Unlock instant, AI-driven research and patent intelligence for your innovation.

Data processing method and device

A data processing and data technology, applied in the field of data processing, can solve the problem that technical data is easy to be tampered with

Inactive Publication Date: 2017-12-01
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Embodiments of the present invention provide a data processing method and device to at least solve the technical problem that relevant technical data is easily tampered with

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and device
  • Data processing method and device
  • Data processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] According to an embodiment of the present invention, an embodiment of a data processing method is provided.

[0024] Optionally, in this embodiment, the above data processing method can be applied to figure 1 In the hardware environment constituted by the server 102 and the terminal 104 as shown. figure 1 It is a schematic diagram of a hardware environment of a data processing method according to an embodiment of the present invention. Such as figure 1 As shown, the server 102 is connected to the terminal 104 through a network. The above-mentioned network includes but not limited to: a wide area network, a metropolitan area network or a local area network. The terminal 104 is not limited to a PC, a mobile phone, a tablet computer, and the like. The data processing method in the embodiment of the present invention may be executed by the server 102, may also be executed by the terminal 104, and may also be executed jointly by the server 102 and the terminal 104. Wherei...

Embodiment 2

[0102] The technical solutions of the present invention will be described below in conjunction with preferred embodiments.

[0103] This embodiment is mainly used by developers in the software development process, and can be used to prevent data from being tampered with by searching, but there is no perception on the product side.

[0104]The encryption structure used in this embodiment hides the change trend of the data, that is, it is not easy to directly determine the change trend of the data, and it is not easy to locate the memory address of the encryption structure according to the change trend of the original data, even through indirect The search method locates the memory address of the structure, and it is not easy to modify the data to an expected value. Among them, the indirect search refers to first searching for the memory address of the unencrypted data around the encryption structure, and then locating the memory address of the encryption structure through a cer...

Embodiment 3

[0133] According to an embodiment of the present invention, a data processing device for implementing the above data processing method is also provided. Figure 6 is a schematic diagram of a data processing device according to an embodiment of the present invention. Such as Figure 6 As shown, the device may include: an acquisition unit 10 , a first computing unit 20 , a first storage unit 30 and a second storage unit 40 .

[0134] The obtaining unit 10 is configured to obtain original data and random data, wherein the original data is data to be encrypted, and the random data is randomly generated data.

[0135] The original data acquired by the acquisition unit 10 is data to be encrypted, and may be an original value. Preferably, the original data types in this embodiment are int type and float type. The random data acquired by the acquiring unit 10 may be randomly generated by the system, and may be a random value, and the random data is used for operation with the origin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data processing method and device. The data processing method comprises the following steps: acquiring original data and random data, wherein the original data are to-be-encrypted data, and the random data are data generated randomly; computing the original data and the random data to obtain a first computation result; separately storing a plurality of secondary computation results in the first computation result into a first preset array; storing a plurality of pieces of first index information of the first secondary computation results in the first preset array into a second preset array, wherein the different pieces of first index information correspond to different memory addresses, and each first secondary computation result is indexed by the corresponding piece of first indexing information in the first preset array. The technical problem that data in the correlation technique are easily tampered is solved.

Description

technical field [0001] The present invention relates to the field of data processing, in particular to a data processing method and device. Background technique [0002] At present, when processing data, an encryption algorithm commonly used in the field is an XOR encryption structure. The encryption structure usually stores a random value and a result value after XOR processing. For example, when encrypting data, an XOR operation is performed on the original data and a random value to obtain a result value, thereby realizing the encryption of the original data. When the result value is decrypted, XOR processing is performed on the result value and the random value to obtain the original data value. [0003] Although the above encryption algorithm is simple and efficient, and can hide the original data, it also has obvious shortcomings. For example, the algorithm is not easy to hide the trend of data changes. It can locate the memory address of the encryption structure th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F11/14G06F17/30
CPCG06F21/602G06F11/1464G06F16/2272
Inventor 黎定松
Owner TENCENT TECH (SHENZHEN) CO LTD