CN114938298A - Data transmission method and related device - Google Patents

Data transmission method and related device Download PDF

Info

Publication number
CN114938298A
CN114938298A CN202210527920.3A CN202210527920A CN114938298A CN 114938298 A CN114938298 A CN 114938298A CN 202210527920 A CN202210527920 A CN 202210527920A CN 114938298 A CN114938298 A CN 114938298A
Authority
CN
China
Prior art keywords
data processing
data
user
processing module
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210527920.3A
Other languages
Chinese (zh)
Inventor
吕明明
江梦茹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202210527920.3A priority Critical patent/CN114938298A/en
Publication of CN114938298A publication Critical patent/CN114938298A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application provides a data transmission method and a related device, which can be applied to the financial field or other fields, wherein the data transmission method comprises the following steps: after a terminal obtains a software opening request of a user; the software opening request comprises target software information which needs to be opened by a user at this time; opening and displaying the target software to a user; if the target software needs to use the data of the user, sending a data use request to a data processing module; the data processing module comprises an interface corresponding to a company to which the target software belongs; the terminal receives the dynamically updated unique code sent by the data processing module; generating a first mark code by mixing the unique code and the mobile phone number; and sending the first mark code to the data processing module for checking, and when the first mark code passes the checking in the data processing module, sending a data processing result to the terminal by the data processing module. Therefore, the personal privacy data of the user can be effectively protected in the data transmission process.

Description

Data transmission method and related device
Technical Field
The present disclosure relates to the field of data transmission technologies, and in particular, to a data transmission method and a related apparatus.
Background
Privacy has become a topic of special concern for many people, and especially in the current internet + era, unscrupulous utilization of personal information by many companies and enterprises makes the interests of many people greatly infringed.
Disclosure of Invention
In view of this, the present application provides a data transmission method and a related apparatus, which are used for effectively protecting personal privacy data of a user during a data transmission process.
A first aspect of the present application provides a data transmission method, which is applied to a terminal, and includes:
acquiring a software opening request of a user; the software opening request comprises target software information which needs to be opened by a user at this time;
opening and displaying the target software to a user;
if the target software needs to use the data of the user, sending a data use request to a data processing module; the data processing module comprises an interface corresponding to a company to which the target software belongs;
receiving a dynamically updated unique code sent by the data processing module;
generating a first mark code by mixing the unique code and the mobile phone number;
sending the first mark code to the data processing module for inspection;
receiving a data processing result sent by the data processing module; wherein the data processing result is as follows.
Optionally, the data transmission method further includes:
receiving a dynamically updated unique code and an encrypted data processing result sent by the data processing module;
generating a first mark code by mixing the unique code and the mobile phone number;
and decrypting the encrypted data processing result by using the first mark code to obtain a data processing result.
A second aspect of the present application provides a data transmission method, applied to a data processing module, including:
receiving a data use request sent by a terminal;
in a data storage module, acquiring the grade information of the user and the grade information of the data of the user needing to be used;
determining whether the target software has the acquisition authority or not according to the grade information of the user and the grade information of the data of the user needing to be used;
if the user has the acquisition authority, extracting the data of the user and processing the data to obtain a data processing result and generating a dynamically updated unique code;
sending the dynamically updated unique code to a terminal;
generating a second mark code by mixing the unique code and the mobile phone number;
receiving a first mark code sent by a terminal;
judging whether the first mark code is consistent with the second mark code;
and if the first mark code is consistent with the second mark code, sending the data processing result to the terminal.
Optionally, the data transmission method further includes:
encrypting the data processing result by using the second mark code to obtain an encrypted data processing result;
and sending the dynamically updated unique code and the encrypted data processing result to a terminal.
Optionally, the data storage module is used for unified management, and a separate space is opened up for each enterprise.
A third aspect of the present application provides a terminal, comprising:
the first acquisition unit is used for acquiring a software opening request of a user; the software opening request comprises target software information which needs to be opened by a user at this time;
the display unit is used for opening and displaying the target software to a user;
the first sending unit is used for sending a data use request to a data processing module if the target software needs to use the data of the user; the data processing module comprises an interface corresponding to a company to which the target software belongs;
the first receiving unit is used for receiving the dynamically updated unique code sent by the data processing module;
the first generating unit is used for generating a first mark code by mixing the unique code and the mobile phone number;
the second sending unit is used for sending the first mark code to the data processing module for checking;
and the second receiving unit is used for receiving the data processing result sent by the data processing module.
Optionally, the terminal further includes:
the third receiving unit is used for receiving the dynamically updated unique code and the encrypted data processing result sent by the data processing module;
the first generating unit is used for generating a first mark code by mixing the unique code and the mobile phone number;
and the decryption unit is used for decrypting the encrypted data processing result by using the first mark code to obtain a data processing result.
A fourth aspect of the present application provides a data processing module, including:
a fourth receiving unit, configured to receive a data usage request sent by a terminal;
a second obtaining unit, configured to obtain, in a data storage module, the user level information and the level information of the user data that needs to be used;
the determining unit is used for determining whether the target software has the acquisition authority or not according to the grade information of the user and the grade information of the data of the user needing to be used;
the second generation unit is used for extracting the data of the user and processing the data to obtain a data processing result if the acquisition authority exists, and generating a dynamically updated unique code;
a third sending unit, configured to send the dynamically updated unique code to a terminal;
the third generating unit is used for generating a second mark code by mixing the unique code and the mobile phone number;
a fifth receiving unit, configured to receive the first identifier sent by the terminal;
a judging unit, configured to judge whether the first flag code is consistent with the second flag code;
and the fourth sending unit is used for sending the data processing result to the terminal if the judging unit judges that the first mark code is consistent with the second mark code.
Optionally, the data processing module further includes:
the encryption unit is used for encrypting the data processing result by utilizing the second mark code to obtain an encrypted data processing result;
and the fifth sending unit is used for sending the dynamically updated unique code and the encrypted data processing result to the terminal.
Optionally, the data storage module is used for unified management, and a separate space is opened up for each enterprise.
In view of the above, the present application provides a data transmission method and a related apparatus, where the data transmission method includes: after a terminal obtains a software opening request of a user; the software opening request comprises target software information which needs to be opened by a user at this time; opening and displaying the target software to a user; if the target software needs to use the data of the user, sending a data use request to a data processing module; the data processing module comprises an interface corresponding to a company to which the target software belongs; the terminal receives the dynamically updated unique code sent by the data processing module; generating a first mark code by mixing the unique code and the mobile phone number; and sending the first mark code to the data processing module for inspection, and when the first mark code passes the inspection in the data processing module, sending a data processing result to the terminal by the data processing module. Therefore, the personal privacy data of the user can be effectively protected in the data transmission process.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a detailed flowchart of a data transmission method according to an embodiment of the present application;
fig. 2 is a detailed flowchart of a data transmission method according to another embodiment of the present application;
fig. 3 is a schematic diagram of a terminal according to another embodiment of the present application;
fig. 4 is a schematic diagram of a terminal according to another embodiment of the present application;
FIG. 5 is a schematic diagram of a data processing module according to another embodiment of the present application;
fig. 6 is a schematic diagram of a data processing module according to another embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The term "include" and variations thereof as used herein are open-ended, i.e., "including but not limited to". The term "based on" is "based, at least in part, on". The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment"; the term "some embodiments" means "at least some embodiments". Relevant definitions for other terms will be given in the following description.
It should be noted that the terms "first", "second", and the like in the present application are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence relationship of the functions performed by the devices, modules or units.
It is noted that references to "a" or "an" modification in this application are intended to be illustrative rather than limiting, and those skilled in the art will appreciate that references to "one or more" are intended to be exemplary unless the context clearly indicates otherwise.
An embodiment of the present application provides a data processing method, as shown in fig. 1, which specifically includes the following steps:
s101, the terminal obtains a software opening request of a user.
The software opening request comprises target software information which needs to be opened by the user at this time.
The software opening request may be, but is not limited to, generated by clicking a software icon on a terminal by a user, generated in a manner of a voice command, and the like, and is not limited herein.
And S102, opening the terminal and displaying the target software to the user.
S103, if the target software needs to use the data of the user, the terminal sends a data use request to the data processing module.
The data processing module comprises an interface corresponding to a company to which the target software belongs. The data processing module comprises interfaces corresponding to a plurality of companies, and the data processing module is used for unified management and opening up a single space for each enterprise.
S104, the data processing module receives a data use request sent by the terminal.
S105, the data processing module acquires the grade information of the user and the grade information of the data of the user required to be used in the data storage module.
S106, the data processing module determines whether the target software has the acquisition permission or not according to the grade information of the user and the grade information of the data of the user needing to be used.
Specifically, if it is determined that the target software has the acquisition permission, step S107 is executed.
S107, the data processing module extracts the data of the user and processes the data to obtain a data processing result, and a dynamically updated unique code is generated.
And S108, the data processing module sends the dynamically updated unique code to the terminal, and generates a second mark code by mixing the unique code with the mobile phone number.
And S109, the terminal receives the dynamically updated unique code sent by the data processing module.
And S110, the terminal generates a first mark code by mixing the unique code and the mobile phone number.
And S111, the terminal sends the first mark code to the data processing module for checking.
And S112, the data processing module receives the first mark code sent by the terminal.
S113, the data processing module judges whether the first mark code is consistent with the second mark code.
Specifically, if the first flag code is determined to be consistent with the second flag code, step S114 is executed.
And S114, the data processing module sends the data processing result to the terminal.
And S115, the terminal receives the data processing result sent by the data processing module.
According to the above scheme, the present application provides a data transmission method: after a terminal obtains a software opening request of a user; the software opening request comprises target software information which needs to be opened by a user at this time; opening and displaying target software to a user; if the target software needs to use the data of the user, sending a data use request to a data processing module; the data processing module comprises an interface corresponding to a company to which the target software belongs; the terminal receives a dynamically updated unique code sent by the data processing module; generating a first mark code by mixing the unique code and the mobile phone number; and sending the first mark code to a data processing module for inspection, and sending a data processing result to the terminal by the data processing module when the first mark code passes the inspection in the data processing module. Therefore, the personal privacy data of the user can be effectively protected in the data transmission process.
In another embodiment of the present application, an implementation manner of the data processing method, as shown in fig. 2, includes:
s201, the terminal acquires a software opening request of a user.
The software opening request comprises target software information which needs to be opened by the user at this time.
The software opening request may be, but is not limited to, a software icon clicked by a user on a terminal to generate, a voice command to generate, and the like, and is not limited herein.
S202, the terminal is opened and displays the target software to the user.
And S203, if the target software needs to use the data of the user, the terminal sends a data use request to the data processing module.
The data processing module comprises an interface corresponding to a company to which the target software belongs. The data processing module comprises interfaces corresponding to a plurality of companies, and the data processing module is used for unified management and opening up a single space for each enterprise.
S204, the data processing module receives a data use request sent by the terminal.
S205, the data processing module acquires the grade information of the user and the grade information of the data of the user which needs to be used in the data storage module.
S206, the data processing module determines whether the target software has the acquisition authority or not according to the grade information of the user and the grade information of the data of the user needing to be used.
Specifically, if it is determined that the target software has the acquisition permission, step S207 is executed.
S207, the data processing module extracts the data of the user and processes the data to obtain a data processing result, and a dynamically updated unique code is generated.
And S208, the data processing module generates a second mark code by mixing the unique code and the mobile phone number.
S209, the data processing module encrypts the data processing result by using the second mark code to obtain an encrypted data processing result.
S210, the data processing module sends the dynamically updated unique code and the encrypted data processing result to the terminal.
S211, the terminal receives the dynamically updated unique code and the encrypted data processing result sent by the data processing module.
S212, the terminal generates a first mark code by mixing the unique code and the mobile phone number.
S213, the terminal decrypts the encrypted data processing result by using the first mark code to obtain the data processing result.
According to the above scheme, the present application provides a data transmission method: after a terminal obtains a software opening request of a user; the software opening request comprises target software information which needs to be opened by a user at this time; opening and displaying target software to a user; if the target software needs to use the data of the user, sending a data use request to a data processing module; the data processing module comprises an interface corresponding to a company to which the target software belongs; the terminal receives a dynamically updated unique code and an encrypted data processing result sent by the data processing module, and generates a first mark code by mixing the unique code and the mobile phone number; and the terminal decrypts the encrypted data processing result by using the first mark code to obtain the data processing result. Therefore, the personal privacy data of the user can be effectively protected in the data transmission process.
The invention name provided by the invention can be used in the financial field or other fields, for example, can be used in the application scene of mobile banking in the financial field. The other field is an arbitrary field other than the financial field, for example, a data transmission field. The above description is only an example, and does not limit the application field of the name of the invention provided by the present invention.
Another embodiment of the present application provides a terminal, as shown in fig. 3, specifically including:
a first obtaining unit 301, configured to obtain a software opening request of a user.
The software opening request comprises information of the target software which needs to be opened by the user at this time.
And a presentation unit 302 for opening and presenting the target software to the user.
A first sending unit 303, configured to send a data use request to the data processing module if the target software needs to use data of the user.
The data processing module comprises an interface corresponding to a company to which the target software belongs.
A first receiving unit 304, configured to receive the dynamically updated unique code sent by the data processing module.
A first generating unit 305, configured to generate a first identifier code by mixing the unique code with the mobile phone number.
A second sending unit 306, configured to send the first identifier to the data processing module for verification.
A second receiving unit 307, configured to receive the data processing result sent by the data processing module.
For a specific working process of the unit disclosed in the above embodiment of the present application, reference may be made to the content of the corresponding method embodiment, as shown in fig. 1, which is not described herein again.
According to the above scheme, the present application provides a data transmission method: the first obtaining unit 301 obtains a software opening request of a user; the software opening request comprises target software information which needs to be opened by a user at this time; the presentation unit 302 opens and presents the target software to the user; if the target software needs to use the data of the user, the first sending unit 303 sends a data use request to the data processing module; the data processing module comprises an interface corresponding to a company to which the target software belongs; the first receiving unit 304 receives the dynamically updated unique code sent by the data processing module; the first generation unit 305 generates a first identification code by mixing the unique code and the mobile phone number; the second sending unit 306 sends the first identifier to the data processing module for verification, and when the verification passes in the data processing module, the data processing module sends the data processing result to the terminal, and the second receiving unit 307 is configured to receive the data processing result sent by the data processing module. Therefore, the personal privacy data of the user can be effectively protected in the data transmission process.
In another embodiment of the present application, an implementation of a terminal, as shown in fig. 4, includes:
a first obtaining unit 301, configured to obtain a software opening request of a user.
The software opening request comprises target software information which needs to be opened by the user at this time.
And a presentation unit 302 for opening and presenting the target software to the user.
A first sending unit 303, configured to send a data use request to the data processing module if the target software needs to use data of the user.
The data processing module comprises an interface corresponding to a company to which the target software belongs.
A third receiving unit 401, configured to receive the dynamically updated unique code and the encrypted data processing result sent by the data processing module.
A first generating unit 305, configured to generate a first identifier code by mixing the unique code with the mobile phone number.
A decryption unit 402, configured to decrypt the encrypted data processing result with the first identifier to obtain the data processing result.
For a specific working process of the unit disclosed in the above embodiment of the present application, reference may be made to the content of the corresponding method embodiment, as shown in fig. 2, which is not described herein again.
According to the above scheme, the present application provides a data transmission method: the first obtaining unit 301 obtains a software opening request of a user; the software opening request comprises target software information which needs to be opened by a user at this time; the presentation unit 302 opens and presents the target software to the user; if the target software needs to use the data of the user, the first sending unit 303 sends a data use request to the data processing module; the data processing module comprises an interface corresponding to a company to which the target software belongs; the third receiving unit 401 receives the dynamically updated unique code and the encrypted data processing result sent by the data processing module, and the first generating unit 305 generates the first flag code by mixing the unique code with the mobile phone number; the decryption unit 402 decrypts the encrypted data processing result using the first identifier to obtain the data processing result. Therefore, the personal privacy data of the user can be effectively protected in the data transmission process.
Another embodiment of the present application provides a data processing module, as shown in fig. 5, specifically including:
a fourth receiving unit 501, configured to receive a data usage request sent by a terminal.
A second obtaining unit 502, configured to obtain, in the data storage module, the rank information of the user and the rank information of the user data that needs to be used.
The determining unit 503 is configured to determine whether the target software has the acquisition right according to the level information of the user and the level information of the data of the user that needs to be used.
A second generating unit 504, configured to extract and process data of the user to obtain a data processing result if there is an acquisition right, and generate a dynamically updated unique code.
A third sending unit 505, configured to send the dynamically updated unique code to the terminal.
A third generating unit 506, configured to generate a second identifier code by mixing the unique code with the mobile phone number.
A fifth receiving unit 507, configured to receive the first identifier sent by the terminal.
The determining unit 508 is configured to determine whether the first flag code is consistent with the second flag code.
A fourth sending unit 509, configured to send the data processing result to the terminal if the determining unit 508 determines that the first identifier is consistent with the second identifier.
For a specific working process of the unit disclosed in the above embodiment of the present application, reference may be made to the content of the corresponding method embodiment, as shown in fig. 1, which is not described herein again.
According to the above scheme, the present application provides a data processing module: when the fourth receiving unit 501 receives a data use request sent by the terminal, the second obtaining unit 502 obtains the user level information and the user data level information needed to be used in the data storage module; the determining unit 503 determines whether the target software has an acquisition right according to the level information of the user and the level information of the user data required to be used; if the acquisition authority exists, the second generation unit 504 extracts and processes the data of the user to obtain a data processing result, and generates a dynamically updated unique code; a third transmitting unit 505 transmits the dynamically updated unique code to the terminal; the third generating unit 506 generates a second identifier code by mixing the unique code and the mobile phone number; a fifth receiving unit 507 receives the first flag code sent by the terminal; the determining unit 508 determines whether the first flag code is consistent with the second flag code; if the determining unit 508 determines that the first flag code is consistent with the second flag code, the fourth sending unit 509 sends the data processing result to the terminal. And further, in the data transmission process, the personal privacy data of the user is effectively protected.
Another embodiment of the present application provides a data processing module, as shown in fig. 6, specifically including:
a fourth receiving unit 501, configured to receive a data usage request sent by a terminal.
A second obtaining unit 502, configured to obtain, in the data storage module, the rank information of the user and the rank information of the user data that needs to be used.
The determining unit 503 is configured to determine whether the target software has the acquisition right according to the level information of the user and the level information of the data of the user that needs to be used.
A second generating unit 504, configured to extract and process data of the user to obtain a data processing result if there is an acquisition right, and generate a dynamically updated unique code.
A third generating unit 506, configured to generate a second identifier code by mixing the unique code with the mobile phone number.
The encryption unit 601 is configured to encrypt the data processing result by using the second identifier to obtain an encrypted data processing result.
A fifth sending unit 602, configured to send the dynamically updated unique code and the encrypted data processing result to the terminal.
For a specific working process of the unit disclosed in the above embodiment of the present application, reference may be made to the content of the corresponding method embodiment, as shown in fig. 2, which is not described herein again.
According to the above scheme, the present application provides a data processing module: when the fourth receiving unit 501 receives a data use request sent by the terminal, the second obtaining unit 502 obtains the user level information and the user data level information that needs to be used in the data storage module; the determining unit 503 determines whether the target software has an acquisition right according to the level information of the user and the level information of the data of the user required to be used; if the acquisition authority exists, the second generation unit 504 extracts and processes the data of the user to obtain a data processing result, and generates a dynamically updated unique code; the third generating unit 506 generates a second identifier code by mixing the unique code and the mobile phone number; an encrypting unit 601, configured to encrypt the data processing result by using the second identifier to obtain an encrypted data processing result; a fifth sending unit 602, configured to send the dynamically updated unique code and the encrypted data processing result to the terminal. And further, in the data transmission process, the personal privacy data of the user is effectively protected.
Another embodiment of the present application provides a computer storage medium, on which a computer program is stored, wherein the computer program, when executed by a processor, implements the method for transmitting data as described in any one of the above embodiments.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The names of messages or information exchanged between a plurality of devices in the embodiments of the present application are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
Computer program code for carrying out operations for aspects of the present application may be written in any combination of one or more programming languages, including but not limited to an object oriented programming language such as Python, Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It should be noted that the computer readable medium mentioned above in the present application may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
In the above embodiments disclosed in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The apparatus and method embodiments described above are illustrative only, as the flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present disclosure may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part. The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present disclosure may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a live broadcast device, or a network device) to execute all or part of the steps of the method according to the embodiments of the present disclosure. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
A person skilled in the art can make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A data transmission method is applied to a terminal and comprises the following steps:
acquiring a software opening request of a user; the software opening request comprises target software information which needs to be opened by a user at this time;
opening and displaying the target software to a user;
if the target software needs to use the data of the user, sending a data use request to a data processing module; the data processing module comprises an interface corresponding to a company to which the target software belongs;
receiving a dynamically updated unique code sent by the data processing module;
generating a first mark code by mixing the unique code and the mobile phone number;
sending the first mark code to the data processing module for inspection;
and receiving a data processing result sent by the data processing module.
2. The transmission method according to claim 1, further comprising:
receiving a dynamically updated unique code and an encrypted data processing result sent by the data processing module;
generating a first mark code by mixing the unique code and the mobile phone number;
and decrypting the encrypted data processing result by using the first mark code to obtain a data processing result.
3. A data transmission method is applied to a data processing module and comprises the following steps:
receiving a data use request sent by a terminal;
in a data storage module, acquiring the grade information of the user and the grade information of the data of the user needing to be used;
determining whether the target software has the acquisition permission or not according to the grade information of the user and the grade information of the data of the user needing to be used;
if the user has the acquisition authority, extracting the data of the user and processing the data to obtain a data processing result and generating a dynamically updated unique code;
sending the dynamically updated unique code to a terminal;
generating a second mark code by mixing the unique code and the mobile phone number;
receiving a first mark code sent by a terminal;
judging whether the first mark code is consistent with the second mark code;
and if the first mark code is consistent with the second mark code, sending the data processing result to the terminal.
4. The transmission method according to claim 3, further comprising:
encrypting the data processing result by using the second mark code to obtain an encrypted data processing result;
and sending the dynamically updated unique code and the encrypted data processing result to a terminal.
5. The transmission method according to claim 3, wherein the data storage module opens up a separate space for each enterprise for unified management.
6. A terminal, comprising:
the first acquisition unit is used for acquiring a software opening request of a user; the software opening request comprises target software information which needs to be opened by a user at this time;
the display unit is used for opening and displaying the target software to a user;
the first sending unit is used for sending a data use request to a data processing module if the target software needs to use the data of the user; the data processing module comprises an interface corresponding to a company to which the target software belongs;
the first receiving unit is used for receiving the dynamically updated unique code sent by the data processing module;
the first generating unit is used for generating a first mark code by mixing the unique code and the mobile phone number;
the second sending unit is used for sending the first mark code to the data processing module for checking;
and the second receiving unit is used for receiving the data processing result sent by the data processing module.
7. The terminal of claim 6, further comprising:
the third receiving unit is used for receiving the dynamically updated unique code and the encrypted data processing result sent by the data processing module;
the first generating unit is used for generating a first mark code by mixing the unique code and the mobile phone number;
and the decryption unit is used for decrypting the encrypted data processing result by using the first mark code to obtain a data processing result.
8. A data processing module, comprising:
a fourth receiving unit, configured to receive a data usage request sent by a terminal;
the second acquisition unit is used for acquiring the grade information of the user and the grade information of the data of the user needing to be used in the data storage module;
the determining unit is used for determining whether the target software has the acquisition authority or not according to the grade information of the user and the grade information of the data of the user needing to be used;
the second generation unit is used for extracting the data of the user and processing the data to obtain a data processing result if the acquisition authority exists, and generating a dynamically updated unique code;
a third sending unit, configured to send the dynamically updated unique code to a terminal;
the third generating unit is used for generating a second mark code by mixing the unique code and the mobile phone number;
a fifth receiving unit, configured to receive the first identifier sent by the terminal;
a judging unit, configured to judge whether the first flag code is consistent with the second flag code;
and the fourth sending unit is used for sending the data processing result to the terminal if the judging unit judges that the first mark code is consistent with the second mark code.
9. The data processing module of claim 8, further comprising:
the encryption unit is used for encrypting the data processing result by utilizing the second mark code to obtain an encrypted data processing result;
and the fifth sending unit is used for sending the dynamically updated unique code and the encrypted data processing result to the terminal.
10. The data processing module of claim 8, wherein the data storage module opens up a separate space for each enterprise for unified management.
CN202210527920.3A 2022-05-16 2022-05-16 Data transmission method and related device Pending CN114938298A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210527920.3A CN114938298A (en) 2022-05-16 2022-05-16 Data transmission method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210527920.3A CN114938298A (en) 2022-05-16 2022-05-16 Data transmission method and related device

Publications (1)

Publication Number Publication Date
CN114938298A true CN114938298A (en) 2022-08-23

Family

ID=82865499

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210527920.3A Pending CN114938298A (en) 2022-05-16 2022-05-16 Data transmission method and related device

Country Status (1)

Country Link
CN (1) CN114938298A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112019566A (en) * 2020-09-25 2020-12-01 中国农业银行股份有限公司 Data transmission method, server, client and computer storage medium
CN112825520A (en) * 2019-11-21 2021-05-21 ***通信有限公司研究院 User privacy data processing method, device, system and storage medium
CN113626863A (en) * 2021-08-11 2021-11-09 杭州橙鹰数据技术有限公司 Data processing method and device
CN113918904A (en) * 2021-10-12 2022-01-11 工银科技有限公司 Data processing method and device, electronic equipment and computer readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112825520A (en) * 2019-11-21 2021-05-21 ***通信有限公司研究院 User privacy data processing method, device, system and storage medium
CN112019566A (en) * 2020-09-25 2020-12-01 中国农业银行股份有限公司 Data transmission method, server, client and computer storage medium
CN113626863A (en) * 2021-08-11 2021-11-09 杭州橙鹰数据技术有限公司 Data processing method and device
CN113918904A (en) * 2021-10-12 2022-01-11 工银科技有限公司 Data processing method and device, electronic equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN104660589B (en) Method, system and terminal for encrypting control and information analysis of information
CN107786331B (en) Data processing method, device, system and computer readable storage medium
CN105991563B (en) Method and device for protecting security of sensitive data and three-party service system
CN110636043A (en) File authorization access method, device and system based on block chain
CN107733639B (en) Key management method, device and readable storage medium
CN115529130B (en) Data processing method, terminal, server, system, device, medium and product
CN108923925B (en) Data storage method and device applied to block chain
CN108667784B (en) System and method for protecting internet identity card verification information
CN114500093B (en) Safe interaction method and system for message information
CN111030827A (en) Information interaction method and device, electronic equipment and storage medium
CN112733180A (en) Data query method and device and electronic equipment
CN110545542B (en) Main control key downloading method and device based on asymmetric encryption algorithm and computer equipment
CN114866964A (en) Message transmission method and device based on proximity service, electronic equipment and medium
CN107707528B (en) Method and device for isolating user information
CN113037760B (en) Message sending method and device
CN115567263A (en) Data transmission management method, data processing method and device
CN114938298A (en) Data transmission method and related device
CN113992345A (en) Method and device for encrypting and decrypting webpage sensitive data, electronic equipment and storage medium
CN109347826B (en) Verification method and system
CN110061949B (en) Method and device for acquiring information
CN110875820A (en) Management method and system for multimedia content protection key and key agent device
CN114826616B (en) Data processing method, device, electronic equipment and medium
KR101511451B1 (en) Method of encryption to keyboard input information
CN114925382A (en) Data processing method and related device
CN112118208B (en) Method and device for reporting data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination