Data processing method and device
A data processing and data technology, applied in the field of data processing, can solve the problem that technical data is easy to be tampered with
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0023] According to an embodiment of the present invention, an embodiment of a data processing method is provided.
[0024] Optionally, in this embodiment, the above data processing method can be applied to figure 1 In the hardware environment constituted by the server 102 and the terminal 104 as shown. figure 1 It is a schematic diagram of a hardware environment of a data processing method according to an embodiment of the present invention. Such as figure 1 As shown, the server 102 is connected to the terminal 104 through a network. The above-mentioned network includes but not limited to: a wide area network, a metropolitan area network or a local area network. The terminal 104 is not limited to a PC, a mobile phone, a tablet computer, and the like. The data processing method in the embodiment of the present invention may be executed by the server 102, may also be executed by the terminal 104, and may also be executed jointly by the server 102 and the terminal 104. Wherei...
Embodiment 2
[0102] The technical solutions of the present invention will be described below in conjunction with preferred embodiments.
[0103] This embodiment is mainly used by developers in the software development process, and can be used to prevent data from being tampered with by searching, but there is no perception on the product side.
[0104]The encryption structure used in this embodiment hides the change trend of the data, that is, it is not easy to directly determine the change trend of the data, and it is not easy to locate the memory address of the encryption structure according to the change trend of the original data, even through indirect The search method locates the memory address of the structure, and it is not easy to modify the data to an expected value. Among them, the indirect search refers to first searching for the memory address of the unencrypted data around the encryption structure, and then locating the memory address of the encryption structure through a cer...
Embodiment 3
[0133] According to an embodiment of the present invention, a data processing device for implementing the above data processing method is also provided. Figure 6 is a schematic diagram of a data processing device according to an embodiment of the present invention. Such as Figure 6 As shown, the device may include: an acquisition unit 10 , a first computing unit 20 , a first storage unit 30 and a second storage unit 40 .
[0134] The obtaining unit 10 is configured to obtain original data and random data, wherein the original data is data to be encrypted, and the random data is randomly generated data.
[0135] The original data acquired by the acquisition unit 10 is data to be encrypted, and may be an original value. Preferably, the original data types in this embodiment are int type and float type. The random data acquired by the acquiring unit 10 may be randomly generated by the system, and may be a random value, and the random data is used for operation with the origin...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


