CN111917555A - Data processing method and device - Google Patents

Data processing method and device Download PDF

Info

Publication number
CN111917555A
CN111917555A CN202010670447.5A CN202010670447A CN111917555A CN 111917555 A CN111917555 A CN 111917555A CN 202010670447 A CN202010670447 A CN 202010670447A CN 111917555 A CN111917555 A CN 111917555A
Authority
CN
China
Prior art keywords
timestamp
data
verification
verification information
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010670447.5A
Other languages
Chinese (zh)
Other versions
CN111917555B (en
Inventor
缪练
梁志婷
徐浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Minglue Artificial Intelligence Group Co Ltd
Original Assignee
Shanghai Minglue Artificial Intelligence Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Minglue Artificial Intelligence Group Co Ltd filed Critical Shanghai Minglue Artificial Intelligence Group Co Ltd
Priority to CN202010670447.5A priority Critical patent/CN111917555B/en
Publication of CN111917555A publication Critical patent/CN111917555A/en
Application granted granted Critical
Publication of CN111917555B publication Critical patent/CN111917555B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a data processing method and a data processing device, wherein the method comprises the following steps: sending first uploading request information to a data server, wherein the first uploading request information comprises an equipment ID (identity) and a timestamp of current sound recording equipment, and the timestamp is the timestamp when the first uploading request is sent; receiving verification information issued by the data server according to the equipment ID and the timestamp; and sending the verification information and the audio data to be encrypted so that the data server encrypts the audio data to be encrypted according to a preset encryption method under the condition that the verification information passes verification, wherein the preset encryption method and the timestamp have an association relationship. The invention solves the problems that the encryption of the audio data is not easy to leak and the pressure of the encryption process on the server is reduced, thereby achieving the effects of ensuring the legality of the audio data and reducing the performance consumption of the server caused by the encryption process.

Description

Data processing method and device
Technical Field
The present invention relates to the field of data processing, and in particular, to a data processing method and apparatus.
Background
In an online store, in order to monitor and count data of service conditions of workers, a recording acquisition device is usually equipped for each worker to acquire service sessions of the workers during working hours in real time.
The storage space of the recording acquisition equipment is generally small, and the recording acquisition equipment needs to be backed up regularly, but due to the fact that more people and intelligent equipment come and go from an offline store, other equipment can be mistakenly accessed into a channel for data transmission with the server, and therefore useless data can be acquired in the server.
Furthermore, after transmitting the audio data to the server, security and privacy protection issues of the audio data are typically noted. After the audio data are uniformly packaged into files, the files are encrypted by adopting the same encryption method, but the same encryption method is easily cracked illegally by other people when a user uses the same encryption method for a long time.
The problem that encryption of audio data is not easy to leak and the pressure of an encryption process on a server is reduced in the related art is solved.
Disclosure of Invention
The embodiment of the invention provides a data processing method and a data processing device, which are used for at least solving the problems that in the related technology, audio data encryption is not easy to leak, and the pressure of an encryption process on a server is reduced.
According to an embodiment of the present invention, there is provided a data processing method including: sending first uploading request information to a data server, wherein the first uploading request information comprises an equipment ID (identity) and a timestamp of current sound recording equipment, and the timestamp is the timestamp when the first uploading request is sent; receiving verification information issued by the data server according to the equipment ID and the timestamp; and sending the verification information and the audio data to be encrypted so that the data server encrypts the audio data to be encrypted according to a preset encryption method under the condition that the verification information passes verification, wherein the preset encryption method and the timestamp have an association relationship.
Optionally, the receiving the check information issued according to the device ID and the timestamp includes: and receiving verification information containing the verification code under the condition that the equipment meets the encryption condition according to the equipment ID and the time period of the timestamp corresponds to the verification code and the ID of the preset encryption method according to the timestamp.
Optionally, sending the verification information and the data to be encrypted, where encrypting the data to be encrypted according to a preset encryption method when the verification information passes the verification includes: and sending the check code in the check information and the data to be encrypted according to the received check information containing the check code, so that the data server inquires the preset encryption method according to the ID of the preset encryption method to encrypt the data to be encrypted under the condition that the check code passes the check.
Optionally, the method further comprises: and under the condition of downloading or inquiring the encrypted data, acquiring the ID of a preset decryption method corresponding to the time period to which the timestamp belongs, and decrypting the data.
According to an embodiment of the present invention, there is also provided a data processing method including: receiving first uploading request information sent by current sound recording equipment, wherein the first uploading request information comprises an equipment ID and a timestamp, the timestamp is the timestamp when the first uploading request is sent, and the equipment ID is used for determining that the equipment is compliant equipment; the data server determines verification information and a preset encryption method according to the time period to which the timestamp belongs; the data server issues the check information; and encrypting the audio data to be encrypted according to the preset encryption method under the condition that the verification information passes the verification, wherein the preset encryption method and the timestamp have an association relationship.
Optionally, the determining the check information and the preset encryption method according to the time period to which the timestamp belongs includes: determining verification information and a preset encryption method in a target time period according to the time period to which the timestamp belongs; encrypting the data to be encrypted according to the preset encryption method under the condition that the verification information passes the verification comprises the following steps: determining a preset encryption method in the target time period under the condition that the verification information passes the verification; and encrypting the data to be encrypted according to a preset encryption method in the target time period.
Optionally, before receiving the first upload request information, the method further includes: cutting a preset processing time into a plurality of time periods; randomly generating verification information and an encryption and decryption method according to a plurality of time periods, wherein the encryption and decryption method comprises an encryption method and an ID of the encryption method, and the ID of the decryption method; and storing the verification information and the encryption and decryption method respectively corresponding to each time period in a preset tree structure.
Optionally, the encrypting the data to be encrypted according to the preset encryption method when the verification information passes the verification further includes: receiving a processing request, wherein the processing request comprises downloading or inquiring encrypted data; inquiring a corresponding decryption method in the preset tree structure according to the ID of the decryption method; decrypting the encrypted data according to the decryption method.
According to another embodiment of the present invention, there is provided a data processing apparatus including:
the system comprises an uploading module, a data server and a processing module, wherein the uploading module is used for sending first uploading request information to the data server, the first uploading request information comprises a device ID and a time stamp of the current sound recording device, and the time stamp is the time stamp when the first uploading request is sent;
the first receiving module is used for receiving the verification information issued by the data server according to the equipment ID and the timestamp;
and the sending module is used for sending the verification information and the audio data to be encrypted so that the data server encrypts the audio data to be encrypted according to a preset encryption method under the condition that the verification information passes verification, wherein the preset encryption method and the timestamp have an association relationship.
According to another embodiment of the present invention, there is provided a data processing apparatus including: the second receiving module is configured to receive first upload request information sent by a current sound recording device, where the first upload request information includes a device ID and a timestamp, where the timestamp is a timestamp when the first upload request is sent, and the device ID is used to determine that a device is a device that meets an encryption condition; the determining module is used for determining the verification information and the preset encryption method according to the time period to which the timestamp belongs; the issuing module is used for issuing the verification information; and the encryption module is used for encrypting the audio data to be encrypted according to the preset encryption method under the condition that the verification information passes the verification, wherein the preset encryption method and the timestamp have an association relation.
According to a further embodiment of the present invention, there is also provided a storage medium having a computer program stored therein, wherein the computer program is arranged to perform the steps of any of the above method embodiments when executed.
According to yet another embodiment of the present invention, there is also provided an electronic device, including a memory in which a computer program is stored and a processor configured to execute the computer program to perform the steps in any of the above method embodiments.
According to the invention, after the first upload request information is sent to the data server, the verification information issued by the data server according to the equipment ID and the timestamp is received, so that the verification information and the audio data to be encrypted are sent, and the data server encrypts the audio data to be encrypted according to a preset encryption method under the condition that the verification information passes verification. Therefore, the problems that the audio data is not easy to leak in the encryption process and the pressure of the encryption process on the server is reduced can be solved, and the effects of ensuring the legality of the audio data and reducing the performance consumption brought to the server by the encryption process are achieved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
fig. 1 is a block diagram of a hardware configuration of a mobile terminal of a data processing method according to an embodiment of the present invention;
FIG. 2 is a flow diagram of a data processing method according to an embodiment of the invention;
FIG. 3 is a flow chart of a data processing method according to an embodiment of the present invention;
FIG. 4 is a block diagram of a data processing arrangement according to an embodiment of the present invention;
FIG. 5 is a block diagram of a data processing arrangement according to an embodiment of the present invention;
fig. 6 is a flow chart of a data processing method according to an alternative embodiment of the invention.
Detailed Description
The invention will be described in detail hereinafter with reference to the accompanying drawings in conjunction with embodiments. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
Example 1
The method provided by the first embodiment of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Taking the example of being operated on a mobile terminal, fig. 1 is a hardware structure block diagram of the mobile terminal of a data processing method according to an embodiment of the present invention. As shown in fig. 1, the mobile terminal 10 may include one or more (only one shown in fig. 1) processors 102 (the processor 102 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA) and a memory 104 for storing data, and optionally may also include a transmission device 106 for communication functions and an input-output device 108. It will be understood by those skilled in the art that the structure shown in fig. 1 is only an illustration, and does not limit the structure of the mobile terminal. For example, the mobile terminal 10 may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
The memory 104 may be used to store computer programs, for example, software programs and modules of application software, such as computer programs corresponding to the data processing method in the embodiment of the present invention, and the processor 102 executes various functional applications and data processing by running the computer programs stored in the memory 104, so as to implement the method described above. The memory 104 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some instances, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the mobile terminal 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 106 is used for receiving or transmitting data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the mobile terminal 10. In one example, the transmission device 106 includes a Network adapter (NIC), which can be connected to other Network devices through a base station so as to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
In this embodiment, a data processing method operating in the mobile terminal or the network architecture is provided, and fig. 2 is a flowchart of the data processing method according to the embodiment of the present invention, as shown in fig. 2, the flowchart includes the following steps:
step S202, sending first uploading request information to a data server, wherein the first uploading request information comprises a device ID and a time stamp of the current sound recording device, and the time stamp is the time stamp when the first uploading request is sent;
step S204, receiving verification information issued by the data server according to the equipment ID and the timestamp;
step S206, sending the verification information and the audio data to be encrypted, so that the data server encrypts the audio data to be encrypted according to a preset encryption method when the verification information passes verification, where the preset encryption method has an association relationship with the timestamp.
Through the steps, after the first upload request information is sent to the data server, the verification information issued by the data server according to the equipment ID and the timestamp is received, so that the verification information and the audio data to be encrypted are sent, and the data server encrypts the audio data to be encrypted according to a preset encryption method under the condition that the verification information passes verification. Therefore, the problems that the audio data is not easy to leak in the encryption process and the pressure of the encryption process on the server is reduced can be solved, and the effects of ensuring the legality of the audio data and reducing the performance consumption brought to the server by the encryption process are achieved.
In step S202, first upload request information is sent to a data server through the current sound recording device. It should be noted that the first upload request information includes a device ID of the current sound recording device and a timestamp, that is, the timestamp is a timestamp when the first upload request is sent.
Specifically, the current sound recording device may have its own device ID, and carry its own device ID and current timestamp when the current sound recording device sends an upload request.
In step S204, the current sound recording device receives verification information issued by the data server according to the device ID and the timestamp.
Specifically, after the recording device obtains the check code, the audio data file and the received check code are sent to the server together.
In the step S206, the verification information and the audio data to be encrypted are sent through the current sound recording device, so that the data server encrypts the audio data to be encrypted according to a preset encryption method when the verification information passes the verification. Since the preset encryption method and the time stamp have an association relationship, each time stamp corresponds to one preset encryption method, and the encryption methods can be generated in advance through a data server.
Specifically, the data server checks the uploaded audio data file by extracting the check code, and after the check is consistent, the data server queries the ID interface according to the corresponding encryption algorithm ID, so that the corresponding encryption algorithm is called to encrypt the audio data file.
As an alternative embodiment of the present invention, the receiving the verification information issued according to the device ID and the timestamp includes: and receiving verification information containing the verification code under the condition that the equipment meets the encryption condition according to the equipment ID and the time period of the timestamp corresponds to the verification code and the ID of the preset encryption method according to the timestamp.
As an optional embodiment of the present invention, sending the verification information and the data to be encrypted, where encrypting the data to be encrypted according to a preset encryption method when the verification information passes the verification includes: and sending the check code in the check information and the data to be encrypted according to the received check information containing the check code, so that the data server inquires the preset encryption method according to the ID of the preset encryption method to encrypt the data to be encrypted under the condition that the check code passes the check.
In specific implementation, each recording device has a device ID of the recording device, the recording device carries the device ID of the recording device and a current timestamp when sending an uploading requirement, the server judges that the device ID is held by the compliance device, and quickly searches a corresponding check code and an algorithm ID in a data structure of a Reddish-Black tree according to the timestamp carried by the recording device in the uploading requirement and the time period; and issuing the check code to the recording equipment.
As an alternative embodiment mode of the present invention, the method further includes: and under the condition of downloading or inquiring the encrypted data, acquiring the ID of a preset decryption method corresponding to the time period to which the timestamp belongs, and decrypting the data.
In specific implementation, when a user needs to download or query an encrypted audio data file, the user acquires a corresponding decryption algorithm ID from the server by confirming an uploading time period and queries an ID interface of the server, so that the corresponding decryption algorithm is called to decrypt the audio data file.
Fig. 3 is a flowchart of a data processing method according to an embodiment of the present invention, and as shown in fig. 3, the flowchart includes the steps of:
step S302, a data server receives first upload request information sent by a current sound recording device, wherein the first upload request information comprises a device ID and a timestamp, the timestamp is the timestamp when the first upload request is sent, and the device ID is used for determining that a device is a device meeting an encryption condition;
step S304, the data server determines the verification information and the preset encryption method according to the time period to which the timestamp belongs;
step S306, the data server issues the verification information;
and step S308, encrypting the audio data to be encrypted according to the preset encryption method under the condition that the verification information passes the verification, wherein the preset encryption method and the timestamp have an association relationship.
In the above step S302, the upload request information sent by the current sound recording apparatus is received at the data server. Because the first upload request information includes the device ID and the timestamp, the audio recording device needs to send an upload encryption request to the server before uploading data.
In step S304, the data server determines the check information and the preset encryption method according to the time period to which the timestamp belongs.
Specifically, a generation module is arranged in the data server, and the generation module generates a random check code according to time periods, each time period corresponds to one random check code, and each time period corresponds to one set of encryption and decryption algorithms, that is, one set of encryption and decryption algorithms is randomly selected from a plurality of sets of preset encryption and decryption algorithms, and a corresponding device ID is obtained. For example, a time period may be set every 5 minutes, where each time period corresponds to a random check code and a set of encryption and decryption algorithms.
In step S306, the data server issues the verification information according to the uploading request of the sound recording device. The check information includes information such as a check code, a preset encryption algorithm, an equipment ID and the like.
In the above step S308, the audio data to be encrypted is encrypted according to the preset encryption method when the verification information passes the verification on the recording apparatus.
As an optional embodiment of the present invention, the determining, according to the time period to which the timestamp belongs, the check information and the preset encryption method include: determining verification information and a preset encryption method in a target time period according to the time period to which the timestamp belongs; encrypting the data to be encrypted according to the preset encryption method under the condition that the verification information passes the verification comprises the following steps: determining a preset encryption method in the target time period under the condition that the verification information passes the verification; and encrypting the data to be encrypted according to a preset encryption method in the target time period.
Specifically, in the embodiment of the present invention, a plurality of check codes, a plurality of encryption and decryption methods are provided. And in the data server, each time period corresponds to a check code according to the time period cut in the historical record every day, and an encryption algorithm and a decryption algorithm are randomly used. Usually, a check code for each time of the day is generated in advance, and a corresponding algorithm ID is randomly acquired.
Preferably, the check code, the encryption algorithm ID, and the decryption algorithm ID for each segment time may be loaded in the program of the server in a red-black tree manner. And checking the verification code between the recording equipment and the data server, and supporting a quick query decryption algorithm and a generated verification code through a storage structure of the Reynebia Reynebria.
As an optional embodiment of the present invention, before receiving the first upload request information, the method further includes: cutting a preset processing time into a plurality of time periods; randomly generating verification information and an encryption and decryption method according to a plurality of time periods, wherein the encryption and decryption method comprises an encryption method and an ID of the encryption method, and the ID of the decryption method; and storing the verification information and the encryption and decryption method respectively corresponding to each time period in a preset tree structure.
In specific implementation, the preset processing duration is cut into a plurality of time periods; and randomly generating the verification information and the encryption and decryption methods according to a plurality of time periods. The encryption and decryption methods include an encryption method, an ID of the encryption method, a decryption method, and an ID of the decryption method. And storing the verification information and the encryption and decryption methods respectively corresponding to each time period in the red and black tree. By adopting the memory data storage format of the red and black tree, the encryption, decryption method and check code used in a certain time period can be quickly found no matter how short the time end is cut.
As an optional embodiment of the present invention, after encrypting the data to be encrypted according to the preset encryption method when the verification information passes the verification, the method further includes: receiving a processing request, wherein the processing request comprises downloading or inquiring encrypted data; inquiring a corresponding decryption method in the preset tree structure according to the ID of the decryption method; decrypting the encrypted data according to the decryption method.
In specific implementation, a request for downloading or querying the encrypted audio data is received at the data server, a corresponding decryption method is queried in the red and black tree according to the ID of a preset decryption method, and the encrypted audio data is decrypted according to the corresponding decryption method.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
Example 2
In this embodiment, a data processing apparatus is further provided, and the apparatus is used to implement the foregoing embodiments and preferred embodiments, and details are not repeated for what has been described. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
Fig. 4 is a block diagram of a data processing apparatus according to an embodiment of the present invention, as shown in fig. 4, the apparatus including:
the recording device comprises an uploading module 30, a sending module, a receiving module and a sending module, wherein the uploading module is used for sending first uploading request information to a data server, the first uploading request information comprises a device ID and a timestamp of the current recording device, and the timestamp is the timestamp when the first uploading request is sent;
a first receiving module 32, configured to receive check information issued by the data server according to the device ID and the timestamp;
a sending module 34, configured to send the verification information and the audio data to be encrypted, so that the data server encrypts the audio data to be encrypted according to a preset encryption method when the verification information passes verification, where the preset encryption method has an association relationship with the timestamp.
And sending first upload request information to a data server through the current sound recording device in the upload module 30. It should be noted that the first upload request information includes a device ID of the current sound recording device and a timestamp, that is, the timestamp is a timestamp when the first upload request is sent.
Specifically, the current sound recording device may have its own device ID, and carry its own device ID and current timestamp when the current sound recording device sends an upload request.
And in the first receiving module 32, the verification information issued by the data server according to the device ID and the timestamp is received by the current sound recording device.
Specifically, after the recording device obtains the check code, the audio data file and the received check code are sent to the server together.
The sending module 34 sends the verification information and the audio data to be encrypted through the current recording device, so that the data server encrypts the audio data to be encrypted according to a preset encryption method when the verification information passes the verification. Since the preset encryption method and the time stamp have an association relationship, each time stamp corresponds to one preset encryption method, and the encryption methods can be generated in advance through a data server.
Specifically, the data server checks the uploaded audio data file by extracting the check code, and after the check is consistent, the data server queries the ID interface according to the corresponding encryption algorithm ID, so that the corresponding encryption algorithm is called to encrypt the audio data file.
The first receiving module 32 is further configured to receive check information including the check code when it is determined that the device meets the encryption condition according to the device ID and it is determined that a time period to which the timestamp belongs corresponds to the check code and an ID of a preset encryption method according to the timestamp.
The sending module 34 is further configured to send, according to the received check information including the check code, the check code in the check information and the data to be encrypted, so that the data server queries the preset encryption method according to the ID of the preset encryption method to encrypt the data to be encrypted when the check code passes the check.
Fig. 5 is a block diagram of a data processing apparatus according to an embodiment of the present invention, as shown in fig. 4, the apparatus including:
a second receiving module 50, configured to receive first upload request information sent by a current sound recording device, where the first upload request information includes a device ID and a timestamp, where the timestamp is a timestamp when the first upload request is sent, and the device ID is used to determine that a device is a device that meets an encryption condition;
a determining module 52, configured to determine, according to a time period to which the timestamp belongs, verification information and a preset encryption method;
the issuing module 54 is used for issuing the verification information;
and an encrypting module 56, configured to encrypt the audio data to be encrypted according to the preset encrypting method when the verification information passes the verification, where the preset encrypting method and the timestamp have an association relationship.
The second receiving module 50 receives the upload request information sent by the current sound recording device at the data server. Because the first upload request information includes the device ID and the timestamp, the audio recording device needs to send an upload encryption request to the server before uploading data.
In the determining module 52, the data server determines the check information and the preset encryption method according to the time period to which the timestamp belongs.
Specifically, a generation module is arranged in the data server, and the generation module generates a random check code according to time periods, each time period corresponds to one random check code, and each time period corresponds to one set of encryption and decryption algorithms, that is, one set of encryption and decryption algorithms is randomly selected from a plurality of sets of preset encryption and decryption algorithms, and a corresponding device ID is obtained. For example, a time period may be set every 5 minutes, where each time period corresponds to a random check code and a set of encryption and decryption algorithms.
The data server in the issuing module 54 issues the verification information according to the uploading request of the recording device. The check information includes information such as a check code, a preset encryption algorithm, an equipment ID and the like.
In the encryption module 56, the audio data to be encrypted is encrypted according to the preset encryption method when the verification information passes verification on the recording device.
It should be noted that, the above modules may be implemented by software or hardware, and for the latter, the following may be implemented, but not limited to: the modules are all positioned in the same processor; alternatively, the modules are respectively located in different processors in any combination.
In order to better understand the flow of the data processing method, the following explains the technical solutions with reference to the preferred embodiments, but the technical solutions of the embodiments of the present invention are not limited.
The method of the preferred embodiment of the invention generates the check code in advance at the data server to reduce the pressure of the server. In the data server, the encryption algorithm of a time period is adopted and the data server is randomly replaced every day, so that the difficulty of cracking the verification code is increased. In addition, in the memory data storage format of the red and black tree in the data server, the encryption and decryption method and the check code used in a certain time period can be quickly found no matter how short the time end is cut.
Fig. 6 is a flowchart illustrating a data processing method according to an embodiment of the present application, including the steps of:
first, the data server performs segmentation at regular intervals in units of days. Specifically, each time corresponds to a check code according to a time period cut before every day, and an encryption algorithm and a decryption algorithm are randomly used. The server is provided with a plurality of sets of encryption and decryption algorithms in advance, each set of encryption and decryption algorithm has a respective ID interface, and the encryption algorithm/decryption algorithm can be directly called by inquiring the ID interface.
Preferably, the check code of each time of the day may be generated in advance, and the corresponding algorithm ID may be randomly acquired.
Optionally, the check code, the encryption algorithm ID, and the decryption algorithm ID of each time period are loaded in the program of the server in a red-black tree manner to check the verification code between the recording device and the server, and the decryption algorithm and the generated check code are quickly queried through a storage structure of the red-black tree.
Alternatively, to improve security, the check code and algorithm ID may be automatically refreshed at 0 o' clock every day.
Then, a generating module is arranged in the data server, the generating module generates random check codes according to time periods, each time period corresponds to one random check code, and each time period corresponds to one set of encryption and decryption algorithms.
And then, respectively recording the random check code generated by the generation module of the data server, the obtained encryption algorithm ID and the obtained decryption algorithm ID into a red-black tree data structure according to the segmentation of the time period. As shown in fig. 6, each 5 minutes is a time period, and the check code and the algorithm ID corresponding to different time periods can be quickly found by using the red and black tree data structure.
And finally, the current recording equipment sends an uploading requirement to the server before uploading data, and the server confirms that the uploading requirement is sent by the equipment meeting the encryption condition, and then sends a check code to the recording equipment. Because each recording device has its own device ID, the recording device carries its own device ID and current timestamp when sending the upload request, and the server judges that the device ID is held by the device satisfying the encryption condition, and carries the timestamp in the upload request according to the recording device. For example, the time stamp: 2020-01-0110: 01:01, confirming that the time period is 10:00-10:05, and quickly finding out the corresponding check code and algorithm ID from the time period to the data structure of the red-black tree; and issuing the check code to the recording equipment.
And after the current recording equipment acquires the check code, sending the audio data file and the received check code to the server together. And the data server checks the uploaded audio data file by extracting the check code, and after the check is consistent, the ID interface of the uploaded audio data file is inquired according to the corresponding encryption algorithm ID, so that the corresponding encryption algorithm is called to encrypt the audio data file.
Optionally, when the user needs to download or query the encrypted audio data file, the ID interface is queried by confirming that the corresponding decryption algorithm ID is obtained in the server during the uploading time period, so as to invoke the corresponding decryption algorithm to decrypt the audio data file.
Embodiments of the present invention also provide a storage medium having a computer program stored therein, wherein the computer program is arranged to perform the steps of any of the above method embodiments when executed.
Alternatively, in the present embodiment, the storage medium may be configured to store a computer program for executing the steps of:
s1, sending first uploading request information to a data server, wherein the first uploading request information comprises a device ID and a time stamp of the current sound recording device, and the time stamp is the time stamp when the first uploading request is sent;
s2, receiving verification information issued by the data server according to the equipment ID and the timestamp;
and S3, sending the verification information and the audio data to be encrypted, so that the data server encrypts the audio data to be encrypted according to a preset encryption method under the condition that the verification information passes verification, wherein the preset encryption method has an association relation with the timestamp.
Optionally, the storage medium is further arranged to store a computer program for performing the steps of:
s1, receiving verification information containing the verification code under the condition that the equipment meets the encryption condition according to the equipment ID and the time period of the timestamp corresponds to the verification code and the ID of the preset encryption method according to the timestamp;
and S2, receiving verification information containing the verification code under the condition that the equipment meets the encryption condition according to the equipment ID and the time period of the timestamp corresponds to the verification code and the ID of the preset encryption method according to the timestamp.
Optionally, in this embodiment, the storage medium may include, but is not limited to: various media capable of storing computer programs, such as a usb disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk.
Embodiments of the present invention also provide an electronic device comprising a memory having a computer program stored therein and a processor arranged to run the computer program to perform the steps of any of the above method embodiments.
Optionally, the electronic apparatus may further include a transmission device and an input/output device, wherein the transmission device is connected to the processor, and the input/output device is connected to the processor.
Optionally, in this embodiment, the processor may be configured to execute the following steps by a computer program:
s1, sending first uploading request information to a data server, wherein the first uploading request information comprises a device ID and a time stamp of the current sound recording device, and the time stamp is the time stamp when the first uploading request is sent;
s2, receiving verification information issued by the data server according to the equipment ID and the timestamp;
and S3, sending the verification information and the audio data to be encrypted, so that the data server encrypts the audio data to be encrypted according to a preset encryption method under the condition that the verification information passes verification, wherein the preset encryption method has an association relation with the timestamp.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments and optional implementation manners, and this embodiment is not described herein again.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, and in some cases, the steps shown or described may be performed in an order different than that described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A data processing method, comprising:
sending first uploading request information to a data server, wherein the first uploading request information comprises an equipment ID (identity) and a timestamp of current sound recording equipment, and the timestamp is the timestamp when the first uploading request is sent;
receiving verification information issued by the data server according to the equipment ID and the timestamp;
and sending the verification information and the audio data to be encrypted so that the data server encrypts the audio data to be encrypted according to a preset encryption method under the condition that the verification information passes verification, wherein the preset encryption method and the timestamp have an association relationship.
2. The method of claim 1, wherein receiving the verification information issued according to the device ID and the timestamp comprises:
and receiving verification information containing the verification code under the condition that the equipment meets the encryption condition according to the equipment ID and the time period of the timestamp corresponds to the verification code and the ID of the preset encryption method according to the timestamp.
3. The method according to claim 2, wherein sending the verification information and the data to be encrypted, and performing encryption processing on the data to be encrypted according to a preset encryption method if the verification information passes the verification comprises:
and sending the check code in the check information and the data to be encrypted according to the received check information containing the check code, so that the data server inquires the preset encryption method according to the ID of the preset encryption method to encrypt the data to be encrypted under the condition that the check code passes the check.
4. The method of claim 3, further comprising:
and under the condition of downloading or inquiring the encrypted data, acquiring the ID of a preset decryption method corresponding to the time period to which the timestamp belongs, and decrypting the data.
5. A data processing method, comprising:
the method comprises the steps that a data server receives first uploading request information sent by current sound recording equipment, wherein the first uploading request information comprises an equipment ID and a timestamp, the timestamp is the timestamp when the first uploading request is sent, and the equipment ID is used for determining that equipment meets an encryption condition;
the data server determines verification information and a preset encryption method according to the time period to which the timestamp belongs;
the data server issues the check information;
and encrypting the audio data to be encrypted according to the preset encryption method under the condition that the verification information passes the verification, wherein the preset encryption method and the timestamp have an association relationship.
6. The method of claim 5,
the determining of the verification information and the preset encryption method according to the time period to which the timestamp belongs comprises the following steps:
determining verification information and a preset encryption method in a target time period according to the time period to which the timestamp belongs;
encrypting the data to be encrypted according to the preset encryption method under the condition that the verification information passes the verification comprises the following steps:
determining a preset encryption method in the target time period under the condition that the verification information passes the verification;
and encrypting the data to be encrypted according to a preset encryption method in the target time period.
7. The method of claim 5, wherein before receiving the first upload request message, further comprising:
cutting a preset processing time into a plurality of time periods;
randomly generating verification information and an encryption and decryption method according to a plurality of time periods, wherein the encryption and decryption method comprises an encryption method and an ID of the encryption method, and the ID of the decryption method;
and storing the verification information and the encryption and decryption method respectively corresponding to each time period in a preset tree structure.
8. The method according to claim 7, wherein after encrypting the data to be encrypted according to the preset encryption method if the verification information passes the verification, the method further comprises:
receiving a processing request, wherein the processing request comprises downloading or inquiring encrypted data;
inquiring a corresponding decryption method in the preset tree structure according to the ID of the decryption method;
decrypting the encrypted data according to the decryption method.
9. A data processing apparatus, comprising:
the system comprises an uploading module, a data server and a processing module, wherein the uploading module is used for sending first uploading request information to the data server, the first uploading request information comprises a device ID and a time stamp of the current sound recording device, and the time stamp is the time stamp when the first uploading request is sent;
the first receiving module is used for receiving the verification information issued by the data server according to the equipment ID and the timestamp;
and the sending module is used for sending the verification information and the audio data to be encrypted so that the data server encrypts the audio data to be encrypted according to a preset encryption method under the condition that the verification information passes verification, wherein the preset encryption method and the timestamp have an association relationship.
10. A data processing apparatus, comprising:
the second receiving module is configured to receive first upload request information sent by a current sound recording device, where the first upload request information includes a device ID and a timestamp, where the timestamp is a timestamp when the first upload request is sent, and the device ID is used to determine that a device is a device that meets an encryption condition;
the determining module is used for determining the verification information and the preset encryption method according to the time period to which the timestamp belongs;
the issuing module is used for issuing the verification information;
and the encryption module is used for encrypting the audio data to be encrypted according to the preset encryption method under the condition that the verification information passes the verification, wherein the preset encryption method and the timestamp have an association relation.
CN202010670447.5A 2020-07-13 2020-07-13 Data processing method and device Active CN111917555B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010670447.5A CN111917555B (en) 2020-07-13 2020-07-13 Data processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010670447.5A CN111917555B (en) 2020-07-13 2020-07-13 Data processing method and device

Publications (2)

Publication Number Publication Date
CN111917555A true CN111917555A (en) 2020-11-10
CN111917555B CN111917555B (en) 2024-03-15

Family

ID=73227867

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010670447.5A Active CN111917555B (en) 2020-07-13 2020-07-13 Data processing method and device

Country Status (1)

Country Link
CN (1) CN111917555B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112672333A (en) * 2020-12-15 2021-04-16 浙江三维万易联科技有限公司 Equipment connection method and device
CN112714112A (en) * 2020-12-22 2021-04-27 四川云申至诚科技有限公司 Data encryption and decryption method for server data storage
CN113360884A (en) * 2021-06-11 2021-09-07 潍柴动力股份有限公司 Equipment authentication method, vehicle-mounted terminal, server and system
CN113890730A (en) * 2021-09-23 2022-01-04 上海华兴数字科技有限公司 Data transmission method and system
WO2023142957A1 (en) * 2022-01-25 2023-08-03 京东方科技集团股份有限公司 Method and apparatus for verifying display terminal, storage medium, and electronic device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105959279A (en) * 2016-04-29 2016-09-21 大连理工大学 Computer information transmission system and method based on encryption processing
KR200481693Y1 (en) * 2016-09-01 2016-11-01 이경구 Cloud voice recording system
CN106101368A (en) * 2016-07-07 2016-11-09 立德高科(昆山)数码科技有限责任公司 The method and system of Quick Response Code have been generated based on telephonograph
CN107633588A (en) * 2017-10-24 2018-01-26 北京金储自动化技术有限公司 Control method, system, lockset, electronic equipment and readable storage medium storing program for executing
WO2018032573A1 (en) * 2016-08-18 2018-02-22 中兴通讯股份有限公司 Data processing method, apparatus, server and terminal
WO2018196541A1 (en) * 2017-04-24 2018-11-01 腾讯科技(深圳)有限公司 Document sharing method, server, terminal and storage medium
CN108809940A (en) * 2018-05-04 2018-11-13 四川理工学院 Network system server interacts encryption method with client

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105959279A (en) * 2016-04-29 2016-09-21 大连理工大学 Computer information transmission system and method based on encryption processing
CN106101368A (en) * 2016-07-07 2016-11-09 立德高科(昆山)数码科技有限责任公司 The method and system of Quick Response Code have been generated based on telephonograph
WO2018032573A1 (en) * 2016-08-18 2018-02-22 中兴通讯股份有限公司 Data processing method, apparatus, server and terminal
KR200481693Y1 (en) * 2016-09-01 2016-11-01 이경구 Cloud voice recording system
WO2018196541A1 (en) * 2017-04-24 2018-11-01 腾讯科技(深圳)有限公司 Document sharing method, server, terminal and storage medium
CN107633588A (en) * 2017-10-24 2018-01-26 北京金储自动化技术有限公司 Control method, system, lockset, electronic equipment and readable storage medium storing program for executing
CN108809940A (en) * 2018-05-04 2018-11-13 四川理工学院 Network system server interacts encryption method with client

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112672333A (en) * 2020-12-15 2021-04-16 浙江三维万易联科技有限公司 Equipment connection method and device
CN112672333B (en) * 2020-12-15 2023-08-25 三维通信股份有限公司 Equipment connection method and device
CN112714112A (en) * 2020-12-22 2021-04-27 四川云申至诚科技有限公司 Data encryption and decryption method for server data storage
CN113360884A (en) * 2021-06-11 2021-09-07 潍柴动力股份有限公司 Equipment authentication method, vehicle-mounted terminal, server and system
CN113890730A (en) * 2021-09-23 2022-01-04 上海华兴数字科技有限公司 Data transmission method and system
WO2023142957A1 (en) * 2022-01-25 2023-08-03 京东方科技集团股份有限公司 Method and apparatus for verifying display terminal, storage medium, and electronic device

Also Published As

Publication number Publication date
CN111917555B (en) 2024-03-15

Similar Documents

Publication Publication Date Title
CN111917555B (en) Data processing method and device
CN110708164B (en) Control method and device for Internet of things equipment, storage medium and electronic device
CN105007577A (en) Virtual SIM card parameter management method, mobile terminal and server
CN111614670A (en) Method and device for sending encrypted file and storage medium
CN115208705B (en) Encryption and decryption method and device based on link data self-adaptive adjustment
CN105120530A (en) Method and device for acquiring data and data acquisition system
CN112883388A (en) File encryption method and device, storage medium and electronic device
CN113259382A (en) Data transmission method, device, equipment and storage medium
CN111372056A (en) Video data encryption and decryption processing method and device
CN111414174A (en) Server firmware upgrading method and device and related equipment
CN111490880B (en) File receiving method and device
CN110166460B (en) Service account registration method and device, storage medium and electronic device
CN112564901A (en) Key generation method and system, storage medium and electronic device
CN111367686A (en) Service interface calling method and device, computer equipment and storage medium
CN113346999B (en) Splitting encryption-based brain central system
CN111506913B (en) Audio encryption method and device, storage medium and electronic device
WO2022100675A1 (en) Data encryption and data decryption methods, apparatus, storage medium, and electronic apparatus
CN111464496B (en) Data transmission method, device, system, storage medium and electronic device
CN110913350B (en) Anti-cheating attendance checking method, device and system
CN114423001A (en) Decryption method, server and storage medium
CN111797417A (en) File uploading method and device, storage medium and electronic device
CN112118267A (en) Anonymous communication method and related device
CN111310130A (en) Authorization authentication processing method, device, storage medium and electronic device
CN114285655B (en) Method and device for determining secret key, storage medium and electronic device
CN112672333B (en) Equipment connection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant