CN117040882A - Black box processing method and system in data transmission process - Google Patents

Black box processing method and system in data transmission process Download PDF

Info

Publication number
CN117040882A
CN117040882A CN202311095205.8A CN202311095205A CN117040882A CN 117040882 A CN117040882 A CN 117040882A CN 202311095205 A CN202311095205 A CN 202311095205A CN 117040882 A CN117040882 A CN 117040882A
Authority
CN
China
Prior art keywords
compressed data
data
encrypted compressed
compression mode
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311095205.8A
Other languages
Chinese (zh)
Inventor
江鹏
刘小明
王磊
余斌
孙之雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Electronics Technology Changjiang Data Co ltd
Original Assignee
China Electronics Technology Changjiang Data Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Electronics Technology Changjiang Data Co ltd filed Critical China Electronics Technology Changjiang Data Co ltd
Priority to CN202311095205.8A priority Critical patent/CN117040882A/en
Publication of CN117040882A publication Critical patent/CN117040882A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/04Protocols for data compression, e.g. ROHC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a black box processing method and a device in a data transmission process, which relate to the technical field of computers, and the black box processing method in the data transmission process comprises the following steps: the method comprises the steps that a first user side carries out compression encryption on original data to obtain encrypted compressed data, and the encrypted compressed data and a compression mode are sent to a server; the server receives the encrypted compressed data, performs verification, and sends the encrypted compressed data after the compression mode and the verification pass to a second user terminal; and the second user side acquires the compression mode and the encrypted compressed data after the verification is passed, and decrypts and decompresses the encrypted compressed data to obtain the original data. The black box processing method in the data transmission process can improve the data efficiency and ensure the safety of data transmission.

Description

Black box processing method and system in data transmission process
Technical Field
The application relates to the technical field of computers, in particular to a black box processing method and a black box processing system in a data transmission process.
Background
With the development of the internet, the volume of data transmission is larger and larger, the requirement on security is higher and higher, most of transmission-based networks are shared networks and are limited by bandwidth, and in the process of transmitting large data volume, the data transmission efficiency is low and the data transmission security is low.
Particularly in many big data scenarios, if the transmission of 1G data is performed according to a normal transmission mode, for example, one 1G data at a time, the transmission of the data by the transmission party takes a lot of time to send the data, the reception party takes a lot of time to receive the data, the efficiency is very low, the data security is not guaranteed, and the data is lost, so that the data is stolen.
Disclosure of Invention
The application provides a black box processing method, a system, equipment and a storage medium in a data transmission process, which can reduce consumption of system resources and enhance system stability.
In order to achieve the above purpose, the application adopts the following technical scheme:
in a first aspect, a black box processing method in a data transmission process is provided, including the following steps:
the method comprises the steps that a first user side carries out compression encryption on original data to obtain encrypted compressed data, and the encrypted compressed data and a compression mode are sent to a server;
the server receives the encrypted compressed data, performs verification, and sends the encrypted compressed data after the compression mode and the verification pass to a second user terminal;
and the second user side acquires the compression mode and the encrypted compressed data after the verification is passed, and decrypts and decompresses the encrypted compressed data to obtain the original data.
In some embodiments, the first ue performs compression encryption on the original data to obtain encrypted compressed data, and sends the encrypted compressed data and a compression manner to a server, where the method includes:
according to the data type, selecting a proper method from four modes of gzip, snappy, lz4 and zstd for compression;
and encrypting the data according to the preset encryption times, and generating a secret key containing a compression mode.
In some embodiments, the server receives the encrypted compressed data and performs a verification comprising:
verifying the file according to the key, and judging whether the file is tampered;
and verifying whether the file is complete or not and whether the file is safe or not through the hash value.
The server records the IP of the first user terminal each time, and when the first user terminal with the same IP value continuously transmits for a plurality of times every second, the transmission is judged to be frequent;
in some embodiments, the server receives the encrypted compressed data and performs a verification, further comprising:
judging whether the encrypted compressed data is empty or not;
when the encrypted compressed data is a json object, judging whether the json format is correct or not;
judging whether the encrypted compressed data is a large amount of repeated data or not;
judging whether the first encrypted compressed data contains a blood fishy violence vocabulary or not according to a preset data blacklist;
when the first encrypted compressed data contains website connection, judging whether the website link is an illegal website or not.
In some embodiments, the obtaining, by the second user side, the encrypted compressed data after the compression mode and the verification pass, and performing decryption and decompression to obtain the original data includes:
when the size of the verified encrypted compressed data exceeds a preset size, the file is required to be segmented, the file is segmented into a plurality of sub-encrypted compressed data, and the plurality of sub-encrypted compressed data are simultaneously sent to a second user side.
In some embodiments, after the second user side obtains the second encrypted compressed data and the compression mode, the decrypting and decompressing are performed to obtain the original data, including:
when the second user side obtains the sub-encrypted compressed data, the plurality of sub-encrypted compressed data are automatically restored to obtain verified encrypted compressed data;
and decrypting and decompressing the verified encrypted compressed data according to the key containing the compression mode to obtain the original data.
In a second aspect, a black box processing system in a data transmission process is provided, which includes:
the first user terminal is used for compressing and encrypting the original data to obtain encrypted compressed data, and transmitting the encrypted compressed data and the compression mode to the server;
the server is used for receiving the encrypted compressed data, checking the encrypted compressed data and transmitting the encrypted compressed data after the compression mode and the checking pass to the second user terminal;
and the second user side is used for obtaining the compression mode and the encrypted compressed data after the verification is passed, and decrypting and decompressing the encrypted compressed data to obtain the original data.
In some embodiments, the first client is configured to:
according to the data type, selecting a proper method from four modes of gzip, snappy, lz4 and zstd for compression;
and encrypting the data according to the preset encryption times, and generating a secret key containing a compression mode.
In a third aspect, there is provided a computer device comprising: a processor, a memory, and a computer program stored on the memory and executable by the processor, wherein the computer program when executed by the processor implements the method of any of the first aspects.
In a fourth aspect, a computer readable storage medium is provided, on which a computer program is stored, wherein the computer program, when executed by a processor, implements the method according to any one of the first aspects.
In the application, a first user side carries out compression encryption on original data to obtain encrypted compressed data, and sends the encrypted compressed data and a compression mode to a server; the server receives the encrypted compressed data, performs verification, and sends the encrypted compressed data after the compression mode and the verification pass to a second user terminal; and the second user side acquires the compression mode and the encrypted compressed data after the verification is passed, and decrypts and decompresses the encrypted compressed data to obtain the original data. The application can improve the data efficiency and ensure the safety of data transmission.
Drawings
FIG. 1 is a flowchart of a black box processing method in a data transmission process according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a black box processing system in a data transmission process according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Referring to fig. 1, fig. 1 is a flow chart of a black box processing method in a data transmission process according to an embodiment of the present application. As shown in fig. 1, the method includes, but is not limited to, the steps of:
s1, a first user side carries out compression encryption on original data to obtain encrypted compressed data, and sends the encrypted compressed data and a compression mode to a server;
s2, the server receives the encrypted compressed data, performs verification, and sends the encrypted compressed data after the compression mode and the verification pass to a second user terminal;
s3, the second user side obtains the compression mode and the encrypted compressed data after the verification is passed, and decrypts and decompresses the encrypted compressed data to obtain the original data.
It is worth to say that, through verifying the encrypted compressed data by the server in step S2, it is verified whether the encrypted compressed data is tampered, safe, junk data, and frequent in transmission, when the detection is passed, the detected encrypted compressed data is sent to the second user side, so that the original data is prevented from being exposed, and meanwhile, the data content is detected, and the safety of data transmission is ensured.
In some embodiments, the first ue performs compression encryption on the original data to obtain encrypted compressed data, and sends the encrypted compressed data and a compression manner to a server, where the method includes:
according to the data type, selecting a proper method from four modes of gzip, snappy, lz4 and zstd for compression; and (3) compressing by an internal java program (jar packet), and decompressing by the data receiver according to the received compressed data and the compression mode by the internal java program (jar packet).
And encrypting the data according to the preset encryption times, and generating a secret key containing a compression mode.
The encryption times default once when encrypting, the encryption times can be defined by the data sender, the maximum encryption times are 3 times, the correctness of the key must be verified in advance when decrypting, the key is not exposed outwards, and the key is generated by the inside of the program and the rule is generated. Such as: and (3) constant and variable (such as date), then generating a string of secret keys by using irreversible encryption, packing the data once by the server according to the secret keys and the data after compression encryption, unpacking the data by a data receiver according to a secret key passing program, then decrypting the internal circulation of the java program for 3 times, judging whether the list is the encrypted data or not by the circulation program each time, and if the list is not the encrypted data, jumping out the circulation for the original data, and taking the final data by a data receiver.
In some embodiments, the server receives the encrypted compressed data and performs a verification comprising:
verifying the file according to the key, and judging whether the file is tampered;
and verifying whether the file is complete or not and whether the file is safe or not through the hash value.
The server records the IP of the first user terminal each time, and when the first user terminal with the same IP value continuously transmits for a plurality of times every second, the transmission is judged to be frequent;
in some embodiments, the server receives the encrypted compressed data and performs a verification, further comprising:
judging whether the encrypted compressed data is empty or not;
when the encrypted compressed data is a json object, judging whether the json format is correct or not;
judging whether the encrypted compressed data is a large amount of repeated data or not;
judging whether the first encrypted compressed data contains a blood fishy violence vocabulary or not according to a preset data blacklist;
when the first encrypted compressed data contains website connection, judging whether the website link is an illegal website or not.
In some embodiments, the obtaining, by the second user side, the encrypted compressed data after the compression mode and the verification pass, and performing decryption and decompression to obtain the original data includes:
when the size of the verified encrypted compressed data exceeds a preset size, the file is required to be segmented, the file is segmented into a plurality of sub-encrypted compressed data, and the plurality of sub-encrypted compressed data are simultaneously sent to a second user side.
For example: the preset data size is 200MB, but the received encrypted compressed data size is 1000MB, the server splits the received data into five groups of sub-encrypted compressed data with the size of 200MB, and simultaneously sends the sub-encrypted compressed data to a second user side, and the second user side automatically restores the five groups of sub-encrypted compressed data after receiving the sub-encrypted compressed data.
In some embodiments, after the second user side obtains the second encrypted compressed data and the compression mode, the decrypting and decompressing are performed to obtain the original data, including:
when the second user side obtains the sub-encrypted compressed data, the plurality of sub-encrypted compressed data are automatically restored to obtain verified encrypted compressed data;
and decrypting and decompressing the verified encrypted compressed data according to the key containing the compression mode to obtain the original data.
The method comprises the following steps: the method comprises the steps that a first user side carries out compression encryption on original data to obtain encrypted compressed data, and the encrypted compressed data and a compression mode are sent to a server; the server receives the encrypted compressed data, performs verification, and sends the encrypted compressed data after the compression mode and the verification pass to a second user terminal; and the second user side acquires the compression mode and the encrypted compressed data after the verification is passed, and decrypts and decompresses the encrypted compressed data to obtain the original data. The method can improve the data efficiency and ensure the safety of data transmission.
Referring to fig. 2, fig. 2 is a schematic diagram of a black box processing system in a data transmission process according to an embodiment of the present application, where the system includes:
the first user terminal is used for compressing and encrypting the original data to obtain encrypted compressed data, and transmitting the encrypted compressed data and the compression mode to the server;
the server is used for receiving the encrypted compressed data, checking the encrypted compressed data and transmitting the encrypted compressed data after the compression mode and the checking pass to the second user terminal;
and the second user side is used for obtaining the compression mode and the encrypted compressed data after the verification is passed, and decrypting and decompressing the encrypted compressed data to obtain the original data.
In some embodiments, the first client is configured to:
according to the data type, selecting a proper method from four modes of gzip, snappy, lz4 and zstd for compression;
and encrypting the data according to the preset encryption times, and generating a secret key containing a compression mode.
In some embodiments, the server is configured to:
verifying the file according to the key, and judging whether the file is tampered;
and verifying whether the file is complete or not and whether the file is safe or not through the hash value.
The server records the IP of the first user terminal each time, and when the first user terminal with the same IP value continuously transmits for a plurality of times every second, the transmission is judged to be frequent;
in some embodiments, the server is further configured to:
judging whether the encrypted compressed data is empty or not;
when the encrypted compressed data is a json object, judging whether the json format is correct or not;
judging whether the encrypted compressed data is a large amount of repeated data or not;
judging whether the first encrypted compressed data contains a blood fishy violence vocabulary or not according to a preset data blacklist;
when the first encrypted compressed data contains website connection, judging whether the website link is an illegal website or not.
In some embodiments, the server is configured to:
when the size of the verified encrypted compressed data exceeds a preset size, the file is required to be segmented, the file is segmented into a plurality of sub-encrypted compressed data, and the plurality of sub-encrypted compressed data are simultaneously sent to a second user side.
In some embodiments, the second client is configured to:
when the sub-encrypted compressed data is obtained, the plurality of sub-encrypted compressed data are automatically restored, and verified encrypted compressed data are obtained;
and decrypting and decompressing the verified encrypted compressed data according to the key containing the compression mode to obtain the original data.
It should be noted that, step numbers of each step in the embodiment of the present application are not limited to the order of each operation in the technical solution of the present application.
It should be noted that, for convenience and brevity of description, the specific working process of the above-described apparatus and units may refer to the corresponding process in the embodiment of the black box processing method in the foregoing data transmission process, which is not described herein again.
The apparatus provided by the above embodiments may be implemented in the form of a computer program which may be run on a computer device as shown in fig. 3.
The embodiment of the application also provides computer equipment, which comprises: the system comprises a memory, a processor and a network interface which are connected through a system bus, wherein at least one instruction is stored in the memory, and the at least one instruction is loaded and executed by the processor so as to realize all or part of the steps of the black box processing method in the data transmission process.
Wherein the network interface is used for network communication, such as sending assigned tasks, etc. It will be appreciated by those skilled in the art that the structure shown in FIG. 3 is merely a block diagram of some of the structures associated with the present inventive arrangements and is not limiting of the computer device to which the present inventive arrangements may be applied, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
The processor may be a CPU, but may also be other general purpose processors, DSPs (Digital Signal Processor, digital signal processors), ASICs (Application Specific Integrated Circuit, application specific integrated circuits), FPGAs (Field Programmable Gate Array, field programmable gate arrays) or other programmable logic devices, discrete gate or transistor logic device discrete hardware components, etc. A general purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like, that is a control center of a computer device, with various interfaces and lines connecting various parts of the entire computer device.
The memory may be used to store computer programs and/or modules, and the processor implements various functions of the computer device by running or executing the computer programs and/or modules stored in the memory, and invoking data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, application programs required for at least one function (such as a video playing function, an image playing function, etc.), and the like; the storage data area may store data (such as video data, image data, etc.) created according to the use of the cellular phone, etc. In addition, the memory may include high-speed random access memory, and may also include nonvolatile memory, such as a hard disk, memory, plug-in hard disk, SMC (Smart Media Card), SD (Secure digital) Card, flash Card (Flash Card), at least one disk storage device, flash memory device, or other volatile solid-state storage device.
The embodiment of the application also provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor, implements all or part of the steps of the black box processing method in the data transmission process.
The foregoing all or part of the flow may be implemented by a computer program for instructing the relevant hardware, and the computer program may be stored in a computer readable storage medium, where the computer program when executed by a processor may implement the steps of each method described above. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, executable files or in some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer memory, a ROM (Read-Only memory), a RAM (Random Access memory), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth. It should be noted that the content of the computer readable medium can be appropriately increased or decreased according to the requirements of the jurisdiction's jurisdiction and the patent practice, for example, in some jurisdictions, the computer readable medium does not include electrical carrier signals and telecommunication signals according to the jurisdiction and the patent practice.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, server, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, magnetic disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing is only a specific embodiment of the application to enable those skilled in the art to understand or practice the application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. The black box processing method in the data transmission process is characterized by comprising the following steps of:
the method comprises the steps that a first user side carries out compression encryption on original data to obtain encrypted compressed data, and the encrypted compressed data and a compression mode are sent to a server;
the server receives the encrypted compressed data, performs verification, and sends the encrypted compressed data after the compression mode and the verification pass to a second user terminal;
and the second user side acquires the compression mode and the encrypted compressed data after the verification is passed, and decrypts and decompresses the encrypted compressed data to obtain the original data.
2. The black box processing method in the data transmission process of claim 1, wherein the first client performs compression encryption on the original data to obtain encrypted compressed data, and sends the encrypted compressed data and the compression mode to the server, and the method comprises the steps of:
according to the data type, selecting a proper method from four modes of gzip, snappy, lz4 and zstd for compression;
and encrypting the data according to the preset encryption times, and generating a secret key containing a compression mode.
3. The black box processing method in a data transmission process according to claim 1, wherein the server receives the encrypted compressed data and performs a check, comprising:
verifying the file according to the key, and judging whether the file is tampered;
and verifying whether the file is complete or not and whether the file is safe or not through the hash value.
The server records the IP of the first user terminal each time, and when the first user terminal with the same IP value continuously transmits for a plurality of times every second, the transmission is judged to be frequent.
4. A black-box processing method in a data transmission process according to claim 3, wherein the server receives the encrypted compressed data and performs a check, further comprising:
judging whether the encrypted compressed data is empty or not;
when the encrypted compressed data is a json object, judging whether the json format is correct or not;
judging whether the encrypted compressed data is a large amount of repeated data or not;
judging whether the first encrypted compressed data contains a blood fishy violence vocabulary or not according to a preset data blacklist;
when the first encrypted compressed data contains website connection, judging whether the website link is an illegal website or not.
5. The black box processing method in the data transmission process of claim 4, wherein the second client obtains the encrypted compressed data after the compression mode and the check pass, and performs decryption and decompression to obtain the original data, comprising:
when the size of the verified encrypted compressed data exceeds a preset size, the file is required to be segmented, the file is segmented into a plurality of sub-encrypted compressed data, and the plurality of sub-encrypted compressed data are simultaneously sent to a second user side.
6. The black box processing method in the data transmission process of claim 5, wherein after the second user side obtains the second encrypted compressed data and the compression mode, performing decryption and decompression to obtain the original data, the method comprises the following steps:
when the second user side obtains the sub-encrypted compressed data, the plurality of sub-encrypted compressed data are automatically restored to obtain verified encrypted compressed data;
and decrypting and decompressing the verified encrypted compressed data according to the key containing the compression mode to obtain the original data.
7. A black box processing system in a data transmission process, comprising:
the first user terminal is used for compressing and encrypting the original data to obtain encrypted compressed data, and transmitting the encrypted compressed data and the compression mode to the server;
the server is used for receiving the encrypted compressed data, checking the encrypted compressed data and transmitting the encrypted compressed data after the compression mode and the checking pass to the second user terminal;
and the second user side is used for obtaining the compression mode and the encrypted compressed data after the verification is passed, and decrypting and decompressing the encrypted compressed data to obtain the original data.
8. The black box processing method in a data transmission process of claim 7, wherein the first client is configured to:
according to the data type, selecting a proper method from four modes of gzip, snappy, lz4 and zstd for compression;
and encrypting the data according to the preset encryption times, and generating a secret key containing a compression mode.
9. A computer device comprising a processor, a memory, and a computer program stored on the memory and executable by the processor, wherein the computer program when executed by the processor performs the steps of any of claims 1 to 6.
10. A computer readable storage medium, characterized in that the computer readable storage medium has stored thereon a computer program, wherein the computer program, when being executed by a processor, realizes the steps of the method according to any of claims 1 to 6.
CN202311095205.8A 2023-08-28 2023-08-28 Black box processing method and system in data transmission process Pending CN117040882A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311095205.8A CN117040882A (en) 2023-08-28 2023-08-28 Black box processing method and system in data transmission process

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311095205.8A CN117040882A (en) 2023-08-28 2023-08-28 Black box processing method and system in data transmission process

Publications (1)

Publication Number Publication Date
CN117040882A true CN117040882A (en) 2023-11-10

Family

ID=88622738

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311095205.8A Pending CN117040882A (en) 2023-08-28 2023-08-28 Black box processing method and system in data transmission process

Country Status (1)

Country Link
CN (1) CN117040882A (en)

Similar Documents

Publication Publication Date Title
CN109194625B (en) Client application protection method and device based on cloud server and storage medium
US11907700B2 (en) Upgrading method and system, server, and terminal device
CN107786331B (en) Data processing method, device, system and computer readable storage medium
US20170171166A1 (en) Anti-hotlinking method and electronic device
CN107864117B (en) Webpage interception method and device and computer readable storage medium
CN111314288B (en) Relay processing method, relay processing device, server, and storage medium
WO2004042537A2 (en) System and method for securing digital messages
CN112272314B (en) Method, device, equipment and medium for safely transmitting video in video network
CN112153015A (en) Multi-encryption interface authentication method, device, equipment and readable storage medium
CN112199622A (en) Page jump method, system and storage medium
CN111934873A (en) Bidding file encryption and decryption method and device
CN113515766A (en) File transmission method and device
CN108737353B (en) Data encryption method and device based on data analysis system
CN116455572B (en) Data encryption method, device and equipment
CN115935388B (en) Software package safe sending method, device, equipment and storage medium
CN110971581B (en) Encrypted data processing method and device
US10320559B2 (en) Network communication encoder using key pattern encryption
CN117040882A (en) Black box processing method and system in data transmission process
CN115567297A (en) Cross-site request data processing method and device
CN115567271A (en) Authentication method and device, page skip method and device, electronic equipment and medium
CN109145645B (en) Method for protecting short message verification code in android mobile phone
CN116318686B (en) Data encryption transmission method and device, electronic equipment and storage medium
CN114826729B (en) Data processing method, page updating method and related hardware
CN114629671B (en) Data detection system
CN114531284B (en) Data encryption method, device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination