypted service identification code set to obtain an encrypted service name set and an encrypted service identification code set. Therefore, the data matching success rate of the user terminal and the service analysis terminal can be improved by performing data matching on the service name and the identification code of the supply terminal. And secondly, the service analysis terminal constructs an encryption supply end identification code information list according to the encryption supply end identification code set and the encryption service name set, and sends the encryption supply end identification code information list to the user terminal. Then, the user terminal performs conversion processing on each encrypted supply-side identification code information in the encrypted supply-side identification code information list in response to receiving the encrypted supply-side identification code information list, so as to generate a converted encrypted supply-side identification code information list. Thereby, the subsequent data matching is facilitated. And then, the user terminal constructs an encryption comparison service information list according to the private key and the comparison service information set, and sends the encryption comparison service information list and the conversion encryption supply end identification code information list to the service analysis terminal. Therefore, the service analysis terminal is convenient for data matching. And then, the service analysis terminal constructs an analysis supply end identification code information list according to the encryption contrast service information list and the conversion encryption supply end identification code information list, and sends the analysis supply end identification code information list to the user terminal. Therefore, data matching can be performed between the service name and the supply end identification code, and a matched analysis supply end identification code information list is established. Therefore, the success rate of data matching is improved, and the checking time is shortened.
Drawings
The above and other features, advantages, and aspects of embodiments of the present disclosure will become more apparent by reference to the following detailed description when taken in conjunction with the accompanying drawings. The same or similar reference numbers will be used throughout the drawings to refer to the same or like elements. It should be understood that the figures are schematic and that elements and components are not necessarily drawn to scale.
FIG. 1 is a flow chart of some embodiments of a method of vendor data encryption resolution in accordance with the present disclosure;
fig. 2 is a schematic structural diagram of an electronic device suitable for use in implementing some embodiments of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete. It should be understood that the drawings and embodiments of the present disclosure are for illustration purposes only and are not intended to limit the scope of the present disclosure.
It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings. Embodiments of the present disclosure and features of embodiments may be combined with each other without conflict.
It should be noted that the terms "first," "second," and the like in this disclosure are merely used to distinguish between different devices, modules, or units and are not used to define an order or interdependence of functions performed by the devices, modules, or units.
It should be noted that references to "one", "a plurality" and "a plurality" in this disclosure are intended to be illustrative rather than limiting, and those of ordinary skill in the art will appreciate that "one or more" is intended to be understood as "one or more" unless the context clearly indicates otherwise.
The names of messages or information interacted between the various devices in the embodiments of the present disclosure are for illustrative purposes only and are not intended to limit the scope of such messages or information.
The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Fig. 1 is a flow chart of some embodiments of a method of vendor data encryption resolution according to the present disclosure. A flow 100 of some embodiments of a method of vendor data encryption resolution according to the present disclosure is shown. The method for encrypting and analyzing the data of the supply end comprises the following steps:
step 101, the user terminal randomly generates a key pair, and sends the public key included in the key pair to the associated service analysis terminal.
In some embodiments, the user terminal randomly generates a key pair and transmits a public key comprised by the key pair to the associated. Wherein the key pair comprises a public key and a private key. Here, the user terminal may refer to a user service terminal that cooperates with each of the supply terminals. The service resolving terminal may refer to a terminal that manages each of the supply ends. The user terminal is in communication connection with the user terminal. The user terminal may randomly generate an RSA key pair. The public key consists of two parts, one part is: the total number N, the other part is: public index e. The private key consists of two parts, one part is: the total number N, the other part is: a private exponent d. The user terminal stores the contrast service information of the cooperation service with each supply terminal. The service analysis terminal stores the service information of the service provider of each provider associated with the user terminal. The control traffic information may include at least one of: and comparing the service name with the service name by comparing with the identification code of the supply end. The provisioning side service information may include at least one of: the service name is a service identifier. The reference provider identifier/provider identifier may be a social credit code. The reference service name/service name may refer to a service number/name.
Step 102, the service analysis terminal responds to the public key sent by the user terminal, and encrypts the service name and the service identification code included in each service information of the service information set of the service end, so as to generate an encrypted service name and an encrypted service identification code, and obtain an encrypted service name set and an encrypted service identification code set.
In some embodiments, the service analysis terminal respectively encrypts the service name and the service identifier included in each service information of the service information set of the service information of the service end in response to receiving the public key sent by the user terminal, so as to generate an encrypted service name and an encrypted service identifier, and obtain an encrypted service name set and an encrypted service identifier set. The service information of the supply end may refer to the service information corresponding to a certain supply end.
In practice, the service analysis terminal may encrypt the service name and the service identifier included in each service information of the service information set of the service end by the following steps to generate an encrypted service name and an encrypted service identifier:
first, determining whether the identifier field corresponding to the identifier of the supply end is empty.
And a second step of generating an identification code encryption value corresponding to the supply end identification code in response to determining that the identification code field is not empty. The number of digits corresponding to the supply side identification code can be randomly generated.
And thirdly, encrypting the supply end identification code according to the identification code encryption value and the public key to generate an encrypted supply end identification code. That is, u= (r) e And (x e)% N x H (b)% N formula, and performing encryption processing on the supply terminal identification code to generate an encrypted supply terminal identification code. Where u may represent an encrypted vendor identification code. r may represent an identification code encryption value. e is a common index. N is the total number. % may represent the remainder operation. H () may represent a hash operation. b may represent a supply side identification code.
Fourth, determining whether the service name field corresponding to the service name is empty.
And fifthly, generating a name encryption value corresponding to the service name in response to determining that the service name field is not empty. The number of digits corresponding to the service name may be randomly generated.
And sixthly, encrypting the service name according to the name encryption numerical value and the public key to obtain an encrypted service name. That is, u= (R) e And (x e)% N x H (b)% N formula, and performing encryption processing on the service name to generate an encrypted service name. Where U may represent an encrypted service name. R may represent a name encryption value. e is a common index. N is the total number. % may represent the remainder operation. H () may represent a hash operation. c may represent a service name.
The related content in step 102 is an invention point of the present disclosure, which solves the second technical problem mentioned in the background art, which is easy to cause data leakage. ". Factors that easily cause data leakage are often as follows: because of certain sensitivity of the data, the business data of each party are checked and matched one by business personnel. If the above factors are solved, the effect of improving the confidentiality of the data can be achieved. To achieve this, first, it is determined whether the identifier field corresponding to the supply-side identifier is empty. And secondly, generating an identification code encryption numerical value corresponding to the identification code of the supply end in response to the fact that the identification code field is not empty. Thus, the encryption value can be generated for encryption according to the supply end identification code. And then, carrying out encryption processing on the supply end identification code according to the identification code encryption numerical value and the public key so as to generate an encrypted supply end identification code. Therefore, the supply end identification code can be encrypted through the randomly generated encryption numerical value, and the confidentiality of the supply end identification code is improved. Then, it is determined whether the service name field corresponding to the service name is empty. Then, in response to determining that the service name field is not null, a name encryption value corresponding to the service name is generated, whereby an encryption value may be generated for encryption based on the service name. And finally, encrypting the service name according to the name encryption numerical value and the public key to obtain an encrypted service name. Therefore, the service name can be encrypted through the encryption numerical value generated randomly, and the confidentiality of the service name is improved.
And 103, the service analysis terminal constructs an encryption supply end identification code information list according to the encryption supply end identification code set and the encryption service name set, and sends the encryption supply end identification code information list to the user terminal.
In some embodiments, the service analysis terminal constructs an encrypted service identifier information list according to the encrypted service identifier set and the encrypted service name set, and sends the encrypted service identifier information list to the user terminal.
In practice, the service analysis terminal can construct an encrypted supply end identification code information list through the following steps:
first, an encryption supply end identification code information empty list is established.
And a second step of merging the encrypted supply end identification code and the encrypted service name corresponding to the encrypted supply end identification code into encrypted supply end identification code information for each encrypted supply end identification code in the encrypted supply end identification code set.
And thirdly, adding the combined encryption supply end identification code information into the encryption supply end identification code information empty list to obtain an encryption supply end identification code information list.
Step 104, the user terminal responds to the received encrypted supply terminal identification code information list and performs conversion processing on each encrypted supply terminal identification code information in the encrypted supply terminal identification code information list so as to generate a converted encrypted supply terminal identification code information list.
In some embodiments, the user terminal may perform conversion processing on each encrypted vendor identifier information in the encrypted vendor identifier information list to generate a converted encrypted vendor identifier information list in response to receiving the encrypted vendor identifier information list.
In practice, the user terminal may perform the following processing steps for each encrypted provisioning end identifier information in the encrypted provisioning end identifier information list:
and in the first step, in response to the encrypted supply terminal identification code included in the encrypted supply terminal identification code information not being null, performing encryption processing on the encrypted supply terminal identification code according to the private key to generate a target encrypted supply terminal identification code. That is, z= (u) d And (x d)% N formula, and performing encryption processing on the encryption supply end identification code to generate a target encryption supply end identification code. Where z may represent the target encrypted vendor identification code. u may represent an encrypted vendor identification code. d is a private exponent. N is the total number. % may represent the remainder operation.
Second, in response to the encrypted service name included in the encrypted service user identification sample not being null, according to the aboveAnd the private key performs encryption processing on the encrypted service name to generate a target encrypted service name. Can pass x= (U d And (x d)% N formula, and performing encryption processing on the encrypted service name to generate a target encrypted service name. Where x may represent the target encrypted service name. U may represent an encrypted service name. d is a private exponent. N is the total number. % may represent the remainder operation.
And thirdly, adding the target encryption supply end identification code and the target encryption service name into the encryption supply end identification code information to obtain conversion encryption supply end identification code information.
Finally, each piece of transcrypted supply side identification code information may be combined into a list of transcrypted supply side identification code information.
And 105, the user terminal constructs an encryption comparison service information list according to the private key and the comparison service information set, and sends the encryption comparison service information list and the conversion encryption supply end identification code information list to the service analysis terminal.
In some embodiments, the ue may construct an encrypted comparison service information list according to the private key and the comparison service information set, and send the encrypted comparison service information list and the encrypted conversion provider identifier information list to the service analysis terminal. The reference service information in the reference service information set includes a reference supply end identification code and a reference service name.
In practice, the above-mentioned user terminal may construct the encryption contrast service information list by:
in a first step, for each of the set of collation service information, the following processing steps are performed:
a first sub-step of determining whether the reference supply end identification code included in the reference service information is empty.
A second substep, in response to determining that the comparison supply-side identifier is not null, performing encryption processing on the comparison supply-side identifier according to the private key to generate an encrypted comparison supply-side identifierAnd (5) code. That is, the signal can be obtained by m=h (H (a d ) d % N) formula, performing encryption processing on the control supply terminal identification code to generate an encrypted control supply terminal identification code. Where m may represent an encryption reference supply side identification code. a may represent a control supply identity. d is a private exponent. N is the total number. % may represent the remainder operation. H () may represent a hash operation.
And a third sub-step of determining whether the reference service name included in the reference service information is null.
And a fourth sub-step, in response to determining that the comparison service name is not null, performing encryption processing on the comparison service name according to the private key to generate an encrypted comparison service name. That is, the signal can be obtained by m=h (H (a d ) d % N) formula, performing encryption processing on the control service name to generate an encrypted control service name. Where M may represent an encryption contrast service name. A may represent a control service name. d is a private exponent. N is the total number. % may represent the remainder operation. H () may represent a hash operation.
And fifth substep, merging the encryption contrast supply terminal identification code and the encryption contrast service name into encryption contrast service information.
And secondly, establishing an encryption contrast service information empty list, and adding each piece of combined encryption contrast service information into the encryption contrast service information empty list to obtain an encryption contrast service information list.
And 106, the service analysis terminal constructs an analysis supply end identification code information list according to the encryption contrast service information list and the conversion encryption supply end identification code information list, and sends the analysis supply end identification code information list to the user terminal.
In some embodiments, the service resolving terminal may construct a resolving provider identity information list according to the encryption contrast service information list and the conversion encryption provider identity information list, and send the resolving provider identity information list to the user terminal.
In practice, the service analysis terminal can construct and analyze the supply end identification code information list through the following steps:
first, for each piece of the encrypted supply-side identification code information in the encrypted supply-side identification code information list, the following processing steps are performed:
a first sub-step of determining whether the target encrypted supply-side identification code included in the converted encrypted supply-side identification code information is null.
And a second sub-step of performing a reference encryption process on the encrypted supply-side identification code included in the converted encrypted supply-side identification code information according to the private key and the associated identification code encryption value to generate a reference encrypted supply-side identification code in response to determining that the target encrypted supply-side identification code is not null. The associated identifier encryption value may refer to the identifier encryption value corresponding to the target encryption vendor identifier. That is, w=h ((r) d ×H(u) d ) % N) formula, performing encryption processing on the encrypted supply terminal identification code to generate a reference encrypted supply terminal identification code. Wherein W may represent a reference encrypted vendor identification code. u may represent an encrypted vendor identification code. d is a private exponent. N is the total number. % may represent the remainder operation. H () may represent a hash operation. r may represent an identification code encryption value.
And a third sub-step of performing, in response to determining that the target encrypted service user name is not null, a reference encryption process on the encrypted service name included in the converted encryption provider identification code information according to the private key and the associated name encryption value, to generate a reference encrypted service name. The associated name encryption value may refer to a name encryption value corresponding to the user name of the target encrypted service. That is, q=h ((R) d ×H(U) d ) % N) formula, performing encryption processing on the encrypted service name to generate a reference encrypted service name. Where Q may represent a reference encrypted service name. U may represent an encrypted service name. d is a private exponent. N is the total number. % may represent the remainder operation. H () may represent a hash operation. R may represent a name encryption value.
And a fourth sub-step of merging the reference encryption supply terminal identification code and the reference encryption service name into standard supply terminal identification code information.
And secondly, creating a standard supply end identification code information empty list, and adding the combined standard supply end identification code information into the standard supply end identification code information empty list to obtain a standard supply end identification code information list.
And thirdly, constructing an analysis supply end identification code information list according to the encryption contrast service information list and the standard supply end identification code information list.
In practice, the following sub-steps may be included to build a list of resolution provider identity information:
the first sub-step, constructing an empty list of the identification code information of the analysis supply end.
A second substep of executing, for each standard supply-end identification code information in the standard supply-end identification code information list, the following processing steps:
first, determining whether the encryption contrast service information list includes encryption contrast service information in which the encryption contrast service identification code matches with the reference encryption service identification code included in the standard service identification code information. That is, it may be determined whether or not there is encryption contrast service information including the same encryption contrast service identification code as the reference encryption supply identification code included in the standard supply identification code information in the encryption contrast service information list.
And secondly, in response to determining that the encryption contrast service information of which the included encryption contrast service identifier is matched with the reference encryption service identifier included in the standard service identifier information exists, determining whether the encryption contrast service information of which the included encryption contrast service name is matched with the reference encryption service name included in the standard service identifier information exists in the encryption contrast service information list. Matching may refer to the same.
Third, in response to determining that there is encryption contrast service information including an encryption contrast service name that matches a reference encryption service name included in the standard supply-side identification code information, setting an information state of the standard supply-side identification code information to an information complete matching state. That is, the information integrity matching state may represent the information integrity of the standard supply side identification code information.
Fourth, in response to determining that there is no encryption-reference service information including an encryption-reference service name that matches a reference encryption service name included in the standard supply-side identification code information, setting an information state of the standard supply-side identification code information to a service name missing state. The service name missing state may indicate that the standard provider identification information lacks a service name.
Fifth, in response to determining that there is no encryption contrast service information including an encryption contrast service name that matches a reference encryption service name included in the standard supply-side identification information and determining that there is encryption contrast service information including an encryption contrast service name that matches a reference encryption service name included in the standard supply-side identification information, an information state of the standard supply-side identification information is set to a supply-side identification missing state. The missing status of the supply end identification code may indicate that the standard supply end identification code information lacks the supply end identification code.
Sixth, the standard supply end identification code information after the modification state is determined to be the analysis supply end identification code information.
And a third sub-step of adding the identification code information of each analysis supply end into the above-mentioned empty list of identification code information of the analysis supply end to obtain an identification code information list of the analysis supply end.
The above-mentioned related matters serve as an invention point of the present disclosure, and solve the third "technical problem mentioned in the background art, which results in difficulty in supplementing missing data. ". Factors that lead to difficulty in supplementing missing data tend to be as follows: missing data is not marked, resulting in difficulty in supplementing missing data. If the above factors are solved, the effect of complementing the missing data can be achieved. To achieve this, first, it is determined whether or not there is encryption reference service information in which an encryption reference service identification code included in the encryption reference service information list matches a reference encryption service identification code included in the standard service identification code information. Therefore, the information state of the standard supply end identification code information is conveniently marked according to the matching result. And secondly, in response to determining that the encryption contrast service information of which the included encryption contrast service identifier is matched with the reference encryption service identifier included in the standard service identifier information exists, determining whether the encryption contrast service information of which the included encryption contrast service name is matched with the reference encryption service name included in the standard service identifier information exists in the encryption contrast service information list. Then, in response to determining that there is encryption contrast service information including an encryption contrast service name that matches a reference encryption service name included in the standard supply-side identification code information, setting an information state of the standard supply-side identification code information to an information complete matching state. Thus, the information of the standard supply end identification code information can be expressed as complete. Then, in response to determining that there is no encryption-reference service information including an encryption-reference service name that matches a reference encryption service name included in the standard supply-side identification code information, the information state of the standard supply-side identification code information is set to a service name missing state. Therefore, the service name missing in the standard supply end identification code information can be identified. And then, in response to determining that the encryption contrast service information including the encryption contrast service name matched with the reference encryption service name included in the standard supply end identification code information does not exist, setting the information state of the standard supply end identification code information as the supply end identification code missing state. Therefore, the supply end identification code which is missing in the standard supply end identification code information can be identified. And finally, determining the standard supply end identification code information after the modification state as analysis supply end identification code information. Thus, the missing data can be complemented according to the information state.
Step 107, the user terminal performs an addition process on the analysis provider identifier information list.
In some embodiments, the ue may perform an addition process on the resolved supply side identifier information list.
In practice, for each parsing supply-end identification code information in the parsing supply-end identification code information list, the following processing steps are executed:
first, determining whether the information state corresponding to the resolved supply terminal identification code information is a supply terminal identification code missing state.
And a second step of adding a corresponding supply end identification code in the analysis supply end identification code information in response to determining that the information state is a supply end identification code missing state. That is, first, the supply end identification code corresponding to the analysis supply end identification code information may be queried. Then, the corresponding supply end identification code is added in the analysis supply end identification code information.
And thirdly, determining whether the information state corresponding to the analysis supply terminal identification code information is a service name missing state.
And step four, in response to determining that the information state is a service name missing state, adding a corresponding service name in the analysis supply end identification code information. That is, first, the service name corresponding to the analysis provider id information may be queried. Then, adding corresponding service name in the said information of the identification code of the analysis supply end.
Referring now to fig. 2, a schematic diagram of an electronic device (e.g., a user terminal and/or a business resolution terminal) 200 suitable for use in implementing some embodiments of the present disclosure is shown. The electronic devices in some embodiments of the present disclosure may include, but are not limited to, mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), car terminals (e.g., car navigation terminals), and the like, as well as stationary terminals such as digital TVs, desktop computers, and the like. The electronic device shown in fig. 2 is merely an example and should not impose any limitations on the functionality and scope of use of embodiments of the present disclosure.
As shown in fig. 2, the electronic device 200 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 201, which may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 202 or a program loaded from a storage means 208 into a Random Access Memory (RAM) 203. In the RAM203, various programs and data necessary for the operation of the electronic apparatus 200 are also stored. The processing device 201, ROM202, and RAM203 are connected to each other through a bus 204. An input/output (I/O) interface 205 is also connected to bus 204.
In general, the following devices may be connected to the I/O interface 205: input devices 206 including, for example, a touch screen, touchpad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 207 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 208 including, for example, magnetic tape, hard disk, etc.; and a communication device 209. The communication means 209 may allow the electronic device 200 to communicate with other devices wirelessly or by wire to exchange data. While fig. 2 shows the electronic device 20 with various means, it is to be understood that not all of the illustrated means are required to be implemented or provided. More or fewer devices may be implemented or provided instead. Each block shown in fig. 2 may represent one device or a plurality of devices as needed.
In particular, according to some embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, some embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flow chart. In such embodiments, the computer program may be downloaded and installed from a network via the communication device 209, or from the storage device 208, or from the ROM 202. The above-described functions defined in the methods of some embodiments of the present disclosure are performed when the computer program is executed by the processing device 201.
It should be noted that, the computer readable medium described in some embodiments of the present disclosure may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In some embodiments of the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In some embodiments of the present disclosure, however, the computer-readable signal medium may comprise a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, fiber optic cables, RF (radio frequency), and the like, or any suitable combination of the foregoing.
In some implementations, the clients, servers may communicate using any currently known or future developed network protocol, such as HTTP (HyperText Transfer Protocol ), and may be interconnected with any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the internet (e.g., the internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed networks.
The computer readable medium may be contained in the electronic device; or may exist alone without being incorporated into the electronic device. The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: the user terminal randomly generates a key pair and sends a public key included in the key pair to an associated service analysis terminal, wherein the key pair comprises a public key and a private key; the service analysis terminal responds to the public key sent by the user terminal, and encrypts a service name and a service identification code included in each service information of the service information set of the service end to generate an encrypted service name and an encrypted service identification code set to obtain an encrypted service name set and an encrypted service identification code set; the service analysis terminal constructs an encryption supply end identification code information list according to the encryption supply end identification code set and the encryption service name set, and sends the encryption supply end identification code information list to the user terminal; the user terminal responds to the received encryption supply end identification code information list and carries out conversion processing on each encryption supply end identification code information in the encryption supply end identification code information list so as to generate a conversion encryption supply end identification code information list; the user terminal constructs an encryption comparison service information list according to the private key and the comparison service information set, and sends the encryption comparison service information list and the conversion encryption supply end identification code information list to the service analysis terminal; the service analysis terminal builds an analysis supply end identification code information list according to the encryption contrast service information list and the conversion encryption supply end identification code information list, and sends the analysis supply end identification code information list to the user terminal; and the user terminal performs addition processing on the analysis supply end identification code information list.
Computer program code for carrying out operations for some embodiments of the present disclosure may be written in one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The functions described above herein may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: a Field Programmable Gate Array (FPGA), an Application Specific Integrated Circuit (ASIC), an Application Specific Standard Product (ASSP), a system on a chip (SOC), a Complex Programmable Logic Device (CPLD), and the like.
The foregoing description is only of the preferred embodiments of the present disclosure and description of the principles of the technology being employed. It will be appreciated by those skilled in the art that the scope of the invention in the embodiments of the present disclosure is not limited to the specific combination of the above technical features, but encompasses other technical features formed by any combination of the above technical features or their equivalents without departing from the spirit of the invention. Such as the above-described features, are mutually substituted with (but not limited to) the features having similar functions disclosed in the embodiments of the present disclosure.

Claims (6)

1. A method for encrypting and analyzing data at a supply end comprises the following steps:
the method comprises the steps that a user terminal randomly generates a key pair and sends a public key included in the key pair to an associated service analysis terminal, wherein the key pair comprises a public key and a private key;
The service analysis terminal responds to the public key sent by the user terminal, and encrypts a service name and a service identification code included in each service information of the service information set of the service end to generate an encrypted service name and an encrypted service identification code set to obtain an encrypted service name set and an encrypted service identification code set;
the service analysis terminal constructs an encryption supply end identification code information list according to the encryption supply end identification code set and the encryption service name set, and sends the encryption supply end identification code information list to the user terminal;
the user terminal responds to the received encryption supply end identification code information list and carries out conversion processing on each encryption supply end identification code information in the encryption supply end identification code information list so as to generate a conversion encryption supply end identification code information list;
the user terminal constructs an encryption comparison service information list according to the private key and the comparison service information set, and sends the encryption comparison service information list and the conversion encryption supply end identification code information list to the service analysis terminal;
the service analysis terminal builds an analysis supply end identification code information list according to the encryption contrast service information list and the conversion encryption supply end identification code information list, and sends the analysis supply end identification code information list to the user terminal;
And the user terminal performs addition processing on the analysis supply terminal identification code information list.
2. The method of claim 1, wherein the constructing an encrypted provisioning end identifier information list from the encrypted provisioning end identifier set and the encrypted service name set comprises:
establishing an encryption supply end identification code information empty list;
combining the encrypted supply end identification code and the encrypted service name corresponding to the encrypted supply end identification code into encrypted supply end identification code information for each encrypted supply end identification code in the encrypted supply end identification code set;
and adding the combined encryption supply end identification code information to the encryption supply end identification code information empty list to obtain an encryption supply end identification code information list.
3. The method of claim 1, wherein the converting each encrypted vendor-side identifier information in the encrypted vendor-side identifier information list to generate a converted encrypted vendor-side identifier information list comprises:
for each encrypted supply-side identification code information in the encrypted supply-side identification code information list, performing the following processing steps:
Responding to the encryption supply end identification code included in the encryption supply end identification code information is not null, and carrying out encryption processing on the encryption supply end identification code according to the private key so as to generate a target encryption supply end identification code;
in response to the encrypted service name included in the encrypted service user identification sample being not null, performing encryption processing on the encrypted service name according to the private key to generate a target encrypted service name;
and adding the target encryption supply end identification code and the target encryption service name into the encryption supply end identification code information to obtain conversion encryption supply end identification code information.
4. The method of claim 1, wherein the adding the list of resolved vendor identification codes information comprises:
for each parsing supply terminal identification code information in the parsing supply terminal identification code information list, executing the following processing steps:
determining whether the information state corresponding to the analysis supply terminal identification code information is a supply terminal identification code missing state;
responding to the determination that the information state is a supply end identification code missing state, and adding a corresponding supply end identification code into the analysis supply end identification code information;
Determining whether the information state corresponding to the analysis supply terminal identification code information is a service name missing state;
and in response to determining that the information state is a service name missing state, adding a corresponding service name in the analysis supply terminal identification code information.
5. An electronic device, comprising:
one or more processors;
a storage device having one or more programs stored thereon;
when executed by the one or more processors, causes the one or more processors to implement the method of any of claims 1-4.
6. A computer readable medium having stored thereon a computer program, wherein the program when executed by a processor implements the method of any of claims 1-4.
CN202310572959.1A 2023-05-19 2023-05-19 Method, device and computer medium for encrypting and analyzing data at supply end Pending CN116720201A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310572959.1A CN116720201A (en) 2023-05-19 2023-05-19 Method, device and computer medium for encrypting and analyzing data at supply end

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310572959.1A CN116720201A (en) 2023-05-19 2023-05-19 Method, device and computer medium for encrypting and analyzing data at supply end

Publications (1)

Publication Number Publication Date
CN116720201A true CN116720201A (en) 2023-09-08

Family

ID=87868829

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310572959.1A Pending CN116720201A (en) 2023-05-19 2023-05-19 Method, device and computer medium for encrypting and analyzing data at supply end

Country Status (1)

Country Link
CN (1) CN116720201A (en)

Similar Documents

Publication Publication Date Title
CN110704833A (en) Data permission configuration method, device, electronic device and storage medium
CN111199037A (en) Login method, system and device
CN112418446A (en) Model processing method, system, device, medium and electronic equipment
CN110545542A (en) Main control key downloading method and device based on asymmetric encryption algorithm and computer equipment
CN112329044A (en) Information acquisition method and device, electronic equipment and computer readable medium
CN116361121A (en) Abnormal interface alarm method, device, electronic equipment and computer readable medium
CN114499893B (en) Bidding file encryption and evidence storage method and system based on block chain
CN113079085B (en) Business service interaction method, business service interaction device, business service interaction equipment and storage medium
CN112434064B (en) Data processing method, device, medium and electronic equipment
CN116226888B (en) Power data interactive encryption method, system and equipment based on privacy protection
CN116720201A (en) Method, device and computer medium for encrypting and analyzing data at supply end
CN113259353A (en) Information processing method and device and electronic equipment
CN116720202B (en) Service information detection method, device, electronic equipment and computer readable medium
CN117132245B (en) Method, device, equipment and readable medium for reorganizing online article acquisition business process
CN116702169B (en) Data encryption migration method, electronic device and computer readable medium
CN115378743B (en) Information encryption transmission method, device, equipment and medium
CN114003188B (en) Information encryption display method, device, electronic equipment and computer readable medium
CN113742774B (en) Data processing method and device, readable medium and electronic equipment
CN112437052B (en) Method, apparatus, electronic device, and computer-readable medium for processing information
CN111314320B (en) Communication method, terminal, server and system based on HTTP
CN116128415B (en) Power equipment information sending method and device, electronic equipment and computer medium
CN112036821B (en) Quantization method, quantization device, quantization medium and quantization electronic equipment based on grid map planning private line
CN115842819B (en) Automatic driving system test data downloading method, device and equipment
CN112261659B (en) Control method and device for terminal and server, terminal and storage medium
CN111400322B (en) Method, apparatus, electronic device and medium for storing data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination