CN117014229B - Service data safety transmission method and system - Google Patents

Service data safety transmission method and system Download PDF

Info

Publication number
CN117014229B
CN117014229B CN202311268261.7A CN202311268261A CN117014229B CN 117014229 B CN117014229 B CN 117014229B CN 202311268261 A CN202311268261 A CN 202311268261A CN 117014229 B CN117014229 B CN 117014229B
Authority
CN
China
Prior art keywords
data
service
marks
sequence
variables
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311268261.7A
Other languages
Chinese (zh)
Other versions
CN117014229A (en
Inventor
兰满桔
吴俊刚
赵伟锋
张宇文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Shanghang Information Technology Co ltd
Original Assignee
Guangzhou Shanghang Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Shanghang Information Technology Co ltd filed Critical Guangzhou Shanghang Information Technology Co ltd
Priority to CN202311268261.7A priority Critical patent/CN117014229B/en
Publication of CN117014229A publication Critical patent/CN117014229A/en
Application granted granted Critical
Publication of CN117014229B publication Critical patent/CN117014229B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Abstract

The invention discloses a method and a system for safely transmitting service data, comprising the following steps: acquiring service data to be transmitted, and analyzing the service data to obtain a data mark and a data variable; constructing a first password sequence, and sending the first password sequence to the service terminal so that the service terminal generates and returns a data table to be filled according to the first password sequence; generating a description file filled with the simulation data to obtain a complete data table; the service terminal constructs and returns a second password sequence according to the complete data table; and analyzing the second password sequence, carrying out security check on the analysis result and the description file, encrypting the description file through the second password sequence, decrypting the description file by the service terminal, and carrying out data cleaning on the obtained complete data table according to the decrypted description file to finally obtain the actual service data. The invention solves the technical problem of low service data security caused by easy interception and copying of service data in the prior art.

Description

Service data safety transmission method and system
Technical Field
The present invention relates to the field of data security transmission technologies, and in particular, to a method and a system for securely transmitting service data.
Background
With the development of internet technology and communication service systems, a large amount of service data are received, stored, transmitted and processed by a service platform server, and the data in multiple aspects and dimensions are involved, so that the amount of service data required to be transmitted is extremely large, and meanwhile, a large amount of service data belong to sensitive data, and the service data which is not protected by a key cannot be simply transmitted.
At present, before the transmission of service data, encryption protection and transmission of the service data can be realized by means of encryption of a secret key, encryption verification of terminal identity, and the like, but in the actual service data transmission process, because the data volume of the service data is huge, the service data is intercepted from a service terminal and is easy to be reversely positioned, so lawless persons usually intercept and copy the service data in a service data transmission link, and then the original service data is transmitted to the service terminal in a return value link, so that the encryption verification of the secret key, the terminal identity verification, and the like are difficult to identify lawless persons, and meanwhile, the mode of intercepting the service data in the transmission is difficult to be reversely positioned, and the problem of whether the service data is leaked or not is difficult to be distinguished, so that the security of the service data is lower.
Therefore, a method for avoiding easy interception and duplication of service data and improving the security of service data transmission is needed.
Disclosure of Invention
The invention provides a service data security transmission method and a system, which are used for solving the technical problem that service data is easy to be intercepted and copied, so that the service data security is low in the prior art.
In order to solve the above technical problems, an embodiment of the present invention provides a method for securely transmitting service data, including:
acquiring service data to be transmitted, and analyzing the service data to obtain a data mark and a data variable; wherein, the business data comprises a plurality of data marks and corresponding data variables;
constructing a first password sequence according to the number of the data marks, the corresponding data variables and the sequence of the data marks obtained when the service data are analyzed, and sending the first password sequence to a service terminal so that the service terminal generates and returns a data table to be filled according to the first password sequence; each data mark corresponds to a password sequence value corresponding to a first password sequence, and the number of table marks and the number of table variables in the data table to be filled are respectively the same as the number of the data marks and the maximum data volume of the data variables;
Responding to the data table to be filled returned by the service terminal, filling the data variables with analog data so that the data sizes of the data variables corresponding to all the data marks are the same, generating a description file for filling the analog data, and inputting the data variables filled with the analog data into the data table to be filled to obtain a complete data table;
encrypting the complete data table according to the first password sequence and sending the encrypted complete data table to the service terminal, so that the service terminal decrypts the complete data table according to the first password sequence after receiving the complete data table, and constructs and returns a second password sequence according to the number of data marks in the complete data table, corresponding data variables and the sequence of the data marks in the complete data table;
and responding to a second password sequence returned by the service terminal, analyzing the second password sequence, carrying out security check on an analysis result and the description file, encrypting the description file through the second password sequence after the security check is passed, and sending the description file to the service terminal so that the service terminal decrypts the obtained description file according to the second password sequence, and carrying out data cleaning on the obtained complete data table according to the decrypted description file to finally obtain actual service data.
As a preferred scheme, the method includes the steps of obtaining service data to be sent, and analyzing the service data to obtain a data mark and a data variable, specifically:
acquiring service data to be transmitted, and analyzing to obtain a plurality of data marks according to the type of the service data;
and according to the time relation of the service data, analyzing and obtaining a data variable which is corresponding to each data mark and changes along with the time change.
As a preferred solution, the constructing a first password sequence according to the number of the data flags, the corresponding data variables, and the sequence of the data flags obtained when the service data is analyzed specifically includes:
according to the sequence of obtaining the data marks when analyzing the service data, combining the number of the data marks and the data variables of the corresponding data marks, sequentially generating a first password sequence value for each data mark, and constructing the generated first password sequence value according to the generation sequence to obtain a first password sequence; wherein each first cipher sequence value may describe the order of the corresponding data flags in all data flags, the data size of the corresponding data variable, and the time relationship.
As a preferred solution, the filling of the analog data is performed on the data variables, so that the data sizes of the data variables corresponding to all the data marks are the same, and a description file of the filled analog data is generated, so that the data variables after the analog data are filled are input into the data table to be filled, and a complete data table is obtained, specifically:
calculating the quantity of the analog data required to be filled in each data mark according to the maximum value of the data quantity of the data variable corresponding to all the data marks, thereby respectively calculating the analog data required to be filled in each data mark according to the data variable in each data mark in sequence, and filling the analog data in the data variable by combining the time relation of the service data so as to ensure that the data quantity of the data variable corresponding to all the data marks reaches the maximum value;
generating a description file of filling simulation data according to the simulation data corresponding to each data mark, the quantity of the simulation data to be filled and the filling time position;
and sequentially inputting the data variables of the analog data filled by the data marks into the data table to be filled, so that when the data quantity of the data variables of each data mark is larger than the number of the table variables in the data table to be filled or the numerical value corresponding to the sequence of the data marks is larger than the number of the table marks in the data table to be filled in the process of inputting the data variables of each data mark into the data table to be filled, generating a hidden danger alarm for the safe transmission of the service data until all the data marks and the data variables corresponding to the data marks are input into the data table to be filled, and obtaining a complete data table.
As a preferred solution, the constructing and returning a second password sequence according to the number of the data marks in the complete data table, the corresponding data variables and the sequence of the data marks in the complete data table specifically includes:
according to the sequence of the data marks in the complete data table, combining the number of the data marks in the complete data table and the data variables of the corresponding data marks, sequentially generating a second password sequence value for the data marks in each complete data table, and constructing the generated second password sequence value according to the generation sequence to obtain a second password sequence; wherein each second cipher sequence value may describe the order of the corresponding data flags in all data flags, the data size of the corresponding data variable, and the time relationship.
As a preferred solution, the parsing of the second password sequence, and the security verification of the parsed result and the description file are performed, and after the security verification is passed, the description file is encrypted by the second password sequence and then sent to the service terminal, specifically:
analyzing the second password sequence to obtain file information describing the sequence of the data marks in the complete data table in all the data marks, the data volume of the corresponding data variables and the time relation, and comparing the file information with the service data to obtain difference data;
And when the difference data is consistent with the simulation data of the description file, the security check is passed, and the description file is encrypted through a second password sequence and then sent to the service terminal.
Preferably, the method further comprises:
and carrying out data slicing on the description file, generating a hash value on the description file after the data slicing, creating a header file according to the description file after the data slicing, and sending the description file after the data slicing and the header file to the service terminal when the difference data are consistent with the simulation data of the description file, so that the service terminal carries out hash value verification on the description file after the data slicing and the header file, and integrating the data slicing by the service terminal to obtain a complete description file after the hash value verification is successful.
Correspondingly, the invention also provides a service data security transmission system, which comprises: a server and a service terminal;
the server comprises: the device comprises an analysis module, a first password sequence module, a description file module, an encryption module and a security verification module;
the analysis module is used for acquiring service data to be sent and analyzing the service data to obtain a data mark and a data variable; wherein, the business data comprises a plurality of data marks and corresponding data variables;
The first password sequence module is used for constructing a first password sequence according to the number of the data marks, the corresponding data variables and the sequence of the data marks obtained when the service data are analyzed, and sending the first password sequence to the service terminal; each data mark corresponds to a password sequence value corresponding to a first password sequence, and the number of table marks and the number of table variables in the data table to be filled are respectively the same as the number of the data marks and the maximum data volume of the data variables;
the description file module is used for responding to the data table to be filled returned by the service terminal, filling the data variables with analog data so that the data sizes of the data variables corresponding to all the data marks are the same, generating a description file for filling the analog data, and inputting the data variables after filling the analog data into the data table to be filled to obtain a complete data table;
the encryption module is used for encrypting the complete data table according to the first password sequence and sending the encrypted complete data table to the service terminal so that the service terminal receives the complete data table;
The security verification module is used for responding to a second password sequence returned by the service terminal, analyzing the second password sequence, carrying out security verification on an analysis result and the description file, and after the security verification is passed, encrypting the description file through the second password sequence and then sending the description file to the service terminal;
the service terminal is used for generating and returning a data table to be filled according to the first password sequence; after the complete data table is received, decrypting the complete data table according to the first password sequence, and constructing and returning a second password sequence according to the number of data marks in the complete data table, corresponding data variables and the sequence of the data marks in the complete data table; decrypting the obtained description file according to the second password sequence, and cleaning the data of the obtained complete data table according to the decrypted description file to finally obtain the actual service data.
Correspondingly, the invention also provides a terminal device, which comprises a processor, a memory and a computer program stored in the memory and configured to be executed by the processor, wherein the processor realizes the service data security transmission method according to any one of the above when executing the computer program.
Correspondingly, the invention further provides a computer readable storage medium, the computer readable storage medium comprises a stored computer program, and the equipment where the computer readable storage medium is located is controlled to execute the service data security transmission method according to any one of the above when the computer program runs.
Compared with the prior art, the embodiment of the invention has the following beneficial effects:
according to the technical scheme, the service data are analyzed to obtain a plurality of data marks and corresponding data variables, the first password sequence is generated according to the number, the sequence and the data variables of the data marks, so that after the service is interrupted, a second password sequence corresponding to the complete data table is generated and returned, the situation that lawless persons take the identity of the service terminal to read the service data through intercepting transmission data in the middle is avoided, the identity verification and the determination of the service terminal are realized through returning the data table to be filled, the data variables are simulated to input the data variables of the returned data table to be filled, the corresponding complete data table is sent to the service terminal, even if lawless persons obtain the corresponding service data, the lawless persons have meaningless data after filling a large amount of simulated data, the second password sequence corresponding to the complete data table is constructed through the service terminal, the description file is finally sent to the corresponding service terminal when the security verification is passed through intercepting transmission data, the service terminal is further used for obtaining the description file, the service data can be further solved, the service data can be further required to be completely read by the service terminal, the service data can be further solved, the service data can be completely cannot be completely and the service data can be completely and the data can be completely solved, and the service can be further prevented from being transmitted by the molecular data can be completely, and the service can be completely and the data can be completely not be completely copied, and the data can be completely easily detected by a method is required by a molecular method and the service can be easily and the data can be easily solved.
Drawings
Fig. 1: the method for safely transmitting the service data comprises the following steps of a flow chart;
fig. 2: the method and the device are schematic diagrams of the analyzed service data provided by the embodiment of the invention;
fig. 3: the embodiment of the invention provides a structural schematic diagram of a service data security transmission system.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, a method for securely transmitting service data according to an embodiment of the present invention includes steps S101 to S105:
step S101: acquiring service data to be transmitted, and analyzing the service data to obtain a data mark and a data variable; the service data comprises a plurality of data marks and corresponding data variables.
As a preferred scheme, the method includes the steps of obtaining service data to be sent, and analyzing the service data to obtain a data mark and a data variable, specifically:
acquiring service data to be transmitted, and analyzing to obtain a plurality of data marks according to the type of the service data; and according to the time relation of the service data, analyzing and obtaining a data variable which is corresponding to each data mark and changes along with the time change.
In this embodiment, for different application fields, the types of service data also greatly differ, for example: for business data in the e-commerce field, user data, behavior data, product data, comment data and the like may be involved, and for mobile communication field, user data, flow data, communication duration and the like may be involved. However, the service data may be divided into data flags, data variables, and other information according to the division of the data structure, where the data variables are specific values, for example: the user ID, the value of the commodity number, the value of the commodity data amount, the value of the commodity browsing record, the value of the flow data, etc., and the data flag is a description of the corresponding data variable, i.e., a specific actual concept describing a specific numerical value, for example: for one of the pieces of traffic data information, { (traffic data) | (167M, 2M,36M,84M,1328M,25M,3524M, …, 92M) }, where "traffic data" is a data flag, "(167M, 2M,36M,84M,1328M,25M,3524M, …, 92M)" is a data variable, and each element thereof is a value of the data variable.
Further, since the values of the corresponding data variables are different for one data flag at different times, the time relationship of the service data can be further analyzed to obtain the data variable corresponding to each data flag and changing with time, that is, "167M", "2M", "36M" … "92M" of the data variable at the corresponding time node. Preferably, the interval of the time nodes can be set by the actual traffic data requirements.
Step S102: constructing a first password sequence according to the number of the data marks, the corresponding data variables and the sequence of the data marks obtained when the service data are analyzed, and sending the first password sequence to a service terminal so that the service terminal generates and returns a data table to be filled according to the first password sequence; and the number of table marks and the number of table variables in the data table to be filled are respectively the same as the number of the data marks and the maximum data volume of the data variables.
As a preferred solution, the constructing a first password sequence according to the number of the data flags, the corresponding data variables, and the sequence of the data flags obtained when the service data is analyzed specifically includes:
According to the sequence of obtaining the data marks when analyzing the service data, combining the number of the data marks and the data variables of the corresponding data marks, sequentially generating a first password sequence value for each data mark, and constructing the generated first password sequence value according to the generation sequence to obtain a first password sequence; wherein each first cipher sequence value may describe the order of the corresponding data flags in all data flags, the data size of the corresponding data variable, and the time relationship.
In this embodiment, please refer to fig. 2, which is a schematic diagram of the parsed service data, wherein circles are data variables corresponding to the data tag at different times, and diagonal lines are data variables corresponding to the data tag at the times. Therefore, the sequence of each data mark can be obtained through the analyzed service data, and the first password sequence value corresponding to each data mark can be obtained in sequence by combining the number of the data marks and the data variable corresponding to the data mark.
For example, the first cipher sequence value corresponding to each data flag may not be a value of the same number of bits, for example, when n=11, m=100, the number of data flags is 11, and the value of the data variable existing in each data flag may be obtained. For example, if "data flag 1" has 65 data variables in total, so the first cipher sequence value of "data flag 1" is (1065001003039100), wherein the first bit "1" represents the order of "data flag 1", the second to fourth bits "065" are 65 data variables in number, and "001" and "003" represent the data variables present in time 1 to time 3, and "039" and "100" represent the data variables present in time 39 to time 100; since the data variable is present in a certain time interval, two boundary time points are necessarily present, the analysis can be performed by actually setting the time requirement of the service data after the number of the data variables.
Further, the data length of the first cipher sequence value is not necessarily the same for different data flags. And combining the obtained first password sequence values corresponding to the data marks according to the sequence of the data marks to obtain a first password sequence which is unique to the service data and can also be used as a unique key for encrypting the service data.
In this embodiment, after receiving the corresponding first password sequence, the service terminal can parse the first password sequence, so as to obtain the number of data marks corresponding to the service data and the data marks corresponding to the data variable with the maximum number, and further generate the corresponding data table to be filled. The number of table marks and the number of table variables in the data table to be filled are respectively the same as the number of the data marks and the maximum data amount of the data variables.
Step S103: and responding to the data table to be filled returned by the service terminal, filling the data variables with analog data so that the data sizes of the data variables corresponding to all the data marks are the same, generating a description file for filling the analog data, and inputting the data variables filled with the analog data into the data table to be filled to obtain a complete data table.
As a preferred solution, the filling of the analog data is performed on the data variables, so that the data sizes of the data variables corresponding to all the data marks are the same, and a description file of the filled analog data is generated, so that the data variables after the analog data are filled are input into the data table to be filled, and a complete data table is obtained, specifically:
calculating the quantity of the analog data required to be filled in each data mark according to the maximum value of the data quantity of the data variable corresponding to all the data marks, thereby respectively calculating the analog data required to be filled in each data mark according to the data variable in each data mark in sequence, and filling the analog data in the data variable by combining the time relation of the service data so as to ensure that the data quantity of the data variable corresponding to all the data marks reaches the maximum value; generating a description file of filling simulation data according to the simulation data corresponding to each data mark, the quantity of the simulation data to be filled and the filling time position; and sequentially inputting the data variables of the analog data filled by the data marks into the data table to be filled, so that when the data quantity of the data variables of each data mark is larger than the number of the table variables in the data table to be filled or the numerical value corresponding to the sequence of the data marks is larger than the number of the table marks in the data table to be filled in the process of inputting the data variables of each data mark into the data table to be filled, generating a hidden danger alarm for the safe transmission of the service data until all the data marks and the data variables corresponding to the data marks are input into the data table to be filled, and obtaining a complete data table.
In this embodiment, the maximum value of the data amount of the data variable corresponding to all the data flags is calculated, that is, the data flag with the largest data variable is searched out, so that the number of data variable filling required by each data flag can be obtained, so that the number of data variables corresponding to each data flag is the same and is the maximum value.
The filled analog data can be obtained from all the data variables corresponding to the data flag. Preferably, the average value, the median value, the extreme value and the like of all the data variables of the data mark can be calculated as corresponding analog data. And then the filled service data are sequentially input into the data table to be filled, so as to judge whether the service data cannot be fully filled into the data table to be filled or whether the filling of the data cannot be realized by the existence of the spare table, and further judge whether the hidden danger alarm for the safety transmission of the service data is generated. In the actual operation process, the first password sequence corresponds to the analyzed service data, so that the analyzed service data is filled with the maximum value of the number of data variables, the data to be filled generated according to the first password sequence corresponds to the data table to be filled one by one, when the data cannot be input one by one, the first password sequence sent to the service terminal is indicated to have the risk of tampering, and therefore, the potential safety hazard warning of the service data transmission is generated, the manager can be reminded of the risk of the service data transmission, the service data transmission is interrupted, the risk of service data leakage is avoided, and the safety of the service data is improved.
Step S104: and encrypting the complete data table according to the first password sequence and sending the encrypted complete data table to the service terminal, so that the service terminal decrypts the complete data table according to the first password sequence after receiving the complete data table, and constructs and returns a second password sequence according to the number of data marks in the complete data table, corresponding data variables and the sequence of the data marks in the complete data table.
As a preferred solution, the constructing and returning a second password sequence according to the number of the data marks in the complete data table, the corresponding data variables and the sequence of the data marks in the complete data table specifically includes:
according to the sequence of the data marks in the complete data table, combining the number of the data marks in the complete data table and the data variables of the corresponding data marks, sequentially generating a second password sequence value for the data marks in each complete data table, and constructing the generated second password sequence value according to the generation sequence to obtain a second password sequence; wherein each second cipher sequence value may describe the order of the corresponding data flags in all data flags, the data size of the corresponding data variable, and the time relationship.
In this embodiment, the complete data table is encrypted by the first cipher sequence as an encryption key and sent to the service terminal. The encryption algorithm includes, but is not limited to, a symmetric key encryption algorithm, an asymmetric key encryption algorithm, a hash algorithm, and the like.
Further, the service terminal decrypts the complete data table according to the first password sequence obtained in advance, so that the complete data table is obtained, and the security check of the corresponding service data can be returned by generating the second password sequence for the complete data table, so that the security in the data transmission process is improved, and the check of the leakage risk of the data transmission is realized.
It should be noted that, the second password sequence is obtained according to the number of data flags in the complete data table, the corresponding data variables and the sequence of the data flags in the complete data table, and the logic is similar to that of the first password sequence, but because the number of the data variables corresponding to the data flags in the complete data table is changed, the specific values of the corresponding second password sequence are different, for example: the second cryptographic sequence describes the order of the data flags, the number of data variables, and the information of all time nodes. Illustratively, a second cryptographic sequence (2089001100) represents a data flag 2, there are 89 data variables, and the data variables all overlap from time 1 to time 100. The second cipher sequence mainly describes the data mark in the complete data table, namely the corresponding data variable, so that the specific form can be set according to the type, condition and other factors of the actual service data.
Step S105: and responding to a second password sequence returned by the service terminal, analyzing the second password sequence, carrying out security check on an analysis result and the description file, encrypting the description file through the second password sequence after the security check is passed, and sending the description file to the service terminal so that the service terminal decrypts the obtained description file according to the second password sequence, and carrying out data cleaning on the obtained complete data table according to the decrypted description file to finally obtain actual service data.
As a preferred solution, the parsing of the second password sequence, and the security verification of the parsed result and the description file are performed, and after the security verification is passed, the description file is encrypted by the second password sequence and then sent to the service terminal, specifically:
analyzing the second password sequence to obtain file information describing the sequence of the data marks in the complete data table in all the data marks, the data volume of the corresponding data variables and the time relation, and comparing the file information with the service data to obtain difference data; and when the difference data is consistent with the simulation data of the description file, the security check is passed, and the description file is encrypted through a second password sequence and then sent to the service terminal.
In this embodiment, in response to the second password sequence returned by the service terminal and analysis is performed, file information describing the sequence of the data flags in the complete data table in all the data flags, the data size of the corresponding data variables and the time relationship can be obtained, so that when the data flags and the data variables are compared with each other through the file information, relevant data information of the complete data table in the service terminal and the service data are obtained, the obtained difference data are different, and therefore the difference between the complete data table and the service data is the filled analog data (the analog data in the description file) under the condition that all the data in the transmission process are not intercepted and tampered, and therefore, the risk of data leakage exists in the transmission process through the fact that the difference data correspond to the analog data in the description file, the corresponding description file cannot be sent to the service terminal, and the complete data table possibly having the leakage is filled with the analog data, so that the service data obtained by an illegal molecule are also data without practical meaning, and the risk of data leakage in the transmission process is greatly reduced.
Further, when the difference data is consistent with the analog data of the description file, it is indicated that the risk of leakage of the service data does not exist in the process of multiple data transmission, so that the description file is encrypted through the second password sequence and then sent to the service terminal, so that the service terminal can decrypt the description file according to the generated second password sequence, and therefore data cleaning of a complete data table can be achieved according to the description file, a large amount of meaningless analog data is washed away, and final practical service data is obtained.
Preferably, the method further comprises:
and carrying out data slicing on the description file, generating a hash value on the description file after the data slicing, creating a header file according to the description file after the data slicing, and sending the description file after the data slicing and the header file to the service terminal when the difference data are consistent with the simulation data of the description file, so that the service terminal carries out hash value verification on the description file after the data slicing and the header file, and integrating the data slicing by the service terminal to obtain a complete description file after the hash value verification is successful.
In this embodiment, after the description file is generated, the description file is subjected to data slicing, so that a corresponding hash value and a corresponding header file are generated, the security of transmission of the description file can be further improved, the cost of cracking the first password sequence, the second password sequence, the hash value and the header file by an lawless person is increased, and the security of service data transmission can be further improved.
Further, hash value verification is carried out on the description file and the header file after the data slicing at the service terminal, and after the hash value verification is successful, the complete description file can be accurately recovered and obtained through integration of the data slicing.
It can be understood that in this embodiment, since there is only one transmission of service data in the whole service data transmission process, and the other transmission of the password sequence, the description file, and the like is performed, it is difficult for an lawbreaker to determine the form of the corresponding service data through the intercepted sequence, so that the possibility that the service data is leaked is greatly reduced, and even if the lawbreaker intercepts the corresponding service data, the complete data table has a large amount of useless data, so that the data cannot be accurately cleaned, and the obtained meaningless service data cannot achieve the purpose of intercepting the service data without a sender, that is, the purpose of accurately, efficiently and safely transmitting the service data is further achieved.
The implementation of the above embodiment has the following effects:
according to the technical scheme, the service data are analyzed to obtain a plurality of data marks and corresponding data variables, the first password sequence is generated according to the number, the sequence and the data variables of the data marks, so that after the service is interrupted, a second password sequence corresponding to the complete data table is generated and returned, the situation that lawless persons take the identity of the service terminal to read the service data through intercepting transmission data in the middle is avoided, the identity verification and the determination of the service terminal are realized through returning the data table to be filled, the data variables are simulated to input the data variables of the returned data table to be filled, the corresponding complete data table is sent to the service terminal, even if lawless persons obtain the corresponding service data, the lawless persons have meaningless data after filling a large amount of simulated data, the second password sequence corresponding to the complete data table is constructed through the service terminal, the description file is finally sent to the corresponding service terminal when the security verification is passed through intercepting transmission data, the service terminal is further used for obtaining the description file, the service data can be further solved, the service data can be further required to be completely read by the service terminal, the service data can be further solved, the service data can be completely cannot be completely and the service data can be completely and the data can be completely solved, and the service can be further prevented from being transmitted by the molecular data can be completely, and the service can be completely and the data can be completely not be completely copied, and the data can be completely easily detected by a method is required by a molecular method and the service can be easily and the data can be easily solved.
Fig. 3 is a schematic diagram of a service data security transmission system according to an embodiment of the present invention, including: a server 01 and a service terminal 02.
The server 01 includes: a parsing module 011, a first cipher sequence module 012, a description file module 013, an encryption module 014 and a security verification module 015.
The analysis module 011 is configured to obtain service data to be sent, and analyze the service data to obtain a data flag and a data variable; the service data comprises a plurality of data marks and corresponding data variables.
The first code sequence module 012 is configured to construct a first code sequence according to the number of the data flags, the corresponding data variables, and the sequence of the data flags obtained when the service data is parsed, and send the first code sequence to a service terminal; and the number of table marks and the number of table variables in the data table to be filled are respectively the same as the number of the data marks and the maximum data volume of the data variables.
The description file module 013 is configured to respond to the to-be-filled data table returned by the service terminal, fill the data variable with analog data, so that the data sizes of the data variables corresponding to all the data marks are the same, and generate a description file for filling the analog data, thereby inputting the data variable after filling the analog data into the to-be-filled data table to obtain a complete data table.
The encryption module 014 is configured to encrypt the complete data table according to the first password sequence and send the encrypted complete data table to the service terminal, so that the service terminal receives the complete data table.
The security verification module 015 is configured to respond to a second password sequence returned by the service terminal, parse the second password sequence, perform security verification on the parsed result and the description file, and encrypt the description file through the second password sequence and send the encrypted description file to the service terminal after the security verification is passed.
The service terminal 02 is configured to generate and return a data table to be filled according to the first password sequence; after the complete data table is received, decrypting the complete data table according to the first password sequence, and constructing and returning a second password sequence according to the number of data marks in the complete data table, corresponding data variables and the sequence of the data marks in the complete data table; decrypting the obtained description file according to the second password sequence, and cleaning the data of the obtained complete data table according to the decrypted description file to finally obtain the actual service data.
As a preferred scheme, the method includes the steps of obtaining service data to be sent, and analyzing the service data to obtain a data mark and a data variable, specifically:
acquiring service data to be transmitted, and analyzing to obtain a plurality of data marks according to the type of the service data; and according to the time relation of the service data, analyzing and obtaining a data variable which is corresponding to each data mark and changes along with the time change.
As a preferred solution, the constructing a first password sequence according to the number of the data flags, the corresponding data variables, and the sequence of the data flags obtained when the service data is analyzed specifically includes:
according to the sequence of obtaining the data marks when analyzing the service data, combining the number of the data marks and the data variables of the corresponding data marks, sequentially generating a first password sequence value for each data mark, and constructing the generated first password sequence value according to the generation sequence to obtain a first password sequence; wherein each first cipher sequence value may describe the order of the corresponding data flags in all data flags, the data size of the corresponding data variable, and the time relationship.
As a preferred solution, the filling of the analog data is performed on the data variables, so that the data sizes of the data variables corresponding to all the data marks are the same, and a description file of the filled analog data is generated, so that the data variables after the analog data are filled are input into the data table to be filled, and a complete data table is obtained, specifically:
Calculating the quantity of the analog data required to be filled in each data mark according to the maximum value of the data quantity of the data variable corresponding to all the data marks, thereby respectively calculating the analog data required to be filled in each data mark according to the data variable in each data mark in sequence, and filling the analog data in the data variable by combining the time relation of the service data so as to ensure that the data quantity of the data variable corresponding to all the data marks reaches the maximum value; generating a description file of filling simulation data according to the simulation data corresponding to each data mark, the quantity of the simulation data to be filled and the filling time position; and sequentially inputting the data variables of the analog data filled by the data marks into the data table to be filled, so that when the data quantity of the data variables of each data mark is larger than the number of the table variables in the data table to be filled or the numerical value corresponding to the sequence of the data marks is larger than the number of the table marks in the data table to be filled in the process of inputting the data variables of each data mark into the data table to be filled, generating a hidden danger alarm for the safe transmission of the service data until all the data marks and the data variables corresponding to the data marks are input into the data table to be filled, and obtaining a complete data table.
As a preferred solution, the constructing and returning a second password sequence according to the number of the data marks in the complete data table, the corresponding data variables and the sequence of the data marks in the complete data table specifically includes:
according to the sequence of the data marks in the complete data table, combining the number of the data marks in the complete data table and the data variables of the corresponding data marks, sequentially generating a second password sequence value for the data marks in each complete data table, and constructing the generated second password sequence value according to the generation sequence to obtain a second password sequence; wherein each second cipher sequence value may describe the order of the corresponding data flags in all data flags, the data size of the corresponding data variable, and the time relationship.
As a preferred solution, the parsing of the second password sequence, and the security verification of the parsed result and the description file are performed, and after the security verification is passed, the description file is encrypted by the second password sequence and then sent to the service terminal, specifically:
analyzing the second password sequence to obtain file information describing the sequence of the data marks in the complete data table in all the data marks, the data volume of the corresponding data variables and the time relation, and comparing the file information with the service data to obtain difference data; and when the difference data is consistent with the simulation data of the description file, the security check is passed, and the description file is encrypted through a second password sequence and then sent to the service terminal.
Preferably, the method further comprises:
and carrying out data slicing on the description file, generating a hash value on the description file after the data slicing, creating a header file according to the description file after the data slicing, and sending the description file after the data slicing and the header file to the service terminal when the difference data are consistent with the simulation data of the description file, so that the service terminal carries out hash value verification on the description file after the data slicing and the header file, and integrating the data slicing by the service terminal to obtain a complete description file after the hash value verification is successful.
It will be clear to those skilled in the art that, for convenience and brevity of description, reference may be made to the corresponding process in the foregoing method embodiment for the specific working process of the above-described apparatus, which is not described herein again.
The implementation of the above embodiment has the following effects:
according to the technical scheme, the service data are analyzed to obtain a plurality of data marks and corresponding data variables, the first password sequence is generated according to the number, the sequence and the data variables of the data marks, so that after the service is interrupted, a second password sequence corresponding to the complete data table is generated and returned, the situation that lawless persons take the identity of the service terminal to read the service data through intercepting transmission data in the middle is avoided, the identity verification and the determination of the service terminal are realized through returning the data table to be filled, the data variables are simulated to input the data variables of the returned data table to be filled, the corresponding complete data table is sent to the service terminal, even if lawless persons obtain the corresponding service data, the lawless persons have meaningless data after filling a large amount of simulated data, the second password sequence corresponding to the complete data table is constructed through the service terminal, the description file is finally sent to the corresponding service terminal when the security verification is passed through intercepting transmission data, the service terminal is further used for obtaining the description file, the service data can be further solved, the service data can be further required to be completely read by the service terminal, the service data can be further solved, the service data can be completely cannot be completely and the service data can be completely and the data can be completely solved, and the service can be further prevented from being transmitted by the molecular data can be completely, and the service can be completely and the data can be completely not be completely copied, and the data can be completely easily detected by a method is required by a molecular method and the service can be easily and the data can be easily solved.
In a third embodiment, correspondingly, the present invention further provides a terminal device, including: a processor, a memory, and a computer program stored in the memory and configured to be executed by the processor, the processor implementing the traffic data secure transmission method according to any one of the embodiments above when the computer program is executed.
The terminal device of this embodiment includes: a processor, a memory, a computer program stored in the memory and executable on the processor, and computer instructions. The processor, when executing the computer program, implements the steps of the first embodiment described above, such as steps S101 to S105 shown in fig. 1. Alternatively, the processor, when executing the computer program, performs the functions of the modules/units in the apparatus embodiments described above, for example, a description file module 013.
The computer program may be divided into one or more modules/units, which are stored in the memory and executed by the processor to accomplish the present invention, for example. The one or more modules/units may be a series of computer program instruction segments capable of performing the specified functions, which instruction segments are used for describing the execution of the computer program in the terminal device. For example, the description file module 013 is configured to respond to the to-be-filled data table returned by the service terminal, fill the data variable with analog data, so that the data sizes of the data variables corresponding to all the data marks are the same, and generate a description file for filling the analog data, thereby inputting the data variable after filling the analog data into the to-be-filled data table, and obtaining a complete data table.
The terminal equipment can be computing equipment such as a desktop computer, a notebook computer, a palm computer, a cloud server and the like. The terminal device may include, but is not limited to, a processor, a memory. It will be appreciated by those skilled in the art that the schematic diagram is merely an example of a terminal device and does not constitute a limitation of the terminal device, and may include more or less components than illustrated, or may combine some components, or different components, e.g., the terminal device may further include an input-output device, a network access device, a bus, etc.
The processor may be a central processing unit (Central Processing Unit, CPU), other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), off-the-shelf programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. The general purpose processor may be a microprocessor or the processor may be any conventional processor or the like, which is a control center of the terminal device, and which connects various parts of the entire terminal device using various interfaces and lines.
The memory may be used to store the computer program and/or the module, and the processor may implement various functions of the terminal device by running or executing the computer program and/or the module stored in the memory and invoking data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created according to the use of the mobile terminal, etc. In addition, the memory may include high-speed random access memory, and may also include non-volatile memory, such as a hard disk, memory, plug-in hard disk, smart Media Card (SMC), secure Digital (SD) Card, flash Card (Flash Card), at least one disk storage device, flash memory device, or other volatile solid-state storage device.
Wherein the terminal device integrated modules/units may be stored in a computer readable storage medium if implemented in the form of software functional units and sold or used as stand alone products. Based on such understanding, the present invention may implement all or part of the flow of the method of the above embodiment, or may be implemented by a computer program to instruct related hardware, where the computer program may be stored in a computer readable storage medium, and when the computer program is executed by a processor, the computer program may implement the steps of each of the method embodiments described above. Wherein the computer program comprises computer program code which may be in source code form, object code form, executable file or some intermediate form etc. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth. It should be noted that the computer readable medium contains content that can be appropriately scaled according to the requirements of jurisdictions in which such content is subject to legislation and patent practice, such as in certain jurisdictions in which such content is subject to legislation and patent practice, the computer readable medium does not include electrical carrier signals and telecommunication signals.
In a fourth embodiment, correspondingly, the present invention further provides a computer readable storage medium, where the computer readable storage medium includes a stored computer program, and when the computer program runs, the device where the computer readable storage medium is controlled to execute the method for securely transmitting service data according to any one of the above embodiments.
The foregoing embodiments have been provided for the purpose of illustrating the general principles of the present invention, and are not to be construed as limiting the scope of the invention. It should be noted that any modifications, equivalent substitutions, improvements, etc. made by those skilled in the art without departing from the spirit and principles of the present invention are intended to be included in the scope of the present invention.

Claims (10)

1. A method for securely transmitting service data, comprising:
acquiring service data to be transmitted, and analyzing the service data to obtain a data mark and a data variable; wherein, the business data comprises a plurality of data marks and corresponding data variables;
constructing a first password sequence according to the number of the data marks, the corresponding data variables and the sequence of the data marks obtained when the service data are analyzed, and sending the first password sequence to a service terminal so that the service terminal generates and returns a data table to be filled according to the first password sequence; each data mark corresponds to a password sequence value corresponding to a first password sequence, and the number of table marks and the number of table variables in the data table to be filled are respectively the same as the number of the data marks and the maximum data volume of the data variables;
Responding to the data table to be filled returned by the service terminal, filling the data variables with analog data so that the data sizes of the data variables corresponding to all the data marks are the same, generating a description file for filling the analog data, and inputting the data variables filled with the analog data into the data table to be filled to obtain a complete data table;
encrypting the complete data table according to the first password sequence and sending the encrypted complete data table to the service terminal, so that the service terminal decrypts the complete data table according to the first password sequence after receiving the complete data table, and constructs and returns a second password sequence according to the number of data marks in the complete data table, corresponding data variables and the sequence of the data marks in the complete data table;
and responding to a second password sequence returned by the service terminal, analyzing the second password sequence, carrying out security check on an analysis result and the description file, encrypting the description file through the second password sequence after the security check is passed, and sending the description file to the service terminal so that the service terminal decrypts the obtained description file according to the second password sequence, and carrying out data cleaning on the obtained complete data table according to the decrypted description file to finally obtain actual service data.
2. The method for securely transmitting service data according to claim 1, wherein the obtaining service data to be transmitted and analyzing the service data obtain data marks and data variables specifically comprises:
acquiring service data to be transmitted, and analyzing to obtain a plurality of data marks according to the type of the service data;
and according to the time relation of the service data, analyzing and obtaining a data variable which is corresponding to each data mark and changes along with the time change.
3. The method for securely transmitting service data according to claim 2, wherein the constructing a first cipher sequence according to the number of the data flags, the corresponding data variables, and the order of the data flags obtained when the service data is parsed comprises:
according to the sequence of obtaining the data marks when analyzing the service data, combining the number of the data marks and the data variables of the corresponding data marks, sequentially generating a first password sequence value for each data mark, and constructing the generated first password sequence value according to the generation sequence to obtain a first password sequence; wherein each first cipher sequence value may describe the order of the corresponding data flags in all data flags, the data size of the corresponding data variable, and the time relationship.
4. The method for securely transmitting service data according to claim 3, wherein the filling of analog data is performed on the data variables so that the data sizes of the data variables corresponding to all the data marks are the same, and a description file of the filled analog data is generated, so that the data variables after the filling of the analog data are input into the data table to be filled to obtain a complete data table, specifically:
calculating the quantity of the analog data required to be filled in each data mark according to the maximum value of the data quantity of the data variable corresponding to all the data marks, thereby respectively calculating the analog data required to be filled in each data mark according to the data variable in each data mark in sequence, and filling the analog data in the data variable by combining the time relation of the service data so as to ensure that the data quantity of the data variable corresponding to all the data marks reaches the maximum value;
generating a description file of filling simulation data according to the simulation data corresponding to each data mark, the quantity of the simulation data to be filled and the filling time position;
and sequentially inputting the data variables of the analog data filled by the data marks into the data table to be filled, so that when the data quantity of the data variables of each data mark is larger than the number of the table variables in the data table to be filled or the numerical value corresponding to the sequence of the data marks is larger than the number of the table marks in the data table to be filled in the process of inputting the data variables of each data mark into the data table to be filled, generating a hidden danger alarm for the safe transmission of the service data until all the data marks and the data variables corresponding to the data marks are input into the data table to be filled, and obtaining a complete data table.
5. The method for securely transmitting service data according to claim 4, wherein the constructing and returning the second password sequence according to the number of the data flags in the complete data table, the corresponding data variables and the sequence of the data flags in the complete data table specifically comprises:
according to the sequence of the data marks in the complete data table, combining the number of the data marks in the complete data table and the data variables of the corresponding data marks, sequentially generating a second password sequence value for the data marks in each complete data table, and constructing the generated second password sequence value according to the generation sequence to obtain a second password sequence; wherein each second cipher sequence value may describe the order of the corresponding data flags in all data flags, the data size of the corresponding data variable, and the time relationship.
6. The method for securely transmitting service data according to claim 5, wherein the second password sequence is parsed, and the parsed result is securely checked with the description file, and when the security check is passed, the description file is encrypted by the second password sequence and then transmitted to the service terminal, specifically:
Analyzing the second password sequence to obtain file information describing the sequence of the data marks in the complete data table in all the data marks, the data volume of the corresponding data variables and the time relation, and comparing the file information with the service data to obtain difference data;
and when the difference data is consistent with the simulation data of the description file, the security check is passed, and the description file is encrypted through a second password sequence and then sent to the service terminal.
7. The method for securely transmitting service data according to claim 6, further comprising:
and carrying out data slicing on the description file, generating a hash value on the description file after the data slicing, creating a header file according to the description file after the data slicing, and sending the description file after the data slicing and the header file to the service terminal when the difference data are consistent with the simulation data of the description file, so that the service terminal carries out hash value verification on the description file after the data slicing and the header file, and integrating the data slicing by the service terminal to obtain a complete description file after the hash value verification is successful.
8. A system for secure transmission of service data, comprising: a server and a service terminal;
the server comprises: the device comprises an analysis module, a first password sequence module, a description file module, an encryption module and a security verification module;
the analysis module is used for acquiring service data to be sent and analyzing the service data to obtain a data mark and a data variable; wherein, the business data comprises a plurality of data marks and corresponding data variables;
the first password sequence module is used for constructing a first password sequence according to the number of the data marks, the corresponding data variables and the sequence of the data marks obtained when the service data are analyzed, and sending the first password sequence to the service terminal so that the service terminal generates and returns a data table to be filled according to the first password sequence; each data mark corresponds to a password sequence value corresponding to a first password sequence, and the number of table marks and the number of table variables in the data table to be filled are respectively the same as the number of the data marks and the maximum data volume of the data variables;
the description file module is used for responding to the data table to be filled returned by the service terminal, filling the data variables with analog data so that the data sizes of the data variables corresponding to all the data marks are the same, generating a description file for filling the analog data, and inputting the data variables after filling the analog data into the data table to be filled to obtain a complete data table;
The encryption module is used for encrypting the complete data table according to the first password sequence and sending the encrypted complete data table to the service terminal so that the service terminal receives the complete data table;
the security verification module is used for responding to a second password sequence returned by the service terminal, analyzing the second password sequence, carrying out security verification on an analysis result and the description file, and after the security verification is passed, encrypting the description file through the second password sequence and then sending the description file to the service terminal;
the service terminal is used for generating and returning a data table to be filled according to the first password sequence; after the complete data table is received, decrypting the complete data table according to the first password sequence, and constructing and returning a second password sequence according to the number of data marks in the complete data table, corresponding data variables and the sequence of the data marks in the complete data table; decrypting the obtained description file according to the second password sequence, and cleaning the data of the obtained complete data table according to the decrypted description file to finally obtain the actual service data.
9. A terminal device comprising a processor, a memory and a computer program stored in the memory and configured to be executed by the processor, the processor implementing the traffic data secure transmission method according to any one of claims 1 to 7 when the computer program is executed.
10. A computer readable storage medium, characterized in that the computer readable storage medium comprises a stored computer program, wherein the computer program, when run, controls a device in which the computer readable storage medium is located to perform the method for secure transmission of service data according to any one of claims 1 to 7.
CN202311268261.7A 2023-09-28 2023-09-28 Service data safety transmission method and system Active CN117014229B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311268261.7A CN117014229B (en) 2023-09-28 2023-09-28 Service data safety transmission method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311268261.7A CN117014229B (en) 2023-09-28 2023-09-28 Service data safety transmission method and system

Publications (2)

Publication Number Publication Date
CN117014229A CN117014229A (en) 2023-11-07
CN117014229B true CN117014229B (en) 2024-01-05

Family

ID=88562146

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311268261.7A Active CN117014229B (en) 2023-09-28 2023-09-28 Service data safety transmission method and system

Country Status (1)

Country Link
CN (1) CN117014229B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109191194A (en) * 2018-08-22 2019-01-11 腾讯科技(深圳)有限公司 A kind of card certificate data processing method, equipment, system and storage medium
CN110166234A (en) * 2019-05-21 2019-08-23 阿里巴巴集团控股有限公司 A kind of creation of business cipher key and business datum encryption method, apparatus and system
WO2020237868A1 (en) * 2019-05-24 2020-12-03 平安科技(深圳)有限公司 Data transmission method, electronic device, server and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109191194A (en) * 2018-08-22 2019-01-11 腾讯科技(深圳)有限公司 A kind of card certificate data processing method, equipment, system and storage medium
CN110166234A (en) * 2019-05-21 2019-08-23 阿里巴巴集团控股有限公司 A kind of creation of business cipher key and business datum encryption method, apparatus and system
WO2020237868A1 (en) * 2019-05-24 2020-12-03 平安科技(深圳)有限公司 Data transmission method, electronic device, server and storage medium

Also Published As

Publication number Publication date
CN117014229A (en) 2023-11-07

Similar Documents

Publication Publication Date Title
US9836612B2 (en) Protecting data
CN107770159B (en) Vehicle accident data recording method and related device and readable storage medium
CN108985081A (en) A kind of watermark encrypting method, apparatus, medium and electronic equipment
CN112751852A (en) Data transmission method and related equipment
CN104283853A (en) Method, terminal device and network device for improving information safety
CN105871805A (en) Anti-stealing-link method and device
CN110061967A (en) Business datum providing method, device, equipment and computer readable storage medium
CN110995720A (en) Encryption method, device, host terminal and encryption chip
CN111404892B (en) Data supervision method and device and server
CN111628863B (en) Data signature method and device, electronic equipment and storage medium
CN111246407B (en) Data encryption and decryption method and device for short message transmission
CN117014229B (en) Service data safety transmission method and system
CN109547404B (en) Data acquisition method and server
CN116663030A (en) Desensitization processing method and device for interactive data
CN115758432A (en) Omnibearing data encryption method and system based on machine learning algorithm
CN112910641B (en) Verification method and device for cross-link transaction supervision, relay link node and medium
CN114036546A (en) Identity verification method and device based on mobile phone number, computer equipment and medium
CN114491661A (en) Log tamper-proofing method and system based on block chain
CN111130788B (en) Data processing method and system, data reading method and iSCSI server
CN114117388A (en) Device registration method, device registration apparatus, electronic device, and storage medium
CN117596086B (en) Commodity data encryption transmission method and system based on supply chain
CN115935388B (en) Software package safe sending method, device, equipment and storage medium
CN112559825B (en) Service processing method, device, computing equipment and medium
CN114006689B (en) Data processing method, device and medium based on federal learning
Dewangan et al. Privacy Preservation in Cloud Platform Using Fully Homomorphic Encryption Techniques

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant