WO2024109211A1 - 数据处理方法及系统、电子设备和计算机可读存储介质 - Google Patents

数据处理方法及系统、电子设备和计算机可读存储介质 Download PDF

Info

Publication number
WO2024109211A1
WO2024109211A1 PCT/CN2023/114409 CN2023114409W WO2024109211A1 WO 2024109211 A1 WO2024109211 A1 WO 2024109211A1 CN 2023114409 W CN2023114409 W CN 2023114409W WO 2024109211 A1 WO2024109211 A1 WO 2024109211A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
hole
information
attribute information
processed
Prior art date
Application number
PCT/CN2023/114409
Other languages
English (en)
French (fr)
Inventor
曹耀斌
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2024109211A1 publication Critical patent/WO2024109211A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Definitions

  • the present application relates to the field of data processing technology, and in particular to a data processing method, a data processing system, an electronic device, and a computer-readable storage medium.
  • an embodiment of the present application provides a data processing method, including: determining attribute information of a hole, processing original data based on the attribute information of the hole to obtain hole data; and processing the hole data to obtain target data.
  • an embodiment of the present application provides a data processing method, comprising: acquiring attribute information of a hole from a preset storage area, the attribute information of the hole matching the target data; The hole data is extracted according to the attribute information of the hole to obtain the data to be decrypted; and the data to be decrypted is decrypted and the decrypted data is backfilled into the hole corresponding to the data to be decrypted to obtain the original data.
  • an embodiment of the present application provides a data processing system, comprising: at least one of an encryption device and a decryption device; the encryption device is configured to execute the data processing method in the first aspect of the present application; the decryption device is configured to execute the data processing method in the second aspect of the present application.
  • an embodiment of the present application provides an electronic device, comprising: at least one processor; and a memory, on which at least one computer program is stored, and when the at least one computer program is executed by the at least one processor, the at least one processor implements the data processing method provided by the present application.
  • an embodiment of the present application provides a computer-readable storage medium, which stores a computer program.
  • the processor When the computer program is executed by a processor, the processor enables the processor to implement the data processing method provided by the present application.
  • FIG1 is a schematic flow chart of a data processing method provided in an embodiment of the present application.
  • FIG2 is a schematic flow chart of a data processing method provided in an embodiment of the present application.
  • FIG3 shows a block diagram of the encryption device provided in an embodiment of the present application.
  • FIG4 shows a block diagram of the decryption device provided in an embodiment of the present application.
  • FIG5 is a block diagram showing the composition of a data processing system provided in an embodiment of the present application.
  • FIG6 is a flow chart showing a working method of a data processing system provided in an embodiment of the present application.
  • FIG. 7 is a schematic diagram showing raw data including holes provided in an embodiment of the present application.
  • FIG8 is a block diagram showing an exemplary hardware architecture of a computing device capable of implementing the data processing method and apparatus according to an embodiment of the present application.
  • the following methods can be used to protect data: encrypt the data as a whole and decrypt the encrypted data when using it to obtain the original data; or obtain the user's authorization to facilitate data management.
  • the above management method using user authorization cannot reversely process binary data, cannot guarantee that users obtain complete data, and reduces the accuracy of data.
  • the data also needs to be further encrypted to ensure data security.
  • the above-mentioned method of encrypting and protecting the entire data is suitable for data with a smaller amount of data (for example, encryption of a text file, etc.).
  • the relevant encryption methods include: file header encryption and stream encryption.
  • File header encryption is to encrypt the data header information of the file. It is a partial encryption method with weak encryption strength. It can be applied to video or audio players, etc. However, when the file is actually used, the actual content of the file can be obtained by skipping the data header information of the file, which reduces the security of the file.
  • stream encryption is slightly more secure by encrypting the entire file. For example, when playing a file, it is necessary to decrypt the file while playing it. If the file has a large amount of data, it will increase the user's waiting time and reduce the user's experience. In addition, if a third-party device obtains the decryption method corresponding to its encryption method, it is easy to cause the entire file to be stolen.
  • the encryption and decryption time will be too long, causing the user to wait for longer than the user can tolerate, thereby reducing the user's experience.
  • the present application provides a data processing method, a data processing system, an electronic device and a computer-readable storage medium.
  • FIG1 is a flow chart of a data processing method provided in an embodiment of the present application.
  • the data processing method can be applied to a data processing device, such as an encryption device, etc.
  • the data processing method includes but is not limited to the following steps S101 to S103.
  • Step S101 determining the attribute information of the hole.
  • a hole is a regular or irregular small area on the original data.
  • the hole can be called a "window", that is, a segment of linear data that has been intercepted; the hole can also be data with two-dimensional spatial characteristics.
  • Step S102 processing the original data based on the attribute information of the hole to obtain hole data.
  • the hole attribute information can also be called hole metadata, that is, data used to characterize the characteristic information of the hole.
  • the original data is punched based on the hole attribute information to obtain hole data, which is the data located in the hole in the original data.
  • Step S103 processing the hole data to obtain target data.
  • the target data includes: processed hole data, and data other than hole data in the original data (such as sieve data, etc.).
  • the attribute information of the hole is determined, and the original data is processed based on the attribute information of the hole to obtain the hole data, which is the data located in the hole in the original data, so as to facilitate the operation of the hole data and reduce the amount of data operation; the hole data is processed to obtain the target data, that is, only the hole data is processed instead of processing all the original data, so as to obtain the target data, which speeds up the data processing speed and improves the data security.
  • the data processing method before determining the attribute information of the hole in step S101, the data processing method further includes: determining the data type and data size information of the original data; and generating a boundary sequence according to the data type and data size information.
  • the boundary sequence is used to determine the attribute information of the hole.
  • the boundary sequence is used to constrain the position information and size information of the hole in the original data.
  • the boundary sequence can include a grid with an equal structure or a grid with a random grid structure. It only needs to be set correspondingly for the original data to constrain the position and size of different holes in the original data.
  • the data type and data size information of the original data are determined to clarify the characteristics of the original data, for example, to determine whether the original data is video data, audio data, or text data, and to determine the data size corresponding to the original data (e.g., The length and width of the data, etc.), so as to facilitate the boundary restriction of the original data, and to characterize the boundary information of the original data in the form of generating a boundary sequence, so that when punching the original data, it will not exceed the boundary corresponding to the boundary sequence, and the original data can be punched in a targeted manner to improve the accuracy of the punching.
  • the data size corresponding to the original data e.g., The length and width of the data, etc.
  • determining the attribute information of the hole in step S101 includes: determining the attribute information of the hole based on a random sequence generated by a random number generator.
  • the attribute information of the hole includes at least one of the position information of the hole, the size information of the hole, the density information of the hole and the shape information of the hole.
  • the density information of the holes may include density information obtained by punching holes in different areas of the original data.
  • the density of holes punched in the core area must be greater than a preset density threshold, while the density of holes punched in the non-core area may be less than or equal to the preset density threshold, so as to reduce the amount of data processed and improve the data processing speed.
  • the shape information of the hole includes at least one of the following shapes: square, circle, rectangle, triangle and other triangular or quadrilateral shapes.
  • the size information of the hole includes the inner diameter of the hole, the length of each side and other information.
  • the position information of the hole refers to the position of the hole in the original data, so as to locate the hole according to the position information.
  • the size information of the hole includes: preset length information and preset width information; the data length of the data to be processed corresponding to the hole matches the preset length information; the data width of the data to be processed corresponding to the hole matches the preset width information, which can ensure that after the data in the hole is processed, the obtained data to be processed can correspond to the original data in the hole, ensuring that the target data finally obtained has the same length as the original data, thereby improving data matching.
  • the attribute information of the above-mentioned hole is information randomly determined based on a random sequence, so as to prevent a third-party device from intercepting or decrypting the data in the hole after obtaining the attribute information of the hole, thereby improving the security of the data in the hole.
  • generating a boundary sequence based on the data type and data size information includes: based on the data type, using key data area densification rules to plan the data size information and generate the boundary sequence; or, based on the data type and data size information, randomly generating a boundary sequence, wherein the boundary sequence is a sequence including multiple random grids.
  • Key data area densification rules can be rules based on key data area determination. Then, for example, the grids planned in the key data are denser, while the grids planned in the non-key data are relatively looser.
  • different planning rules are used in a targeted manner to plan different parts of the original data, so that the generated boundary sequence has a certain randomness and can reflect the characteristics of the original data, so as to facilitate the subsequent punching of different grids and improve the accuracy of data punching.
  • the boundary sequence can be made random, thereby reducing the possibility of calculating the order of the boundary sequence, preventing data from being cracked, and improving data security.
  • the data type includes video data.
  • the data size information is planned using a key data area densification rule, and generating a boundary sequence includes: performing grid planning on key frames of the video data to obtain a first grid sequence; performing grid planning on video frames other than the key frames in the video data to obtain a second grid sequence; and generating a boundary sequence based on the first grid sequence and the second grid sequence.
  • the hole density in the first random grid is higher than the hole density in the second random grid.
  • the key frame includes: a benchmark data frame (i.e., the previous and next data frames can be calculated based on the key frame, which is the basic processing data frame in the video data), or a data frame that the user expects to use.
  • the video data is a video file in the Moving Picture Experts Group 4 (MP4) format
  • MP4 Moving Picture Experts Group 4
  • the holes can be made to fall into the key frames as much as possible to ensure that the hole density in the first grid sequence corresponding to the key frames is higher than the preset density threshold, thereby strengthening the protection of the key frames.
  • the hole density in the second random grid can also be set to be lower than the preset density threshold to highlight the protection of the key frames.
  • the processing intensity of the key frames is emphasized to ensure the security of the key frames of the video data; at the same time, the hole density in the second random grid is set to be lower than the preset density threshold, which can reduce the number of punching holes corresponding to the second random grid and improve data processing efficiency.
  • the data type includes text data.
  • the data size information is planned using a key data area densification rule, and the boundary sequence is generated including: performing grid planning on the data packet header in the text data to obtain a third grid sequence. Column; grid planning the data in the text data except the data packet header to obtain a fourth grid sequence; and, based on the third grid sequence and the fourth grid sequence, generating a boundary sequence.
  • grid planning is performed on the data packet headers in the text data to obtain a third grid sequence with concentrated distribution characteristics; grid planning is performed on the data other than the data packet headers in the text data to obtain a fourth grid sequence with uniform distribution characteristics; and a boundary sequence is determined based on the third grid sequence and the fourth grid sequence.
  • the third grid sequence corresponding to the data packet header presents a concentrated distribution feature (for example, the number of grid sequences is greater than a preset number threshold); and the fourth grid sequence corresponding to the data other than the data packet header in the text data presents a uniform distribution feature (for example, the number of grid sequences is less than or equal to the preset number threshold, and, in the fourth grid sequence, the grids inside it are all equally divided structures), so as to facilitate different processing of different parts of the data and strengthen the protection of the data packet header.
  • a concentrated distribution feature for example, the number of grid sequences is greater than a preset number threshold
  • the fourth grid sequence corresponding to the data other than the data packet header in the text data presents a uniform distribution feature (for example, the number of grid sequences is less than or equal to the preset number threshold, and, in the fourth grid sequence, the grids inside it are all equally divided structures), so as to facilitate different processing of different parts of the data and strengthen the protection of the data packet header.
  • the original data is processed based on the attribute information of the holes in step S102, and the hole data is obtained in the following manner: based on a random sequence generated by a random number generator, at least one of the hole position information or the hole size information is determined; based on at least one of the hole position information or the hole size information, holes are punched in a random grid boundary sequence corresponding to the original data to obtain the original data including the holes.
  • the random grid boundary sequence includes multiple grid sequences. For example, when a random sequence generated by a random number generator is obtained, the distribution of the random sequence is compared with the original data to determine the position in the original data where a hole needs to be punched, and the corresponding hole size information (such as hole length information and hole width information, etc.), so as to clarify which part of the original data needs to be punched to obtain the original data including the hole.
  • the corresponding hole size information such as hole length information and hole width information, etc.
  • the holes obtained by punching holes in the original data can be one or more, subject to the confidentiality requirements of the original data. This application does not limit the number of holes.
  • the data in the hole may be reorganized, and then the reorganized data may be encrypted using a preset encryption algorithm to increase the difficulty of cracking the encrypted data (ie, the data to be processed).
  • the data processing method after encrypting the hole data using a preset encryption algorithm to obtain the data to be processed, and before backfilling the data to be processed into the hole corresponding to the data to be processed and obtaining the target data, the data processing method also includes at least one of the following operations: saving the attribute information of the hole to a preset storage area; or storing the data to be processed to a preset storage area.
  • Storing the data to be processed in the preset storage area can back up the data to be processed and reduce the possibility of losing the data to be processed. After acquiring the data to be processed from the preset storage area, the data to be processed is backfilled into the hole corresponding to the data to be processed to ensure the accuracy of the obtained target data.
  • the recipient of the target data needs to obtain the original data corresponding to the target data, it is necessary to obtain the attribute information of the hole from the preset storage area to ensure the correctness of the decryption operation on the target data, so that the recipient of the target data can use the attribute information of the hole obtained from the preset storage area to accurately decrypt the target data and obtain the original data required by the user to meet the usage needs of the user as the recipient.
  • Fig. 2 is a flow chart of a data processing method provided in an embodiment of the present application.
  • the data processing method can be applied to a data processing device, such as a decryption device, etc.
  • the data processing method includes but is not limited to the following steps S201 to S203.
  • Step S201 obtaining attribute information of the hole from a preset storage area.
  • the hole attribute information matches the target data.
  • the hole attribute information includes at least one of hole position information, hole size information and hole shape information.
  • the hole attribute information pre-stored by the encryption device can be used to decrypt the acquired target data to obtain the original data corresponding to the target data, thereby improving the decryption accuracy of the target data.
  • Step S202 extracting hole data according to the attribute information of the hole to obtain data to be decrypted.
  • Hole data refers to the encrypted data located in the holes of the target data.
  • the portion of the target data located within the hole is extracted, which can identify the specific data that needs to be decrypted (i.e., the data to be decrypted) and improve the data processing efficiency.
  • the hole's position information such as the starting position, the ending position, etc.
  • the hole's size information such as the hole's length and width, or the hole's radius, etc.
  • the hole's shape information such as square, rectangle, circle, etc.
  • Step S203 decrypt the data to be decrypted, and fill the decrypted data back into the hole corresponding to the data to be decrypted to obtain the original data.
  • a preset decryption algorithm e.g., a decryption algorithm corresponding to the preset encryption algorithm used by the encryption device
  • a decryption algorithm can be used to decrypt the data to be decrypted, thereby obtaining accurate decrypted data; further, the decrypted data is backfilled into the hole corresponding to the data to be decrypted, thereby restoring the target data to the original data, making it easier for users to operate on the original data.
  • the position and size of the holes existing in the target data can be clearly determined, so as to facilitate the continued processing of the data in the holes; the hole data is extracted according to the attribute information of the holes to obtain the data to be decrypted, and the data to be decrypted is decrypted, and the decrypted data is backfilled into the holes corresponding to the data to be decrypted to obtain the original data, thereby reducing the amount of data processing in the process of decrypting the data and speeding up the data decryption, so that the user can obtain accurate original data as soon as possible and improve the user experience.
  • the step S202 of extracting hole data based on the attribute information of the hole to obtain the data to be decrypted can be implemented in the following manner: traversing the random grid boundary sequence corresponding to the target data based on the attribute information of the hole to obtain the target hole that matches the attribute information of the hole; and extracting the data in the target hole to obtain the data to be decrypted.
  • the random grid boundary sequence is used to determine hole attribute information.
  • the random grid boundary sequence is used to constrain the location information and size information of the holes in the target data.
  • the random grid boundary sequence includes multiple grid sequences, each of which can be a randomly generated sequence or a sequence uniformly distributed according to the characteristics of the target data.
  • the encryption device 300 includes but is not limited to the following modules: a determination module 301 , a first processing module 302 , and a second processing module 303 .
  • the determination module 301 is configured to determine attribute information of the hole.
  • the first processing module 302 is configured to process the original data based on the attribute information of the hole to obtain the hole data.
  • the second processing module 303 is configured to process the hole data to obtain target data.
  • the encryption device 300 in this embodiment can implement the method applied to the encryption device in the embodiment of the present application.
  • the attribute information of the hole is determined by the determination module 301; the first processing module 302 is used to process the original data based on the attribute information of the hole to obtain the hole data, and the hole data is the data located in the hole in the original data, so as to facilitate the operation of the hole data and reduce the amount of data operation; the second processing module 303 is used to process the hole data to obtain the target data, that is, only the hole data is processed instead of processing all the original data, so as to obtain the target data, thereby speeding up the data processing speed and improving the data security.
  • FIG4 is a block diagram showing a decryption device according to an embodiment of the present application.
  • the decryption device 400 includes but is not limited to the following modules: an acquisition module 401 , an extraction module 402 , and a decryption module 403 .
  • the acquisition module 401 acquires the attribute information of the hole matching the target data from the preset storage area, so as to clarify the position and size of the hole existing in the target data, and facilitate the further processing of the data in the hole;
  • Module 402 extracts the hole data (e.g., part of the target data located in the hole) according to the attribute information of the hole, obtains the data to be decrypted, decrypts the data to be decrypted, and uses decryption module 403 to fill the decrypted data back into the hole corresponding to the data to be decrypted to obtain the original data, thereby reducing the amount of data processing in the process of decrypting the data and speeding up the data decryption, so that the user can obtain accurate original data as soon as possible, thereby improving the user experience.
  • the encryption device 502 punches holes in the original data based on the determined attribute information of the holes to obtain the original data including the holes, and then processes the hole data, that is, only processes the data located in the holes in the original data, rather than processing all the original data, so as to obtain the target data, speed up the data processing speed, improve the data processing efficiency, and thus ensure the security of the data.
  • a random algorithm is used to determine the attribute information of the hole (such as the location information of the hole, the size of the hole, etc.), and then the original data is punched based on the attribute information of the hole.
  • the obtained original data including the holes also presents a certain degree of randomness. If the target data is intercepted by a third party, the original data including the random holes cannot be decrypted, thereby improving the security of the data.
  • Step S602 The encryption device plans the data size information of the original data based on the data type of the original data and adopts the key data area densification rule to generate a random grid boundary sequence.
  • the random grid boundary sequence is used to constrain the location information and size information of the holes in the original data.
  • the random grid boundary sequence may include a sequence of multiple random points distributed between 0 and the total length of the original data.
  • the random grid boundary sequence includes multiple grid sequences, and the multiple grid sequences may be evenly distributed or differently distributed based on the characteristics of the original data, so as to constrain the punching positions of the original data.
  • step S603 the encryption device generates a random sequence based on a random number generator, and determines the attribute information of the hole according to the random sequence.
  • Step S604 the encryption device punches holes in the random grid boundary sequence corresponding to the original data according to the hole position information and/or hole size information to obtain the original data including the holes.
  • FIG7 is a schematic diagram of raw data including holes provided by an embodiment of the present application.
  • a tabular line 710 represents a random grid boundary sequence in the raw data, and the random grid boundary sequence is used to constrain the holes in the raw data (e.g., a shadow pattern 720) The position information and size information of the hole.
  • the shadow pattern 720 can be expressed in different shapes such as ellipses, circles, rectangles or squares (not shown in FIG. 7 ) of different sizes to represent the shapes of corresponding punch holes in different random grids.
  • the random grid boundary sequence may include a grid of an equally divided structure or a grid of a random grid structure. It only needs to be set correspondingly for the original data to constrain the positions and sizes of different holes in the original data.
  • the above random grid boundary sequence is only an example, and can be specifically set according to actual conditions. Other random grid boundary sequences not described are also within the scope of protection of this application and will not be described here.
  • Step S605 processing the hole data to obtain target data.
  • the hole data (e.g., data located in the holes in the original data) is extracted, and the extracted data is processed or calculated to obtain the data to be processed, and then the data to be processed is backfilled into the corresponding holes to obtain the target data, which is the encrypted original data, that is, the original data that is only encrypted for the data in the holes.
  • a preset encryption algorithm (such as AES algorithm, etc.) can be used to encrypt the data in the hole, or preset data can be used to replace the hole data to obtain the target data.
  • the video data is a video file in MP4 format, which includes key frames.
  • the holes can be made to fall into the key frames as much as possible to ensure that the hole density in the key frames is greater than a preset ratio, thereby strengthening the protection of the key frames.
  • the data length of the to-be-processed data corresponding to the hole matches the preset length information; the data width of the to-be-processed data corresponding to the hole matches the preset width information.
  • the data length of the to-be-processed data corresponding to the hole is set equal to the preset length, and the data width of the to-be-processed data corresponding to the hole is set equal to the preset width, for example, the preset length or preset width is set to an integer multiple of 16 bytes, etc., so as to facilitate During the data backfilling process, it is ensured that the data length of the backfilled data (ie, the target data) is the same as the data length of the original data.
  • step S606 the encryption device saves the attribute information of the hole to a preset storage area, and sends the target data to the decryption device.
  • Step S607 When receiving the target data, the decryption device obtains the attribute information of the hole from the preset storage area.
  • the attribute information of the holes is matched with the target data.
  • Step S608 The decryption device extracts the portion of the target data located in the hole according to the attribute information of the hole to obtain the data to be decrypted.
  • the decryption device can traverse the random grid boundary sequence corresponding to the target data according to the attribute information of the hole to obtain the target hole matching the attribute information of the hole; extract the data in the target hole to obtain the data to be decrypted.
  • the random grid boundary sequence is used to constrain the location information and size information of the holes in the target data.
  • Step S609 decrypt the data to be decrypted, and fill the decrypted data back into the hole corresponding to the data to be decrypted to obtain the original data.
  • the original data is punched based on the attribute information of the determined holes to obtain the original data including the holes, so as to facilitate the operation of the data in the holes and reduce the amount of data operation; only the data in the holes is processed (such as encryption processing, or using preset data backfilling, etc.), rather than processing all the original data, so as to obtain the target data, ensure data security, speed up the data processing speed, improve the processing efficiency of original data with large amount of data, and enhance the user experience.
  • FIG8 is a block diagram showing an exemplary hardware architecture of a computing device capable of implementing the data processing method and apparatus according to an embodiment of the present application.
  • a computing device 800 includes an input device 801, an input interface 802, a central processing unit 803, a memory 804, an input The input interface 802, the CPU 803, the memory 804, and the output interface 805 are interconnected via a bus 807.
  • the input device 801 and the output device 806 are connected to the bus 807 through the input interface 802 and the output interface 805, respectively, and are further connected to other components of the computing device 800.
  • the input device 801 receives input information from the outside and transmits the input information to the central processing unit 803 through the input interface 802; the central processing unit 803 processes the input information based on the computer executable instructions stored in the memory 804 to generate output information, temporarily or permanently stores the output information in the memory 804, and then transmits the output information to the output device 806 through the output interface 805; the output device 806 outputs the output information to the outside of the computing device 800 for user use.
  • the computing device shown in FIG. 8 may be implemented as an electronic device, which may include: a memory configured to store a computer program; and a processor configured to run the computer program stored in the memory to perform the above-mentioned data processing method.
  • the computing device shown in FIG. 8 may be implemented as a data processing system, which may include: a memory configured to store a computer program; and a processor configured to run the computer program stored in the memory to perform the above-mentioned data processing method.
  • An embodiment of the present application further provides a computer-readable storage medium, which stores a computer program.
  • the processor implements the above-mentioned data processing method.
  • the embodiments of the present application may be implemented by executing computer program instructions by a processor of a mobile device, for example, in a processor entity, or by hardware, or by a combination of software and hardware.
  • the computer program instructions may be assembly instructions, instruction set architecture (ISA) instructions, machine instructions, machine-dependent instructions, microcode, firmware instructions, state setting data, or source or object code written in any combination of one or more programming languages.
  • ISA instruction set architecture
  • the block diagram of any logic flow in the accompanying drawings of the present application can represent program steps, or can represent interconnected logic circuits, modules and functions, or can represent a combination of program steps and logic circuits, modules and functions.
  • the computer program can be stored on a memory.
  • the memory can have any type suitable for the local technical environment and can be implemented using any suitable data storage technology, such as but not limited to read-only memory (ROM), random access memory (RAM), optical memory device and system (digital versatile disc DVD or CD disc), etc.
  • Computer readable media may include non-transient storage media.
  • the processor can be any type suitable for the local technical environment, such as but not limited to a general-purpose computer, a special-purpose computer, a microprocessor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), a programmable logic device (FGPA) and a processor based on a multi-core processor architecture.
  • DSP digital signal processor
  • ASIC application-specific integrated circuit
  • FGPA programmable logic device

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

本申请提出一种数据处理方法、一种数据处理系统、一种电子设备和一种计算机可读存储介质,涉及数据处理技术领域。该数据处理方法包括:确定孔洞的属性信息,基于孔洞的属性信息对原始数据进行处理,获得孔洞数据;以及对孔洞数据进行处理,获得目标数据。

Description

数据处理方法及系统、电子设备和计算机可读存储介质
相关申请的交叉引用
本申请要求于2022年11月23日提交的中国专利申请NO.202211479113.5的优先权,该中国专利申请的内容通过引用的方式整体合并于此。
技术领域
本申请涉及数据处理技术领域,具体涉及数据处理方法、数据处理系统、电子设备和计算机可读存储介质。
背景技术
随着互联网技术的发展,对于信息的安全性需求也与日俱增。尤其在对具有大数据量的处理对象(如,视频数据、音频数据以及以表格或文字形式表征的文本数据等)进行处理时,该处理对象中包含的隐私信息的安全性越来越受到重视。
通常会采用对数据进行加密再解密的方式来保证数据的安全性,但是,针对具有大数据量的处理对象,对该处理对象进行解密所需的处理时长过大,例如,某用户在打开自己存储在服务器上的私密相册时,若该私密相册中的照片数量过多,通常都会等待很长的时间,以使服务器对该私密相册进行解密,从而降低了用户的使用体验。
公开内容
第一方面,本申请实施例提供一种数据处理方法,包括:确定孔洞的属性信息,基于孔洞的属性信息对原始数据进行处理,获得孔洞数据;以及对孔洞数据进行处理,获得目标数据。
第二方面,本申请实施例提供一种数据处理方法,包括:从预设存储区域获取孔洞的属性信息,孔洞的属性信息与目标数据相匹配; 依据孔洞的属性信息对孔洞数据进行提取,获得待解密数据;以及对待解密数据进行解密,并将解密后的数据回填至与待解密数据对应的孔洞内,获得原始数据。
第三方面,本申请实施例提供一种数据处理系统,包括:加密装置和解密装置中的至少一者;加密装置被配置为执行本申请第一方面中的数据处理方法;解密装置被配置为执行本申请第二方面中的数据处理方法。
第四方面,本申请实施例提供一种电子设备,包括:至少一个处理器;以及存储器,其上存储有至少一个计算机程序,当至少一个计算机程序被至少一个处理器执行时,使得至少一个处理器实现本申请提供的数据处理方法。
第五方面,本申请实施例提供了一种计算机可读存储介质,该计算机可读存储介质存储有计算机程序,计算机程序被处理器执行时使得处理器实现本申请提供的数据处理方法。
关于本申请的以上方面和其他方面以及其实现方式,在附图说明、具体实施方式和权利要求中提供更多说明。
附图说明
图1示出本申请实施例提供的数据处理方法的流程示意图。
图2示出本申请实施例提供的数据处理方法的流程示意图。
图3示出本申请实施例提供的加密装置的组成方框图。
图4示出本申请实施例提供的解密装置的组成方框图。
图5示出本申请实施例提供的数据处理系统的组成方框图。
图6示出本申请实施例提供的数据处理系统的工作方法的流程示意图。
图7示出本申请实施例提供的包括孔洞的原始数据的示意图。
图8示出能够实现根据本申请实施例的数据处理方法和装置的计算设备的示例性硬件架构的结构图。
具体实施方式
为使本申请的目的、技术方案和优点更加清楚明白,下文中将结合附图对本申请的实施例进行详细说明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的各特征可以相互任意组合。
目前,针对数据的安全性,可以采用如下方式对数据进行保护:对数据整体进行加密保护,并在使用时对加密后的数据进行解密,以获得原始数据;或,获取用户的授权,以便于对数据进行管理。
但是,上述采用用户授权的管理方式,无法对二进制数据进行逆向处理,不能保证用户获得完整的数据,降低了数据的准确性。该方式中,同样需要进一步对数据进行加密,才能保证数据的安全性。
而上述对数据整体进行加密保护的方式,适用于具有较小数据量的数据(例如,对某个文本文件的加密等),以音视频数据为例,相关的加密方式包括:文件头加密和流加密。
文件头加密是针对文件的数据头信息进行加密,属于部分加密方式,其加密强度较弱,可应用于视频或音频播放器等,但是,在文件实际使用时,可通过跳过文件的数据头信息的方式,获取文件的实质内容,降低了文件的安全性。
流加密相对于文件头加密的方式,安全程度稍有提升,其是通过对整个文件进行整体加密的方式。例如,在播放某文件时,需要一边对文件进行解密,一边进行播放,若文件对应的数据量较大,会增加用户的等待时长,降低用户的使用体验,并且,若第三方设备一旦获得与其加密方式对应的解密方法,易导致整个文件都被盗用。
但是,若针对具有大数据量的数据(如,数据库中存储的日志信息、用户存储在服务器上的长期积累的视频文件或图像数据等),若采用对大数据量的数据进行整体加密和解密的方式,会造成加密和解密的时长过大,使用户等待的时长超过用户可忍受的时长,降低了用户的使用体验。
本申请提供一种数据处理方法、一种数据处理系统、一种电子设备和一种计算机可读存储介质。
图1示出本申请实施例提供的数据处理方法的流程示意图。该数据处理方法可应用于数据处理设备,如加密装置等。如图1所示, 所述数据处理方法包括但不限于以下步骤S101至S 103。
步骤S101,确定孔洞的属性信息。
孔洞为在原始数据上的某块规则或者不规则的小区域,例如,该孔洞可以称为“窗口”,即截取到的一段线性数据;该孔洞还可以是具有二维空间特征的数据。
步骤S102,基于孔洞的属性信息对原始数据进行处理,获得孔洞数据。
孔洞的属性信息也可以称为孔洞的元数据,即用于表征孔洞的特征信息的数据。基于孔洞的属性信息对原始数据进行打孔,获得孔洞数据,该孔洞数据为原始数据中位于孔洞内的数据。
步骤S103,对孔洞数据进行处理,获得目标数据。
目标数据包括:经过处理的孔洞数据,以及原始数据中除孔洞数据以外的数据(如,筛状数据等)。
在本申请提供的数据处理方法中,通过确定孔洞的属性信息,基于孔洞的属性信息对原始数据进行处理,获得孔洞数据,该孔洞数据为原始数据中位于孔洞内的数据,以便于对孔洞数据进行操作,减少数据操作量;对孔洞数据进行处理,获得目标数据,即仅对孔洞数据进行处理,而不是对全部的原始数据进行处理,从而获得目标数据,加快了对数据的处理速度,提升数据的安全性。
在一些实现方式中,在执行步骤S101中的确定孔洞的属性信息之前,所述数据处理方法还包括:确定原始数据的数据类型和数据尺寸信息;以及依据数据类型和数据尺寸信息,生成边界序列。
边界序列用于确定孔洞的属性信息。例如,边界序列用于约束原始数据中的孔洞的位置信息和孔洞的尺寸信息。边界序列可以包括等分结构的栅格,也可以包括随机的网格结构的栅格,只需针对原始数据进行对应的设置,用以约束原始数据中的不同孔洞的位置和尺寸即可。
通过对原始数据进行分析,确定原始数据的数据类型和数据尺寸信息,以明确原始数据的特征,例如,确定原始数据是视频数据、还是音频数据或文本数据等,以及确定原始数据对应的数据尺寸(如, 数据的长度和宽度等),从而方便对原始数据进行边界性的限制,以生成边界序列的方式表征原始数据的边界信息,从而便于在对原始数据进行打孔时,不会超过该边界序列对应的边界,有针对性的对原始数据进行打孔,提升打孔的准确性。
在一些实现方式中,步骤S101中的确定孔洞的属性信息包括:基于随机数发生器生成的随机序列,确定孔洞的属性信息。
孔洞的属性信息包括孔洞的位置信息、孔洞的尺寸信息、孔洞的密度信息和孔洞的形状信息中的至少一种。
例如,孔洞的密度信息可以包括在原始数据的不同区域中打孔所获得的密度信息,例如,在核心区域中打孔的密度要大于预设密度阈值,而在非核心区域中打孔,其孔洞的密度可以小于或等于预设密度阈值,以减少数据的处理量,提升对数据的处理速度。
孔洞的形状信息包括以下形状中的至少一种:方形、圆形、长方形、三角形等不同的三边形或四边形等。孔洞的尺寸信息包括孔洞的内径长度、每条边的边长等信息。孔洞的位置信息是指该孔洞位于原始数据中的哪个位置,以便于根据该位置信息对孔洞进行定位。
例如,孔洞的尺寸信息包括:预设长度信息和预设宽度信息;与孔洞对应的待处理数据的数据长度与预设长度信息相匹配;与孔洞对应的待处理数据的数据宽度与预设宽度信息相匹配,能够保证在对孔洞内的数据处理完毕后,所获得的待处理数据能够与孔洞内的原始数据相对应,保证最终获得的目标数据与原始数据的长度相同,提升数据的匹配性。
需要说明的是,上述孔洞的属性信息是基于随机序列随机确定的信息,以防止第三方设备获取孔洞的属性信息后,对孔洞内的数据进行截获或解密,孔洞内的数据的安全性能够得以提升。
在一些实现方式中,依据数据类型和数据尺寸信息,生成边界序列包括:基于数据类型,采用关键数据区域密集化规则对数据尺寸信息进行规划,生成边界序列;或,基于数据类型和数据尺寸信息,随机生成边界序列,该边界序列为包括多个随机栅格的序列。
关键数据区域密集化规则可以是基于关键数据的区域确定的规 则,例如,在重点数据中规划的网格密集一些,而在非重点数据中规划的网格相对松散一些。
通过数据类型的不同,有针对性的采用不同的规划规则,对原始数据中的不同部分进行规划,以使生成的边界序列具有一定的随机性,并能够体现原始数据的特征,以便于在后续打孔时,针对不同的栅格进行打孔,提升对数据的打孔准确性。
通过随机生成包括多个随机栅格的边界序列,能够使边界序列具有随机性,减少推算该边界序列的顺序的可能性,避免数据被破解,提升数据的安全性。
在一些实现方式中,数据类型包括视频数据。基于数据类型,采用关键数据区域密集化规则对数据尺寸信息进行规划,生成边界序列包括:对视频数据的关键帧进行栅格规划,获得第一栅格序列;对视频数据中除关键帧以外的视频帧进行栅格规划,获得第二栅格序列;以及依据第一栅格序列和第二栅格序列,生成边界序列。
第一随机栅格中的孔洞密度高于第二随机栅格中的孔洞密度。关键帧包括:标杆数据帧(即,基于关键帧能够计算获得前后数据帧,是视频数据中的基础处理数据帧)、或用户期望使用的数据帧等。
例如,视频数据为采用动态图像专家组(Moving Picture Experts Group 4,MP4)格式的视频文件,该视频文件包括关键帧,在对视频数据进行打孔时,可以让孔洞尽量更多的落入关键帧之中,以保证在关键帧对应的第一栅格序列中的孔洞密度高于预设密度阈值,加强对关键帧的保护力度。还可以将第二随机栅格中的孔洞密度设置为低于预设密度阈值,以突出对关键帧的保护力度。
通过对视频数据中的不同类型的数据帧进行不同的栅格规划,突出对关键帧的处理力度,保证视频数据的关键帧的安全性;同时,将第二随机栅格中的孔洞密度设置为低于预设密度阈值,可减少第二随机栅格对应的打孔数量,提升数据的处理效率。
在一些实现方式中,数据类型包括文本数据。基于数据类型,采用关键数据区域密集化规则对数据尺寸信息进行规划,生成边界序列包括:对文本数据中的数据包报头进行栅格规划,获得第三栅格序 列;对文本数据中除数据包报头以外的数据进行栅格规划,获得第四栅格序列;以及,依据第三栅格序列和第四栅格序列,生成边界序列。
例如,对文本数据中的数据包报头进行栅格规划,获得具有集中分布特征的第三栅格序列;对文本数据中除数据包报头以外的数据进行栅格规划,获得具有均匀分布特征的第四栅格序列;依据第三栅格序列和第四栅格序列,确定边界序列。
针对文本数据的不同部分,对应进行不同的规划,以使数据包报头对应的第三栅格序列呈现集中分布(例如,栅格序列的数量大于预设数量阈值)的特征;使文本数据中除数据包报头以外的数据对应的第四栅格序列呈现均匀分布(例如,栅格序列的数量小于或等于预设数量阈值,并且,在第四栅格序列中,其内部的栅格都是等分结构的)的特征,便于对不同部分的数据进行不同的处理,加强对数据包报头的保护力度。
在一些实现方式中,步骤S102中的基于孔洞的属性信息对原始数据进行处理,获得孔洞数据可以采用如下方式实现:基于随机数发生器生成的随机序列,确定孔洞的位置信息或孔洞的尺寸信息中的至少一者;依据孔洞的位置信息或孔洞的尺寸信息中的至少一者,在与原始数据对应的随机栅格边界序列中打孔,获得包括孔洞的原始数据。
随机栅格边界序列包括多个栅格序列。例如,当获取到随机数发生器生成的随机序列时,将该随机序列的分布情况与原始数据相对应,以确定需要在原始数据中的哪个位置上进行打孔、以及对应的孔洞的尺寸信息(如,孔洞的长度信息和孔洞的宽度信息等),从而明确需要针对原始数据的哪个部分进行打孔,以获得包括孔洞的原始数据。
需要说明的是,在原始数据上打孔所获得的孔洞可以是一个或多个,以满足原始数据的保密需求为准,本申请对孔洞的数量不做限制。
在一些实现方式中,步骤S103中的对孔洞数据进行处理,获得目标数据可以采用如下方式实现:使用预设数据替换孔洞数据,获得目标数据。
预设数据可以是全0或全1等预先设定的数值,也可以是基于用户需求的预设数值(如,全A、全B等特定的数据)。
通过采用预先设定的数值来替换孔洞数据,使原始数据得以改变,并获得目标数据。例如,在对内存中存储的原始数据进行删除时,仅是删除了该原始数据对应的记录标签(即,存储地址对应的索引等信息),但没有具体删除该原始数据的具体内容。因此,在需要对该原始数据进行销毁时,可以使用预设数据替换孔洞数据,保证获得的目标数据无法被恢复,从而保证数据的安全性。
在一些实现方式中,步骤S103中的对孔洞数据进行处理,获得目标数据还可以采用如下方式实现:采用预设加密算法对孔洞数据进行加密,获得待处理数据;以及将待处理数据回填至与待处理数据对应的孔洞内,获得目标数据。
例如,可以采用高级加密标准(Advanced Encryption Standard,AES)算法等预设加密算法,对孔洞内的数据进行加密,以使待处理数据不被第三方设备获取到。并且,将待处理数据回填至与待处理数据对应的孔洞内,能够保证数据的完整性,使获得的目标数据的数据长度与原始数据的数据长度相匹配,便于数据的传输。
例如,可以对孔洞内的数据进行重组,然后,再使用预设加密算法对重组后的数据进行加密,以增加对加密后的数据(即,待处理数据)的破解难度。
在一些实现方式中,在采用预设加密算法对孔洞数据进行加密,获得待处理数据之后,以及将待处理数据回填至与待处理数据对应的孔洞内,获得目标数据之前,所述数据处理方法还包括以下操作中的至少一者:将孔洞的属性信息保存至预设存储区域;或,将待处理数据存储至预设存储区域。
通过将孔洞的属性信息保存至预设存储区域(如,设备的内存装置、或缓存装置等),能够便于后续对目标数据进行解密,以获得准确的原始数据。
将待处理数据存储至预设存储区域,能够使待处理数据得到备份,降低待处理数据丢失的可能性,当需要使用该待处理数据时,可 以从预设存储区域中获取该待处理数据后,再将该待处理数据回填至与待处理数据对应的孔洞内,保证获得的目标数据的准确性。
由于在对孔洞数据进行处理时,其孔洞的位置和尺寸均是随机确定的参数,第三方设备无法获知不同的孔洞的属性信息,更无法对目标数据进行解密,保证了数据在传输过程中的安全性。
但是,若目标数据的接收方需要获得该目标数据对应的原始数据,则需要从预设存储区域内获取到该孔洞的属性信息,以保证对目标数据的解密操作的正确性,从而使目标数据的接收方可以使用从预设存储区域获取到的孔洞的属性信息对目标数据进行准确的解密,获得用户需要的原始数据,以满足作为接收方的用户的使用需求。
图2示出本申请实施例提供的数据处理方法的流程示意图。该数据处理方法可应用于数据处理设备,如解密装置等。如图2所示,所述数据处理方法包括但不限于以下步骤S201至S203。
步骤S201,从预设存储区域获取孔洞的属性信息。
孔洞的属性信息与目标数据相匹配。孔洞的属性信息包括:孔洞的位置信息、孔洞的尺寸信息和孔洞的形状信息中的至少一种。
通过从预设存储区域(如,设备内存、或设备缓存等区域)中获取加密装置预先存储的孔洞属性信息,能够使用该孔洞的属性信息对获取到的目标数据进行解密,以获得目标数据对应的原始数据,提高对目标数据的解密准确性。
步骤S202,依据孔洞的属性信息对孔洞数据进行提取,获得待解密数据。
孔洞数据为目标数据中位于孔洞内的、经过加密处理的数据。
例如,根据孔洞的位置信息(如,起始位置、终止位置等)、孔洞的尺寸信息(如,孔洞的长度和宽度、或孔洞的半径等)和孔洞的形状信息(如,正方形、长方形、圆形等)中的至少一种,对目标数据中位于孔洞内的部分进行提取,能够明确具体需要进行解密的数据(即,待解密数据),提升对数据的处理效率。
步骤S203,对待解密数据进行解密,并将解密后的数据回填至与待解密数据对应的孔洞内,获得原始数据。
例如,可采用预设解密算法(如,与加密装置使用的预设加密算法对应的解密算法),对待解密数据进行解密,从而获得准确的解密后的数据;进一步地,将该解密后的数据回填至与待解密数据对应的孔洞内,从而使目标数据得以还原为原始数据,便于用户对原始数据进行操作。
在本申请提供的数据处理方法中,通过从预设存储区域获取与目标数据相匹配的孔洞的属性信息,能够明确目标数据中存在的孔洞的位置及尺寸,便于对孔洞内的数据继续处理;依据孔洞的属性信息对孔洞数据进行提取,获得待解密数据,并对待解密数据进行解密,并将解密后的数据回填至与待解密数据对应的孔洞内,获得原始数据,从而减少在对数据进行解密的过程中的数据处理量,加快数据解密的速度,以使用户尽快获得准确的原始数据,提升用户的使用体验。
在一些实现方式中,步骤S202中的依据孔洞的属性信息对孔洞数据进行提取,获得待解密数据可以采用如下方式实现:依据孔洞的属性信息对与目标数据对应的随机栅格边界序列进行遍历,获得与孔洞的属性信息相匹配的目标孔洞;以及提取目标孔洞内的数据,获得待解密数据。
随机栅格边界序列用于确定孔洞属性信息,例如,该随机栅格边界序列用于约束目标数据中的孔洞的位置信息和孔洞的尺寸信息等。
需要说明的是,随机栅格边界序列包括多个栅格序列,各个栅格序列可以是随机产生的序列,也可以是针对目标数据的特征均匀分布的序列。通过对与目标数据对应的随机栅格边界序列中的每个栅格序列进行遍历,查找到与孔洞的属性信息相匹配的目标孔洞,进而将目标孔洞内的数据提取出来,能够提升对需要处理的数据(即,待解密数据)的提取准确性,以便于对待解密数据进行进一步的处理。
在上述过程中,因仅提取目标数据中的孔洞数据,而非对目标数据的全部数据进行处理,减少了数据处理量,能够有效提升数据的处理效率,能够降低数据的处理时长,提升用户的使用体验。
下面结合附图,详细介绍根据本申请实施例的装置。图3示出 本申请实施例提供的加密装置的组成方框图。如图3所示,该加密装置300包括但不限于如下模块:确定模块301、第一处理模块302、第二处理模块303。
确定模块301配置为确定孔洞的属性信息。
第一处理模块302配置为基于孔洞的属性信息对原始数据进行处理,获得孔洞数据。
第二处理模块303配置为对孔洞数据进行处理,获得目标数据。
需要说明的是,本实施例中的加密装置300能够实现本申请实施例中应用于加密装置的方法。
根据本申请提供的加密装置300,通过确定模块301确定孔洞的属性信息;使用第一处理模块302基于孔洞的属性信息对原始数据进行处理,获得孔洞数据,该孔洞数据为原始数据中位于孔洞内的数据,以便于对孔洞数据进行操作,减少数据操作量;使用第二处理模块303对孔洞数据进行处理,获得目标数据,即仅对孔洞数据进行处理,而不是对全部的原始数据进行处理,从而获得目标数据,加快了对数据的处理速度,提升数据的安全性。
图4示出本申请实施例提供的解密装置的组成方框图。如图4所示,该解密装置400包括但不限于如下模块:获取模块401、提取模块402、解密模块403。
获取模块401配置为从预设存储区域获取孔洞的属性信息,孔洞的属性信息与目标数据相匹配。
提取模块402配置为依据孔洞的属性信息对孔洞数据进行提取,获得待解密数据。
解密模块403配置为对待解密数据进行解密,并将解密后的数据回填至与待解密数据对应的孔洞内,获得原始数据。
需要说明的是,本实施例中的解密装置400能够实现本申请实施例中应用于解密装置的方法。
根据本申请提供的解密装置400,通过获取模块401从预设存储区域获取与目标数据相匹配的孔洞的属性信息,能够明确目标数据中存在的孔洞的位置及尺寸,便于对孔洞内的数据继续处理;使用提取 模块402依据孔洞的属性信息对孔洞数据(如,目标数据中位于孔洞内的部分数据)进行提取,获得待解密数据,并对待解密数据进行解密,并使用解密模块403将解密后的数据回填至与待解密数据对应的孔洞内,获得原始数据,从而减少在对数据进行解密的过程中的数据处理量,加快数据解密的速度,以使用户尽快获得准确的原始数据,提升用户的使用体验。
图5示出本申请实施例提供的数据处理系统的组成方框图。如图5所示,该数据处理系统包括但不限于如下设备:加密装置501(如图5(A)所示);或,解密装置502(如图5(B)所示);或,加密装置501和解密装置502(如图5(C)所示)。
加密装置501配置为执行本申请实施例中应用于加密装置的数据处理方法。解密装置502配置为执行本申请实施例中应用于解密装置的数据处理方法。
需要说明的是,该数据处理系统可以应用于对具有大数据量的文件的数据内容进行保护,且需要快速完成数据处理的应用场景中。例如,用户使用智能终端登录服务器,需要快速查看该用户对应的账户下的图像数据(如,照片、视频文件等),需要服务器采用加密装置501对该用户对应的账户下的图像数据进行加密处理,并且,用户所使用的智能终端可以支持对数据的解密处理(如,智能终端包括解密装置502,从而使用解密装置502对其下载的加密数据进行解密)。
加密装置502基于确定的孔洞的属性信息对原始数据进行打孔,获得包括孔洞的原始数据,进而对孔洞数据进行处理,即仅对原始数据中位于孔洞内的数据进行处理,而不是对全部的原始数据进行处理,从而获得目标数据,加快了对数据的处理速度,提升了数据的处理效率,从而保证数据的安全性。
例如,基于确定的孔洞的属性信息对原始数据进行打孔,可类似于将原始数据比做一张纸,对该纸张进行打孔,从而使该包括孔洞的纸张上无法被使用(即,包括孔洞的原始数据无法被处理),对应的,由于整体数据的内部关联性很高,而包括孔洞的原始数据会导致其内部关联性的缺失,从而使原始数据无法被使用,能够保证目标数 据在传输的过程中的安全性。
例如,采用随机算法来确定孔洞的属性信息(如,孔洞的位置信息、孔洞的尺寸等),进而基于该孔洞的属性信息对原始数据进行打孔,其获得的包括孔洞的原始数据也呈现一定的随机性,若目标数据被第三方截获,也无法对包括随机孔洞的原始数据进行解密,提高了数据的安全性。
在一些实现方式中,可以在空间维度上对孔洞的出现频次和/或孔洞的集中程度进行调整,以增强原始数据被处理的程度,使获得的目标数据更具安全性。例如,原始数据中包括的文件头信息所携带的核心信息较多,可针对该文件头信息进行频次较高的打孔,从而对文件头信息进行重点保护。
图6示出本申请实施例提供的数据处理系统的工作方法的流程示意图。如图6所示,该数据处理系统的工作方法包括但不限于如下步骤S601至S609。
步骤S601,加密装置对原始数据进行分析,确定原始数据的数据类型和数据尺寸信息。
原始数据可以为数据文件,也可以是存储在内存中的一段数据。以上对于原始数据仅是举例说明,可根据实际需要进行具体设定,其他未说明的原始数据也在本申请的保护范围内,在此不再赘述。
步骤S602,加密装置基于原始数据的数据类型,采用关键数据区域密集化规则对原始数据的数据尺寸信息进行规划,生成随机栅格边界序列。
随机栅格边界序列用于约束原始数据中的孔洞的位置信息和孔洞的尺寸信息。随机栅格边界序列可以包括分布在0到原始数据的总长度之间的多个随机点的序列。例如,随机栅格边界序列包括多个栅格序列,多个栅格序列之间可以是均匀分布,也可以是基于原始数据的特征进行不同的分布,以便于对原始数据的打孔位置进行约束。
通过随机栅格边界序列保证对原始数据进行打孔时,不会存在大块的空白区域(即,不存在孔洞的数据部分),以便能够在原始数据中进行均匀的打孔,降低数据泄露的比例。并且,采用随机栅格边 界序列对原始数据的打孔过程进行约束,还能够保证孔洞的位置不会重叠。
关键数据区域密集化规则可以是基于关键数据的区域确定的规则,例如,在重点数据中规划的网格密集一些,而在非重点数据中规划的网格相对松散一些。
在一些实现方式中,数据类型包括视频数据;对视频数据的关键帧进行栅格规划,获得第一栅格序列;对视频数据中除关键帧以外的帧数据进行栅格规划,获得第二栅格序列;以及依据第一栅格序列和第二栅格序列,确定随机栅格边界序列,第一栅格中的孔洞密度高于第二栅格中的孔洞密度。
在一些实现方式中,数据类型包括文本数据;对文本数据中的数据包报头进行栅格规划,获得具有集中分布特征的第三栅格序列;对文本数据中除数据包报头以外的数据进行栅格规划,获得具有均匀分布特征的第四栅格序列;以及依据第三栅格序列和第四栅格序列,确定边界序列。
步骤S603,加密装置基于随机数发生器产生随机序列,并根据该随机序列确定孔洞的属性信息。
孔洞的属性信息包括:孔洞的位置信息、孔洞的尺寸信息、孔洞的密度信息和孔洞的形状信息中的至少一种。例如,可以将孔洞的位置信息和孔洞的尺寸信息称为孔洞的元数据。
步骤S604,加密装置依据孔洞的位置信息和/或孔洞的尺寸信息,在与原始数据对应的随机栅格边界序列中打孔,获得包括孔洞的原始数据。
可以采用随机打孔的方式,在原始数据对应的随机栅格边界序列中,从第一个栅格序列依次开始,遍历随机栅格边界序列中的每个栅格序列,并在每个栅格序列中进行随机地打孔,从而获得包括孔洞的原始数据。
图7示出本申请实施例提供的包括孔洞的原始数据的示意图。如图7所示,表格状线条710表示原始数据中的随机栅格边界序列,该随机栅格边界序列用于约束原始数据中的孔洞(如,阴影图形720) 的位置信息和孔洞的尺寸信息。
需要说明的是,阴影图形720可以表示为尺寸大小不同的椭圆形、圆形、长方形或方形(图7中未示出)等不同形状,以表征在不同的随机栅格内对应的打孔的形状。
随机栅格边界序列可以包括等分结构的栅格,也可以包括随机的网格结构的栅格,只需针对原始数据进行对应的设置,用以约束原始数据中的不同孔洞的位置和尺寸即可。以上对于随机栅格边界序列仅是举例说明,可根据实际情况进行具体设定,其他未说明的随机栅格边界序列也在本申请的保护范围之内,在此不再赘述。
步骤S605,对孔洞数据进行处理,获得目标数据。
将孔洞数据(如,原始数据中位于孔洞内的数据)提取出来,并对提取出来的数据进行处理或运算,获得待处理数据,再将待处理数据回填至对应的孔洞内,获得目标数据,该目标数据为加密后的原始数据,即,仅对孔洞内的数据进行加密处理的原始数据。
可采用预设加密算法(如,AES算法等)对孔洞内的数据进行加密,或,使用预设数据替换孔洞数据,从而获得目标数据。
例如,视频数据为MP4格式的视频文件,该视频文件包括关键帧,在对视频数据进行打孔时,可以让孔洞尽量更多的落入关键帧之中,以保证在关键帧中的孔洞密度大于预设比例,加强对关键帧的保护力度。
例如,文本数据为某个待传输的基于网际互连协议(Internet Protocol,IP)的数据包,该数据包包括数据包报头,在对该文本数据进行打孔时,可针对数据包报头对应的栅格序列进行集中打孔,以加强对数据包报头的保护;对于文本数据中除数据包报头以外的数据,可进行均匀分布的打孔,以便于减少数据的处理量。
需要说明的是,与孔洞对应的待处理数据的数据长度与预设长度信息相匹配;与孔洞对应的待处理数据的数据宽度与预设宽度信息相匹配。例如,设置与孔洞对应的待处理数据的数据长度等于预设长度,并设置与孔洞对应的待处理数据的数据宽度等于预设宽度,例如,设定预设长度或预设宽度为16字节(byte)的整数倍等,以便于在 进行数据回填的过程中,保证回填后的数据(即目标数据)的数据长度与原始数据的数据长度相同。
步骤S606,加密装置将孔洞的属性信息保存至预设存储区域,并将目标数据发送给解密装置。
步骤S607,解密装置在接收到目标数据时,从预设存储区域获取孔洞的属性信息。
孔洞的属性信息与目标数据相匹配。
步骤S608,解密装置依据孔洞的属性信息对目标数据中位于孔洞内的部分进行提取,获得待解密数据。
解密装置可以依据孔洞的属性信息对与目标数据对应的随机栅格边界序列进行遍历,获得与孔洞的属性信息相匹配的目标孔洞;提取目标孔洞内的数据,获得待解密数据。
随机栅格边界序列用于约束目标数据中的孔洞的位置信息和孔洞的尺寸信息。
步骤S609,对待解密数据进行解密,并将解密后的数据回填至与待解密数据对应的孔洞内,获得原始数据。
在本数据处理中,基于确定的孔洞的属性信息对原始数据进行打孔,获得包括孔洞的原始数据,以便于对孔洞内的数据进行操作,减少数据操作量;仅对孔洞内的数据进行处理(如,加密处理、或采用预设数据回填等方式),而不是对全部的原始数据进行处理,从而获得目标数据,保证数据安全性的同时,还加快了对数据的处理速度,提高了对具有大数据量的原始数据的处理效率,提升了用户的使用体验。
需要明确的是,本申请并不局限于上文实施例中所描述并在图中示出的特定配置和处理。为了描述的方便和简洁,这里省略了对已知方法的详细描述,并且上述描述的系统、模块和单元的具体工作过程,可以参考前述方法中的对应过程,在此不再赘述。
图8示出能够实现根据本申请实施例的数据处理方法和装置的计算设备的示例性硬件架构的结构图。如图8所示,计算设备800包括输入设备801、输入接口802、中央处理器803、存储器804、输 出接口805、以及输出设备806。输入接口802、中央处理器803、存储器804、以及输出接口805通过总线807相互连接,输入设备801和输出设备806分别通过输入接口802和输出接口805与总线807连接,进而与计算设备800的其他组件连接。
输入设备801接收来自外部的输入信息,并通过输入接口802将输入信息传送到中央处理器803;中央处理器803基于存储器804中存储的计算机可执行指令对输入信息进行处理以生成输出信息,将输出信息临时或者永久地存储在存储器804中,然后通过输出接口805将输出信息传送到输出设备806;输出设备806将输出信息输出到计算设备800的外部,供用户使用。
在一些实施方式中,图8所示的计算设备可以被实现为一种电子设备,可以包括:存储器,被配置为存储计算机程序;以及处理器,被配置为运行存储器中存储的计算机程序,以执行上述的数据处理方法。
在一些实施方式中,图8所示的计算设备可以被实现为一种数据处理系统,可以包括:存储器,被配置为存储计算机程序;以及处理器,被配置为运行存储器中存储的计算机程序,以执行上述的数据处理方法。
本申请实施例还提供了一种计算机可读存储介质,该计算机可读存储介质存储有计算机程序,所述计算机程序被处理器执行时使得所述处理器实现上述的数据处理方法。
以上所述,仅为本申请的示例性实施例而已,并非用于限定本申请的保护范围。一般来说,本申请的多种实施例可以在硬件或专用电路、软件、逻辑或其任何组合中实现。例如,一些方面可以被实现在硬件中,而其它方面可以被实现在可以被控制器、微处理器或其它计算装置执行的固件或软件中,尽管本申请不限于此。
本申请的实施例可以通过移动装置的处理器执行计算机程序指令来实现,例如在处理器实体中、或者通过硬件、或者通过软件和硬件的组合实现。计算机程序指令可以是汇编指令、指令集架构(ISA)指令、机器指令、机器相关指令、微代码、固件指令、状态设置数据、 或者是以一种或多种编程语言的任意组合编写的源代码或目标代码。
本申请附图中的任何逻辑流程的框图可以表示程序步骤,或者可以表示相互连接的逻辑电路、模块和功能,或者可以表示程序步骤与逻辑电路、模块和功能的组合。计算机程序可以存储在存储器上。存储器可以具有任何适合于本地技术环境的类型并且可以使用任何适合的数据存储技术实现,例如但不限于只读存储器(ROM)、随机访问存储器(RAM)、光存储器装置和系统(数码多功能光碟DVD或CD光盘)等。计算机可读介质可以包括非瞬时性存储介质。处理器可以是任何适合于本地技术环境的类型,例如但不限于通用计算机、专用计算机、微处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、可编程逻辑器件(FGPA)以及基于多核处理器架构的处理器。
通过示范性和非限制性的示例,上文已提供了对本申请的示范实施例的详细描述。但结合附图和权利要求来考虑,对以上实施例的多种修改和调整对本领域技术人员来说是显而易见的,但不偏离本申请的范围。因此,本申请的恰当范围将根据权利要求确定。

Claims (12)

  1. 一种数据处理方法,包括:
    确定孔洞的属性信息;
    基于所述孔洞的属性信息对原始数据进行处理,获得孔洞数据,所述孔洞数据为所述原始数据中位于所述孔洞内的数据;以及
    对所述孔洞数据进行处理,获得目标数据。
  2. 根据权利要求1所述的方法,其中,所述对所述孔洞数据进行处理,获得目标数据包括:
    使用预设数据替换所述孔洞数据,获得所述目标数据。
  3. 根据权利要求1所述的方法,其中,所述对所述孔洞数据进行处理,获得目标数据包括:
    采用预设加密算法对所述孔洞数据进行加密,获得待处理数据;以及
    将所述待处理数据回填至与所述待处理数据对应的孔洞内,获得所述目标数据。
  4. 根据权利要求3所述的方法,还包括:
    所述采用预设加密算法对所述孔洞数据进行加密,获得待处理数据之后,所述将所述待处理数据回填至与所述待处理数据对应的孔洞内,获得所述目标数据之前,采取以下操作中的至少一项:
    将所述孔洞的属性信息保存至预设存储区域;
    或,将所述待处理数据存储至所述预设存储区域。
  5. 根据权利要求4所述的方法,其中,所述确定孔洞的属性信息包括:
    基于随机数发生器生成的随机序列,确定所述孔洞的属性信息;
    其中,所述孔洞的属性信息包括所述孔洞的位置信息、所述孔 洞的尺寸信息、所述孔洞的密度信息和所述孔洞的形状信息中的至少一种。
  6. 根据权利要求5所述的方法,其中,所述孔洞的尺寸信息包括:预设长度信息和预设宽度信息;
    其中,与所述孔洞对应的待处理数据的数据长度与所述预设长度信息相匹配;与所述孔洞对应的待处理数据的数据宽度与所述预设宽度信息相匹配。
  7. 根据权利要求1所述的方法,还包括:
    所述确定孔洞的属性信息之前,确定所述原始数据的数据类型和数据尺寸信息;以及
    依据所述数据类型和所述数据尺寸信息,生成边界序列,其中,所述边界序列用于确定所述孔洞的属性信息。
  8. 根据权利要求7所述的方法,其中,所述依据所述数据类型和所述数据尺寸信息,生成边界序列包括:
    基于所述数据类型,采用关键数据区域密集化规则对所述数据尺寸信息进行规划,生成所述边界序列;
    或,基于所述数据类型和所述数据尺寸信息,随机生成所述边界序列,所述边界序列为包括多个随机栅格的序列。
  9. 一种数据处理方法,包括:
    从预设存储区域获取孔洞的属性信息,所述孔洞的属性信息与目标数据相匹配;
    依据所述孔洞的属性信息对孔洞数据进行提取,获得待解密数据;以及
    对所述待解密数据进行解密,并将解密后的数据回填至与所述待解密数据对应的孔洞内,获得原始数据。
  10. 一种数据处理系统,包括:加密装置或解密装置中的至少一者;
    所述加密装置被配置为执行如权利要求1至8中任一项所述的数据处理方法;
    所述解密装置被配置为执行如权利要求9所述的数据处理方法。
  11. 一种电子设备,包括:
    至少一个处理器;以及
    存储器,其上存储有至少一个计算机程序,当所述至少一个计算机程序被所述至少一个处理器执行时,使得所述至少一个处理器实现如权利要求1至9中任一项所述的数据处理方法。
  12. 一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序被处理器执行时使得所述处理器实现如权利要求1至9中任一项所述的数据处理方法。
PCT/CN2023/114409 2022-11-23 2023-08-23 数据处理方法及系统、电子设备和计算机可读存储介质 WO2024109211A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211479113.5 2022-11-23
CN202211479113.5A CN118070296A (zh) 2022-11-23 2022-11-23 数据处理方法、系统、电子设备和存储介质

Publications (1)

Publication Number Publication Date
WO2024109211A1 true WO2024109211A1 (zh) 2024-05-30

Family

ID=91102798

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/114409 WO2024109211A1 (zh) 2022-11-23 2023-08-23 数据处理方法及系统、电子设备和计算机可读存储介质

Country Status (2)

Country Link
CN (1) CN118070296A (zh)
WO (1) WO2024109211A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101146168A (zh) * 2006-06-30 2008-03-19 株式会社理光 图像处理装置和图像处理方法
CN101652987A (zh) * 2007-05-31 2010-02-17 株式会社Pfu 纸介质信息加密系统、解密系统、程序以及方法
CN104680077A (zh) * 2015-01-20 2015-06-03 中兴通讯股份有限公司 一种加密图片的方法、查看图片的方法、系统和终端
CN104715205A (zh) * 2013-12-12 2015-06-17 中国移动通信集团公司 一种图片资源处理、发布及获取方法和相关装置
CN112040086A (zh) * 2019-06-03 2020-12-04 湖北微模式科技发展有限公司 一种图像加密、解密方法及装置、设备和可读存储介质
CN115330580A (zh) * 2022-08-04 2022-11-11 湖北微模式科技发展有限公司 一种基于数据追加的图像内容加密算法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101146168A (zh) * 2006-06-30 2008-03-19 株式会社理光 图像处理装置和图像处理方法
CN101652987A (zh) * 2007-05-31 2010-02-17 株式会社Pfu 纸介质信息加密系统、解密系统、程序以及方法
CN104715205A (zh) * 2013-12-12 2015-06-17 中国移动通信集团公司 一种图片资源处理、发布及获取方法和相关装置
CN104680077A (zh) * 2015-01-20 2015-06-03 中兴通讯股份有限公司 一种加密图片的方法、查看图片的方法、系统和终端
CN112040086A (zh) * 2019-06-03 2020-12-04 湖北微模式科技发展有限公司 一种图像加密、解密方法及装置、设备和可读存储介质
CN115330580A (zh) * 2022-08-04 2022-11-11 湖北微模式科技发展有限公司 一种基于数据追加的图像内容加密算法

Also Published As

Publication number Publication date
CN118070296A (zh) 2024-05-24

Similar Documents

Publication Publication Date Title
CN109474423B (zh) 数据加解密方法、服务器及存储介质
CN112929172B (zh) 基于密钥库动态加密数据的系统、方法及装置
US11709948B1 (en) Systems and methods for generation of secure indexes for cryptographically-secure queries
US9990507B2 (en) Adapting decoy data present in a network
US20180365434A1 (en) File encryption method, file decrypton method, electronic device, and storage medium
US20160094347A1 (en) Method and system for secure management of computer applications
WO2020224489A1 (zh) 基于区块链的银行数据共享方法及相关设备
CN109271798A (zh) 敏感数据处理方法及系统
CN105468990A (zh) 一种敏感信息的管理控制方法和装置
WO2020177514A1 (zh) 图像存取方法及其系统
CN114186264A (zh) 数据随机加密、解密方法、装置及系统
WO2022068356A1 (zh) 基于区块链的信息加密方法、装置、设备及介质
CN109660327A (zh) 基于虹膜的区块链加密方法、装置及可读存储介质
CN108833133B (zh) 基于云计算网络的网络配置管理方法、装置和存储介质
CN115442032A (zh) 一种数据处理方法、片上系统及可读存储介质
WO2017067513A1 (zh) 数据处理方法及存储网关
CN108965278B (zh) 交易请求处理方法及装置
CN112134829A (zh) 生成加密流量特征集的方法及装置
WO2022068234A1 (zh) 基于共享根密钥的加密方法、装置、设备及介质
CN108256342B (zh) Shader文件的加密方法、装置及解密方法、装置
WO2020044095A1 (zh) 文件加密方法、装置、设备/终端/服务器及计算机可读存储介质
WO2024109211A1 (zh) 数据处理方法及系统、电子设备和计算机可读存储介质
WO2019223098A1 (zh) 一种文件的读写方法及设备
WO2019184741A1 (zh) 应用程序信息的存储、处理方法及装置
CN107423631A (zh) 一种数据库加解密方法和装置