CN113542224A - Training data processing method, device, server and medium - Google Patents

Training data processing method, device, server and medium Download PDF

Info

Publication number
CN113542224A
CN113542224A CN202110668146.3A CN202110668146A CN113542224A CN 113542224 A CN113542224 A CN 113542224A CN 202110668146 A CN202110668146 A CN 202110668146A CN 113542224 A CN113542224 A CN 113542224A
Authority
CN
China
Prior art keywords
data
server
training
sending
data packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110668146.3A
Other languages
Chinese (zh)
Other versions
CN113542224B (en
Inventor
陈卫东
杨鹏伟
李国前
蓝瑜康
原桂强
庄鹏
张自力
孙诚
朱其博
蒋加川
吴朋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changsha Digital Mine Co ltd
Fankou Lead Zinc Mine of Shenzhen Zhongjin Lingnan Nonfemet Co Ltd
Original Assignee
Changsha Digital Mine Co ltd
Fankou Lead Zinc Mine of Shenzhen Zhongjin Lingnan Nonfemet Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changsha Digital Mine Co ltd, Fankou Lead Zinc Mine of Shenzhen Zhongjin Lingnan Nonfemet Co Ltd filed Critical Changsha Digital Mine Co ltd
Priority to CN202110668146.3A priority Critical patent/CN113542224B/en
Publication of CN113542224A publication Critical patent/CN113542224A/en
Application granted granted Critical
Publication of CN113542224B publication Critical patent/CN113542224B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/02Agriculture; Fishing; Forestry; Mining
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/20Education
    • G06Q50/205Education administration or guidance
    • G06Q50/2057Career enhancement or continuing education service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Resources & Organizations (AREA)
  • Computing Systems (AREA)
  • Educational Technology (AREA)
  • Strategic Management (AREA)
  • Educational Administration (AREA)
  • Physics & Mathematics (AREA)
  • Primary Health Care (AREA)
  • General Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Marketing (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Mining & Mineral Resources (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Marine Sciences & Fisheries (AREA)
  • Animal Husbandry (AREA)
  • Agronomy & Crop Science (AREA)
  • Software Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the application is suitable for the technical field of data processing, and provides a training data processing method, a training data processing device, a training data processing server and a training data processing medium, wherein the method comprises the following steps: when a training request is received, determining an application server transmitting the training request; if the application server is an extranet server, packaging first data corresponding to the training request into an encrypted data packet, wherein the first data are data with a security level requirement lower than the actual requirement of the training request, and the encrypted data packet has a corresponding decryption key and a corresponding validity period; sending the encrypted data packet to the extranet server; and when the expiration time of the validity period is reached, sending a data processing instruction to the extranet server to instruct the extranet server to delete the encrypted data packet. By adopting the method, the application range of the training data can be improved, and the safety of the training data is ensured.

Description

Training data processing method, device, server and medium
Technical Field
The embodiment of the application belongs to the technical field of data processing, and particularly relates to a training data processing method, a training data processing device, a training data processing server and a training data processing medium.
Background
Mineral resources are the material basis for developing economies. In China, most mineral resources are mainly underground mineral resources, the exploitation of the underground mineral resources is relatively complex, and various safety accidents often occur. Therefore, it is very important to train the personnel in the well.
Usually, the training content of each mineral production enterprise belongs to the confidential content of the enterprise and needs to be kept secret within a certain range. Therefore, most training data can only be stored in the intranet server. However, in some cases, the business employee may need to view training data on an external network. According to the existing training data storage mode, the training data cannot be obtained at all.
Disclosure of Invention
In view of this, embodiments of the present application provide a method, an apparatus, a server, and a medium for processing training data, so as to improve an application range of the training data, enable a user to view the training data through an external network, and ensure security of the training data.
The first aspect of the embodiment of the present application provides a method for processing training data, which is applied to a data server, and the method includes:
when a training request is received, determining an application server transmitting the training request;
if the application server is an extranet server, packaging first data corresponding to the training request into an encrypted data packet, wherein the first data are data with a security level requirement lower than the actual requirement of the training request, and the encrypted data packet has a corresponding decryption key and a corresponding validity period;
sending the encrypted data packet to the extranet server;
and when the expiration time of the validity period is reached, sending a data processing instruction to the extranet server to instruct the extranet server to delete the encrypted data packet.
A second aspect of the embodiments of the present application provides a training data processing apparatus, applied to a data server, the apparatus including:
the determining module is used for determining an application server for transmitting a training request when the training request is received;
the packaging module is used for packaging first data corresponding to the training request into an encrypted data packet if the application server is an extranet server, wherein the first data are data with a security level requirement lower than the actual requirement of the training request, and the encrypted data packet has a corresponding decryption key and a corresponding validity period;
the sending module is used for sending the encrypted data packet to the extranet server;
and the processing module is used for sending a data processing instruction to the extranet server to instruct the extranet server to delete the encrypted data packet when the expiration time of the validity period is reached.
A third aspect of embodiments of the present application provides a server, including a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor, when executing the computer program, implements the method for processing training data according to the first aspect.
A fourth aspect of embodiments of the present application provides a computer-readable storage medium storing a computer program that, when executed by a processor, implements a method of processing training data as described in the first aspect above.
A fifth aspect of embodiments of the present application provides a computer program product, which, when run on a server, causes the server to perform the method for processing training data according to the first aspect.
Compared with the prior art, the embodiment of the application has the following advantages:
according to the embodiment of the application, when the data server receives the training request, different processing modes can be adopted for the training request by determining the type of the application server transmitting the training request. If the application server is an external network server, the data server can package first data corresponding to the training request, namely data with a lower security level requirement than the actual requirement of the training request, into an encrypted data packet, and send the encrypted data packet to the external network server. Therefore, the safety of the training data sent to the external network server can be ensured through the security processing of reducing the security level requirement and encrypting and packaging. Also, when the expiration time of the validity period of the encrypted data packet is reached, the data server may transmit a data processing instruction to the extranet server to instruct the extranet server to delete the received encrypted data packet, preventing the training data from being stored on the extranet server for a long time.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings used in the embodiments or the description of the prior art will be briefly described below. It is obvious that the drawings in the following description are only some embodiments of the application, and that for a person skilled in the art, other drawings can be derived from them without inventive effort.
FIG. 1 is a schematic flow chart illustrating steps of a method for processing training data according to an embodiment of the present disclosure;
fig. 2 is a schematic diagram illustrating an implementation manner of step S102 of a training data processing method according to an embodiment of the present application;
fig. 3 is a schematic diagram illustrating an implementation manner of step S103 of a training data processing method according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a training data processing apparatus according to an embodiment of the present application;
fig. 5 is a schematic diagram of a server according to an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. However, it will be apparent to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
The technical solution of the present application will be described below by way of specific examples.
Referring to fig. 1, a schematic flow chart illustrating steps of a training data processing method according to an embodiment of the present application is shown, which may specifically include the following steps:
s101, when a training request is received, an application server for transmitting the training request is determined.
It should be noted that the method may be applied to a data server, which may be a server storing training data inside an enterprise.
In the embodiment of the application, the data server can be connected with the application server, and the training data stored on the data server can be presented on different training terminals for users to watch through distribution of the application server.
In the embodiment of the application, in order to ensure the safety of the training data, a plurality of application servers, such as an intranet server and an extranet server, may be configured according to the difference between the intranet and the extranet. The intranet server can be an application server on an enterprise internal network, and the security of the intranet server is high; the extranet server may be an application server on an external network, and the extranet server may be accessed to a network such as the internet.
In an embodiment of the application, the training request may be initiated by a user through a terminal device, and the purpose of the training request may be to request to obtain training data stored on a data server. The training request may be transmitted to a data server via an application server.
Thus, when a training request is received by the data server, the type of application server transmitting the training request may be determined first. Namely, whether the application server transmitting the training request belongs to the intranet server or the extranet server is determined.
In the embodiment of the application, the training data transmitted by the data server to the application server should be data with different security requirements due to different safety requirements.
In one possible implementation of an embodiment of the present application, the data server may store training data that may have different confidentiality requirements that may be used to represent the confidentiality of the corresponding training data. For example, the confidential requirement of training data one is class a.
For training data with a higher security rating, the data server may generate first data with a lower security rating requirement than its actual security rating requirement based on the training data.
For example, for the training data with the security level requirement of level a, the data server may process the training data to obtain the first data with the security level requirement of level B. Wherein, the security level of the B level is lower than that of the A level.
In a specific implementation, when the data server generates first data with a lower security level requirement than the actual security level requirement based on certain training data, the data server may first identify and delete the security-related content in the training data.
Generally, when training data is produced, a producer can mark confidential contents, so that when the training data is processed into first data with lower security level requirements than the actual security level requirements, the data server can identify which contents belong to the confidential contents according to the marks.
For example, for training data existing in the PPT format, a maker can mark PPT pages with confidential content, and the data server can find out which page contents belong to the confidential content according to the mark and delete the page.
Then, the data server may combine the remaining contents from which the confidential contents are deleted into the first data.
It should be noted that, according to different security requirements, the confidential content may have different security levels, and when deleting the confidential content, the data server may also delete the confidential content according to an actual security level requirement, which is not limited in this embodiment of the present application.
S102, if the application server is an extranet server, packaging first data corresponding to the training request into an encrypted data packet, wherein the first data are data with a security level requirement lower than an actual requirement of the training request, and the encrypted data packet has a corresponding decryption key and a validity period.
In the embodiment of the present application, after the data server receives the training request, if it is identified that the application server transmitting the training request is the intranet server, it may be considered that the possibility that the training data is leaked on the intranet is low. Therefore, the data server can send the second data corresponding to the training request, namely the data actually required by the training request, to the intranet server. In this way, the user can obtain complete training data on the internal network.
If the application server transmitting the training request is an extranet server, in order to further ensure the safety of the training data, the data server may encapsulate first data corresponding to the training request, that is, data having a lower security requirement than an actual requirement of the training request, into an encrypted data packet. The encrypted data packet has a corresponding decryption key and a validity period.
In one possible implementation manner of the embodiment of the present application, as shown in fig. 2, the data server encapsulating the first data corresponding to the training request as an encrypted data packet may include the following sub-steps S1021 to S1023:
and S1021, determining the training duration of the first data.
In an embodiment of the present application, the training data may be video data. The first data corresponding to the video data should also be data in video format.
When the data server performs encryption packaging on the first data in the video format, the training duration of the first data can be determined firstly. For example, how long it takes to play the first data completely.
S1022, if the training duration exceeds a preset duration, dividing the first data into a plurality of data segments based on the preset duration.
In the embodiment of the application, the first data with longer training time can be segmented, and the first data with longer training time can be segmented into a plurality of data segments.
In a specific implementation, the first data may be segmented according to a preset duration. For example, for the first data exceeding 30 minutes, it may be divided into a plurality of data segments in a manner of one data segment for 30 minutes.
When the first data is divided into a plurality of data segments according to a certain time length, the time length of a certain data segment may be different from the time lengths of other data segments. For example, for a certain first data, the training time is 3 hours and 40 minutes, namely 220 minutes. If the data segment is divided into 30 minutes, a total of 8 data segments can be obtained. Wherein, the time length of the first 7 data segments is 30 minutes, and the time length of the last data segment is 10 minutes.
And S1023, encrypting the data segments respectively by adopting a preset encryption key to obtain a plurality of encrypted data packets.
After the segmentation of the longer first data is completed, the data server may encrypt each data segment by using a preset encryption key to obtain a plurality of encrypted data packets.
In a specific implementation, when a plurality of data segments are encrypted, the data server may use the same encryption key or different encryption keys; alternatively, the data server may use a certain encryption key for some of the data segments and another encryption key for the remaining other data segments, which is not limited in this embodiment of the present application.
S103, sending the encrypted data packet to the extranet server.
The data server can send the encrypted data packet obtained by encapsulation to an external network server, so that the user can watch the training video on an external network.
In this embodiment, after sending the encrypted data packet to the extranet server, the data server should determine the terminal device that initiated the training request, and send the decryption key corresponding to the encryption key to the terminal device. In this way, the user can use the terminal device to request the delivered first data from the extranet server according to the received decryption key.
In a possible implementation manner of the embodiment of the present application, as shown in fig. 3, the sending, by the data server, the encrypted data packet to the extranet server may include the following sub-steps S1031 to S1032:
and S1031, respectively determining the sending sequence of each encrypted data packet according to the sequence of dividing the first data.
In this embodiment, the data server may determine the transmission order of each encrypted data packet according to the order of dividing the first data. Generally, the order in which the data server sends each encrypted data packet should be the same as the order in which the first data is fragmented.
For example, in the foregoing example, for the first data having a duration of 220 minutes, the division thereof results in a total of 8 data segments. After the 8 segments of data are respectively encrypted, 8 encrypted data packets can be obtained. The transmission sequence of each encrypted data packet is the same as the segmentation sequence of the corresponding data segment in the first data, i.e. the arrangement or playing sequence of each data segment in the first data.
S1032, sequentially sending the plurality of encrypted data packets to the external network server according to the sending sequence, wherein the time difference between the sending of each encrypted data packet and the decryption and playing of the last adjacent encrypted data packet is equal.
In this embodiment, the data server may sequentially send the plurality of encrypted data packets to the extranet server according to the determined sending order.
In a specific implementation, when the data server sends a plurality of encrypted data packets, the data server may send the plurality of encrypted data packets at one time, or send the encrypted data packets in multiple times, and only send one encrypted data packet each time.
In a possible implementation manner of the embodiment of the present application, if the data server only sends one encrypted data packet at a time, the data server may perform the decryption in such a manner that a time difference between a time when each encrypted data packet is sent and a time when an adjacent previous encrypted data packet is decrypted and played is equal to each other.
For example, in the foregoing example, there are 8 encrypted data packets to be sent, and after the data server sends the first encrypted data packet according to the determined sending order, it may be monitored whether the application server plays the video data corresponding to the encrypted data packet through the terminal device. If the encrypted data packet is played on the terminal device, the data server may start timing and send a second encrypted data packet when a preset time point is reached. The predetermined time point may be a time slightly less than the duration of each encrypted data packet. For example, the predetermined time point may be 28 minutes after the last encrypted data packet is played.
After the data server sends the second encrypted data packet, it can continue to monitor whether the second encrypted data packet is played on the terminal device. The data server may then time from when the second encrypted data packet is played. When the preset time point is reached, for example, 28 minutes, the data server may send a third encrypted data packet to the application server until each encrypted data packet is sent.
And S104, when the expiration time of the validity period is reached, sending a data processing instruction to the extranet server to instruct the extranet server to delete the encrypted data packet.
In the embodiment of the present application, the data server may set a validity period for the encrypted data packet. The validity period may indicate that the encrypted data can be decrypted and played only within a time range corresponding to the validity period.
Therefore, in one possible implementation manner of the embodiment of the present application, when the expiration time of the validity period is reached, the data server may send a data processing instruction to the extranet server to instruct the extranet server to delete the received encrypted data packet. In this way, it is ensured that the encrypted data packet is not stored on the external network server for a long time.
In the embodiment of the application, when the data server receives the training request, the data server can adopt different processing modes for the training request by determining the type of the application server transmitting the training request. If the application server is an external network server, the data server can package first data corresponding to the training request, namely data with a lower security level requirement than the actual requirement of the training request, into an encrypted data packet, and send the encrypted data packet to the external network server. Therefore, the safety of the training data sent to the external network server can be ensured through the security processing of reducing the security level requirement and encrypting and packaging. Also, when the expiration time of the validity period of the encrypted data packet is reached, the data server may transmit a data processing instruction to the extranet server to instruct the extranet server to delete the received encrypted data packet, preventing the training data from being stored on the extranet server for a long time.
It should be noted that, the sequence numbers of the steps in the foregoing embodiments do not mean the execution sequence, and the execution sequence of each process should be determined by the function and the inherent logic of the process, and should not constitute any limitation on the implementation process of the embodiments of the present application.
Referring to fig. 4, a schematic diagram of a training data processing apparatus according to an embodiment of the present application is shown, which may specifically include a determining module 401, an encapsulating module 402, a sending module 403, and a processing module 404, where:
a determining module 401, configured to determine, when a training request is received, an application server that transmits the training request;
an encapsulating module 402, configured to encapsulate first data corresponding to the training request into an encrypted data packet if the application server is an extranet server, where the first data is data whose security level requirement is lower than an actual requirement of the training request, and the encrypted data packet has a corresponding decryption key and a validity period;
a sending module 403, configured to send the encrypted data packet to the extranet server;
a processing module 404, configured to send a data processing instruction to the extranet server when the expiration time of the validity period is reached, so as to instruct the extranet server to delete the encrypted data packet.
In an embodiment of the present application, the apparatus further includes a storage module and a generation module, where:
the storage module is used for storing training data, and the training data has corresponding security level requirements;
and the generating module is used for generating first data with lower security requirement than the actual security requirement of the training data based on the training data.
In an embodiment of the present application, the generating module is specifically configured to:
identifying and deleting confidential content in the training data;
and combining the residual contents after the confidential contents are deleted into first data.
In an embodiment of the present application, the training data is video data, and the encapsulation module 402 is specifically configured to:
determining a training duration of the first data;
if the training time length exceeds a preset time length, dividing the first data into a plurality of data segments based on the preset time length;
and encrypting the plurality of data segments respectively by adopting a preset encryption key to obtain a plurality of encrypted data packets.
In this embodiment of the application, the sending module 403 is specifically configured to:
respectively determining the sending sequence of each encrypted data packet according to the sequence of dividing the first data;
and sequentially sending the plurality of encrypted data packets to the extranet server according to the sending sequence, wherein the time difference between the sending of each encrypted data packet and the decryption and playing of the adjacent last encrypted data packet is equal.
In this embodiment of the present application, the determining module 401 is further configured to:
determining terminal equipment initiating the training request;
the sending module 403 is further configured to:
and sending the decryption key to the terminal equipment, wherein the terminal equipment is used for requesting the first data from the extranet server according to the decryption key.
In this embodiment of the application, the sending module 403 is further configured to:
and if the application server is an intranet server, sending second data corresponding to the training request to the intranet server, wherein the second data are data actually required by the training request.
For the apparatus embodiment, since it is substantially similar to the method embodiment, it is described relatively simply, and reference may be made to the description of the method embodiment section for relevant points.
Referring to fig. 5, a schematic diagram of a server of one embodiment of the present application is shown. As shown in fig. 5, the server 500 of the present embodiment includes: a processor 510, a memory 520, and a computer program 521 stored in the memory 520 and executable on the processor 510. The processor 510 implements the steps of the above-described training data processing method in various embodiments, such as steps S101 to S104 shown in fig. 1, when executing the computer program 521. Alternatively, the processor 510, when executing the computer program 521, implements the functions of each module/unit in the above-described device embodiments, for example, the functions of the modules 401 to 404 shown in fig. 4.
Illustratively, the computer program 521 may be partitioned into one or more modules/units that are stored in the memory 520 and executed by the processor 510 to accomplish the present application. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which may be used to describe the execution of the computer program 521 in the server 500. For example, the computer program 521 may be divided into a determination module, an encapsulation module, a transmission module and a processing module, and the specific functions of each module are as follows:
the determining module is used for determining an application server for transmitting a training request when the training request is received;
the packaging module is used for packaging first data corresponding to the training request into an encrypted data packet if the application server is an extranet server, wherein the first data are data with a security level requirement lower than the actual requirement of the training request, and the encrypted data packet has a corresponding decryption key and a corresponding validity period;
the sending module is used for sending the encrypted data packet to the extranet server;
and the processing module is used for sending a data processing instruction to the extranet server to instruct the extranet server to delete the encrypted data packet when the expiration time of the validity period is reached.
The server 500 may include, but is not limited to, a processor 510, a memory 520. Those skilled in the art will appreciate that fig. 5 is merely an example of a server 500 and is not intended to limit server 500 and may include more or fewer components than those shown, or some components may be combined, or different components, e.g., server 500 may also include input-output devices, network access devices, buses, etc.
The Processor 510 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 520 may be an internal storage unit of the server 500, such as a hard disk or a memory of the server 500. The memory 520 may also be an external storage device of the server 500, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and so on, which are provided on the server 500. Further, the memory 520 may also include both an internal storage unit and an external storage device of the server 500. The memory 520 is used for storing the computer program 521 and other programs and data required by the server 500. The memory 520 may also be used to temporarily store data that has been output or is to be output.
The embodiment of the application also discloses a server, which comprises a memory, a processor and a computer program stored in the memory and capable of running on the processor, wherein the processor implements the method for processing the training data according to the foregoing embodiments when executing the computer program.
The embodiment of the application also discloses a computer readable storage medium, which stores a computer program, and the computer program is used for realizing the processing method of the training data according to the previous embodiments when being executed by a processor.
The embodiment of the application also discloses a computer program product, and when the computer program product runs on a server, the server is enabled to execute the processing method of the training data in the previous embodiments.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same. Although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (10)

1. A training data processing method is applied to a data server, and comprises the following steps:
when a training request is received, determining an application server transmitting the training request;
if the application server is an extranet server, packaging first data corresponding to the training request into an encrypted data packet, wherein the first data are data with a security level requirement lower than the actual requirement of the training request, and the encrypted data packet has a corresponding decryption key and a corresponding validity period;
sending the encrypted data packet to the extranet server;
and when the expiration time of the validity period is reached, sending a data processing instruction to the extranet server to instruct the extranet server to delete the encrypted data packet.
2. The method of claim 1, further comprising, prior to receiving a training request:
storing training data, the training data having corresponding confidentiality requirements;
based on the training data, first data having a lower security requirement than an actual security requirement of the training data is generated.
3. The method of claim 2, wherein generating first data having a lower security requirement than an actual security requirement of the training data based on the training data comprises:
identifying and deleting confidential content in the training data;
and combining the residual contents after the confidential contents are deleted into first data.
4. The method according to any one of claims 1-3, wherein the training data is video data, and the encapsulating the first data corresponding to the training request into an encrypted data packet comprises:
determining a training duration of the first data;
if the training time length exceeds a preset time length, dividing the first data into a plurality of data segments based on the preset time length;
and encrypting the plurality of data segments respectively by adopting a preset encryption key to obtain a plurality of encrypted data packets.
5. The method of claim 4, wherein sending the encrypted data packet to the extranet server comprises:
respectively determining the sending sequence of each encrypted data packet according to the sequence of dividing the first data;
and sequentially sending the plurality of encrypted data packets to the extranet server according to the sending sequence, wherein the time difference between the sending of each encrypted data packet and the decryption and playing of the adjacent last encrypted data packet is equal.
6. The method of claim 1, further comprising, after sending the encrypted data packet to the extranet server:
determining terminal equipment initiating the training request;
and sending the decryption key to the terminal equipment, wherein the terminal equipment is used for requesting the first data from the extranet server according to the decryption key.
7. The method of any one of claims 1-3 or 5-6, further comprising:
and if the application server is an intranet server, sending second data corresponding to the training request to the intranet server, wherein the second data are data actually required by the training request.
8. A training data processing device applied to a data server is characterized by comprising:
the determining module is used for determining an application server for transmitting a training request when the training request is received;
the packaging module is used for packaging first data corresponding to the training request into an encrypted data packet if the application server is an extranet server, wherein the first data are data with a security level requirement lower than the actual requirement of the training request, and the encrypted data packet has a corresponding decryption key and a corresponding validity period;
the sending module is used for sending the encrypted data packet to the extranet server;
and the processing module is used for sending a data processing instruction to the extranet server to instruct the extranet server to delete the encrypted data packet when the expiration time of the validity period is reached.
9. A server comprising a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements the method of processing training data according to any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, implements a method of processing training data according to any one of claims 1 to 7.
CN202110668146.3A 2021-06-16 2021-06-16 Training data processing method, device, server and medium Active CN113542224B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110668146.3A CN113542224B (en) 2021-06-16 2021-06-16 Training data processing method, device, server and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110668146.3A CN113542224B (en) 2021-06-16 2021-06-16 Training data processing method, device, server and medium

Publications (2)

Publication Number Publication Date
CN113542224A true CN113542224A (en) 2021-10-22
CN113542224B CN113542224B (en) 2023-12-29

Family

ID=78096180

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110668146.3A Active CN113542224B (en) 2021-06-16 2021-06-16 Training data processing method, device, server and medium

Country Status (1)

Country Link
CN (1) CN113542224B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115599964A (en) * 2022-11-29 2023-01-13 北京思想天下教育科技有限公司(Cn) Training data processing system and data billboard configuration method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020199118A1 (en) * 2001-02-02 2002-12-26 Medinservice.Com, Inc. Internet training course system and methods
CN102708335A (en) * 2012-05-05 2012-10-03 南京赛孚科技有限公司 Confidential file protection method
CN104809405A (en) * 2015-04-24 2015-07-29 广东电网有限责任公司信息中心 Structural data asset leakage prevention method based on hierarchical classification
CN107590396A (en) * 2017-09-01 2018-01-16 泰康保险集团股份有限公司 Data processing method and device, storage medium, electronic equipment
CN109543463A (en) * 2018-10-11 2019-03-29 平安科技(深圳)有限公司 Data Access Security method, apparatus, computer equipment and storage medium
CN110071909A (en) * 2019-03-15 2019-07-30 平安科技(深圳)有限公司 Long data ciphering method, device, computer equipment and storage medium based on RSA
CN110572357A (en) * 2019-07-25 2019-12-13 中国科学院信息工程研究所 device and method for realizing safety information export
CN111523139A (en) * 2020-04-21 2020-08-11 苏州六莲科技有限公司 Data transmission method, system and business mode thereof

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020199118A1 (en) * 2001-02-02 2002-12-26 Medinservice.Com, Inc. Internet training course system and methods
CN102708335A (en) * 2012-05-05 2012-10-03 南京赛孚科技有限公司 Confidential file protection method
CN104809405A (en) * 2015-04-24 2015-07-29 广东电网有限责任公司信息中心 Structural data asset leakage prevention method based on hierarchical classification
CN107590396A (en) * 2017-09-01 2018-01-16 泰康保险集团股份有限公司 Data processing method and device, storage medium, electronic equipment
CN109543463A (en) * 2018-10-11 2019-03-29 平安科技(深圳)有限公司 Data Access Security method, apparatus, computer equipment and storage medium
CN110071909A (en) * 2019-03-15 2019-07-30 平安科技(深圳)有限公司 Long data ciphering method, device, computer equipment and storage medium based on RSA
CN110572357A (en) * 2019-07-25 2019-12-13 中国科学院信息工程研究所 device and method for realizing safety information export
CN111523139A (en) * 2020-04-21 2020-08-11 苏州六莲科技有限公司 Data transmission method, system and business mode thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115599964A (en) * 2022-11-29 2023-01-13 北京思想天下教育科技有限公司(Cn) Training data processing system and data billboard configuration method
CN115599964B (en) * 2022-11-29 2023-03-10 北京思想天下教育科技有限公司 Training data processing system and data billboard configuration method

Also Published As

Publication number Publication date
CN113542224B (en) 2023-12-29

Similar Documents

Publication Publication Date Title
CN105659240B (en) It is a kind of for sending and authentication URL is signed to carry out URL certifications in self adaptation stream and the system and method for the content access authorization based on URL
CN112600665B (en) Hidden communication method, device and system based on block chain and encryption technology
US20210192551A1 (en) Using hashed media identifiers to determine audience measurement data including demographic data from third party providers
CN108431819B (en) Method and system for protecting client access to service of DRM agent of video player
CN110598429B (en) Data encryption storage and reading method, terminal equipment and storage medium
CN101350918A (en) Method for protecting copyright of video content
CN114785524B (en) Electronic seal generation method, device, equipment and medium
CN111934873A (en) Bidding file encryption and decryption method and device
CN111339201A (en) Evaluation method and system based on block chain
CN110266653B (en) Authentication method, system and terminal equipment
CN114338247A (en) Data transmission method and apparatus, electronic device, storage medium, and program product
CN115603907A (en) Method, device, equipment and storage medium for encrypting storage data
CN117640256A (en) Data encryption method, recommendation device and storage medium of wireless network card
CN109711178B (en) Key value pair storage method, device, equipment and storage medium
CN113542224B (en) Training data processing method, device, server and medium
CN108737353A (en) A kind of data ciphering method and device based on data analysis system
CN113630412B (en) Resource downloading method, resource downloading device, electronic equipment and storage medium
CN114095277A (en) Power distribution network secure communication method, secure access device and readable storage medium
CN107743120B (en) Detachable encrypted test question data transmission system and method
JP6362811B1 (en) Registration terminal, key server, search system, registration program
CN105847869A (en) Encrypted playing method and apparatus
JP6797337B2 (en) Message authentication device, message authentication method and message authentication program
CN109218009B (en) Method, client and server for improving equipment ID security
CN110912941A (en) Transmission processing method and device for multicast data
CN108985109A (en) A kind of date storage method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant