+

CN114091014A - Data processing method and device - Google Patents

Data processing method and device Download PDF

Info

Publication number
CN114091014A
CN114091014A CN202111277728.5A CN202111277728A CN114091014A CN 114091014 A CN114091014 A CN 114091014A CN 202111277728 A CN202111277728 A CN 202111277728A CN 114091014 A CN114091014 A CN 114091014A
Authority
CN
China
Prior art keywords
target
party system
data
service agent
party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111277728.5A
Other languages
Chinese (zh)
Other versions
CN114091014B (en
Inventor
郝玉杰
周围
李睿
郭强
骆雪娇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Dahengqin Technology Development Co Ltd
Original Assignee
Zhuhai Dahengqin Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Dahengqin Technology Development Co Ltd filed Critical Zhuhai Dahengqin Technology Development Co Ltd
Priority to CN202111277728.5A priority Critical patent/CN114091014B/en
Publication of CN114091014A publication Critical patent/CN114091014A/en
Application granted granted Critical
Publication of CN114091014B publication Critical patent/CN114091014B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2115Third party

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Telephonic Communication Services (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the invention provides a data processing method and a data processing device, wherein the method comprises the following steps: acquiring a target system identifier of a target third-party system; under the condition that the target system identification is in a preset white list, determining the target system type of a target third-party system, and under the condition that the target system type is a specified system type, establishing a first service agent for the target third-party system so as to adopt the first service agent to communicate with the target third-party system; and under the condition that the target system identification is not in the preset white list, determining the target system security level of the target third-party system, and under the condition that the target system security level is less than the preset security level, establishing a second service agent aiming at the target third-party system so as to adopt the second service agent to communicate with the target third-party system. By the embodiment of the invention, the communication with the third-party system is realized by establishing different service agents.

Description

Data processing method and device
Technical Field
The present invention relates to the field of internet technologies, and in particular, to a method and an apparatus for data processing.
Background
With the development of internet technology, communication between different systems is more and more frequent, and the security of the communication becomes an important issue.
In order to ensure the security of communication, the prior art generally adopts a uniform security check mode for a communication system to be performed, and has no pertinence and the efficiency of image communication.
Disclosure of Invention
In view of the above, it is proposed to provide a method and apparatus for data processing that overcomes or at least partially solves the above mentioned problems, comprising:
a method of data processing, the method comprising:
acquiring a target system identifier of a target third-party system;
under the condition that the target system identification is in a preset white list, determining a target system type of the target third-party system, and under the condition that the target system type is a specified system type, establishing a first service agent for the target third-party system so as to adopt the first service agent to communicate with the target third-party system;
and under the condition that the target system identification is not in a preset white list, determining the target system security level of the target third-party system, and under the condition that the target system security level is less than the preset security level, establishing a second service agent aiming at the target third-party system so as to adopt the second service agent to communicate with the target third-party system.
Optionally, the method further comprises:
when first data to be sent to the target third-party system through a first service agent is detected, preprocessing the first data;
and sending the preprocessed first data to the target third-party system.
Optionally, the method further comprises:
and when detecting that second data sent by the target third-party system is received through a second service agent, performing security check on the second data.
Optionally, the method further comprises:
when detecting that third data is to be sent to the target third-party system through a second service agent, determining key information in the third data, and hiding the key information;
and sending the third data after the hiding processing to the target third-party system.
Optionally, the preprocessing the first data includes:
and carrying out format conversion on the first data, and encrypting the first data after format conversion.
Optionally, the specified system type is a government affairs system type.
An apparatus for data processing, the apparatus comprising:
the target system identification acquisition module is used for acquiring a target system identification of a target third-party system;
the first service agent establishing module is used for determining the target system type of the target third-party system under the condition that the target system identifier is in a preset white list, and establishing a first service agent aiming at the target third-party system under the condition that the target system type is a specified system type so as to adopt the first service agent to communicate with the target third-party system;
and the second service agent establishing module is used for determining the target system security level of the target third-party system under the condition that the target system identification is not in a preset white list, and establishing a second service agent aiming at the target third-party system under the condition that the target system security level is less than the preset security level so as to adopt the second service agent to communicate with the target third-party system.
Optionally, the method further comprises:
the preprocessing module is used for preprocessing first data when the first data to be sent to the target third-party system through the first service agent is detected;
and the first data sending module is used for sending the preprocessed first data to the target third-party system.
A server comprising a processor, a memory and a computer program stored on the memory and capable of running on the processor, the computer program, when executed by the processor, implementing a method of data processing as described above.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method of data processing as described above.
The embodiment of the invention has the following advantages:
in the embodiment of the invention, by acquiring the target system identifier of the target third-party system, determining the target system type of the target third-party system under the condition that the target system identifier is in a preset white list, establishing a first service agent aiming at the target third-party system under the condition that the target system type is a specified system type, so as to adopt the first service agent to communicate with the target third-party system, determining the target system security level of the target third-party system under the condition that the target system identifier is not in the preset white list, establishing a second service agent aiming at the target third-party system under the condition that the target system security level is less than the preset security level, so as to adopt the second service agent to communicate with the target third-party system, realizing the communication between different service agents and the third-party system and adopt different communication modes aiming at different systems, the safety and the efficiency of communication are improved.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings needed to be used in the description of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
FIG. 1 is a flow chart illustrating steps of a method for data processing according to an embodiment of the present invention;
FIG. 2 is a flow chart illustrating steps of another method for data processing according to an embodiment of the present invention;
fig. 3 is a block diagram of a data processing apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below. It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, a flowchart illustrating steps of a data processing method according to an embodiment of the present invention is shown, which may specifically include the following steps:
step 101, acquiring a target system identifier of a target third-party system;
for a target third-party system which needs to communicate with the target third-party system, a target system identifier of the target third-party system may be obtained, and the target system identifier may be information used for identifying the target third-party system, such as a name, an IP address, and a website of the target third-party system.
102, determining a target system type of the target third-party system under the condition that the target system identifier is in a preset white list, and establishing a first service agent for the target third-party system under the condition that the target system type is a specified system type so as to communicate with the target third-party system by adopting the first service agent;
as an example, the specified system type may be a government system type.
In practical application, a white list may be preset, system identifiers of a plurality of third-party systems may be stored in the white list, and a representation that the third-party system having the system identifier in the white list is safe to communicate with is made, so that after the target system identifier is determined, it may be determined whether the target system identifier of the target third-party system is in the white list.
And if the target system identifier is in the white list, establishing communication connection with the target system identifier, but because part of the third-party systems have particularity, only allowing the internal equipment to be connected, and not directly connecting with the external equipment, further determining the target system type of the target third-party system, and judging whether the target system type of the target third-party system is the specified system type.
And under the condition that the type of the target system is a non-specified system type, the target system identification of the target third-party system is also in the white list, and the communication connection can be directly established with the target third-party system. When the target system type is the designated system type, a first service agent for the target third-party system may be established, and then a communication connection between the first service agent and the target third-party system may be established, and the first service agent may be used to communicate with the target third-party system.
103, determining a target system security level of the target third-party system when the target system identifier is not in a preset white list, and establishing a second service agent for the target third-party system to communicate with the target third-party system by using the second service agent when the target system security level is less than a preset security level.
And when the target system identification is not in the preset white list, the representation is not necessarily safe to communicate with the target system identification, the target system security level of the target third-party system can be further determined, and when the target system security level is greater than or equal to the preset security level, the representation has high security degree, and the communication connection can be directly established with the target third-party system.
And under the condition that the security level of the target system is lower than the preset security level, the representation of the security degree is not high, a second service agent aiming at the target third-party system can be established, further, the communication connection between the second service agent and the target third-party system can be established, and the second service agent can be adopted to communicate with the target third-party system.
In the embodiment of the invention, by acquiring the target system identifier of the target third-party system, determining the target system type of the target third-party system under the condition that the target system identifier is in a preset white list, establishing a first service agent aiming at the target third-party system under the condition that the target system type is a specified system type, so as to adopt the first service agent to communicate with the target third-party system, determining the target system security level of the target third-party system under the condition that the target system identifier is not in the preset white list, establishing a second service agent aiming at the target third-party system under the condition that the target system security level is less than the preset security level, so as to adopt the second service agent to communicate with the target third-party system, realizing the communication between different service agents and the third-party system and adopt different communication modes aiming at different systems, the safety and the efficiency of communication are improved.
Referring to fig. 2, a flowchart illustrating steps of another data processing method according to an embodiment of the present invention is shown, which may specifically include the following steps:
step 201, acquiring a target system identifier of a target third-party system;
for a target third-party system which needs to communicate with the target third-party system, a target system identifier of the target third-party system may be obtained, and the target system identifier may be information used for identifying the target third-party system, such as a name, an IP address, and a website of the target third-party system.
Step 202, determining a target system type of the target third-party system under the condition that the target system identifier is in a preset white list, and establishing a first service agent for the target third-party system under the condition that the target system type is a specified system type, so as to communicate with the target third-party system by adopting the first service agent;
as an example, the specified system type may be a government system type.
In practical application, a white list may be preset, system identifiers of a plurality of third-party systems may be stored in the white list, and a representation that the third-party system having the system identifier in the white list is safe to communicate with is made, so that after the target system identifier is determined, it may be determined whether the target system identifier of the target third-party system is in the white list.
And if the target system identifier is in the white list, the target system identifier can establish communication connection with the target system identifier, but because part of the third-party systems have the particularity, the third-party systems only allow the internal equipment to be connected, but do not directly connect with the external equipment, and then the target system type of the target third-party system can be further determined, and whether the target system type of the target third-party system is the specified system type or not can be judged.
And under the condition that the type of the target system is a non-specified system type, the target system identification of the target third-party system is also in the white list, and the communication connection can be directly established with the target third-party system. When the target system type is the designated system type, a first service agent for the target third-party system may be established, and then a communication connection between the first service agent and the target third-party system may be established, and the first service agent may be used to communicate with the target third-party system.
Step 203, determining a target system security level of the target third-party system when the target system identifier is not in a preset white list, and establishing a second service agent for the target third-party system to communicate with the target third-party system by using the second service agent when the target system security level is less than a preset security level;
and when the target system identification is not in the preset white list, the representation is not necessarily safe to communicate with the target system identification, the target system security level of the target third-party system can be further determined, and when the target system security level is greater than or equal to the preset security level, the representation has high security degree, and the communication connection can be directly established with the target third-party system.
And under the condition that the security level of the target system is lower than the preset security level, the representation of the security degree is not high, a second service agent aiming at the target third-party system can be established, further, the communication connection between the second service agent and the target third-party system can be established, and the second service agent can be adopted to communicate with the target third-party system.
Step 204, when detecting that first data is to be sent to the target third-party system through the first service agent, preprocessing the first data, and sending the preprocessed first data to the target third-party system;
after the first service agent is established, the first data can be sent to the target third-party system through the first service agent, because the first service agent is established only when the target system type of the target third-party system is the specified system type, and the communication requirement of the target third-party system of the specified system type is higher, if the specified system type can be the government system type, in order to meet the requirement of the target third-party system, the first data can be preprocessed, and then the preprocessed first data can be sent to the target third-party system.
In an embodiment of the present invention, the preprocessing the first data may include:
and carrying out format conversion on the first data, and encrypting the first data after format conversion.
In a specific implementation, the target third-party system may have a requirement on format and confidentiality for the data, and may perform format conversion on the first data according to the requirement of the target third-party system, and may encrypt the format-converted first data, for example, it may use a certificate to encrypt the first data.
Step 205, when detecting that second data sent by the target third-party system is received through a second service agent, performing security check on the second data;
after the second service agent is established, the second data may be received from the target third-party system through the second service agent, and since the target third-party system is established only when the security level of the target system of the target third-party system is lower than the preset security level, in order to further ensure the security of the received data, security check may be further performed on the received second data, for example, to check whether the second data carries viruses such as trojan horse and the like.
Step 206, when it is detected that third data is to be sent to the target third-party system through the second service agent, determining key information in the third data, hiding the key information, and sending the third data after hiding to the target third-party system.
After the second service agent is established, the third data can be sent to the target third-party system through the second service agent, and as the target third-party system is established only when the security level of the target system of the target third-party system is lower than the preset security level, in order to send the data outwards without leakage, key information in the third data, such as privacy information such as personal identity marks, can be determined, and the key information can be hidden, such as mosaic can be added to the key information in the document, and then the third data after the hidden processing can be sent to the target third-party system.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the illustrated order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments of the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
Referring to fig. 3, a schematic structural diagram of a data processing apparatus according to an embodiment of the present invention is shown, which may specifically include the following modules:
a target system identifier obtaining module 301, configured to obtain a target system identifier of a target third-party system;
a first service agent establishing module 302, configured to determine a target system type of the target third-party system when the target system identifier is in a preset white list, and establish a first service agent for the target third-party system to use the first service agent to communicate with the target third-party system when the target system type is a specified system type;
a second service agent establishing module 303, configured to determine a security level of the target system of the target third-party system when the target system identifier is not in a preset white list, and establish a second service agent for the target third-party system when the security level of the target system is less than a preset security level, so as to communicate with the target third-party system by using the second service agent.
In an embodiment of the present invention, the method further includes:
the preprocessing module is used for preprocessing first data when the first data to be sent to the target third-party system through the first service agent is detected;
and the first data sending module is used for sending the preprocessed first data to the target third-party system.
In an embodiment of the present invention, the method further includes:
and the safety check module is used for carrying out safety check on the second data when the second data sent by the target third-party system is detected to be received through the second service agent.
In an embodiment of the present invention, the method further includes:
the hidden processing module is used for determining key information in third data and hiding the key information when detecting that the third data is to be sent to the target third-party system through a second service agent;
and the third data sending module is used for sending the third data after the hiding processing to the target third-party system.
In an embodiment of the present invention, the preprocessing module includes:
and the format conversion encryption module is used for carrying out format conversion on the first data and encrypting the format-converted first data.
In an embodiment of the invention, the specified system type is a government system type.
In the embodiment of the invention, the target system type of the target third-party system is determined by acquiring the target system identification of the target third-party system under the condition that the target system identification is in a preset white list, and under the condition that the target system type is the designated system type, establishing a first service agent aiming at the target third-party system so as to adopt the first service agent to communicate with the target third-party system, determining a target system security level of the target third party system in the event that the target system identification is not in the preset white list, and establishing a second service agent for the target third-party system under the condition that the security level of the target system is less than the preset security level, the second service agent is adopted to communicate with the target third-party system, so that communication with the third-party system is realized by establishing different service agents, and the communication safety is ensured.
An embodiment of the present invention also provides a server, which may include a processor, a memory, and a computer program stored on the memory and capable of running on the processor, and when executed by the processor, the computer program implements the method for processing data as above.
An embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, implements the above data processing method.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the embodiments of the invention.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The method and apparatus for data processing provided above are described in detail, and a specific example is applied herein to illustrate the principles and embodiments of the present invention, and the above description of the embodiment is only used to help understand the method and core ideas of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A method of data processing, the method comprising:
acquiring a target system identifier of a target third-party system;
under the condition that the target system identification is in a preset white list, determining a target system type of the target third-party system, and under the condition that the target system type is a specified system type, establishing a first service agent for the target third-party system so as to adopt the first service agent to communicate with the target third-party system;
and under the condition that the target system identification is not in a preset white list, determining the target system security level of the target third-party system, and under the condition that the target system security level is less than the preset security level, establishing a second service agent aiming at the target third-party system so as to adopt the second service agent to communicate with the target third-party system.
2. The method of claim 1, further comprising:
when first data to be sent to the target third-party system through a first service agent is detected, preprocessing the first data;
and sending the preprocessed first data to the target third-party system.
3. The method of claim 1 or 2, further comprising:
and when detecting that second data sent by the target third-party system is received through a second service agent, performing security check on the second data.
4. The method of claim 3, further comprising:
when detecting that third data is to be sent to the target third-party system through a second service agent, determining key information in the third data, and hiding the key information;
and sending the third data after the hiding processing to the target third-party system.
5. The method of claim 2, wherein the pre-processing the first data comprises:
and carrying out format conversion on the first data, and encrypting the first data after format conversion.
6. The method of claim 1, wherein the specified system type is a government system type.
7. An apparatus for data processing, the apparatus comprising:
the target system identification acquisition module is used for acquiring a target system identification of a target third-party system;
the first service agent establishing module is used for determining the target system type of the target third-party system under the condition that the target system identifier is in a preset white list, and establishing a first service agent aiming at the target third-party system under the condition that the target system type is a specified system type so as to adopt the first service agent to communicate with the target third-party system;
and the second service agent establishing module is used for determining the target system security level of the target third-party system under the condition that the target system identification is not in a preset white list, and establishing a second service agent aiming at the target third-party system under the condition that the target system security level is less than the preset security level so as to adopt the second service agent to communicate with the target third-party system.
8. The apparatus of claim 7, further comprising:
the preprocessing module is used for preprocessing first data when the first data to be sent to the target third-party system through the first service agent is detected;
and the first data sending module is used for sending the preprocessed first data to the target third-party system.
9. A server, comprising a processor, a memory, and a computer program stored on the memory and capable of running on the processor, the computer program, when executed by the processor, implementing a method of data processing according to any one of claims 1 to 6.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out a method of data processing according to any one of claims 1 to 6.
CN202111277728.5A 2021-10-29 2021-10-29 Data processing method and device Active CN114091014B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111277728.5A CN114091014B (en) 2021-10-29 2021-10-29 Data processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111277728.5A CN114091014B (en) 2021-10-29 2021-10-29 Data processing method and device

Publications (2)

Publication Number Publication Date
CN114091014A true CN114091014A (en) 2022-02-25
CN114091014B CN114091014B (en) 2024-10-18

Family

ID=80298330

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111277728.5A Active CN114091014B (en) 2021-10-29 2021-10-29 Data processing method and device

Country Status (1)

Country Link
CN (1) CN114091014B (en)

Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050251691A1 (en) * 2004-05-07 2005-11-10 Alcatel Data authentication method and agent based system
US20130104243A1 (en) * 2011-10-19 2013-04-25 International Business Machines Corporation Protecting privacy when communicating with a web server
CN105099705A (en) * 2015-08-19 2015-11-25 同方计算机有限公司 A secure communication method and system based on USB protocol
CN105100119A (en) * 2015-08-31 2015-11-25 百度在线网络技术(北京)有限公司 URL detection method and device
CN105245515A (en) * 2015-09-30 2016-01-13 北京奇虎科技有限公司 A data security transmission method and terminal equipment
CN105306454A (en) * 2015-09-30 2016-02-03 北京奇虎科技有限公司 Data transmission method and terminal device
US9294912B1 (en) * 2013-05-22 2016-03-22 Quantcast Corporation Selective regulation of information transmission from mobile applications to third-party privacy complaint target systems
CN106022101A (en) * 2016-05-17 2016-10-12 广东欧珀移动通信有限公司 Application management method and terminal
WO2017084535A1 (en) * 2015-11-20 2017-05-26 英赛克科技(北京)有限公司 Method for trusted protocol conversion and system
WO2017107780A1 (en) * 2015-12-22 2017-06-29 华为技术有限公司 Method, device and system for recognizing illegitimate proxy for charging fraud
US20170280315A1 (en) * 2016-03-28 2017-09-28 Bank Of America Corporation System for adaptation of multiple digital signatures in a distributed network
CN107612901A (en) * 2017-09-11 2018-01-19 深圳市金立通信设备有限公司 One kind applies encryption method and terminal
US20180145986A1 (en) * 2016-11-22 2018-05-24 Daniel Chien Network security based on redirection of questionable network access
US20180285560A1 (en) * 2017-03-31 2018-10-04 Ansuya Negi System, Apparatus And Method For Providing Locality Assertion Between A Security Processor And An Enclave
CN109413201A (en) * 2018-11-27 2019-03-01 东软集团股份有限公司 SSL traffic method, apparatus and storage medium
CN109992965A (en) * 2017-12-29 2019-07-09 广东欧珀移动通信有限公司 Process processing method and apparatus, electronic device, and computer-readable storage medium
CN111625809A (en) * 2020-05-31 2020-09-04 数字浙江技术运营有限公司 Data authorization method and device, electronic equipment and storage medium
CN111797378A (en) * 2020-07-06 2020-10-20 遵义科晟云达科技有限公司 A multi-identity management and authentication platform for human and social information
CN112256490A (en) * 2020-11-17 2021-01-22 珠海大横琴科技发展有限公司 Data processing method and device
CN113468552A (en) * 2021-05-31 2021-10-01 珠海大横琴科技发展有限公司 Data processing method and device

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050251691A1 (en) * 2004-05-07 2005-11-10 Alcatel Data authentication method and agent based system
US20130104243A1 (en) * 2011-10-19 2013-04-25 International Business Machines Corporation Protecting privacy when communicating with a web server
US9294912B1 (en) * 2013-05-22 2016-03-22 Quantcast Corporation Selective regulation of information transmission from mobile applications to third-party privacy complaint target systems
CN105099705A (en) * 2015-08-19 2015-11-25 同方计算机有限公司 A secure communication method and system based on USB protocol
CN105100119A (en) * 2015-08-31 2015-11-25 百度在线网络技术(北京)有限公司 URL detection method and device
CN105245515A (en) * 2015-09-30 2016-01-13 北京奇虎科技有限公司 A data security transmission method and terminal equipment
CN105306454A (en) * 2015-09-30 2016-02-03 北京奇虎科技有限公司 Data transmission method and terminal device
WO2017084535A1 (en) * 2015-11-20 2017-05-26 英赛克科技(北京)有限公司 Method for trusted protocol conversion and system
WO2017107780A1 (en) * 2015-12-22 2017-06-29 华为技术有限公司 Method, device and system for recognizing illegitimate proxy for charging fraud
US20170280315A1 (en) * 2016-03-28 2017-09-28 Bank Of America Corporation System for adaptation of multiple digital signatures in a distributed network
CN106022101A (en) * 2016-05-17 2016-10-12 广东欧珀移动通信有限公司 Application management method and terminal
US20180145986A1 (en) * 2016-11-22 2018-05-24 Daniel Chien Network security based on redirection of questionable network access
US20180285560A1 (en) * 2017-03-31 2018-10-04 Ansuya Negi System, Apparatus And Method For Providing Locality Assertion Between A Security Processor And An Enclave
CN107612901A (en) * 2017-09-11 2018-01-19 深圳市金立通信设备有限公司 One kind applies encryption method and terminal
CN109992965A (en) * 2017-12-29 2019-07-09 广东欧珀移动通信有限公司 Process processing method and apparatus, electronic device, and computer-readable storage medium
CN109413201A (en) * 2018-11-27 2019-03-01 东软集团股份有限公司 SSL traffic method, apparatus and storage medium
CN111625809A (en) * 2020-05-31 2020-09-04 数字浙江技术运营有限公司 Data authorization method and device, electronic equipment and storage medium
CN111797378A (en) * 2020-07-06 2020-10-20 遵义科晟云达科技有限公司 A multi-identity management and authentication platform for human and social information
CN112256490A (en) * 2020-11-17 2021-01-22 珠海大横琴科技发展有限公司 Data processing method and device
CN113468552A (en) * 2021-05-31 2021-10-01 珠海大横琴科技发展有限公司 Data processing method and device

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
关欣;李璐;易田田;罗松;: "智慧城市电子围网应用研究", 信息通信技术与政策, no. 04, 15 April 2019 (2019-04-15) *
昝家玮;: "基于请求回传的代理上网行为研究", 通信与信息技术, no. 03, 25 May 2017 (2017-05-25) *
曹泽;张文;牛少彰;: "SCBox――保护Android应用网络通信的安全工具", 计算机工程与应用, no. 18, 15 September 2017 (2017-09-15) *
汤志伟: "《电子政务的管理与实践》", 30 April 2013, 电子工业大学出版社, pages: 212 *
种惠芳;吴振强;王海燕;: "基于属性的自证实模型及其安全协议", 计算机工程与应用, no. 07, 1 March 2011 (2011-03-01) *
苗涛;张志强;胡炳华;: "工业恶意软件的防范与治理", 智能建筑与智慧城市, no. 04, 25 April 2019 (2019-04-25) *
蔡;孙竹君;王春雷;: "第三方公众平台统一安全集成技术研究", 电子世界, no. 12, 23 June 2017 (2017-06-23) *

Also Published As

Publication number Publication date
CN114091014B (en) 2024-10-18

Similar Documents

Publication Publication Date Title
CN111949953B (en) Identity authentication method, system and device based on block chain and computer equipment
CN108737430B (en) Encryption communication method and system for block chain node
CN107135073B (en) Interface calling method and device
CN108768943B (en) Method and device for detecting abnormal account and server
US9781109B2 (en) Method, terminal device, and network device for improving information security
EP3700164A1 (en) Method and apparatus for facilitating the login of an account
CN111931188B (en) Vulnerability testing method and system in login scene
CN108737328B (en) Browser user agent identification method, system and device
CN113542274A (en) Cross-domain data transmission method, device, server and storage medium
CN111880919B (en) Data scheduling method, system and computer equipment
CN111241523B (en) Authentication processing method, apparatus, device and storage medium
CN110635898A (en) Encryption method and encryption system
CN104796406A (en) Method and device for identifying application
CN113849797B (en) Method, device, equipment and storage medium for repairing data security hole
CN109889410B (en) Method, system, device, proxy equipment and storage medium for testing service function
CN114238982B (en) Application security testing method and device, storage medium and electronic device
CN111245839A (en) Violence cracking prevention method and device
CN110995658A (en) Gateway protection method, device, computer equipment and storage medium
CN115834101A (en) Login control method, system, storage medium and electronic equipment
CN111800496B (en) Interface calling method, device, computer equipment and storage medium
CN111586013A (en) Network intrusion detection method, device, node terminal and storage medium
CN114091014A (en) Data processing method and device
CN117579254A (en) Encryption method, system and device for data transmission
CN108513272B (en) Short message processing method and device
CN113395281B (en) Verification method and device capable of verifying statement and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载