CN116996288A - Processing method, device and system for transmission data between devices and electronic device - Google Patents

Processing method, device and system for transmission data between devices and electronic device Download PDF

Info

Publication number
CN116996288A
CN116996288A CN202310955417.2A CN202310955417A CN116996288A CN 116996288 A CN116996288 A CN 116996288A CN 202310955417 A CN202310955417 A CN 202310955417A CN 116996288 A CN116996288 A CN 116996288A
Authority
CN
China
Prior art keywords
data
target
processed
index information
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310955417.2A
Other languages
Chinese (zh)
Inventor
高耀东
于咏梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing QIYI Century Science and Technology Co Ltd
Original Assignee
Beijing QIYI Century Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing QIYI Century Science and Technology Co Ltd filed Critical Beijing QIYI Century Science and Technology Co Ltd
Priority to CN202310955417.2A priority Critical patent/CN116996288A/en
Publication of CN116996288A publication Critical patent/CN116996288A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention provides a processing method, a device, a system and an electronic device for transmitting data among devices, wherein the method is suitable for the electronic device, and the electronic device is respectively connected with a data request end and a data response end in a network manner and comprises the following steps: acquiring data to be processed, wherein the data to be processed carries first index information; the data to be processed is encrypted data sent by the data request end or the data response end; determining a target decryption algorithm and a target decryption key corresponding to the first index information; and decrypting the data to be processed by using the target decryption algorithm and the target decryption key to obtain decrypted data. By applying the technical scheme of the invention, transparent automatic decryption of encrypted data sent by a data request end or a data response end is realized, and the data processing process is simplified.

Description

Processing method, device and system for transmission data between devices and electronic device
Technical Field
The present invention relates to the field of data security technologies, and in particular, to a method, an apparatus, a system, and an electronic device for processing data transmitted between devices.
Background
In the field of data security, in order to perform secure transmission on data, an internet company generally adopts an encryption mode to transmit the data to be transmitted, so as to protect the security and integrity of the data.
In the related art, in order to improve the security of data, hypertext transfer security protocol (Hypertext Transfer Protocol Secure, HTTPS) is generally used for transferring data between devices, but there is still a risk that data is hijacked when HTTPS is used for transferring data. Based on this, in some technologies, a custom encryption algorithm is used to encrypt the sensitive data, and then the encrypted data is transmitted by a hypertext transfer protocol (HyperText Transfer Protocol, HTTP) (or HTTPs) manner.
However, the inventor finds that the sensitive data is encrypted by adopting a custom encryption algorithm and then transmitted in an HTTP (or HTTPS) mode, and in the development and testing stage of a product, the transmitted data is encrypted by adopting the custom encryption algorithm wholly or partially, so that operations such as checking, modifying and the like on the data are difficult.
Disclosure of Invention
The embodiment of the invention aims to provide a processing method, a device and a system for data transmission among devices and electronic equipment, so that transparent automatic decryption of the data transmission among the devices is realized, and the processing process of the data is simplified. The specific technical scheme is as follows:
In a first aspect of the present invention, there is first provided a method for processing data transmitted between devices, where the method is applicable to an electronic device, and the electronic device is respectively connected to a data request end and a data response end through a network, and the method includes:
acquiring data to be processed, wherein the data to be processed carries first index information; the data to be processed is encrypted data sent by the data request end or the data response end;
determining a target decryption algorithm and a target decryption key corresponding to the first index information;
and decrypting the data to be processed by using the target decryption algorithm and the target decryption key to obtain decrypted data.
In a possible implementation manner, the determining a target decryption algorithm and a target decryption key corresponding to the first index information includes: inquiring first target index information corresponding to the first index information from a pre-constructed target encryption algorithm table, wherein the target encryption algorithm table comprises: the corresponding relation between the index information and the decryption algorithm and the decryption key;
the decrypting the data to be processed by using the target decryption algorithm and the target decryption key to obtain decrypted data includes: and decrypting the data to be processed by using a target decryption algorithm and a target decryption key corresponding to the first target index information to obtain decrypted data.
In a possible implementation manner, in a case that the data to be processed is acquired, the method further includes:
acquiring an operation instruction type aiming at the data to be processed; the operation instruction type comprises at least one of a data viewing instruction, a data modifying instruction and a data simulating instruction;
and responding to the data viewing instruction, visually displaying the decrypted data, and forwarding the data to be processed to the data response end or the data request end.
In one possible embodiment, the method further comprises:
responding to the data modification instruction, and modifying the decrypted data according to a preset modification rule to obtain modified data;
encrypting the modified data by using a target encryption algorithm and a target encryption key corresponding to the first target index information to obtain encrypted modified data;
and sending the encrypted modified data to the data response end or the data request end.
In one possible embodiment, the method further comprises: and visually displaying the modified data.
In one possible embodiment, the method further comprises:
Responding to the data simulation instruction, and performing data simulation on the decrypted data according to a preset simulation rule to obtain target simulation data;
encrypting the target simulation data by using a target encryption algorithm and a target encryption key corresponding to the first target index information to obtain encrypted simulation data;
and sending the encrypted analog data to the data response end or the data request end.
In one possible embodiment, the method further comprises: and visually displaying the target simulation data.
In one possible implementation, the index information includes an encrypted data identifier and an encrypted field;
the decrypting the data to be processed by using the target decryption algorithm and the target decryption key corresponding to the first target index information to obtain decrypted data includes:
determining encrypted data in the data to be processed based on the encrypted data identifier and the encrypted field in the first target index information;
and decrypting the encrypted data by using a target decryption algorithm and a target decryption key corresponding to the first target index information to obtain decrypted data.
In a second aspect of the present invention, there is further provided a method for processing data transmitted between devices, where the method is applicable to a middle service module deployed at a data request end or a data response end, where the data request end is connected to the data response end through a network, and the method includes:
acquiring data to be processed, wherein the data to be processed carries first index information; the data to be processed is encrypted data sent by the data request end or the data response end;
determining a target decryption algorithm and a target decryption key corresponding to the first index information;
decrypting the data to be processed by using the target decryption algorithm and the target decryption key to obtain decrypted data;
and responding to a data viewing instruction aiming at the data to be processed, visually displaying the decrypted data, and forwarding the data to be processed to the data response end or the data request end.
In a possible implementation manner, the determining a target decryption algorithm and a target decryption key corresponding to the first index information includes: inquiring first target index information corresponding to the first index information from a pre-constructed target encryption algorithm table, wherein the target encryption algorithm table comprises: the corresponding relation between the index information and the decryption algorithm and the decryption key;
The decrypting the data to be processed by using the target decryption algorithm and the target decryption key to obtain decrypted data includes: and decrypting the data to be processed by using a target decryption algorithm and a target decryption key corresponding to the first target index information to obtain decrypted data.
In one possible embodiment, the method further comprises:
responding to a data modification instruction aiming at the data to be processed, and modifying the decrypted data according to a preset modification rule to obtain modified data;
visually displaying the modified data;
encrypting the modified data by using a target encryption algorithm and a target encryption key corresponding to the first target index information to obtain encrypted modified data;
and sending the encrypted modified data to the data response end or the data request end.
In one possible embodiment, the method further comprises:
responding to a data simulation instruction aiming at the data to be processed, and performing data simulation on the decrypted data according to a preset simulation rule to obtain target simulation data;
visually displaying the target simulation data;
Encrypting the target simulation data by using a target encryption algorithm and a target encryption key corresponding to the first target index information to obtain encrypted simulation data;
and sending the encrypted analog data to the data response end or the data request end.
In a third aspect of the present invention, there is also provided a processing apparatus for transmitting data between devices, the apparatus being adapted for use in an electronic device, the electronic device being respectively connected to a data request terminal and a data response terminal through a network, the apparatus comprising:
the first data acquisition module is used for acquiring data to be processed, wherein the data to be processed carries first index information; the data to be processed is encrypted data sent by the data request end or the data response end;
the first strategy determining module is used for determining a target decryption algorithm and a target decryption key corresponding to the first index information;
and the first data processing module is used for decrypting the data to be processed by utilizing the target decryption algorithm and the target decryption key to obtain decrypted data.
In a fourth aspect of the present invention, there is also provided a processing apparatus for transmitting data between devices, the apparatus being adapted to be deployed in a central service module of a data request end or a data response end, the data request end being connected to a network of the data response end, the apparatus comprising:
The second data acquisition module is used for acquiring data to be processed, wherein the data to be processed carries first index information; the data to be processed is encrypted data sent by the data request end or the data response end;
the second strategy determining module is used for determining a target decryption algorithm and a target decryption key corresponding to the first index information;
the second data processing module is used for decrypting the data to be processed by utilizing the target decryption algorithm and the target decryption secret key to obtain decrypted data;
the first data viewing module is used for responding to a data viewing instruction aiming at the data to be processed, visually displaying the decrypted data and forwarding the data to be processed to the data response end or the data request end.
In a fifth aspect of the present invention, there is also provided a processing system for transmitting data between devices, the system comprising: the system comprises a data request end, a data response end and a middle server end, wherein the middle server end is respectively connected with the data request end and the data response end through a network;
the data request end is used for sending a data request to the middle server end, and the data request carries second index information;
The middle server is configured to receive the data request, determine a target decryption algorithm and a target decryption key corresponding to the second index information, decrypt the data request by using the target decryption algorithm and the target decryption key corresponding to the second index information, obtain first decrypted data, visually display the first decrypted data, and forward the data request to the data response end;
the data response end is configured to receive the data request, send response data corresponding to the data request to the middle server, where the response data carries third index information;
the middle server is further configured to receive the response data, determine a target decryption algorithm and a target decryption key corresponding to the third index information, decrypt the response data by using the target decryption algorithm and the target decryption key corresponding to the third index information, obtain second decrypted data, visually display the second decrypted data, and forward the response data to the data request terminal;
the data request terminal is further configured to receive the response data.
In yet another aspect of the present invention, there is also provided an electronic device including a processor, a communication interface, a memory, and a communication bus, wherein the processor, the communication interface, and the memory perform communication with each other through the communication bus;
a memory for storing a computer program;
and the processor is used for realizing the steps of any of the processing methods for transmitting data between devices when executing the programs stored in the memory.
In yet another aspect of the implementation of the present invention, there is also provided a computer readable storage medium, where a computer program is stored, where the computer program, when executed by a processor, implements the steps of the method for processing data transmitted between devices described in any of the foregoing.
In yet another aspect of the present invention there is also provided a computer program product containing instructions which, when run on a computer, cause the computer to perform the steps of the method of processing data for transmission between devices as described in any of the above.
According to the processing method, the device, the system and the electronic equipment for transmitting data among the devices, the electronic equipment determines the target decryption algorithm and the target decryption key corresponding to the first index information through the first index information carried in the data to be processed, and decrypts the data to be processed by utilizing the target decryption algorithm and the target decryption key, so that transparent automatic decryption of encrypted data sent by a data request end or a data response end is realized, namely transparent automatic decryption of the data transmitted between the data request end and the data response end is realized, and the data processing process is simplified.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below.
FIG. 1 is a schematic flow chart of a method for processing data transmitted between devices according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart of another method for processing data transmitted between devices according to an embodiment of the present invention;
FIG. 3 is a schematic flow chart of another method for processing data transmitted between devices according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of an architecture of a method for processing data transmitted between devices according to an embodiment of the present invention;
FIG. 5 is a schematic flow chart of another method for processing data transmitted between devices according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of a processing apparatus for transmitting data between devices according to an embodiment of the present invention;
FIG. 7 is a schematic diagram of another configuration of a processing apparatus for transmitting data between devices according to an embodiment of the present invention;
FIG. 8 is a schematic diagram of a processing system for transmitting data between devices according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be described below with reference to the accompanying drawings in the embodiments of the present invention.
In some technologies, for data transmission between devices, a custom encryption algorithm is used to encrypt sensitive data, and then the encrypted data is transmitted in an HTTP (S) manner. In the development and testing stage of the product, the data transmitted are encrypted by the self-defined encryption algorithm wholly or partially, so that operations such as checking, modifying and the like on the data are difficult, for example, the data packet needs to be manually copied, or some encrypted fields need to be decrypted and checked by using different decryption tools, and the operations such as decrypting, checking, modifying and the like on the data cannot be performed under the dynamic key scene are difficult.
In other techniques, for data transmission between devices, different packing methods are used to pack the data, or whether to encrypt the data is controlled by a switch control method. However, the data are packed in different packing modes, so that the consistency of codes and data of different data packets cannot be ensured, and the data in different packing modes cannot be subjected to online back test in the development and testing stages of products. Whether the data encryption is carried out or not is controlled in a switch control mode, so that the data encryption is easy to crack by network hackers and the like, and the safety of the data is not facilitated. That is, whether the data is packed in different packing modes or whether the data is encrypted or not is controlled in a switch control mode, the method is not suitable for the development of products and the processing of data transmitted between devices in a testing stage, and the operations of checking, modifying and the like of the data are difficult.
In order to solve the problem of difficult operations such as checking and modifying transmission data among devices, the embodiment of the invention provides a processing method, a device and a system for the transmission data among devices and electronic equipment, so that transparent automatic decryption of the transmission data among the devices is realized, and the processing process of the data is simplified.
The processing method for transmitting data between devices provided by the embodiment of the invention is applied to development and test scenes of products, can be applied to electronic devices which are respectively connected with a data request end and a data response end in a network manner, and can also be applied to a middle server module which is deployed at the data request end or the data response end and is connected with the data response end in a network manner, wherein the data request end can be a client end, the data response end can be a server end, the middle server module can be a middle server module and the like, and the electronic devices can be devices independent of the data request end and the data response end.
The following describes in detail a processing method for transmitting data between devices according to an embodiment of the present invention:
referring to fig. 1, fig. 1 is a flow chart of a processing method for transmitting data between devices according to an embodiment of the invention. The method is suitable for the electronic equipment which is respectively connected with the data request end and the data response end through a network, and comprises the following steps:
S101, acquiring data to be processed, wherein the data to be processed carries first index information.
The data to be processed is encrypted data sent by a data request end or a data response end.
S102, determining a target decryption algorithm and a target decryption key corresponding to the first index information.
S103, decrypting the data to be processed by using the target decryption algorithm and the target decryption key to obtain decrypted data.
By applying the processing method for transmitting data between devices provided by the embodiment of the invention, the electronic device determines the target decryption algorithm and the target decryption key corresponding to the first index information through the first index information carried in the data to be processed, and decrypts the data to be processed by utilizing the target decryption algorithm and the target decryption key, thereby realizing transparent automatic decryption of encrypted data sent by the data request end or the data response end, namely transparent automatic decryption of the data transmitted between the data request end and the data response end, and simplifying the data processing process.
In a possible implementation manner, the implementation process of determining the target decryption algorithm and the target decryption key corresponding to the first index information in the step S102 may be: querying a pre-built target encryption algorithm table, wherein the pre-built target encryption algorithm table can comprise: the corresponding relation between the index information and the decryption algorithm and the decryption key, so as to obtain first target index information corresponding to the first index information, and correspondingly, the step S103 of decrypting the data to be processed by using the target decryption algorithm and the target decryption key to obtain decrypted data may include: and decrypting the data to be processed by using a target decryption algorithm and a target decryption key corresponding to the first target index information to obtain decrypted data.
In another embodiment, referring to fig. 2, fig. 2 is another flow chart of a processing method for transmitting data between devices in an embodiment of the present invention, where the method is applicable to an electronic device, and the electronic device is respectively connected to a data request end and a data response end through a network, and includes the following steps:
s201, obtaining data to be processed, wherein the data to be processed carries first index information.
The electronic equipment receives an encrypted data request sent by a data request end or receives encrypted response data sent by a data response end, and determines the received encrypted data request or response data as data to be processed, namely the data to be processed is the encrypted data sent by the data request end or the data response end, wherein the data to be processed carries first index information.
In one example, the first index information may be an index identifier (Identity document, ID), such as a number, character, or code, or the like, or may be a uniform resource locator (Uniform Resource Locator, URL), or domain name address, or the like, included in the data request or response data.
S202, inquiring first target index information corresponding to the first index information from a pre-constructed target encryption algorithm table.
In the embodiment of the invention, a pre-constructed target encryption algorithm table is inquired, and the target encryption algorithm table comprises: the index information may include, for example, an index identifier, a data request address, and the like, in correspondence with the decryption algorithm and the decryption key. The data request address may be, for example, URL or domain name address, and further, match the first index information carried in the data to be processed with the index information in the target encryption algorithm table, so as to locate whether the first index information corresponds to the first target index information in the target encryption algorithm table. If the first index information does not have the corresponding first target index information, the operations such as decryption, viewing, modification, etc. cannot be performed on the data to be processed, and only forwarding of the data to be processed can be performed, and if the first index information corresponds to the first target index information, step S203 is performed.
The decryption algorithm and the decryption key contained in the target encryption algorithm table are as follows: the encryption algorithm and the decryption key corresponding to the encryption algorithm and the encryption key used by the data request end and the data response end can be a plurality of different custom algorithms, or can be the existing symmetric or asymmetric encryption algorithm and decryption algorithm.
S203, determining encrypted data in the data to be processed based on the encrypted data identification and the encrypted field in the first target index information.
S204, decrypting the encrypted data by using a target decryption algorithm and a target decryption key corresponding to the first target index information to obtain decrypted data.
In a possible implementation manner, under the condition that the first target index information corresponding to the first index information is queried, the target decryption algorithm and the target decryption key corresponding to the first target index information are directly utilized to decrypt the data to be processed, so as to obtain decrypted data.
In another possible implementation manner, the index information in the target encryption algorithm table may include: index identification, data request address, encrypted data identification, encrypted fields, etc. The encryption data identification is used for identifying whether the data to be processed is encrypted in whole or in part, and the encryption field is used for identifying the data field encrypted in the data to be processed. Further, the encrypted data in the data to be processed can be determined through the encrypted data identifier and the encrypted field, and then the encrypted data is decrypted, so that decrypted data is obtained.
In the embodiment of the present invention, the target encryption algorithm table may further include: executable code corresponding to the decryption algorithm.
Correspondingly, under the condition that the first target index information corresponding to the first index information is queried, the data to be processed can be determined to be wholly or partially encrypted and specifically encrypted through the encrypted data identifier and the encrypted field in the first target index information, and then executable codes and target decryption keys corresponding to the target decryption algorithm corresponding to the first target index information are called to decrypt the encrypted data to obtain decrypted data.
In one possible embodiment, the decrypted data may also be visually presented after it is obtained.
In one example, the decrypted data is presented via a User Interface (UI).
By applying the processing method for transmitting data between devices provided by the embodiment of the invention, the electronic device determines the target decryption algorithm and the target decryption key corresponding to the data to be processed sent by the data request end or the data response end by inquiring the target encryption algorithm table, and decrypts the data to be processed by utilizing the target decryption algorithm and the target decryption key, so that transparent automatic decryption of the encrypted data sent by the data request end or the data response end, namely transparent automatic decryption of the transmitted data between the data request end and the data response end, is realized, and the data processing process is simplified. In the process, code logic of an intrusion data request end and a data response end is not needed, a switch is not needed to be reserved between the data request end and the data response end to control whether data encryption is carried out or not, and the packing mode of the data is not needed to be adjusted, so that data can be transmitted among devices coexisting in different services, fields and multiple encryption modes, transparent automatic decryption is realized, and further, plain text viewing and visual display, namely plain text display and the like can be carried out on the decrypted data.
In the development and test scenarios of products, there are generally operation requirements for checking, modifying, and simulating transmission data between a data request end and a data response end, and at this time, a user may send corresponding operation instructions to an electronic device, so as to perform operations such as checking, modifying, and simulating the transmission data through the electronic device.
Referring to fig. 3, fig. 3 is a schematic flow chart of a processing method of data transmission between devices according to an embodiment of the present invention, where the method may further include the following steps:
s301, obtaining an operation instruction type aiming at data to be processed.
In one example, the electronic device may further receive an operation instruction for the data to be processed by the user in a case where the data to be processed is acquired, or before the data to be processed is acquired, or in a case where the decrypted data is acquired, and acquire a corresponding operation instruction type for the data to be processed, where the operation instruction type may include at least one of a data viewing instruction, a data modifying instruction, and a data simulating instruction.
Step S302 is performed in the case where the operation instruction type is a data viewing instruction, step S303 is performed in the case where the operation instruction type is a data modification instruction, and step S307 is performed in the case where the operation instruction type is a data simulation instruction. Step S302, step S303, and step S307 may be performed synchronously or asynchronously, which is not limited in the embodiment of the present invention.
S302, responding to a data viewing instruction, visually displaying decrypted data, and forwarding the data to be processed to a data response end or a data request end.
If the operation instruction type of the data to be processed is a data viewing instruction, the data viewing instruction is responded, the obtained decrypted data is visually displayed, other processing is not needed to be carried out on the data to be processed or the decrypted data, at this time, the data to be processed is directly forwarded to a data response end or a data request end, and the data to be processed is original ciphertext data, namely the forwarding of the original ciphertext data is realized.
Specifically, if the data to be processed is sent by the data request end, the data to be processed is indicated to be the request data, and the data to be processed is forwarded to the data response end at the moment; if the data to be processed is sent by the data response end, the data to be processed is indicated to be the response data, and the data to be processed is forwarded to the data request end at the moment.
In one possible implementation, the original data to be processed can be sent to a designated data response end or a designated data request end according to the requirements of product development or testing.
In the embodiment of the invention, under the condition that the type of the operation instruction aiming at the data to be processed is a data checking instruction, the complete transparency and the plaintext display of the encrypted data sent by the data request end or the data response end are realized, and meanwhile, the forwarding of the original ciphertext data is realized.
S303, responding to the data modification instruction, and modifying the decrypted data according to a preset modification rule to obtain modified data.
The preset modification rule is as follows: the preset rule for modifying the data to be processed can be specifically set according to an actual application scene, for example, the preset modification rule can be regular replacement, a regular expression for modifying the data, and the like.
For example, if the preset modification rule is a regular replacement, for example, text 1 is replaced by text 2, or field M is replaced by field a, after the decrypted data is obtained, in response to a data modification instruction, text 1 in the decrypted data is replaced by text 2, or field M in the decrypted data is replaced by field a, so as to obtain modified data.
Under the condition that a preset modification rule is not available, decryption data is not required to be modified, and the data to be processed is directly forwarded to a data response end or a data request end.
S304, carrying out visual display on the modified data.
S305, encrypting the modified data by using a target encryption algorithm and a target encryption key corresponding to the first target index information to obtain encrypted modified data.
In one possible implementation manner, the target encryption algorithm table may further include: the corresponding relation between the index information, the encryption algorithm and the encryption key, and executable codes corresponding to the encryption algorithm. Furthermore, under the condition of determining the first target index information corresponding to the first index information, a target encryption algorithm and a target encryption key corresponding to the first target index information can be determined, further, executable codes and the target encryption key corresponding to the target encryption algorithm can be called, and the modified data is encrypted to obtain encrypted modified data.
It will be appreciated that the target encryption algorithm and the target encryption key corresponding to the first target index information correspond to the target decryption algorithm and the target decryption key corresponding to the first target index information, that is, the target encryption algorithm and the target encryption key corresponding to the first target index information are the same as the encryption algorithm and the encryption key of the data to be processed.
S306, the encrypted modified data is sent to a data response end or a data request end.
Specifically, if the data to be processed is sent by the data request end, the data to be processed is the request data, and the encrypted modification data is sent to the data response end at the moment, so that the modification of the request data sent to the data response end is realized; if the data to be processed is sent by the data response end, the data to be processed is the response data, and the encrypted modification data is sent to the data request end at the moment, so that the modification of the response data sent to the data request end is realized.
In one possible implementation, the encrypted modification data may also be sent to a designated data response side or designated data request side according to the needs of product development or testing.
In the embodiment of the invention, the completely transparent and clear text display of the encrypted data sent by the data request end or the data response end is realized, so that the decrypted data corresponding to the data to be processed can be directly modified under the condition that the operation instruction type for the data to be processed is the data modification instruction, and the modified data is encrypted and forwarded by utilizing the same encryption algorithm as that of the data to be processed, thereby simplifying the processing process of the data.
S307, responding to the data simulation instruction, and performing data simulation on the decrypted data according to a preset simulation rule to obtain target simulation data.
The preset simulation rules are as follows: the preset rule for simulating the data of the data to be processed can be specifically set according to the actual application scenario, for example, the preset simulation rule can be to add fields or parameters, delete fields or parameters, modify fields or parameters and the like in the data to be processed.
For example, if the preset simulation rule is to add the field B to the data to be processed, then in response to the data simulation instruction, after obtaining the decrypted data, the field B may be further added to the decrypted data to obtain the target simulation data.
And S308, visually displaying the target simulation data.
S309, encrypting the target simulation data by using the target encryption algorithm and the target encryption key corresponding to the first target index information to obtain encrypted simulation data.
Under the condition that the first target index information corresponding to the first index information is determined, a target encryption algorithm and a target encryption key corresponding to the first target index information can be determined, further, after target simulation data are obtained, executable codes and the target encryption key corresponding to the target encryption algorithm can be called, and the target simulation data are encrypted to obtain encrypted simulation data.
And S310, the encrypted analog data is sent to a data response end or a data request end.
Specifically, if the data to be processed is sent by the data request end, the data to be processed is the request data, and at the moment, the encrypted analog data is sent to the data response end, namely, the simulation of the request data sent to the data response end is realized; if the data to be processed is sent by the data response end, the data to be processed is the response data, and the encrypted simulation data is sent to the data request end at the moment, so that the simulation of the response data sent to the data request end is realized.
In one possible implementation, the encrypted analog data may also be sent to a designated data response side or designated data request side as required by product development or testing.
In the embodiment of the invention, the completely transparent and clear text display of the encrypted data sent by the data request end or the data response end is realized, so that the data can be directly modified on the basis of the decrypted data corresponding to the data to be processed under the condition that the operation instruction type for the data to be processed is the data simulation instruction, the corresponding simulation data is generated, and the target simulation data is encrypted and forwarded by utilizing the encryption algorithm which is the same as the encryption algorithm of the data to be processed, thereby simplifying the data processing process.
Referring to fig. 4, fig. 4 is a schematic diagram of an architecture of a processing method for transmitting data between devices according to an embodiment of the present invention. As shown in fig. 4, the electronic device receives the encrypted data request sent by the data request end (the receiving request in fig. 4), or receives the encrypted response data sent by the data response end (the receiving response in fig. 4), and determines the received data request or response data as the data to be processed, where the data to be processed carries the first index information, such as an index identifier or URL.
Further, whether the first index information corresponds to the first target index information is queried in a target encryption algorithm table (corresponding algorithm and key are queried according to the algorithm table in fig. 4), and the target encryption algorithm table comprises: the index information includes index identification, URL, encrypted data identification, and encrypted field (index, URL, request or response, algorithm, public key, key in fig. 4).
Under the condition that the first target index information is inquired, the target decryption algorithm and the target decryption key corresponding to the first target index information are utilized to decrypt the data to be processed to obtain decrypted data (decryption in fig. 4), and further, the decrypted data is visually displayed (request data after decryption is displayed by the UI in fig. 4).
Under the condition that the type of the operation instruction aiming at the data to be processed is a data looking-up instruction or the type of the operation instruction aiming at the data to be processed is a data modification instruction but no preset modification rule is adopted, decryption data is not required to be modified, and the original data to be processed can be directly forwarded to a data response end or a data request end (when no modification rule is adopted in fig. 4, contents can be transmitted, and encryption operation is not required to be carried out).
In the case that the type of the operation instruction for the data to be processed is a data modification instruction or a data simulation instruction, a preset modification or simulation data rule is read, and the decrypted data is modified according to the preset modification rule to obtain modified data, or the decrypted data is subjected to data simulation according to the preset simulation rule to obtain target simulation data (modification request (response) in fig. 4), for example, the modification or simulation data rule may be: 1. text 1 is replaced with text 2,2. Add request parameters a=1, etc.
Further, the modified data is encrypted by using the target encryption algorithm and the target encryption key corresponding to the first target index information to obtain encrypted modified data, or the target analog data is encrypted by using the target encryption algorithm and the target encryption key corresponding to the first target index information to obtain encrypted analog data (encryption in fig. 4), and then the encrypted modified data or the encrypted analog data is sent to the data responding end or the data requesting end (forwarding to the corresponding service (responding client) in fig. 4).
By applying the processing method for transmitting data between devices provided by the embodiment of the invention, the electronic device determines the target decryption algorithm and the target decryption key corresponding to the data to be processed sent by the data request end or the data response end by inquiring the target encryption algorithm table, and decrypts the data to be processed by utilizing the target decryption algorithm and the target decryption key, so that transparent automatic decryption of the encrypted data sent by the data request end or the data response end, namely transparent automatic decryption of the transmitted data between the data request end and the data response end, is realized, and the data processing process is simplified. In the process, code logic of an intrusion data request end and a data response end is not needed, a switch is not needed to be reserved between the data request end and the data response end to control whether data encryption is carried out or not, and the packing mode of the data is not needed to be adjusted, so that the data can be transmitted among devices coexisting in different services, fields and multiple encryption modes, transparent automatic encryption and decryption can be realized, the whole process is completely transparent to the data request end and the data response end, and clear text viewing, data modification and simulation, visual display, namely clear text display and the like can be carried out on decrypted data.
Fig. 5 is a schematic flow chart of a processing method for transmitting data between devices in an embodiment of the present invention, where the method is applicable to a middle service module deployed at a data request end or a data response end, and the data request end is connected to a data response end through a network, and the method includes:
s501, obtaining data to be processed, wherein the data to be processed carries first index information.
The data to be processed is encrypted data sent by a data request end or a data response end.
S502, determining a target decryption algorithm and a target decryption key corresponding to the first index information.
S503, decrypting the data to be processed by using the target decryption algorithm and the target decryption key to obtain decrypted data.
S504, responding to a data viewing instruction for the data to be processed, performing visual display on the decrypted data, and forwarding the data to be processed to a data response end or a data request end.
If the data to be processed is sent by the data request end, the data to be processed is indicated to be the request data, and the data to be processed is forwarded to the data response end at the moment; if the data to be processed is sent by the data response end, the data to be processed is indicated to be the response data, and the data to be processed is forwarded to the data request end at the moment.
By applying the processing method of the transmission data between the devices, which is provided by the embodiment of the invention, the middle station service module determines the target decryption algorithm and the target decryption key corresponding to the first index information through the first index information carried in the data to be processed, and decrypts the data to be processed by utilizing the target decryption algorithm and the target decryption key, thereby realizing transparent automatic decryption of the encrypted data sent by the data request end or the data response end, namely transparent automatic decryption of the transmission data between the data request end and the data response end, and simplifying the processing process of the data. And responding to a data viewing instruction aiming at the data to be processed, realizing complete transparency and plaintext display of the encrypted data sent by the data request end or the data response end, and simultaneously realizing the forwarding of the original ciphertext data.
In a possible implementation manner, the determining, in step S502, the target decryption algorithm and the target decryption key corresponding to the first index information includes:
inquiring first target index information corresponding to the first index information from a pre-constructed target encryption algorithm table, wherein the target encryption algorithm table comprises: the corresponding relation between the index information and the decryption algorithm and the decryption key;
Correspondingly, the step S503 decrypts the data to be processed by using the target decryption algorithm and the target decryption key to obtain decrypted data, which includes:
and decrypting the data to be processed by using a target decryption algorithm and a target decryption key corresponding to the first target index information to obtain decrypted data.
In one possible embodiment, the method further comprises:
responding to a data modification instruction aiming at the data to be processed, and modifying the decrypted data according to a preset modification rule to obtain modified data;
visually displaying the modified data;
encrypting the modified data by using a target encryption algorithm and a target encryption key corresponding to the first target index information to obtain encrypted modified data;
and sending the encrypted modified data to a data response end or a data request end.
In one possible embodiment, the method further comprises:
responding to a data simulation instruction aiming at the data to be processed, and performing data simulation on the decrypted data according to a preset simulation rule to obtain target simulation data;
visually displaying the target simulation data;
encrypting the target simulation data by using a target encryption algorithm and a target encryption key corresponding to the first target index information to obtain encrypted simulation data;
And sending the encrypted analog data to a data response end or a data request end.
Corresponding to the method embodiment, the embodiment of the invention also provides a corresponding device embodiment.
Fig. 6 is a schematic structural diagram of a processing apparatus for transmitting data between devices according to an embodiment of the present invention. The device is suitable for electronic equipment, and the electronic equipment is connected with a data request end and a data response end through a network respectively, and comprises:
the first data obtaining module 601 is configured to obtain data to be processed, where the data to be processed carries first index information; the data to be processed is encrypted data sent by a data request end or a data response end;
a first policy determining module 602, configured to determine a target decryption algorithm and a target decryption key corresponding to the first index information;
the first data processing module 603 is configured to decrypt the data to be processed by using the target decryption algorithm and the target decryption key, to obtain decrypted data.
By using the processing device for transmitting data between devices provided by the embodiment of the invention, the electronic device determines the target decryption algorithm and the target decryption key corresponding to the first index information through the first index information carried in the data to be processed, and decrypts the data to be processed by using the target decryption algorithm and the target decryption key, so that transparent automatic decryption of encrypted data sent by a data request end or a data response end is realized, namely, transparent automatic decryption of the data transmitted between the data request end and the data response end is realized, and the data processing process is simplified.
In a possible implementation manner, the first policy determining module 602 is specifically configured to query, from a pre-built target encryption algorithm table, first target index information corresponding to the first index information, where the target encryption algorithm table includes: the corresponding relation between the index information and the decryption algorithm and the decryption key;
the first data processing module 603 is specifically configured to decrypt the data to be processed by using a target decryption algorithm and a target decryption key corresponding to the first target index information, so as to obtain decrypted data.
In one possible embodiment, the apparatus further includes:
the instruction type acquisition module is used for acquiring an operation instruction type aiming at data to be processed; the operation instruction type comprises at least one of a data viewing instruction, a data modifying instruction and a data simulating instruction;
and the second data viewing module is used for responding to the data viewing instruction, visually displaying the decrypted data and forwarding the data to be processed to the data response end or the data request end.
In one possible embodiment, the apparatus further includes:
the first data modification module is used for responding to the data modification instruction and modifying the decrypted data according to a preset modification rule to obtain modified data;
The first data encryption module is used for encrypting the modified data by utilizing a target encryption algorithm and a target encryption key corresponding to the first target index information to obtain encrypted modified data;
and the first data forwarding module is used for sending the encrypted modified data to the data response end or the data request end.
In one possible embodiment, the apparatus further includes:
and the first display module is used for visually displaying the modified data.
In one possible embodiment, the apparatus further includes:
the first data simulation module is used for responding to the data simulation instruction and performing data simulation on the decrypted data according to a preset simulation rule to obtain target simulation data;
the second data encryption module is used for encrypting the target simulation data by utilizing a target encryption algorithm and a target encryption key corresponding to the first target index information to obtain encrypted simulation data;
and the second data forwarding module is used for sending the encrypted analog data to the data response end or the data request end.
In one possible embodiment, the apparatus further includes:
and the second display module is used for visually displaying the target simulation data.
In one possible embodiment, the index information includes an encrypted data identifier and an encrypted field;
the first data processing module 603 is specifically configured to:
determining encrypted data in the data to be processed based on the encrypted data identifier and the encrypted field in the first target index information;
and decrypting the encrypted data by using a target decryption algorithm and a target decryption key corresponding to the first target index information to obtain decrypted data.
Fig. 7 is a schematic diagram of another structure of a processing apparatus for transmitting data between devices according to an embodiment of the present invention. The device is suitable for a middle service module deployed at a data request end or a data response end, and the data request end is connected with the data response end through a network, and comprises:
a second data obtaining module 701, configured to obtain data to be processed, where the data to be processed carries first index information; the data to be processed is encrypted data sent by a data request end or a data response end;
a second policy determining module 702, configured to determine a target decryption algorithm and a target decryption key corresponding to the first index information;
a second data processing module 703, configured to decrypt the data to be processed by using the target decryption algorithm and the target decryption key, to obtain decrypted data;
The first data viewing module 704 is configured to respond to a data viewing instruction for the data to be processed, visually display the decrypted data, and forward the data to be processed to the data response end or the data request end.
The middle station service module determines the target decryption algorithm and the target decryption key corresponding to the first index information through the first index information carried in the data to be processed, decrypts the data to be processed by using the target decryption algorithm and the target decryption key, and realizes transparent automatic decryption of the encrypted data sent by the data request end or the data response end, namely transparent automatic decryption of the data to be transmitted between the data request end and the data response end, thereby simplifying the data processing process.
In a possible implementation manner, the second policy determining module 702 is specifically configured to query, from a pre-built target encryption algorithm table, first target index information corresponding to the first index information, where the target encryption algorithm table includes: the corresponding relation between the index information and the decryption algorithm and the decryption key;
the second data processing module 703 is specifically configured to decrypt the data to be processed by using a target decryption algorithm and a target decryption key corresponding to the first target index information, so as to obtain decrypted data.
In one possible embodiment, the apparatus further includes:
the second data modification module is used for responding to a data modification instruction for the data to be processed, and modifying the decrypted data according to a preset modification rule to obtain modified data;
the third display module is used for visually displaying the modified data;
the third data encryption module is used for encrypting the modified data by utilizing a target encryption algorithm and a target encryption key corresponding to the first target index information to obtain encrypted modified data;
and the third data forwarding module is used for sending the encrypted modified data to the data response end or the data request end.
In one possible embodiment, the apparatus further includes:
the second data simulation module is used for responding to a data simulation instruction aiming at the data to be processed and performing data simulation on the decrypted data according to a preset simulation rule to obtain target simulation data;
the fourth display module is used for visually displaying the target simulation data;
the fourth data encryption module is used for encrypting the target simulation data by utilizing a target encryption algorithm and a target encryption key corresponding to the first target index information to obtain encrypted simulation data;
And the fourth data forwarding module is used for sending the encrypted analog data to the data response end or the data request end.
Corresponding to the method embodiment, the embodiment of the invention also provides a corresponding system embodiment.
Referring to fig. 8, fig. 8 is a schematic diagram of a processing system for transmitting data between devices according to an embodiment of the present invention. The processing system for transmitting data between devices in the embodiment of the invention comprises the following steps: the data request end 801, the data response end 803 and the middle server end 802, wherein the middle server end 802 is respectively connected with the data request end 801 and the data response end 803 through a network;
the data request end 801 is configured to send a data request to the middle server end 802, where the data request carries second index information;
the middle server 802 is configured to receive a data request, determine a target decryption algorithm and a target decryption key corresponding to the second index information, decrypt the data request by using the target decryption algorithm and the target decryption key corresponding to the second index information, obtain first decrypted data, visually display the first decrypted data, and forward the data request to the data response 803;
the data response end 803 is configured to receive the data request, send response data corresponding to the data request to the middle server end 802, where the response data carries third index information;
The middle server 802 is further configured to receive the response data, determine a target decryption algorithm and a target decryption key corresponding to the third index information, decrypt the response data by using the target decryption algorithm and the target decryption key corresponding to the third index information, obtain second decrypted data, visually display the second decrypted data, and forward the response data to the data request 801;
the data request end 801 is further configured to receive response data.
By determining the target decryption algorithm and the target decryption key corresponding to the data request sent by the data request end and the target decryption algorithm and the target decryption key corresponding to the response data sent by the data response end, the middle server end decrypts the data request and the response data by respectively utilizing the corresponding target decryption algorithm and the target decryption key, so that transparent automatic decryption of the encrypted data sent by the data request end or the data response end is realized, namely transparent automatic decryption of the data transmitted between the data request end and the data response end is realized, and the data processing process is simplified.
The embodiment of the present invention also provides an electronic device, as shown in fig. 9, including a processor 901, a communication interface 902, a memory 903, and a communication bus 904, where the processor 901, the communication interface 902, and the memory 903 perform communication with each other through the communication bus 904,
A memory 903 for storing a computer program;
the processor 901 is configured to implement the steps of any of the above method embodiments when executing the program stored in the memory 903, so as to achieve the same technical effects.
The communication bus mentioned by the above terminal may be a peripheral component interconnect standard (Peripheral Component Interconnect, abbreviated as PCI) bus or an extended industry standard architecture (Extended Industry Standard Architecture, abbreviated as EISA) bus, etc. The communication bus may be classified as an address bus, a data bus, a control bus, or the like. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
The communication interface is used for communication between the terminal and other devices.
The memory may include random access memory (Random Access Memory, RAM) or non-volatile memory (non-volatile memory), such as at least one disk memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU for short), a network processor (Network Processor, NP for short), etc.; but also digital signal processors (Digital Signal Processor, DSP for short), application specific integrated circuits (Application Specific Integrated Circuit, ASIC for short), field-programmable gate arrays (Field-Programmable Gate Array, FPGA for short) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
In yet another embodiment of the present invention, there is further provided a computer readable storage medium having a computer program stored therein, which when executed by a processor, implements the steps of any of the method embodiments described above to achieve the same technical effects.
In yet another embodiment of the present invention, a computer program product comprising instructions which, when run on a computer, cause the computer to perform the steps of any of the method embodiments described above to achieve the same technical effect is also provided.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present invention, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another, for example, by wired (e.g., coaxial cable, optical fiber, digital Subscriber Line (DSL)), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), etc.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In this specification, each embodiment is described in a related manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for the apparatus/system/electronic device embodiments, the description is relatively simple as it is substantially similar to the method embodiments, as relevant points are found in the partial description of the method embodiments.
The foregoing description is only of the preferred embodiments of the present invention and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention are included in the protection scope of the present invention.

Claims (17)

1. The method is suitable for electronic equipment, and the electronic equipment is respectively connected with a data request end and a data response end in a network manner, and comprises the following steps:
acquiring data to be processed, wherein the data to be processed carries first index information; the data to be processed is encrypted data sent by the data request end or the data response end;
determining a target decryption algorithm and a target decryption key corresponding to the first index information;
and decrypting the data to be processed by using the target decryption algorithm and the target decryption key to obtain decrypted data.
2. The method of claim 1, wherein the determining a target decryption algorithm and a target decryption key corresponding to the first index information comprises:
inquiring first target index information corresponding to the first index information from a pre-constructed target encryption algorithm table, wherein the target encryption algorithm table comprises: the corresponding relation between the index information and the decryption algorithm and the decryption key;
The decrypting the data to be processed by using the target decryption algorithm and the target decryption key to obtain decrypted data includes:
and decrypting the data to be processed by using a target decryption algorithm and a target decryption key corresponding to the first target index information to obtain decrypted data.
3. The method according to claim 2, wherein in case the data to be processed is acquired, the method further comprises:
acquiring an operation instruction type aiming at the data to be processed; the operation instruction type comprises at least one of a data viewing instruction, a data modifying instruction and a data simulating instruction;
and responding to the data viewing instruction, visually displaying the decrypted data, and forwarding the data to be processed to the data response end or the data request end.
4. A method according to claim 3, characterized in that the method further comprises:
responding to the data modification instruction, and modifying the decrypted data according to a preset modification rule to obtain modified data;
encrypting the modified data by using a target encryption algorithm and a target encryption key corresponding to the first target index information to obtain encrypted modified data;
And sending the encrypted modified data to the data response end or the data request end.
5. The method according to claim 4, wherein the method further comprises:
and visually displaying the modified data.
6. A method according to claim 3, characterized in that the method further comprises:
responding to the data simulation instruction, and performing data simulation on the decrypted data according to a preset simulation rule to obtain target simulation data;
encrypting the target simulation data by using a target encryption algorithm and a target encryption key corresponding to the first target index information to obtain encrypted simulation data;
and sending the encrypted analog data to the data response end or the data request end.
7. The method of claim 6, wherein the method further comprises:
and visually displaying the target simulation data.
8. The method of claim 2, wherein the index information includes an encrypted data identification and an encrypted field;
the decrypting the data to be processed by using the target decryption algorithm and the target decryption key corresponding to the first target index information to obtain decrypted data includes:
Determining encrypted data in the data to be processed based on the encrypted data identifier and the encrypted field in the first target index information;
and decrypting the encrypted data by using a target decryption algorithm and a target decryption key corresponding to the first target index information to obtain decrypted data.
9. A processing method for transmitting data between devices, the method being suitable for a middle service module deployed at a data request end or a data response end, the data request end being connected to a data response end through a network, the method comprising:
acquiring data to be processed, wherein the data to be processed carries first index information; the data to be processed is encrypted data sent by the data request end or the data response end;
determining a target decryption algorithm and a target decryption key corresponding to the first index information;
decrypting the data to be processed by using the target decryption algorithm and the target decryption key to obtain decrypted data;
and responding to a data viewing instruction aiming at the data to be processed, visually displaying the decrypted data, and forwarding the data to be processed to the data response end or the data request end.
10. The method of claim 9, wherein the determining the target decryption algorithm and target decryption key corresponding to the first index information comprises:
inquiring first target index information corresponding to the first index information from a pre-constructed target encryption algorithm table, wherein the target encryption algorithm table comprises: the corresponding relation between the index information and the decryption algorithm and the decryption key;
the decrypting the data to be processed by using the target decryption algorithm and the target decryption key to obtain decrypted data includes:
and decrypting the data to be processed by using a target decryption algorithm and a target decryption key corresponding to the first target index information to obtain decrypted data.
11. The method according to claim 10, wherein the method further comprises:
responding to a data modification instruction aiming at the data to be processed, and modifying the decrypted data according to a preset modification rule to obtain modified data;
visually displaying the modified data;
encrypting the modified data by using a target encryption algorithm and a target encryption key corresponding to the first target index information to obtain encrypted modified data;
And sending the encrypted modified data to the data response end or the data request end.
12. The method according to claim 10, wherein the method further comprises:
responding to a data simulation instruction aiming at the data to be processed, and performing data simulation on the decrypted data according to a preset simulation rule to obtain target simulation data;
visually displaying the target simulation data;
encrypting the target simulation data by using a target encryption algorithm and a target encryption key corresponding to the first target index information to obtain encrypted simulation data;
and sending the encrypted analog data to the data response end or the data request end.
13. A processing apparatus for transmitting data between devices, the apparatus being adapted for use with an electronic device, the electronic device being respectively connected to a data request terminal and a data response terminal via a network, the apparatus comprising:
the first data acquisition module is used for acquiring data to be processed, wherein the data to be processed carries first index information; the data to be processed is encrypted data sent by the data request end or the data response end;
The first strategy determining module is used for determining a target decryption algorithm and a target decryption key corresponding to the first index information;
and the first data processing module is used for decrypting the data to be processed by utilizing the target decryption algorithm and the target decryption key to obtain decrypted data.
14. A processing apparatus for transmitting data between devices, the apparatus being adapted for a central service module deployed at a data request end or a data response end, the data request end being connected to a network of the data response end, the apparatus comprising:
the second data acquisition module is used for acquiring data to be processed, wherein the data to be processed carries first index information; the data to be processed is encrypted data sent by the data request end or the data response end;
the second strategy determining module is used for determining a target decryption algorithm and a target decryption key corresponding to the first index information;
the second data processing module is used for decrypting the data to be processed by utilizing the target decryption algorithm and the target decryption secret key to obtain decrypted data;
the first data viewing module is used for responding to a data viewing instruction aiming at the data to be processed, visually displaying the decrypted data and forwarding the data to be processed to the data response end or the data request end.
15. A processing system for transferring data between devices, the system comprising: the system comprises a data request end, a data response end and a middle server end, wherein the middle server end is respectively connected with the data request end and the data response end through a network;
the data request end is used for sending a data request to the middle server end, and the data request carries second index information;
the middle server is configured to receive the data request, determine a target decryption algorithm and a target decryption key corresponding to the second index information, decrypt the data request by using the target decryption algorithm and the target decryption key corresponding to the second index information, obtain first decrypted data, visually display the first decrypted data, and forward the data request to the data response end;
the data response end is configured to receive the data request, send response data corresponding to the data request to the middle server, where the response data carries third index information;
the middle server is further configured to receive the response data, determine a target decryption algorithm and a target decryption key corresponding to the third index information, decrypt the response data by using the target decryption algorithm and the target decryption key corresponding to the third index information, obtain second decrypted data, visually display the second decrypted data, and forward the response data to the data request terminal;
The data request terminal is further configured to receive the response data.
16. The electronic equipment is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory are communicated with each other through the communication bus;
a memory for storing a computer program;
a processor for carrying out the method steps of any one of claims 1-12 when executing a program stored on a memory.
17. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored therein a computer program which, when executed by a processor, implements the method steps of any of claims 1-12.
CN202310955417.2A 2023-08-01 2023-08-01 Processing method, device and system for transmission data between devices and electronic device Pending CN116996288A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310955417.2A CN116996288A (en) 2023-08-01 2023-08-01 Processing method, device and system for transmission data between devices and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310955417.2A CN116996288A (en) 2023-08-01 2023-08-01 Processing method, device and system for transmission data between devices and electronic device

Publications (1)

Publication Number Publication Date
CN116996288A true CN116996288A (en) 2023-11-03

Family

ID=88526057

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310955417.2A Pending CN116996288A (en) 2023-08-01 2023-08-01 Processing method, device and system for transmission data between devices and electronic device

Country Status (1)

Country Link
CN (1) CN116996288A (en)

Similar Documents

Publication Publication Date Title
US9608945B2 (en) Sending messages to multiple receiving electronic devices using a message server
EP3220573B1 (en) Method and system for controlling encryption of information and analyzing information as well as terminal
CN106599723B (en) File encryption method and device and file decryption method and device
CN104255009A (en) Systems and methods for segment integrity and authenticity for adaptive streaming
CN104113528A (en) Pre-posed gateway-based method and system for preventing sensitive information leakage
CN104602238A (en) Wireless network connecting method, device and system
CN112287372A (en) Method and apparatus for protecting clipboard privacy
CN112311769B (en) Method, system, electronic device and medium for security authentication
CN108549824A (en) A kind of data desensitization method and device
CN111246407B (en) Data encryption and decryption method and device for short message transmission
CN106789008B (en) Method, device and system for decrypting sharable encrypted data
CN109039997B (en) Secret key obtaining method, device and system
CN113656713B (en) Network resource processing method, device and system
CN116383867A (en) Data query method, device, electronic equipment and computer readable medium
CN110581838A (en) Method for continuously requesting data stream, electronic device and computer equipment
CN114499836A (en) Key management method, key management device, computer equipment and readable storage medium
CN113312655A (en) File transmission method based on redirection, electronic equipment and readable storage medium
JP2014106690A (en) Terminal equipment, server, content distribution system, content distribution method and program
CN107026828A (en) A kind of anti-stealing link method cached based on internet and internet caching
CN111181905B (en) File encryption method and device
CN116633582A (en) Secure communication method, apparatus, electronic device and storage medium
CN110008654B (en) Electronic file processing method and device
CN116996288A (en) Processing method, device and system for transmission data between devices and electronic device
KR20160123416A (en) Information security device, terminal, network having information security system and terminal
CN113946862A (en) Data processing method, device and equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination