Data processing method and device, electronic equipment and computer readable storage medium
A technology of data processing and electronic equipment, which is applied in the field of computers, can solve problems such as data leakage and easy cracking of keys, and achieve the effect of increasing randomness
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0022] Example 1
[0023] According to an embodiment of the present invention, an embodiment of a data processing method is provided. It should be noted that the steps shown in the flowchart of the accompanying drawings may be executed in a computer system such as a set of computer-executable instructions, and, although A logical order is shown in the flowcharts, but in some cases steps shown or described may be performed in an order different from that herein.
[0024] figure 1 is a flowchart of a data processing method according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:
[0025] Step S102, receiving an encryption request sent by the encryption terminal, wherein the encryption request is used to request to encrypt the data to be encrypted, and the encryption request carries the communication number of the first target object;
[0026] Step S104, in response to the encryption request, determine the attribu...
Example Embodiment
[0065] Example 2
[0066] According to an embodiment of the present invention, an apparatus for implementing the above data processing method is also provided, image 3 is a structural block diagram of a data processing apparatus according to an embodiment of the present invention, such as image 3 As shown, the device includes: a receiving module 302, a first determining module 304, a second determining module 306 and a sending module 308. The device will be described in detail below.
[0067] The receiving module 302 is used for receiving the encryption request sent by the encryption terminal, wherein the encryption request is used for requesting to encrypt the data to be encrypted, and the encryption request carries the communication number of the first target object; the first determining module 304 is connected to the above-mentioned receiving module 302, for determining the attribution of the communication number in response to the encryption request; the second determi...
Example Embodiment
[0069] Example 3
[0070]According to another aspect of the embodiments of the present invention, an electronic device is also provided, including: a processor; and a memory for storing instructions executable by the processor, wherein the processor is configured to execute the instructions to implement any of the above data processing method.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap