[go: up one dir, main page]

CN115730319A - Data processing method, data processing device, computer equipment and storage medium - Google Patents

Data processing method, data processing device, computer equipment and storage medium Download PDF

Info

Publication number
CN115730319A
CN115730319A CN202110984547.XA CN202110984547A CN115730319A CN 115730319 A CN115730319 A CN 115730319A CN 202110984547 A CN202110984547 A CN 202110984547A CN 115730319 A CN115730319 A CN 115730319A
Authority
CN
China
Prior art keywords
target
data processing
security control
data
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110984547.XA
Other languages
Chinese (zh)
Inventor
付博
何畅
吴怡
提江伟
石巍
种衍雪
黄业辉
李茂材
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tenpay Payment Technology Co Ltd
Original Assignee
Tenpay Payment Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tenpay Payment Technology Co Ltd filed Critical Tenpay Payment Technology Co Ltd
Priority to CN202110984547.XA priority Critical patent/CN115730319A/en
Publication of CN115730319A publication Critical patent/CN115730319A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The application relates to a data processing method, a data processing device, computer equipment and a storage medium. The method comprises the following steps: acquiring a plurality of data processing strategies provided by an initial security control; based on at least two data processing strategies selected by self-definition, configuring a data processing strategy combination corresponding to a target service aiming at the initial security control to obtain a target security control bound with the target service; when target data under the target service is acquired based on the target security control, calling the data processing strategy combination through the target security control; analyzing the data processing strategy combination into an instruction calling sequence; and converting the target data according to the instruction calling sequence to obtain converted data. By adopting the method, the target data under the target service can be flexibly converted, so that the safety of the target data under the target service is effectively improved.

Description

数据处理方法、装置、计算机设备和存储介质Data processing method, device, computer equipment and storage medium

技术领域technical field

本申请涉及数据安全技术领域,特别是涉及一种数据处理方法、装置、计算机设备和存储介质。The present application relates to the technical field of data security, in particular to a data processing method, device, computer equipment and storage medium.

背景技术Background technique

随着互联网信息技术的迅速发展,数据传输速度越来越快,传播范围也更广,对于重要的数据则需要保证数据的安全性。目前出现了对数据进行隐蔽、加密等转换处理的技术,以对关键的数据进行保护。With the rapid development of Internet information technology, the speed of data transmission is getting faster and faster, and the scope of transmission is wider. For important data, it is necessary to ensure data security. At present, technologies such as concealment and encryption of data have emerged to protect key data.

相关技术中,通常是通过预先指定的固定方案,对目标数据进行处理。然而这种方式通常是通过调用较常见的特定单一加密算法来实现,这种加密方式较为固定和单一,加密算法容易被破解而导致关键的目标数据泄露,数据安全性较低。In related technologies, target data is usually processed through a pre-designated fixed scheme. However, this method is usually implemented by invoking a more common specific single encryption algorithm. This encryption method is relatively fixed and single. The encryption algorithm is easy to be cracked, resulting in the leakage of key target data, and the data security is low.

发明内容Contents of the invention

基于此,有必要针对上述技术问题,提供一种能够有效提高数据安全性的数据处理方法、装置、计算机设备和存储介质。Based on this, it is necessary to address the above technical problems and provide a data processing method, device, computer equipment and storage medium that can effectively improve data security.

一种数据处理方法,所述方法包括:A data processing method, the method comprising:

获取初始安全控件所提供的多种数据处理策略;Obtain a variety of data processing strategies provided by the initial security controls;

基于自定义选择的至少两种所述数据处理策略,针对所述初始安全控件配置对应于目标业务的数据处理策略组合,得到与所述目标业务绑定的目标安全控件;Based on the at least two data processing strategies selected by self-definition, configure a combination of data processing strategies corresponding to the target service for the initial security control, and obtain a target security control bound to the target service;

当基于所述目标安全控件获取到所述目标业务下的目标数据时,通过所述目标安全控件调用所述数据处理策略组合;When the target data under the target service is obtained based on the target security control, the data processing strategy combination is invoked through the target security control;

将所述数据处理策略组合解析为指令调用序列;parsing the combination of data processing strategies into an instruction call sequence;

按照所述指令调用序列对所述目标数据进行转换处理,得到转换后的数据。Perform conversion processing on the target data according to the instruction calling sequence to obtain converted data.

一种数据处理装置,所述装置包括:A data processing device, said device comprising:

策略获取模块,用于获取初始安全控件所提供的多种数据处理策略;A strategy acquisition module, configured to acquire various data processing strategies provided by the initial security control;

安全控件配置模块,用于基于自定义选择的至少两种所述数据处理策略,针对所述初始安全控件配置对应于目标业务的数据处理策略组合,得到与所述目标业务绑定的目标安全控件;A security control configuration module, configured to configure a combination of data processing policies corresponding to the target service for the initial security control based on at least two of the data processing strategies selected by self-definition, and obtain a target security control bound to the target service ;

安全控件调用模块,用于当基于所述目标安全控件获取到所述目标业务下的目标数据时,通过所述目标安全控件调用所述数据处理策略组合;A security control calling module, configured to call the data processing strategy combination through the target security control when the target data under the target service is obtained based on the target security control;

数据转换处理模块,用于将所述数据处理策略组合解析为指令调用序列;按照所述指令调用序列对所述目标数据进行转换处理,得到转换后的数据。The data conversion processing module is configured to analyze the combination of data processing strategies into an instruction calling sequence; perform conversion processing on the target data according to the instruction calling sequence to obtain converted data.

在一个实施例中,所述安全控件配置模块,还用于获取基于自定义选择的对应于目标业务的至少两种所述数据处理策略;根据至少两种所述数据处理策略,生成与所述目标业务相应的嵌套调用函数;在所述初始安全控件中配置所述嵌套调用函数,得到与所述目标业务绑定的目标安全控件。In one embodiment, the security control configuration module is further configured to obtain at least two data processing strategies corresponding to the target service based on user-defined selection; according to at least two data processing strategies, generate a A nested call function corresponding to the target service; configuring the nested call function in the initial security control to obtain a target security control bound to the target service.

在一个实施例中,所述安全控件配置模块,还用于确定自定义选择的至少两种所述数据处理策略所对应的嵌套调用顺序;按照所述嵌套调用顺序,将所述至少两种所述数据处理策略解析为与所述目标业务相应的嵌套调用函数。In one embodiment, the security control configuration module is further configured to determine the nested call sequence corresponding to the at least two data processing strategies selected by custom; according to the nested call sequence, the at least two The data processing strategy is parsed into a nested call function corresponding to the target business.

在一个实施例中,所述安全控件配置模块,还用于对初始安全控件配置数据处理策略;基于配置的数据处理策略,在所述初始安全控件中配置对应的组合策略,生成提供多种数据处理策略的初始安全控件。In one embodiment, the security control configuration module is further configured to configure a data processing strategy for the initial security control; based on the configured data processing strategy, configure a corresponding combination strategy in the initial security control to generate and provide various data Initial security controls for processing policies.

在一个实施例中,所述安全控件调用模块,还用于当获取的所述目标业务下的数据为目标数据时,通过所述目标安全控件调用表达式解析器和所述数据处理策略组合;通过所述表达式解析器,确定所述数据处理策略组合中表达式的顺序,按照所述顺序将所述数据处理策略组合解析为指令调用序列。In one embodiment, the security control calling module is further configured to call an expression parser and the combination of the data processing strategy through the target security control when the acquired data under the target service is target data; The sequence of expressions in the data processing strategy combination is determined by the expression parser, and the data processing strategy combination is parsed into an instruction calling sequence according to the sequence.

在一个实施例中,所述安全控件调用模块,还用于通过所述表达式解析器初始化指令列表;确定所述数据处理策略组合的外层函数接口;若根据所述外层函数接口识别出所述数据处理策略组合包括嵌套调用函数,则对所述嵌套调用函数进行逐层解析,得到嵌套调用函数中的嵌套的各表达式,将解析的所述表达式按解析顺序添加至所述指令列表,得到指令调用序列。In one embodiment, the security control calling module is also used to initialize the instruction list through the expression parser; determine the outer function interface of the data processing policy combination; if the outer function interface is identified according to the outer function interface The data processing strategy combination includes a nested call function, then the nested call function is analyzed layer by layer to obtain the nested expressions in the nested call function, and the parsed expressions are added in the order of analysis Go to the instruction list to obtain the instruction calling sequence.

在一个实施例中,所述安全控件调用模块,还用于对所述嵌套调用函数进行逐层解析,确定解析得到的当前表达式中输入参数的位置和数量;若解析得到的当前表达式中包括一个输入参数,则将所述当前表达式加入至所述指令列表;若解析得到的当前表达式中包括至少两个输入参数,则根据所述输入参数的位置和数量,生成参数拼接表达式并加入至所述指令列表。In one embodiment, the security control calling module is further configured to perform layer-by-layer analysis on the nested calling function to determine the position and quantity of input parameters in the current expression obtained by analysis; if the current expression obtained by analysis includes one input parameter, then add the current expression to the instruction list; if the parsed current expression includes at least two input parameters, then generate a parameter concatenation expression according to the position and quantity of the input parameters formula and added to the command list.

在一个实施例中,所述安全控件调用模块,还用于分别对解析得到的表达式进行合法性校验;若所述合法性校验通过后,将解析得到的所述表达式按解析顺序添加至所述指令列表,得到指令调用序列。In one embodiment, the security control calling module is also used to check the legality of the parsed expressions respectively; if the legality check is passed, the parsed expressions are parsed in order Add to the instruction list to obtain the instruction calling sequence.

在一个实施例中,所述指令调用序列中包括具有执行顺序的至少两个调用指令;所述数据转换处理模块,还用于按照所述执行顺序执行所述指令调用序列中的调用指令,在执行过程中,将上一个调用指令的执行结果作为下一个调用指令的输入,以对所述目标数据进行转换处理,得到转换后的数据。In one embodiment, the instruction calling sequence includes at least two calling instructions with an execution order; the data conversion processing module is further configured to execute the calling instructions in the instruction calling sequence according to the execution order, and During the execution process, the execution result of the previous call instruction is used as the input of the next call instruction to perform conversion processing on the target data to obtain converted data.

在一个实施例中,所述目标安全控件中包括对应于所述目标业务自定义配置的加密策略;所述数据处理装置还包括加密模块,用于若所述目标数据的属性为加密属性,通过所述目标安全控件调用加密策略;按照所述加密策略对所述处理后的数据进行加密处理。In one embodiment, the target security control includes an encryption policy corresponding to the custom configuration of the target service; the data processing device further includes an encryption module, configured to, if the attribute of the target data is an encryption attribute, pass The target security control invokes an encryption strategy; and encrypts the processed data according to the encryption strategy.

在一个实施例中,所述初始安全控件是基于母应用的运行环境下的安全控件,所述母应用为多个子应用提供运行环境;所述安全控件配置模块,还用于获取针对目标子应用的自定义选择的至少两种所述数据处理策略;对所述初始安全控件配置对应于所述目标子应用中目标业务的数据处理策略组合,得到与所述目标业务绑定的目标安全控件;所述目标安全控件用于对所述目标子应用中目标业务下的目标数据进行转换处理。In one embodiment, the initial security control is a security control based on the running environment of the parent application, and the parent application provides a running environment for multiple sub-applications; the security control configuration module is also used to obtain the target sub-application at least two of the data processing strategies selected by the user; configure the initial security control with a combination of data processing strategies corresponding to the target business in the target sub-application, and obtain the target security control bound to the target business; The target security control is used to convert the target data under the target service in the target sub-application.

在一个实施例中,所述数据转换处理模块,还用于当在所述母应用的运行环境中运行的目标子应用,获取到对应于所述目标子应用的目标业务下目标数据时,则通过所述目标子应用中的目标安全控件调用对应的自定义配置的数据处理策略组合,以根据所述数据处理策略组合对所述目标数据进行转换处理。In one embodiment, the data conversion processing module is further configured to: when the target sub-application running in the running environment of the parent application obtains the target data corresponding to the target service of the target sub-application, then The target security control in the target sub-application invokes a corresponding custom configured data processing policy combination, so as to perform conversion processing on the target data according to the data processing policy combination.

一种计算机设备,包括存储器和处理器,所述存储器存储有计算机程序,所述处理器执行所述计算机程序时实现本申请各实施例的数据处理方法中的步骤。A computer device includes a memory and a processor, the memory stores a computer program, and the processor implements the steps in the data processing method of each embodiment of the present application when executing the computer program.

一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现本申请各实施例的数据处理方法中的步骤。A computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the steps in the data processing method of each embodiment of the present application are implemented.

一种计算机程序产品或计算机程序,所述计算机程序产品或计算机程序包括计算机指令,所述计算机指令存储在计算机可读存储介质中;所述计算机设备的处理器从所述计算机可读存储介质读取所述计算机指令,所述处理器执行所述计算机指令时实现本申请各实施例的数据处理方法中的步骤。A computer program product or computer program comprising computer instructions stored in a computer-readable storage medium; readable by a processor of the computer device from the computer-readable storage medium The computer instruction is fetched, and the processor implements the steps in the data processing method of each embodiment of the present application when executing the computer instruction.

上述数据处理方法、装置、计算机设备和存储介质,获取初始安全控件所提供的多种数据处理策略,业务方则可以在初始安全控件中自定义选择各种数据处理策略进行组合,然后基于自定义选择的至少两种数据处理策略,针对初始安全控件配置对应于目标业务的数据处理策略组合,从而得到与目标业务绑定的目标安全控件。由此业务方能够自定义灵活地生成各种数据处理策略组合,并且经过组合的数据处理策略对于数据处理的安全性更高。当获取到目标业务下的目标数据时,通过目标安全控件调用与目标业务对应的数据处理策略组合,然后将数据处理策略组合解析为指令调用序列,进而按照指令调用序列对目标数据进行转换处理,由此能够更加安全地对目标数据进行转换处理,以使得到转换后的数据不易被破解和泄露,从而有效提高了目标数据的安全性。The above-mentioned data processing method, device, computer equipment and storage medium obtain various data processing strategies provided by the initial security control, and the business side can customize and combine various data processing strategies in the initial security control, and then based on the custom Select at least two data processing strategies, and configure a combination of data processing strategies corresponding to the target service for the initial security control, so as to obtain the target security control bound to the target service. In this way, the business side can customize and flexibly generate various combinations of data processing strategies, and the combined data processing strategies are more secure for data processing. When the target data under the target business is obtained, the data processing strategy combination corresponding to the target business is invoked through the target security control, and then the data processing strategy combination is parsed into an instruction calling sequence, and then the target data is converted and processed according to the instruction calling sequence, In this way, the target data can be converted more safely, so that the converted data is not easy to be cracked and leaked, thereby effectively improving the security of the target data.

附图说明Description of drawings

图1为一个实施例中数据处理方法的应用环境图;Fig. 1 is an application environment diagram of a data processing method in an embodiment;

图2为一个实施例中数据处理方法的流程示意图;Fig. 2 is a schematic flow chart of a data processing method in an embodiment;

图3为一个实施例中目标安全控件的效果图;Fig. 3 is the rendering of the target security control in an embodiment;

图4为一个实施例中表达式解析器的解析流程图;Fig. 4 is the parsing flowchart of expression parser in an embodiment;

图5为另一个实施例中目标数据处理方法的流程示意图;Fig. 5 is a schematic flow chart of a target data processing method in another embodiment;

图6为一个实施例中数据处理的时序图;Fig. 6 is a sequence diagram of data processing in an embodiment;

图7为一个具体的实施例中数据处理方法的流程示意图;Fig. 7 is a schematic flow chart of a data processing method in a specific embodiment;

图8为一个实施例中数据处理装置的结构框图;Fig. 8 is a structural block diagram of a data processing device in an embodiment;

图9为一个实施例中计算机设备的内部结构图;Figure 9 is an internal structural diagram of a computer device in an embodiment;

图10为另一个实施例中计算机设备的内部结构图。Fig. 10 is an internal structure diagram of a computer device in another embodiment.

具体实施方式Detailed ways

为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

本申请提供的数据处理方法,可应用于计算机设备中。计算机设备可以为终端或服务器。可以理解的是,本申请提供的数据处理方法,可以应用于终端,也可以应用于服务器,还可以应用于包括终端和服务器的系统,并通过终端和服务器的交互实现。The data processing method provided in this application can be applied to computer equipment. A computer device can be a terminal or a server. It can be understood that the data processing method provided in this application can be applied to a terminal, a server, or a system including a terminal and a server, and can be realized through interaction between the terminal and the server.

本申请提供的数据处理方法,可以应用于如图1所示的应用环境中。其中,终端102通过网络与服务器104进行通信。终端102从服务器104获取初始安全控件所提供的多种数据处理策略后,终端102获取业务方用户自定义选择的至少两种数据处理策略,并上传至服务器104。然后服务器104获取初始安全控件所提供的多种数据处理策略;基于自定义选择的至少两种数据处理策略,针对初始安全控件配置对应于目标业务的数据处理策略组合,得到与目标业务绑定的目标安全控件;当基于目标安全控件获取到目标业务下的目标数据时,通过目标安全控件调用数据处理策略组合;将数据处理策略组合解析为指令调用序列;按照指令调用序列对目标数据进行处理,得到处理后的数据。The data processing method provided in this application can be applied to the application environment shown in FIG. 1 . Wherein, the terminal 102 communicates with the server 104 through the network. After the terminal 102 obtains multiple data processing strategies provided by the initial security control from the server 104 , the terminal 102 obtains at least two data processing strategies selected by the business party user and uploads them to the server 104 . Then the server 104 acquires multiple data processing strategies provided by the initial security control; based on at least two data processing strategies selected by self-definition, configure a combination of data processing strategies corresponding to the target business for the initial security control, and obtain the data processing strategy bound to the target business Target security control; when the target data under the target business is obtained based on the target security control, the data processing strategy combination is invoked through the target security control; the data processing strategy combination is parsed into an instruction calling sequence; the target data is processed according to the instruction calling sequence, Get the processed data.

其中,服务器104服务器可以是独立的物理服务器,也可以是多个物理服务器构成的服务器集群或者分布式系统,还可以是提供云服务、云数据库、云计算、云函数、云存储、网络服务、云通信、中间件服务、域名服务、安全服务、CDN、以及大数据和人工智能平台等基础云技术服务的云服务器。终端102可以是智能手机、平板电脑、笔记本电脑、台式计算机、智能音箱、智能手表等,但并不局限于此。终端以及服务器可以通过有线或无线通信方式进行直接或间接地连接,本申请在此不做限制。Wherein, the server 104 server can be an independent physical server, or a server cluster or a distributed system composed of multiple physical servers, and can also provide cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, Cloud servers for basic cloud technology services such as cloud communications, middleware services, domain name services, security services, CDN, and big data and artificial intelligence platforms. The terminal 102 may be a smart phone, a tablet computer, a notebook computer, a desktop computer, a smart speaker, a smart watch, etc., but is not limited thereto. The terminal and the server may be connected directly or indirectly through wired or wireless communication, which is not limited in this application.

云技术(Cloud technology)是指在广域网或局域网内将硬件、软件、网络等系列资源统一起来,实现数据的计算、储存、处理和共享的一种托管技术。云技术基于云计算商业模式应用的网络技术、信息技术、整合技术、管理平台技术、应用技术等的总称,可以组成资源池,按需所用,灵活便利。Cloud technology refers to a hosting technology that unifies a series of resources such as hardware, software, and network in a wide area network or a local area network to realize data calculation, storage, processing, and sharing. Cloud technology is a general term for network technology, information technology, integration technology, management platform technology, application technology, etc. based on cloud computing business model applications. It can form a resource pool and be used on demand, which is flexible and convenient.

云计算(Cloud Computing)是指IT(Internet Technology,互联网技术)基础设施的交付和使用模式,指通过网络以按需、易扩展的方式获得所需资源;广义云计算指服务的交付和使用模式,指通过网络以按需、易扩展的方式获得所需服务。这种服务可以是IT和软件、互联网相关,也可是其他服务。云计算是网格计算(Grid Computing)、分布式计算(DistributedComputing)、并行计算(Parallel Computing)、效用计算(UtilityComputing)、网络存储(Network Storage Technologies)、虚拟化(Virtualization)、负载均衡(Load Balance)等传统计算机和网络技术发展融合的产物。伴随着互联网行业的高度发展和应用,将来每个物品都有可能存在自己的识别标志,都需要传输到后台系统进行逻辑处理,不同程度级别的数据将会分开处理,各类行业数据皆需要强大的系统后盾支撑,只能通过云计算来实现。Cloud Computing (Cloud Computing) refers to the delivery and use mode of IT (Internet Technology, Internet Technology) infrastructure, which refers to the acquisition of required resources through the network in an on-demand and easy-to-expand manner; cloud computing in a broad sense refers to the delivery and use mode of services , refers to obtaining the required services through the network in an on-demand and easy-to-expand manner. Such services can be IT and software, Internet related, or other services. Cloud computing is grid computing (Grid Computing), distributed computing (Distributed Computing), parallel computing (Parallel Computing), utility computing (Utility Computing), network storage (Network Storage Technologies), virtualization (Virtualization), load balancing (Load Balance ) and other traditional computer and network technology development fusion products. With the rapid development and application of the Internet industry, each item may have its own identification mark in the future, which needs to be transmitted to the background system for logical processing. Data of different levels will be processed separately, and all kinds of industry data need to be powerful. The system backing support can only be realized through cloud computing.

区块链是分布式数据存储、点对点传输、共识机制、加密算法等计算机技术的新型应用模式。区块链(Blockchain),本质上是一个去中心化的数据库,是一串使用密码学方法相关联产生的数据块,每一个数据块中包含了一批次网络交易的信息,用于验证其信息的有效性(防伪)和生成下一个区块。区块链可以包括区块链底层平台、平台产品服务层以及应用服务层。Blockchain is a new application model of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. Blockchain (Blockchain), essentially a decentralized database, is a series of data blocks associated with each other using cryptographic methods. Each data block contains a batch of network transaction information, which is used to verify its Validity of information (anti-counterfeiting) and generation of the next block. The blockchain can include the underlying platform of the blockchain, the platform product service layer, and the application service layer.

区块链底层平台可以包括用户管理、基础服务、智能合约以及运营监控等处理模块。其中,用户管理模块负责所有区块链参与者的身份信息管理,包括维护公私钥生成(账户管理)、密钥管理以及用户真实身份和区块链地址对应关系维护(权限管理)等,并且在授权的情况下,监管和审计某些真实身份的交易情况,提供风险控制的规则配置(风控审计);基础服务模块部署在所有区块链节点设备上,用来验证业务请求的有效性,并对有效请求完成共识后记录到存储上,对于一个新的业务请求,基础服务先对接口适配解析和鉴权处理(接口适配),然后通过共识算法将业务信息加密(共识管理),在加密之后完整一致的传输至共享账本上(网络通信),并进行记录存储;智能合约模块负责合约的注册发行以及合The underlying blockchain platform can include processing modules such as user management, basic services, smart contracts, and operational monitoring. Among them, the user management module is responsible for the identity information management of all blockchain participants, including maintenance of public and private key generation (account management), key management, and maintenance of the corresponding relationship between the user's real identity and blockchain address (authority management), etc., and in In the case of authorization, supervise and audit transactions of certain real identities, and provide risk control rule configuration (risk control audit); the basic service module is deployed on all blockchain node devices to verify the validity of business requests, And complete the consensus on valid requests and record them on the storage. For a new business request, the basic service first analyzes and authenticates the interface adaptation (interface adaptation), and then encrypts the business information through the consensus algorithm (consensus management). After encryption, it is completely and consistently transmitted to the shared ledger (network communication) and recorded for storage; the smart contract module is responsible for the registration and issuance of the contract and the contract

约触发和合约执行,开发人员可以通过某种编程语言定义合约逻辑,发布到区块链上(合约注册),根据合约条款的逻辑,调用密钥或者其它的事件触发执行,完成合约逻辑,同时还提供对合约升级注销的功能;运营监控模块主要负责产品发布过程中的部署、配置的修改、合约设置、云适配以及产品运行中的实时状态的可视化输出,例如:告警、监控网络情况、监控节点设备健康状态等。平台产品服务层提供典型应用的基本能力和实现框架,开发人员可以基于这些基本能力,叠加业务的特性,完成业务逻辑的区块链实现。应用服务层提供基于区块链方案的应用服务给业务参与方进行使用。Contract trigger and contract execution, developers can define the contract logic through a certain programming language, publish it to the blockchain (contract registration), according to the logic of the contract terms, call the key or other events to trigger execution, complete the contract logic, and at the same time It also provides the function of contract upgrade and cancellation; the operation monitoring module is mainly responsible for the deployment during the product release process, configuration modification, contract setting, cloud adaptation, and visual output of real-time status during product operation, such as: alarm, monitoring network conditions, Monitor the health status of node equipment, etc. The platform product service layer provides the basic capabilities and implementation framework of typical applications. Based on these basic capabilities, developers can superimpose the characteristics of the business and complete the blockchain implementation of business logic. The application service layer provides application services based on blockchain solutions for business participants to use.

本技术方案中的终端设备可以是区块链节点设备,多个区块链节点设备之间可以通过网络通信形成区块链存储系统。本技术方案提供的数据处理方法的应用场景还可以为:在区块链节点设备接收到业务请求时,通过本技术方案提供的数据处理方法实现对关键的业务信息的处理,例如具体可以对区块链节点的账户信息进行处理。在对关键的业务信息进行处理之后将处理后的数据传输至共享账本,并作为一个新的数据块存储至区块链中。The terminal device in this technical solution may be a block chain node device, and multiple block chain node devices may form a block chain storage system through network communication. The application scenario of the data processing method provided by this technical solution can also be: when the block chain node device receives a business request, the data processing method provided by this technical solution can be used to process key business information. The account information of the block chain node is processed. After processing key business information, the processed data is transmitted to the shared ledger and stored in the blockchain as a new data block.

在一个实施例中,如图2所示,提供了一种数据处理方法,以该方法应用于图1中的计算机设备为例进行说明,该计算机设备具体可以是终端或者服务器。本实施例中,该方法包括以下步骤:In one embodiment, as shown in FIG. 2 , a data processing method is provided. The method is applied to the computer device in FIG. 1 as an example for illustration. The computer device may specifically be a terminal or a server. In this embodiment, the method includes the following steps:

步骤S202,获取初始安全控件所提供的多种数据处理策略。Step S202, acquiring various data processing policies provided by the initial security control.

其中,安全控件是针对特定业务系统或浏览器开发的、对关键数据进行保护的插件,例如包括维持服务端和客户端信息的保密、防止账号密码丢失等功能。安全控件通常是为了提升用户数据安全,防止账户密码等目标数据被木马或病毒等恶意软件盗取的程序或插件。安全控件可以配置在各种业务系统或应用程序中,也可以通过浏览器下载安装并加载,从而提供数据保护服务。Among them, the security control is a plug-in developed for a specific business system or browser to protect key data, such as maintaining the confidentiality of server and client information, preventing loss of account passwords, and other functions. Security controls are usually programs or plug-ins designed to improve user data security and prevent target data such as account passwords from being stolen by malware such as Trojan horses or viruses. Security controls can be configured in various business systems or applications, and can also be downloaded, installed and loaded through a browser to provide data protection services.

本实施例中的初始安全控件,是自定义配置的安全控件,其中配置了多种数据处理策略。其中,多个是指至少两个。The initial security control in this embodiment is a custom-configured security control, in which various data processing policies are configured. Among them, a plurality refers to at least two.

可以理解,数据转换处理,可以是指对某些关键的信息通过处理规则进行数据的变形,也就是将容易泄密的真实目标数据按一定规则转换成不易泄密的非真实数据的过程,以实现关键的数据的可靠保护。从而能够在开发、测试和其它非生产环境以及外包环境中安全地使用处理后的真实数据集。数据转换处理,具体可以是对数据进行隐蔽处理或加密处理,即将原始数据进行变形转换,以隐藏原始数据对于的明文数据。例如隐蔽处理具体可以为脱敏处理,脱敏处理也就是将敏感的隐私数据变形转换为非真实数据的过程。It can be understood that data conversion processing can refer to the transformation of certain key information through processing rules, that is, the process of converting real target data that is easy to leak into non-real data that is not easy to leak according to certain rules, so as to realize key information. reliable protection of your data. This enables safe use of processed real datasets in development, testing and other non-production environments as well as outsourced environments. The data conversion processing may specifically be performing concealment processing or encryption processing on the data, that is, transforming and transforming the original data to hide the plaintext data of the original data. For example, concealment processing may specifically be desensitization processing, which is a process of transforming sensitive private data into unreal data.

在一个具体的实施例中,数据处理策略,可以是指对数据进行脱敏处理的规则策略,具体可以是脱敏策略,即根据指定脱敏规则自定义的脱敏算法。例如数据处理策略包括对目标数据的替换、重排、加密、截断、掩码等中的至少一种。其中,加密算法可以包括Sha256(Secure Hash Algorithm)算法、SM3算法、Sha1算法、MD5(Message-DigestAlgorithm 5,信息摘要算法)等。In a specific embodiment, the data processing policy may refer to a rule policy for desensitizing data, and specifically may be a desensitization policy, that is, a desensitization algorithm customized according to a specified desensitization rule. For example, the data processing policy includes at least one of replacement, rearrangement, encryption, truncation, masking, etc. of the target data. Wherein, the encryption algorithm may include Sha256 (Secure Hash Algorithm) algorithm, SM3 algorithm, Sha1 algorithm, MD5 (Message-Digest Algorithm 5, information digest algorithm) and so on.

其中,Sha256算法是一种密码安全散列算法,即哈希函数。该函数将数据打乱混合,重新创建一个叫做散列值或哈希值的指纹。散列值通常用一个短的随机字母和数字组成的字符串来代表。对于任意长度的消息,Sha256都会产生一个256bit长的哈希值,称作消息摘要。SM3也是一种密码安全散列算法,主要用于数字签名及验证、消息认证码生成及验证、随机数生成等。Sha1是一种安全算法,主要用于验证数据的完整性。数据在传输的过程中很可能会发生变化,因此也会产生不同的消息摘要。MD5信息摘要算法是一种被广泛使用的密码散列函数,可以产生出一个128位的散列值,用于确保信息传输完整一致。Among them, the Sha256 algorithm is a cryptographically secure hash algorithm, that is, a hash function. This function scrambles the data to recreate a fingerprint called a hash value or hash value. The hash value is usually represented by a short string of random letters and numbers. For a message of any length, Sha256 will generate a 256bit long hash value called a message digest. SM3 is also a cryptographically secure hash algorithm, mainly used for digital signature and verification, message authentication code generation and verification, random number generation, etc. Sha1 is a security algorithm mainly used to verify the integrity of data. The data is likely to change during transmission, so different message digests will also be generated. The MD5 message digest algorithm is a widely used cryptographic hash function that can generate a 128-bit hash value to ensure the integrity and consistency of information transmission.

可以理解,初始安全控件中预先配置有多种数据处理策略。具体可以为至少三种数据处理策略。其中,数据处理策略可以包括常见的加密算法和脱敏算法,还可以包括自定义的加密算法和脱敏算法。It can be understood that multiple data processing strategies are pre-configured in the initial security control. Specifically, there may be at least three data processing strategies. Wherein, the data processing strategy may include common encryption algorithms and desensitization algorithms, and may also include user-defined encryption algorithms and desensitization algorithms.

计算机设备在对目标业务下的目标数据进行处理之前,可以预先配置对应于目标业务的目标安全控件。具体地,计算机设备可以首先获取初始安全控件所提供的多种数据处理策略,然后基于初始安全控件所提供的多种数据处理策略,配置针对目标业务的目标安全控件。Before the computer device processes the target data under the target service, it can pre-configure the target security control corresponding to the target service. Specifically, the computer device may first obtain various data processing strategies provided by the initial security control, and then configure target security controls for target services based on the various data processing strategies provided by the initial security control.

步骤S204,基于自定义选择的至少两种数据处理策略,针对初始安全控件配置对应于目标业务的数据处理策略组合,得到与目标业务绑定的目标安全控件。Step S204, based on at least two data processing strategies selected by self-definition, configure a combination of data processing strategies corresponding to the target service for the initial security control, and obtain a target security control bound to the target service.

其中,目标业务,可以表示特定的业务类型的业务应用,例如,可以是各种业务类型的业务系统或业务系统中的子业务,还可以是各种业务类型的应用程序或应用程序中的子应用。Among them, the target business may represent a business application of a specific business type, for example, it may be a business system of various business types or a sub-business in a business system, or it may be an application program of various business types or a sub-business in an application program. application.

目标安全控件,是指针对目标业务配置了自定义选择的至少两种数据处理策略生成的数据处理策略组合的安全控件。The target security control refers to a security control configured with a combination of data processing policies generated by at least two data processing policies custom-selected for the target business.

具体地,研发人员可以针对目标业务,从出初始安全控件所提供的多种数据处理策略中,自定义选择至少两种数据处理策略。然后计算机设备则在初始安全控件中配置根据自定义选择的至少两种数据处理策略,并将初始安全控件与目标业务绑定,从而能够灵活地得到与目标业务绑定的目标安全控件。Specifically, R&D personnel can customize and select at least two data processing strategies from various data processing strategies provided by the initial security control for the target business. Then the computer device configures at least two data processing strategies selected according to self-definition in the initial security control, and binds the initial security control to the target service, so that the target security control bound to the target service can be flexibly obtained.

在其中一个实施例中,业务方还可以从初始安全控件所提供的多种数据处理策略中,自定义选择其中一种数据处理策略。然后针对初始安全控件配置对应于目标业务的数据处理策略,从而得到与目标业务绑定的目标安全控件。In one of the embodiments, the business party can also customize and select one of the data processing strategies from the various data processing strategies provided by the initial security control. Then configure the data processing strategy corresponding to the target business for the initial security control, so as to obtain the target security control bound to the target business.

步骤S206,当基于目标安全控件获取到目标业务下的目标数据时,通过目标安全控件调用数据处理策略组合。Step S206, when the target data under the target service is acquired based on the target security control, call the data processing policy combination through the target security control.

可以理解,目标数据,又称关键的数据,是指泄漏后可能会给社会或个人带来严重危害的数据。例如,目标数据具体可以是敏感数据。It can be understood that target data, also known as critical data, refers to data that may cause serious harm to society or individuals if leaked. For example, the target data may specifically be sensitive data.

在一个实施例中,目标数据包括姓名、身份证号码、住址、电话、银行账号、邮箱、密码、医疗信息以及教育背景等中的至少一种。In one embodiment, the target data includes at least one of name, ID number, address, phone number, bank account number, email address, password, medical information, and educational background.

计算机设备对目标业务配置具有自定义的数据处理策略组合的目标安全控件后,则可以通过目标安全控件对目标业务下的目标数据进行处理。After the computer device is configured with a target security control with a custom data processing policy combination for the target service, the target data under the target service can be processed through the target security control.

具体地,当计算机设备获取到目标业务下的目标数据时,则实时调用与目标业务绑定的目标安全控件,并通目标安全控件加载已配置的数据处理策略组合。Specifically, when the computer device obtains the target data under the target service, it calls the target security control bound to the target service in real time, and loads the configured data processing strategy combination through the target security control.

步骤S208,将数据处理策略组合解析为指令调用序列。Step S208, analyzing the combination of data processing strategies into an instruction calling sequence.

其中,指令调用序列,可以表示指令的集合,表示具有执行顺序的多个指令调用,即一系列按照一定执行顺序排列的指令。具体可以为数据处理策略组合中至少两个数据处理策略分别对应的指令调用。具体地,每一条指令调用序列可以对应于一种脱敏算法或加密算法。Wherein, the instruction call sequence may represent a set of instructions, and represent a plurality of instruction calls with an execution order, that is, a series of instructions arranged in a certain order of execution. Specifically, it may be invoking instructions corresponding to at least two data processing strategies in the data processing strategy combination. Specifically, each instruction calling sequence may correspond to a desensitization algorithm or an encryption algorithm.

可以理解,计算机设备在对目标数据进行处理的过程中,就是依次执行指令调用序列对目标数据进行转换处理的过程,从而实现对目标数据转换处理,得到隐蔽明文后的数据。It can be understood that in the process of processing the target data, the computer equipment is the process of sequentially executing the instruction calling sequence to convert the target data, so as to realize the conversion process of the target data and obtain the data after hiding the plaintext.

其中,目标安全控件中还包括针对数据处理策略组合的解析规则,用于将自定义的数据处理策略组合解析为指令调用序列。Wherein, the target security control also includes parsing rules for the combination of data processing strategies, which are used to resolve the custom combination of data processing strategies into an instruction calling sequence.

计算机设备通过目标安全控件加载自定义的数据处理策略组合后,则按照目标安全控件中针对数据处理策略组合的解析规则,对数据处理策略组合进行策略解析,得到与数据处理策略组合对应的指令调用序列。After the computer device loads the custom data processing strategy combination through the target security control, it analyzes the data processing strategy combination according to the parsing rules for the data processing strategy combination in the target security control, and obtains the instruction call corresponding to the data processing strategy combination sequence.

计算机设备将自定义的数据处理策略组合解析为对应的指令调用序列后,则按照指令调用序列的指令执行顺序,依次执行各条指令调用序列。After the computer device parses the self-defined combination of data processing strategies into corresponding instruction calling sequences, it executes each instruction calling sequence sequentially according to the instruction execution order of the instruction calling sequences.

步骤S210,按照指令调用序列对目标数据进行转换处理,得到转换后的数据。Step S210, converting the target data according to the instruction calling sequence to obtain the converted data.

可以理解,本实施例中的转换处理,可以是通过针对目标数据执行一系列的指令调用序列以实现对目标数据变形。例如,具体可以是对目标数据进行脱敏处理,以得到脱敏后的数据。It can be understood that the conversion process in this embodiment may implement a series of instruction call sequences for the target data to transform the target data. For example, specifically, desensitization may be performed on target data to obtain desensitized data.

计算机设备将数据处理策略组合解析为对应的指令调用序列后,则可以按照相应的指令执行顺序,针对目标数据依次执行指令调用序列。After the computer device parses the combination of data processing strategies into a corresponding instruction invocation sequence, the instruction invocation sequence can be sequentially executed for the target data according to the corresponding instruction execution sequence.

例如,若指令调用序列为至少三条时,计算机设备首先执行第一条指令调用序列后,基于执行第一条指令后得到的结果,依次按照指令执行顺序执行后续的指令调用序列,直到执行最后一条指令调用序列后,则得到转换后的数据。其中,转换后的数据具体可以为哈希值的形式。For example, if there are at least three instruction call sequences, the computer device first executes the first instruction call sequence, and based on the result obtained after executing the first instruction, executes subsequent instruction call sequences in sequence until the last instruction call sequence is executed. After the sequence of instruction calls, the converted data is obtained. Wherein, the converted data may specifically be in the form of a hash value.

可以理解的是,计算机设备对目标数据进行转换处理,得到转换后的数据后,则将转换后的数据存储至目标业务对应的数据库中,由此能够有效避免在数据库中存储明文数据。It can be understood that the computer equipment converts the target data, and after obtaining the converted data, stores the converted data in the database corresponding to the target business, thereby effectively avoiding storing plaintext data in the database.

在其中一个实施例中,基于自定义选择的至少两种数据处理策略,配置得到与目标业务绑定的目标安全控件后。若存在明文的目标业务下的历史目标数据,计算机设备则可以通过目标安全控件对目标业务下的历史目标数据进行转换处理,以将历史目标数据转换为隐蔽处理后的数据。由于目标安全控件中配置了与目标业务绑定的自定义的数据处理策略组合,由此能够有利于兼容旧的目标业务下的数据以及数据格式,从而更加安全灵活地对目标业务下的目标数据进行隐蔽处理。In one of the embodiments, based on at least two data processing strategies selected by self-definition, the target security control bound to the target service is configured and obtained. If there is historical target data under the target business in clear text, the computer device can convert the historical target data under the target business through the target security control, so as to convert the historical target data into covertly processed data. Since the target security control is configured with a custom data processing policy combination bound to the target business, it can facilitate compatibility with the data and data formats under the old target business, thereby more securely and flexibly processing the target data under the target business Be concealed.

如图3所示,为一个实施例中目标安全控件的效果图。可以理解,密码信息是一种典型的目标数据。参照图3,目标安全控件可以应用在目标业务的密码脱敏处理的场景中。例如在目标业务中需要用户输入密码信息来验证身份信息的过程中,当计算机设备获取到用户输入目标业务下的密码信息后,则实时调用绑定的目标安全控件通过目标安全控件调用与目标业务对应的数据处理策略组合。然后将数据处理策略组合解析为指令调用序列,进而按照指令调用序列对目标数据进行脱敏处理,得到脱敏后的数据。计算机设备可以进一步基于脱敏后的数据进行身份验证,由此能够有效避免明文数据暴露,从而能够保证关键目标数据的安全性。As shown in FIG. 3 , it is an effect diagram of a target security control in an embodiment. It can be understood that password information is a typical target data. Referring to FIG. 3 , the target security control can be applied in the scenario of password desensitization processing of the target business. For example, in the process of requiring the user to enter password information to verify the identity information in the target business, when the computer device obtains the password information entered by the user under the target business, it will call the bound target security control in real time and call the target business through the target security control The corresponding combination of data processing strategies. Then the combination of data processing strategies is parsed into an instruction call sequence, and then the target data is desensitized according to the instruction call sequence to obtain the desensitized data. The computer device can further perform identity verification based on the desensitized data, thereby effectively avoiding the exposure of plaintext data, thereby ensuring the security of key target data.

上述数据处理方法中,计算机设备获取初始安全控件所提供的多种数据处理策略,业务方则可以在初始安全控件中自定义选择各种数据处理策略进行组合,然后基于自定义选择的至少两种数据处理策略,针对初始安全控件配置对应于目标业务的数据处理策略组合,从而得到与目标业务绑定的目标安全控件。由此业务方能够自定义灵活地生成各种数据处理策略组合,并且经过组合的数据处理策略对于数据处理的安全性更高。当获取到目标业务下的目标数据时,通过目标安全控件调用与目标业务对应的数据处理策略组合,然后将数据处理策略组合解析为指令调用序列,进而按照指令调用序列对目标数据进行转换处理,由此能够更加安全地对目标数据进行转换处理,以使得到转换后的数据不易被破解和泄露,从而有效提高了目标数据的安全性。In the above data processing method, the computer device obtains multiple data processing strategies provided by the initial security control, and the business side can customize and combine various data processing strategies in the initial security control, and then select at least two based on the custom The data processing strategy configures a combination of data processing strategies corresponding to the target business for the initial security control, so as to obtain the target security control bound to the target business. In this way, the business side can customize and flexibly generate various combinations of data processing strategies, and the combined data processing strategies are more secure for data processing. When the target data under the target business is obtained, the data processing strategy combination corresponding to the target business is invoked through the target security control, and then the data processing strategy combination is parsed into an instruction calling sequence, and then the target data is converted and processed according to the instruction calling sequence, In this way, the target data can be converted more safely, so that the converted data is not easy to be cracked and leaked, thereby effectively improving the security of the target data.

在一个实施例中,基于自定义选择的至少两种数据处理策略,针对初始安全控件配置对应于目标业务的数据处理策略组合,得到与目标业务绑定的目标安全控件的步骤,包括:获取基于自定义选择的对应于目标业务的至少两种数据处理策略;根据至少两种数据处理策略,生成与目标业务相应的嵌套调用函数;在初始安全控件中配置嵌套调用函数,得到与目标业务绑定的目标安全控件。In one embodiment, based on at least two data processing strategies selected by self-definition, the initial security control is configured with a combination of data processing strategies corresponding to the target business, and the step of obtaining the target security control bound to the target business includes: obtaining a security control based on Customize at least two data processing strategies corresponding to the target business; generate a nested call function corresponding to the target business according to at least two data processing strategies; configure the nested call function in the initial security control to obtain the target business The bound target security control.

其中,嵌套调用就是至某个函数调用另外一个函数,即函数嵌套允许在一个函数中调用另外一个函数。例如,当有多个函数时,若这几个函数之间具有逐层调用的关系,那么这些函数则为嵌套调用函数。Among them, the nested call is to call another function from one function, that is, function nesting allows calling another function in one function. For example, when there are multiple functions, if there is a layer-by-layer call relationship between these functions, then these functions are nested call functions.

可以理解,每一种数据处理策略可以为一种策略函数,自定义选择的数据处理策略组合中则包括至少两种策略函数,至少两种策略函数可以组成嵌套调用函数。也就是说,嵌套调用函数是表示具有逐层调用关系的多个策略函数。It can be understood that each data processing strategy can be a strategy function, and the custom-selected data processing strategy combination includes at least two strategy functions, and at least two strategy functions can form a nested calling function. That is to say, a nested calling function means multiple policy functions having a layer-by-layer calling relationship.

计算机设备获取初始安全控件所提供的多种数据处理策略,并获取从初始安全控件所提供的多种数据处理策略中,针对目标业务自定义选择的至少两种数据处理策略后,则对自定义选择的至少两种数据处理策略组合进行策略解析,得到与目标业务相应的嵌套调用函数。After the computer device obtains various data processing strategies provided by the initial security controls, and obtains at least two data processing strategies selected for the target business customization from among the various data processing strategies provided by the initial security controls, then the customized The combination of at least two selected data processing strategies is analyzed to obtain the nested call function corresponding to the target business.

然后计算机设备则在初始安全控件中配置嵌套调用函数,由于自定义选择的数据处理策略组合是对应于目标业务的,因此在对初始安全控件配置的过程中,能够同时将初始安全控件与目标业务绑定,从而能够更加灵活地配置与目标业务绑定的目标安全控件。Then the computer equipment configures the nested call function in the initial security control. Since the data processing strategy combination selected by the user corresponds to the target business, in the process of configuring the initial security control, the initial security control can be combined with the target business at the same time. Business binding, so that the target security control bound to the target business can be more flexibly configured.

在一个实施例中,根据至少两种数据处理策略,生成与目标业务相应的嵌套调用函数的步骤,包括:确定自定义选择的至少两种数据处理策略所对应的嵌套调用顺序;按照嵌套调用顺序,将至少两种数据处理策略解析为与目标业务相应的嵌套调用函数。In one embodiment, according to at least two data processing strategies, the step of generating a nested call function corresponding to the target service includes: determining the nested call sequence corresponding to the at least two data processing strategies selected by the user; nested call sequence, and at least two data processing strategies are parsed into nested call functions corresponding to the target business.

其中,嵌套调用顺序是表示各策略函数之间的调用顺序。Wherein, the nested call sequence indicates the call sequence among the policy functions.

可以理解,每一种数据处理策略可以为一种策略函数,自定义选择的数据处理策略组合中则包括至少两种策略函数,至少两种策略函数可以组成嵌套调用函数。也就是说,嵌套调用函数是表示具有逐层调用关系的多个策略函数。It can be understood that each data processing strategy can be a strategy function, and the custom-selected data processing strategy combination includes at least two strategy functions, and at least two strategy functions can form a nested calling function. That is to say, a nested calling function means multiple policy functions having a layer-by-layer calling relationship.

计算机设备对自定义选择的至少两种数据处理策略组合进行策略解析时,具体可以调用初始安全控件中的解析器,首先通过初始安全控件中的解析器确定自定义选择的至少两种数据处理策略所对应的多个策略函数,以及每个策略函数对应的嵌套调用顺序。然后按照嵌套调用顺序,将至少两种数据处理策略解析为与目标业务相应的嵌套调用函数,从而能够灵活高效地自定义配置得到与目标业务绑定的目标安全控件。When the computer device performs policy analysis on the combination of at least two data processing strategies selected by self-definition, it can specifically call the resolver in the initial security control, and first determine the at least two data processing strategies selected by self-definition through the resolver in the initial security control The corresponding multiple strategy functions, and the nested call sequence corresponding to each strategy function. Then, according to the nested call sequence, at least two data processing strategies are parsed into nested call functions corresponding to the target business, so that the target security control bound to the target business can be obtained through flexible and efficient custom configuration.

在一个实施例中,在获取初始安全控件所提供的多种数据处理策略之前,方法还包括初始安全控件的配置步骤,初始安全控件的配置步骤包括:对初始安全控件配置数据处理策略;基于配置的数据处理策略,在初始安全控件中配置对应的组合策略,生成提供多种数据处理策略的初始安全控件。In one embodiment, before acquiring multiple data processing policies provided by the initial security controls, the method further includes a step of configuring the initial security controls, the step of configuring the initial security controls includes: configuring the data processing policies for the initial security controls; Configure the corresponding combined strategy in the initial security control to generate an initial security control that provides multiple data processing strategies.

可以理解,初始安全控件,是预先配置了多种数据处理策略的安全控件,由此能够向业务方提供初始安全控件,使得业务方能够从初始安全控件提供的多种数据处理策略中自定义选择所需的数据处理策略组合,以实现安全灵活地对目标数据进行处理。It can be understood that the initial security control is a security control that is pre-configured with various data processing strategies, so that the initial security control can be provided to the business side, so that the business side can customize the selection from the various data processing strategies provided by the initial security control The combination of data processing strategies required to enable safe and flexible processing of the target data.

其中,计算机设备在获取初始安全控件之前,还包括初始安全控件的配置步骤。该初始安全控件的配置步骤可以由其他第三方平台执行,也可以由当前的计算机设备执行。Wherein, before the computer device obtains the initial security control, it also includes a configuration step of the initial security control. The step of configuring the initial security control can be performed by other third-party platforms, or by current computer equipment.

其中,组合策略,即表示各个数据处理策略之间的组合策略。Wherein, the combined strategy refers to a combined strategy among various data processing strategies.

具体地,计算机设备首先获取多个数据处理策略,其中可以包括自定义的数据处理策略。然后对初始安全控件配置所获取的多个数据处理策略,并确定各个数据处理策略之间的组合策略。计算机设备进而在初始安全控件中配置各个数据处理策略之间的组合策略,从而生成提供多种数据处理策略的初始安全控件。Specifically, the computer device first obtains a plurality of data processing policies, which may include self-defined data processing policies. Then configure the obtained multiple data processing strategies for the initial security control, and determine the combined strategy among the various data processing strategies. The computer device then configures a combined strategy among various data processing strategies in the initial security control, thereby generating an initial security control that provides multiple data processing strategies.

本实施例中,通过对初始的安全控件配置多种数据处理策略,由此使得初始安全控件能够提供多种数据处理策略,以供业务方针对目标业务自定义选择数据处理策略组合,得到与目标业务绑定的自定义配置的目标安全控件。In this embodiment, by configuring multiple data processing strategies for the initial security control, the initial security control can provide multiple data processing strategies for the business side to customize the combination of data processing strategies for the target business, and obtain the target The target security control for the custom configuration of the business binding.

在一个实施例中,当基于目标安全控件获取到目标业务下的目标数据时,通过目标安全控件调用数据处理策略组合的步骤,包括:当获取的目标业务下的数据为目标数据时,通过目标安全控件调用表达式解析器和数据处理策略组合。In one embodiment, when the target data under the target business is obtained based on the target security control, the step of invoking the combination of data processing strategies through the target security control includes: when the acquired data under the target business is target data, through the target Security controls invoke expression parsers and data processing strategy combinations.

将数据处理策略组合解析为指令调用序列的步骤,包括:通过表达式解析器,确定数据处理策略组合中表达式的顺序,按照顺序将数据处理策略组合解析为指令调用序列。The step of parsing the data processing strategy combination into an instruction calling sequence includes: determining the sequence of expressions in the data processing strategy combination through an expression parser, and parsing the data processing strategy combination into an instruction calling sequence according to the order.

当计算机设备获取到目标业务下的目标数据时,则实时调用与目标业务绑定的目标安全控件,并通目标安全控件加载已配置的数据处理策略组合。When the computer device acquires the target data under the target service, it will call the target security control bound to the target service in real time, and load the configured data processing strategy combination through the target security control.

可以理解,表达式解析器是目标安全控件中配置的用于将数据处理策略组合解析为指令调用的解析工具包。例如,表达式解析器能够实现对各种表达式进行解析,例如可以包括数学函数、布尔运算、字符串运算、加密函数、嵌套函数、以及自定义函数等表达式。其中,各表达式的顺序也就是指各表达式的执行顺序。It can be understood that the expression parser is a parsing toolkit configured in the target security control for parsing the combination of data processing strategies into instruction calls. For example, the expression parser is capable of parsing various expressions, such as expressions including mathematical functions, Boolean operations, string operations, encryption functions, nested functions, and user-defined functions. Wherein, the order of the expressions refers to the execution order of the expressions.

在配置与目标业务对应的目标安全控件后,当计算机设备获取到目标业务下的目标数据时,则唤起目标安全控件,并通过目标安全控件加载其中的表达式解析器,以及调用目标业务对应的数据处理策略组合。After configuring the target security control corresponding to the target business, when the computer device obtains the target data under the target business, it will invoke the target security control, and load the expression parser in it through the target security control, and call the target business corresponding A combination of data processing strategies.

然后计算机设备进而通过表达式解析器对数据处理策略组合进行解析。具体地,计算机设备首先通过表达式解析器解析数据处理策略组合中的各表达式的顺序,然后按照各表达式的顺序将数据处理策略组合中的各表达式,转换为具有执行顺序的指令调用序列。可以理解,各表达式的顺序,与指令调用序列的执行顺序是相对应的。Then the computer device further parses the combination of data processing strategies through the expression parser. Specifically, the computer device first parses the order of the expressions in the data processing strategy combination through the expression parser, and then converts the expressions in the data processing strategy combination into instruction calls with an execution sequence according to the order of the expressions sequence. It can be understood that the order of the expressions corresponds to the execution order of the instruction calling sequence.

本实施例中,通过目标安全控件的表达式解析器,对自定义选择的数据处理策略组合进行策略解析,能够快速有效地将数据处理策略组合解析为具有执行顺序的指令调用序列,从而能够高效安全地对目标数据进行处理。In this embodiment, through the expression parser of the target security control, the policy analysis is performed on the custom-selected data processing policy combination, and the data processing policy combination can be quickly and effectively parsed into an instruction call sequence with an execution order, thereby enabling efficient Safely process target data.

在一个实施例中,通过表达式解析器,确定数据处理策略组合中表达式的顺序,按照顺序将数据处理策略组合解析为指令调用序列的步骤,包括:通过表达式解析器初始化指令列表;确定数据处理策略组合的外层函数接口;若根据外层函数接口识别出数据处理策略组合包括嵌套调用函数,则对嵌套调用函数进行逐层解析,得到嵌套调用函数中的嵌套的各表达式,将解析的表达式按解析顺序添加至指令列表,得到指令调用序列。In one embodiment, the sequence of the expressions in the data processing strategy combination is determined through an expression parser, and the step of parsing the data processing strategy combination into an instruction call sequence in order includes: initializing the instruction list through the expression parser; determining The outer layer function interface of the data processing strategy combination; if it is identified according to the outer layer function interface that the data processing strategy combination includes a nested call function, then the nested call function is analyzed layer by layer, and each nested call function in the nested call function is obtained. expression, add the parsed expression to the instruction list in the order of parsing, and obtain the instruction calling sequence.

其中,指令列表,即用于记录解析得到的各个指令的列表。具体可以将指令列表中所记录的指令,表示为指令序列的集合。多条指令的可以按执行顺序拼接形成的指令队列。指令的执行顺序,用于循着这个指令顺序一直往下执行各个指令。Wherein, the instruction list is a list for recording each instruction obtained by parsing. Specifically, the instructions recorded in the instruction list may be expressed as a set of instruction sequences. Multiple instructions can be spliced in order of execution to form an instruction queue. The execution order of the instructions is used to follow the order of the instructions and execute each instruction down.

可以理解,外层函数接口,也即数据处理策略组合中的外层函数。其中,外层函数就是数据处理策略组合中最后执行的表达式;数据处理策略组合中的内层函数,就是数据处理策略组合中最先执行的表达式。It can be understood that the outer function interface is also the outer function in the combination of data processing strategies. Among them, the outer function is the expression executed last in the combination of data processing strategies; the inner function in the combination of data processing strategies is the expression executed first in the combination of data processing strategies.

计算机设备通过表达式解析器解析数据处理策略组合的过程中,通过表达式逐层解析数据处理策略组合,以逐层解析出数据处理策略组合中的各表达式。In the process of parsing the data processing strategy combination by the computer device through the expression parser, the expression is used to analyze the data processing strategy combination layer by layer, so as to analyze each expression in the data processing strategy combination layer by layer.

具体地,计算机设备首先通过表达式解析器初始化一个指令列表,并将数据处理策略组合输入至表达式解析器中。表达式解析器则首先确定数据处理策略组合的外层函数接口,然后识别外层函数接口中是否还包括嵌套调用函数,也就是识别其中是否还包括内层函数。Specifically, the computer device first initializes an instruction list through the expression parser, and inputs the combination of data processing strategies into the expression parser. The expression parser first determines the outer layer function interface of the data processing strategy combination, and then identifies whether the outer layer function interface also includes nested calling functions, that is, identifies whether it also includes inner layer functions.

若根据外层函数接口识别出数据处理策略组合包括嵌套调用函数,则对嵌套调用函数进行逐层解析,按解析顺序分别得到嵌套调用函数中的嵌套的各表达式,并分别将解析的表达式按解析顺序依次添加至指令列表中,从而得到指令调用序列。If it is identified according to the outer function interface that the combination of data processing strategies includes a nested call function, then the nested call function is analyzed layer by layer, and the nested expressions in the nested call function are respectively obtained in the order of analysis, and respectively The parsed expressions are added to the instruction list sequentially in the order of parsing, so as to obtain the instruction calling sequence.

在其中一个实施例中,若业务方仅从初始安全控件所提供的多种数据处理策略中,自定义选择了其中一种数据处理策略,然后对初始安全控件配置对应于目标业务的数据处理策略,得到与目标业务绑定的目标安全控件后。当基于目标安全控件获取到目标业务下的目标数据时,通过目标安全控件调用数据处理策略,然后则通过目标安全控件中的表达式解析器直接对该数据处理策略进行解析,得到对应的转换指令。计算机设备进而按照指令调用序列对目标数据进行转换处理,得到安全性较高的转换后的数据。In one of the embodiments, if the business party only selects one of the data processing strategies from the various data processing strategies provided by the initial security control, and then configures the initial security control with a data processing strategy corresponding to the target business , after obtaining the target security control bound to the target service. When the target data under the target business is obtained based on the target security control, the data processing strategy is invoked through the target security control, and then the data processing strategy is directly parsed through the expression parser in the target security control to obtain the corresponding conversion instruction . The computer device further converts the target data according to the instruction calling sequence, and obtains the converted data with higher security.

在一个实施例中,对嵌套调用函数进行逐层解析,得到嵌套调用函数中的嵌套的各表达式的步骤,包括:对嵌套调用函数进行逐层解析,确定解析得到的当前表达式中输入参数的位置和数量;若解析得到的当前表达式中包括一个输入参数,则将当前表达式加入至指令列表;若解析得到的当前表达式中包括至少两个输入参数,则根据输入参数的位置和数量,生成参数拼接表达式并加入至指令列表。In one embodiment, the step of analyzing the nested call function layer by layer to obtain the nested expressions in the nested call function includes: analyzing the nested call function layer by layer to determine the current expression obtained by parsing The position and number of input parameters in the formula; if the current expression obtained by parsing includes one input parameter, then add the current expression to the command list; if the current expression obtained by parsing includes at least two input parameters, then according to the input The position and number of parameters, generate a parameter splicing expression and add it to the command list.

可以理解,输入参数是指输入至指定表达式的一组变量。本实施例中的输入参数可以包括目标业务下的目标数据、中间处理结果、随机值参数等。其中,随机值参数具体可以是Salt值,也称为加盐值,用于与目标数据进行组合而生成的随机数值。It will be understood that an input parameter refers to a set of variables input to a specified expression. The input parameters in this embodiment may include target data under the target business, intermediate processing results, random value parameters, and the like. Wherein, the random value parameter may specifically be a Salt value, also called a salt value, which is a random value generated by combining with target data.

计算机设备在对嵌套调用函数进行逐层解析的过程中,首先判断嵌套调用函数中是否还包括嵌套调用函数,若有,则对嵌套调用函数进一步进行解析,得到当前表达式。若当前表达式不包括嵌套调用函数时,则识别当前表达式中输入参数的位置和数量。然后根据输入参数的位置和数量,将相应的表达式加入至指令列表。In the process of analyzing the nested calling function layer by layer, the computer device first judges whether the nested calling function also includes the nested calling function, and if so, further analyzes the nested calling function to obtain the current expression. If the current expression does not include nested calling functions, then identify the position and number of input parameters in the current expression. Then according to the position and quantity of the input parameters, the corresponding expressions are added to the instruction list.

具体地,若解析得到的当前表达式中包括一个输入参数,则将当前表达式加入至指令列表。若解析得到的当前表达式中包括至少两个输入参数,则根据输入参数的位置和数量,生成参数拼接表达式,并将该参数拼接表达式加入至指令列表。例如,若解析得到的当前表达式中包括一个目标数据的输入参数和一个随机值的输入参数时,则根据目标数据的输入参数和随机值的输入参数之间的位置关系,生成当前的参数拼接表达式。Specifically, if the parsed current expression includes an input parameter, the current expression is added to the instruction list. If the parsed current expression includes at least two input parameters, generate a parameter splicing expression according to the position and quantity of the input parameters, and add the parameter splicing expression to the instruction list. For example, if the parsed current expression includes an input parameter of target data and an input parameter of random value, then according to the positional relationship between the input parameter of target data and the input parameter of random value, generate the current parameter concatenation expression.

如目标数据的输入参数在前,随机值的输入参数在前时,则生成的参数拼接表达式可以为前向拼接的表达式。如随机值的输入参数在后,目标数据的输入参数在后时,则生成的参数拼接表达式可以为后向拼接的表达式。将这些表达式按照解析顺序添加至指令列表后,即可解析得到指令调用序列,由此能够有效地将数据处理策略组合解析为对应的指令调用序列。If the input parameter of the target data comes first, and the input parameter of the random value comes first, the generated parameter splicing expression can be a forward splicing expression. If the input parameter of the random value is last, and the input parameter of the target data is last, the generated parameter splicing expression can be a backward splicing expression. After these expressions are added to the instruction list according to the parsing order, the instruction calling sequence can be parsed, so that the combination of data processing strategies can be effectively parsed into the corresponding instruction calling sequence.

在一个实施例中,将解析的表达式按解析顺序添加至指令列表,得到指令调用序列的步骤,包括:分别对解析得到的表达式进行合法性校验;若合法性校验通过后,将解析得到的表达式按解析顺序添加至指令列表,得到指令调用序列。In one embodiment, the step of adding the parsed expressions to the instruction list in the order of parsing to obtain the instruction call sequence includes: performing a legality check on the parsed expressions respectively; if the legality check is passed, the The expressions obtained by parsing are added to the instruction list in the order of parsing, and the instruction calling sequence is obtained.

可以理解,验证表达式的合法性,是指校验表达式是否符合算法规则,也就是校验这个表达式是否能够被计算机设备识别并运行。例如,合法性校验可以包括校验表达式中的输入参数、运算操作符、以及函数等是否符合算法规则。It can be understood that verifying the validity of an expression refers to verifying whether the expression complies with algorithm rules, that is, verifying whether the expression can be recognized and run by a computer device. For example, the validity check may include checking whether the input parameters, operation operators, and functions in the expression conform to algorithm rules.

计算机设备在对嵌套调用函数进行逐层解析过程中,每一轮解析得到的表达式后,还对每一轮解析得到的表达式进行合法性校验。若表达式的合法性校验通过后,则将该表达式添加至指令列表中。直到数据处理策略组合中的表达式均被解析且添加至指令列表后,则基于指令列表得到指令调用序列。由此能够有效地将目标业务对应的数据处理策略组合解析为相应的指令调用序列。During the layer-by-layer parsing process of the nested calling function, the computer device also performs a legality check on the expression obtained after each round of parsing. If the validity check of the expression is passed, the expression is added to the command list. After the expressions in the data processing strategy combination are all parsed and added to the instruction list, an instruction calling sequence is obtained based on the instruction list. In this way, the combination of data processing strategies corresponding to the target business can be effectively parsed into a corresponding instruction invocation sequence.

在一个实施例中,指令调用序列中包括具有执行顺序的至少两个调用指令;按照指令调用序列对目标数据进行转换处理,得到转换后的数据的步骤,包括:按照执行顺序执行指令调用序列中的调用指令,在执行过程中,将上一个调用指令的执行结果作为下一个调用指令的输入,以对目标数据进行转换处理,得到转换后的数据。In one embodiment, the instruction call sequence includes at least two call instructions with an execution order; the step of converting the target data according to the instruction call sequence to obtain the converted data includes: executing the instruction call sequence according to the execution order In the execution process, the execution result of the previous call instruction is used as the input of the next call instruction to convert the target data and obtain the converted data.

可以理解,上一个调用指令的执行结果,是表示执行指令调用序列过程中的中间处理结果。It can be understood that the execution result of the last calling instruction represents an intermediate processing result during the execution of the instruction calling sequence.

计算机设备将数据处理策略组合解析为具有执行顺序的指令调用序列后,则按照执行顺序依次执行指令调用序列中的调用指令。在执行调用指令的过程中,每执行一个调用指令得到对应的执行结果后,则将上一个调用指令的执行结果作为下一个调用指令的输入,以对目标数据进行转换处理,从而能够安全有效地得到转换处理后的数据。After the computer device parses the combination of data processing strategies into an instruction calling sequence with an execution order, it sequentially executes the calling instructions in the instruction calling sequence according to the execution order. In the process of executing the call instruction, after each execution of a call instruction to obtain the corresponding execution result, the execution result of the previous call instruction is used as the input of the next call instruction to convert the target data, so that it can be safely and effectively Get the converted data.

如图4所示,为一个实施例中表达式解析器的解析流程图。参照图4,表达式解析器首先初始化指令列表,首先确定数据处理策略组合的表达式是否为合法表达式。若为合法表达式,则对数据处理策略组合的表达式进行解析。具体地,首先解析得到当前外层函数名称接口,并通过Hash值计算该外层函数名称Api,得到编码后的当前外层函数名称Api的Hash值,即HashApi。然后识别当前外层函数是否有嵌套调用,具体可以包括识别表达式嵌套调用和参数嵌套调用等。As shown in FIG. 4, it is a parsing flowchart of an expression parser in an embodiment. Referring to FIG. 4 , the expression parser first initializes the instruction list, and first determines whether the expression combined by the data processing strategy is a legal expression. If it is a legal expression, the expression of the data processing strategy combination is parsed. Specifically, firstly, the interface of the current outer function name is obtained by parsing, and the outer function name Api is calculated through the Hash value to obtain the encoded Hash value of the current outer function name Api, that is, HashApi. Then identify whether the current outer function has nested calls, which may specifically include identifying nested calls of expressions and nested calls of parameters.

若识别出当前外层函数具有嵌套调用,则进一步对当前外层函数进行递归调用解析,以进一步解析出所调用的表达式函数。If it is identified that the current outer layer function has a nested call, further recursive call analysis is performed on the current outer layer function, so as to further analyze the called expression function.

若当前外层函数没有嵌套调用,则进一步识别当前表达式中的输入参数的数量和位置。具体地,若当前表达式中只有一个参数,则直接将当前外层函数对应的HashApi作为指令加入至指令列表中。If the current outer function has no nested calls, further identify the number and position of the input parameters in the current expression. Specifically, if there is only one parameter in the current expression, directly add the HashApi corresponding to the current outer layer function as an instruction into the instruction list.

若当前表达式中包括两个参数,则表示输入参数中包括一个随机值参数。若随机值在前,则生成前向拼接的表达式,例如可以为insertSalt()。并将该当前表达式加入至指令列表中,然后将相应的函数HashApi作为指令加入至指令列表中。若随机值在后,则首先将HashApi加入至指令列表中,然后生成后向拼接的表达式,例如可以为appendSalt(),并将该当前表达式加入至指令列表中。If the current expression includes two parameters, it means that the input parameters include a random value parameter. If the random value is in the front, generate the expression of forward splicing, for example, it can be insertSalt(). And add the current expression to the instruction list, and then add the corresponding function HashApi as an instruction to the instruction list. If the random value follows, first add HashApi to the instruction list, and then generate a backward spliced expression, for example, appendSalt(), and add the current expression to the instruction list.

若当前表达式中包括三个参数,表示输入参数中包括两个随机值参数,则首先生成前向拼接的表达式,例如可以为insertSalt()。并将该当前表达式加入至指令列表中。然后将相应的函数HashApi作为指令加入至指令列表中。最后再生成后向拼接的表达式,例如可以为appendSalt(),并将该当前表达式加入至指令列表中。If the current expression includes three parameters, it means that the input parameters include two random value parameters, then first generate an expression for forward splicing, for example, insertSalt(). And add the current expression to the instruction list. Then add the corresponding function HashApi as an instruction to the instruction list. Finally, an expression for backward splicing is generated, for example, appendSalt(), and the current expression is added to the command list.

在将每一步解析得到的当前表达式加入至指令列表之前,还需要判断当前输入的表达式是否为合法表达式,若为合法表达式,才将当前表达式加入至指令列表中。直到数据处理策略组合的表达式解析完成后,指令列表中的各指令,即为得到的指令调用序列。Before adding the current expression obtained by parsing at each step to the instruction list, it is necessary to judge whether the currently input expression is a legal expression, and if it is a legal expression, the current expression is added to the instruction list. After the expression analysis of the combination of data processing strategies is completed, each instruction in the instruction list is the obtained instruction calling sequence.

例如,以数据处理策略组合的表达式为“Sha256(Salt2,SM3(pwd,Salt1),Salt3)”为例进行说明。其中,“pwd”表示目标业务下的目标数据,例如具体可以为密码信息;“Salt”表示随机值参数;“SM3()”表示SM3算法;“Sha256()”表示Sha256算法。其中,表达式解析器可以将解析得到的当前表达式解析为相应的伪码。可以理解,伪码是一种算法描述语言,使被描述的算法可以容易地以任何一种编程语言实现。For example, the expression of the combination of data processing strategies is "Sha256(Salt2, SM3(pwd, Salt1), Salt3)" as an example for illustration. Among them, "pwd" indicates the target data under the target service, for example, it may be password information; "Salt" indicates a random value parameter; "SM3()" indicates the SM3 algorithm; "Sha256()" indicates the Sha256 algorithm. Wherein, the expression parser can parse the current expression obtained by parsing into corresponding pseudocode. It can be understood that pseudocode is an algorithm description language, so that the described algorithm can be easily implemented in any programming language.

按照上述表达式解析流程对该表达式进行解析。首先初始化指令列表后,首先解析得到当前外层函数“Sha256()”,然后识别当前外层函数是否有嵌套调用。其中当前外层函数“Sha256()”中具有嵌套调用,则进一步对当前外层函数进行递归调用解析,以进一步解析出所调用的表达式函数,得到当前表达式为“(pwd,Salt1)”部分。由于随机值参数Salt1在后,则生成后向拼接的表达式appendSalt(Salt1),并将这个解析得到的第一个表达式对应的伪码添加至指令列表中,其对应的执行结果则为“pwd+Salt1”。Parse the expression according to the above expression parsing process. After the instruction list is initialized, the current outer layer function "Sha256()" is first parsed, and then it is identified whether the current outer layer function has a nested call. Wherein the current outer layer function "Sha256()" has a nested call, then further analyze the recursive call of the current outer layer function to further analyze the called expression function, and obtain the current expression as "(pwd,Salt1)" part. Since the random value parameter Salt1 is behind, generate the backward concatenated expression appendSalt(Salt1), and add the pseudocode corresponding to the first expression obtained by parsing to the instruction list, and the corresponding execution result is " pwd+Salt1".

然后继续解析得到当前外层函数“SM3()”,并将这个解析得到的第二个表达式对应的伪码添加至指令列表中,其对应的执行结果则为“SM3(pwd+Salt1)”。Then continue to analyze to get the current outer layer function "SM3()", and add the pseudocode corresponding to the second expression obtained by the analysis to the instruction list, and the corresponding execution result is "SM3(pwd+Salt1)" .

计算机设备通过表达式解析器进一步解析当前外层函数,解析出当前表达式为“Salt2,SM3(pwd,Salt1)”部分,由于随机值参数Salt1在前,则生成前向拼接的表达式insertSalt(Salt2),并将这个解析得到的第三个表达式对应的伪码添加至指令列表中,其对应的执行结果则为“Salt2+SM3(pwd+Salt1)”。The computer device further parses the current outer layer function through the expression parser, and parses out that the current expression is the part of "Salt2, SM3(pwd, Salt1)". Since the random value parameter Salt1 is in front, the forward spliced expression insertSalt( Salt2), and add the pseudocode corresponding to the third expression obtained from the analysis to the instruction list, and the corresponding execution result is "Salt2+SM3(pwd+Salt1)".

进一步地,表达式解析器继续解析得到当前外层函数,解析出当前表达式为“Salt2,SM3(pwd,Salt1),Salt3”部分,由于随机值参数Salt1在后,则生成后向拼接的表达式appendSalt(Salt3),并将这个解析得到的第四个表达式对应的伪码添加至指令列表中,其对应的执行结果则为“Salt2+SM3(pwd+Salt1)+Salt3”。Further, the expression parser continues to analyze to obtain the current outer layer function, and parses out that the current expression is the part of "Salt2, SM3(pwd, Salt1), Salt3". Since the random value parameter Salt1 is behind, the backward spliced expression is generated appendSalt(Salt3), and add the pseudocode corresponding to the fourth expression obtained by parsing to the instruction list, and the corresponding execution result is "Salt2+SM3(pwd+Salt1)+Salt3".

然后,表达式解析器继续解析得到当前外层函数,解析出当前表达式为“Sha256()”部分,并将这个解析得到的第四个表达式对应的伪码添加至指令列表中,其对应的执行结果则为“Sha256(Salt2+SM3(pwd+Salt1)+Salt3)”。Then, the expression parser continues to parse to obtain the current outer layer function, parses out the current expression as the "Sha256()" part, and adds the pseudocode corresponding to the fourth expression obtained by parsing to the instruction list, which corresponds to The execution result is "Sha256(Salt2+SM3(pwd+Salt1)+Salt3)".

该数据处理策略组合最终解析得到的指令列表如下表一所示。The list of instructions finally parsed by the combination of data processing strategies is shown in Table 1 below.

序号serial number 伪码pseudocode 执行结果Results of the 11 appendSalt(Salt1)appendSalt(Salt1) pwd+Salt1pwd+Salt1 22 SM3()SM3() SM3(pwd+Salt1)SM3(pwd+Salt1) 33 insertSalt(Salt2)insertSalt(Salt2) Salt2+SM3(pwd+Salt1)Salt2+SM3(pwd+Salt1) 44 appendSalt(Salt3)appendSalt(Salt3) Salt2+SM3(pwd+salt1)+Salt3Salt2+SM3(pwd+salt1)+Salt3 55 Sha256Sha256 Sha256(salt2+SM3(pwd+salt1)+Salt3)Sha256(salt2+SM3(pwd+salt1)+Salt3)

表一Table I

本实施例中,通过基于自定义选择的至少两种数据处理策略,对初始安全控件配置对应于目标业务的数据处理策略组合得到的目标安全控件后。当获取到目标业务下的目标数据时,通过目标安全控件调用与目标业务对应的数据处理策略组合,然后将数据处理策略组合解析为指令调用序列,进而按照指令调用序列对目标数据进行处理,由此能够更加安全地对目标数据进行隐蔽处理,以使得到隐蔽处理后的数据不易被破解和泄露。In this embodiment, the initial security control is configured with the target security control obtained by combining the data processing policies corresponding to the target service through at least two data processing policies based on self-defined selection. When the target data under the target business is obtained, the data processing policy combination corresponding to the target business is invoked through the target security control, and then the data processing policy combination is parsed into an instruction calling sequence, and then the target data is processed according to the instruction calling sequence, by This can more safely covertly process the target data, so that the covertly processed data is not easy to be cracked and leaked.

在一个实施例中,在按照指令调用序列对目标数据进行转换处理,得到转换后的数据之后,上述数据处理方法还包括:当目标数据的属性为加密属性时,通过目标安全控件调用加密策略;按照加密策略对处理后的数据进行加密处理。In one embodiment, after converting the target data according to the instruction calling sequence to obtain the converted data, the data processing method further includes: when the attribute of the target data is an encryption attribute, calling the encryption policy through the target security control; The processed data is encrypted according to the encryption policy.

其中,目标安全控件中包括对应于目标业务自定义配置的加密策略。可以理解,加密策略用于对数据进行加密处理,具体可以对属性为加密属性的数据进行加密处理。Wherein, the target security control includes an encryption policy corresponding to the custom configuration of the target business. It can be understood that the encryption policy is used to encrypt data, and specifically, data whose attribute is an encryption attribute may be encrypted.

其中,目标安全控件中还预先配置有针对目标业务下的加密策略,用于对属性为加密属性的目标数据进行加密。Wherein, the target security control is also pre-configured with an encryption strategy for the target service, which is used to encrypt the target data whose attribute is an encryption attribute.

若计算机设备识别到目标业务下的目标数据的属性为加密属性时,表示该目标数据的重要程度较高,需要进行转换处理以及加密处理。具体地,计算机设备通过目标安全控件调用加密策略,然后通过目标安全控件中的表达式解析器,将安全策略解析为相应的加密指令。然后针对转换处理后的数据,执行相应的加密指令以进行加密处理。If the computer device recognizes that the attribute of the target data under the target business is an encrypted attribute, it means that the target data is of high importance, and needs to be converted and encrypted. Specifically, the computer device calls the encryption policy through the target security control, and then parses the security policy into corresponding encryption instructions through the expression parser in the target security control. Then, for the converted data, a corresponding encryption instruction is executed for encryption processing.

本实施例中,通过对转换后的数据进一步进行加密处理,由此能够更加安全地对目标数据进行转换和加密,以使得到转换后的数据不易被破解和泄露,从而大大提高了目标数据的安全性。In this embodiment, by further encrypting the converted data, the target data can be converted and encrypted more safely, so that the converted data is not easy to be cracked and leaked, thereby greatly improving the security of the target data. safety.

在一个实施例中,基于自定义选择的至少两种数据处理策略,针对初始安全控件配置对应于目标业务的数据处理策略组合,得到与目标业务绑定的目标安全控件的步骤,包括:获取针对目标子应用的自定义选择的至少两种数据处理策略;对初始安全控件配置对应于目标子应用中目标业务的数据处理策略组合,得到与目标业务绑定的目标安全控件。In one embodiment, based on at least two data processing strategies selected by self-definition, the initial security control is configured with a combination of data processing strategies corresponding to the target business, and the step of obtaining the target security control bound to the target business includes: obtaining the target security control for At least two data processing strategies selected by the target sub-application; configure the initial security control with a combination of data processing strategies corresponding to the target business in the target sub-application, and obtain the target security control bound to the target business.

其中,初始安全控件是基于母应用的运行环境下的安全控件,母应用为多个子应用提供运行环境。Wherein, the initial security control is a security control based on the operating environment of the parent application, and the parent application provides the operating environment for multiple sub-applications.

可以理解,母应用是指能够独立运行是指可独立运行的应用,是直接运行于操作系统上的原生应用程序。母应用具体可以是承载子应用的应用程序,且能够提供运行环境给子应用运行的应用。母应用包括但不限于即时通信应用、SNS(Social Network Sites,社交网站)应用、短视频应用、长视频应用、游戏应用、音乐分享应用、UGC(User GeneratedContent,用户生成内容)应用,但不限于此。It can be understood that the parent application refers to an application that can run independently, and is a native application that runs directly on the operating system. Specifically, the parent application may be an application that hosts a sub-application and can provide an operating environment for the sub-application to run. Parent applications include but are not limited to instant messaging applications, SNS (Social Network Sites, social networking site) applications, short video applications, long video applications, game applications, music sharing applications, UGC (User Generated Content, user generated content) applications, but are not limited to this.

子应用可以是附属于母应用的各种业务应用场景,还可以是运行于母应用程序中的子应用程序。各个子应用可以对应不同的业务领域。子应用包括但不限于即时通信应用、SNS应用、短视频应用、长视频应用、游戏应用、音乐分享应用、购物出售应用、UGC应用、各类智能识别应用,但不限于此。Sub-applications can be various business application scenarios attached to the parent application, or sub-applications running in the parent application. Each sub-application can correspond to different business domains. Sub-applications include, but are not limited to, instant messaging applications, SNS applications, short video applications, long video applications, game applications, music sharing applications, shopping and sales applications, UGC applications, and various intelligent identification applications, but are not limited thereto.

各子应用可以配置各自的目标业务下的目标安全控件,然后根据母应用的运行环境,对子应用的运行环境进行配置,使得能够在母应用上运行该子应用。Each sub-application can configure target security controls under its own target business, and then configure the sub-application's running environment according to the running environment of the parent application, so that the sub-application can run on the parent application.

母应用中预先配置有能够提供多种数据处理策略的初始安全控件。若目标业务方需要构建目标子应用在母应用上的运行环境时,可以获取母应用提供的初始安全控件,然后从初始安全控件所提供的可定制的多种数据处理策略中,自定义任意选择所需的数据处理策略或数据处理策略组合,进而配置与目标子应用绑定的目标安全控件。其中,目标安全控件用于对目标子应用中目标业务下的目标数据进行转换处理。The parent application is pre-configured with initial security controls that can provide various data processing strategies. If the target business party needs to build the operating environment of the target sub-application on the parent application, it can obtain the initial security control provided by the parent application, and then customize any choice from the various customizable data processing strategies provided by the initial security control The required data processing policy or combination of data processing policies, and then configure the target security control bound to the target sub-application. Wherein, the target security control is used to convert and process the target data under the target service in the target sub-application.

具体地,计算机设备获取目标业务方针对目标子应用的自定义选择的至少两种数据处理策略后,则将初始安全控件与目标子应用的目标业务进行绑定,并对初始安全控件配置对应于目标业务的数据处理策略组合,从而得到与目标业务绑定的安全性较高的目标安全控件。Specifically, after the computer device acquires at least two data processing strategies customized by the target business party for the target sub-application, it binds the initial security control with the target business of the target sub-application, and configures the initial security control corresponding to Combining the data processing strategies of the target business to obtain a target security control with high security bound to the target business.

本实施例中,通过母应用提供的能够自定义选择多种数据处理策略的初始安全控件,使得在母应用中运行的各子应用能够从初始安全控件提供的多种数据处理策略中,自定义任意选择所需的数据处理策略或数据处理策略组合,由此能够有效地针对各子应用生成多种自由组合的数据处理策略组合,由此能够更加安全地对目标数据进行转换处理,以使得到转换后的数据不易被破解和泄露。In this embodiment, through the initial security control provided by the parent application, which can customize and select various data processing strategies, each sub-application running in the parent application can customize the various data processing strategies provided by the initial security control By arbitrarily selecting the required data processing strategy or data processing strategy combination, a variety of freely combined data processing strategy combinations can be effectively generated for each sub-application, so that the target data can be converted and processed more safely, so that the obtained The converted data is not easily cracked and leaked.

在一个实施例中,如图5所示,提供了另一种目标数据处理方法,具体包括以下步骤:In one embodiment, as shown in FIG. 5 , another target data processing method is provided, which specifically includes the following steps:

步骤S502,获取初始安全控件所提供的多种数据处理策略;初始安全控件是基于母应用的运行环境下的安全控件母,应用为多个子应用提供运行环境。Step S502, acquiring various data processing strategies provided by the initial security control; the initial security control is a parent security control based on the operating environment of the parent application, and the application provides the operating environment for multiple sub-applications.

步骤S504,获取针对目标子应用的自定义选择的至少两种数据处理策略。Step S504, acquiring at least two data processing policies customized for the target sub-application.

步骤S506,对初始安全控件配置对应于目标子应用中目标业务的数据处理策略组合,得到与目标业务绑定的目标安全控件。Step S506, configure the initial security control with a combination of data processing policies corresponding to the target service in the target sub-application, and obtain the target security control bound to the target service.

步骤S508,当在母应用的运行环境中运行的目标子应用,获取到对应于目标子应用的目标业务下目标数据时,通过目标子应用中的目标安全控件调用对应的自定义配置的数据处理策略组合。Step S508, when the target sub-application running in the operating environment of the parent application obtains the target data corresponding to the target business of the target sub-application, call the corresponding custom-configured data processing through the target security control in the target sub-application strategic combination.

步骤S510,将数据处理策略组合解析为指令调用序列。Step S510, analyzing the combination of data processing strategies into an instruction calling sequence.

步骤S512,按照指令调用序列对目标数据进行转换处理,得到转换后的数据。Step S512, converting the target data according to the instruction calling sequence to obtain the converted data.

可以理解,计算机设备获取目标业务方针对目标子应用的自定义选择的至少两种数据处理策略后,则将初始安全控件与目标子应用的目标业务进行绑定,并对初始安全控件配置对应于目标业务的数据处理策略组合,从而得到与目标业务绑定的安全性较高的目标安全控件。It can be understood that, after the computer device obtains at least two data processing strategies custom-selected by the target business party for the target sub-application, it binds the initial security control with the target business of the target sub-application, and configures the initial security control corresponding to Combining the data processing strategies of the target business to obtain a target security control with high security bound to the target business.

当在母应用的运行环境中运行的目标子应用,获取到对应于目标子应用的目标业务下目标数据时,表示需要对目标子应用的目标业务下目标数据进行转换处理。计算机设备则通过目标子应用中的目标安全控件调用对应的自定义配置的数据处理策略组合,然后通过目标安全控件对数据处理策略组合进行解析,得到对应的具有执行顺序的指令调用序列,进而针对目标数据按照执行顺序依次执行指令调用序列,直到指令调用序列执行完成后,即完成对目标数据进行转换处理,得到转换后的数据。When the target sub-application running in the running environment of the parent application obtains the target data corresponding to the target business of the target sub-application, it indicates that the target data of the target business of the target sub-application needs to be converted. The computer device invokes the corresponding custom-configured data processing strategy combination through the target security control in the target sub-application, and then analyzes the data processing strategy combination through the target security control to obtain the corresponding instruction calling sequence with execution order, and then targets the The target data executes the instruction call sequence sequentially according to the execution order, until the instruction call sequence is executed, the conversion processing of the target data is completed, and the converted data is obtained.

计算机设备可以将转换后的数据进一步进行存储和应用,由此能够有效保证在不暴露目标数据的明文的前提下,能够更加安全灵活地定制各子应用的目标业务对应的数据处理策略,从而更加安全地对目标数据进行转换处理,以使得到转换后的数据不易被破解和泄露,有效保证了目标数据的安全性。The computer equipment can further store and apply the converted data, which can effectively ensure that the data processing strategy corresponding to the target business of each sub-application can be customized more safely and flexibly without exposing the plaintext of the target data, thus making it more efficient. The target data is safely converted so that the converted data is not easy to be cracked and leaked, effectively ensuring the security of the target data.

在一个具体的实施例中,如图6所示,为一个实施例中数据转换处理的时序图。参照图6,计算机设备中部署有安全控件,该安全控件是与目标业务对应的目标安全控件,具体可以表示目标业务对应的服务器。目标业务具体可以表示为目标业务方对应的终端。In a specific embodiment, as shown in FIG. 6 , it is a timing diagram of data conversion processing in an embodiment. Referring to FIG. 6 , a security control is deployed in the computer device, and the security control is a target security control corresponding to the target service, and may specifically represent a server corresponding to the target service. The target service may specifically be expressed as a terminal corresponding to the target service party.

具体地,计算机设备通过初始安全控件提供的多种数据处理策略,基于目标业务方从这多种数据处理策略中自定义选择所需的数据处理策略组合后,对初始安全控件配置对应于目标业务的数据处理策略组合,得到与目标业务绑定的目标安全控件之后。当目标业务方输入目标数据时,计算机设备则唤起所绑定的目标安全控件,并加载其中自定义配置的数据处理策略组合并进行解析,解析得到具有执行顺序的指令调用序列。Specifically, the computer device uses various data processing strategies provided by the initial security controls, and after the target business party customizes the required combination of data processing strategies from these various data processing strategies, configure the initial security controls corresponding to the target business After obtaining the target security control bound to the target business. When the target business party inputs the target data, the computer device will evoke the bound target security control, and load the data processing policy combination of the custom configuration in it and analyze it, and analyze it to obtain an instruction call sequence with an execution order.

当目标数据采集完成时,可以反馈目标业务方反馈完成数据采集的通知。目标安全控件则获取所采集的目标数据,将目标数据输入至目标安全控件中,目标安全控件则首先对目标数据,指令调用序列的按照执行顺序执行第一条解析出的指令调用序列中的指令。然后按照执行顺序依次指令解析出的指令,直到执行完成最后一条解析出的指令后,即得到转换后的数据,并向目标业务方返回转换后的数据。例如转换后的数据,具体可以为转换后的HashData哈希值。When the target data collection is completed, the target business party can feed back a notification that the data collection is completed. The target security control obtains the collected target data, and inputs the target data into the target security control, and the target security control first executes the instruction in the first parsed instruction call sequence according to the execution order of the target data and instruction call sequence . Then instruct the parsed instructions in order of execution until the last parsed instruction is executed, then the converted data will be obtained, and the converted data will be returned to the target business party. For example, the converted data may specifically be the converted HashData hash value.

在一个具体的实施例中,如图7所示,提供了一种具体的数据处理方法,具体包括以下步骤:In a specific embodiment, as shown in FIG. 7, a specific data processing method is provided, which specifically includes the following steps:

步骤702,获取初始安全控件所提供的多种数据处理策略。Step 702, acquiring various data processing policies provided by the initial security control.

步骤704,获取基于自定义选择的对应于目标业务的至少两种数据处理策略,确定自定义选择的至少两种数据处理策略所对应的嵌套调用顺序。Step 704: Obtain at least two data processing strategies corresponding to the target service based on the user-defined selection, and determine the nested call sequence corresponding to the at least two data processing strategies selected by the user-defined.

步骤706,按照嵌套调用顺序,将至少两种数据处理策略解析为与目标业务相应的嵌套调用函数。Step 706: According to the sequence of nested calls, at least two data processing strategies are parsed into nested call functions corresponding to the target business.

步骤708,在初始安全控件中配置嵌套调用函数,得到与目标业务绑定的目标安全控件。Step 708, configure the nested call function in the initial security control to obtain the target security control bound to the target service.

步骤710,当获取的目标业务下的数据为目标数据时,通过目标安全控件调用表达式解析器和数据处理策略组合。Step 710, when the acquired data under the target service is the target data, invoke the combination of the expression parser and the data processing strategy through the target security control.

步骤712,通过表达式解析器初始化指令列表;确定数据处理策略组合的外层函数接口。Step 712, initialize the instruction list through the expression parser; determine the outer function interface of the data processing strategy combination.

步骤714,若根据外层函数接口识别出数据处理策略组合包括嵌套调用函数,则对嵌套调用函数进行逐层解析,得到嵌套调用函数中的嵌套的各表达式,将解析的表达式按解析顺序添加至指令列表,得到指令调用序列。Step 714, if it is identified according to the outer function interface that the combination of data processing strategies includes a nested call function, then the nested call function is analyzed layer by layer to obtain each nested expression in the nested call function, and the parsed expression Formulas are added to the instruction list in the order of analysis to obtain the instruction calling sequence.

步骤716,按照执行顺序执行指令调用序列中的调用指令,在执行过程中,将上一个调用指令的执行结果作为下一个调用指令的输入,以对目标数据进行转换处理,得到转换后的数据。Step 716: Execute the calling instructions in the instruction calling sequence according to the execution sequence. During the execution process, use the execution result of the previous calling instruction as the input of the next calling instruction to convert the target data and obtain the converted data.

本实施例中,通过基于自定义选择的至少两种数据处理策略,针对初始安全控件配置对应于目标业务的数据处理策略组合,从而得到与目标业务绑定的目标安全控件。由此业务方能够自定义灵活地生成各种数据处理策略组合,并且经过组合的数据处理策略对于数据转换处理的安全性更高。当获取到目标业务下的目标数据时,通过目标安全控件将数据处理策略组合解析为指令调用序列,进而按照指令调用序列对目标数据进行转换处理,由此能够更加安全地对目标数据进行转换处理,以使得到转换后的数据不易被破解和泄露,从而有效提高了目标数据的安全性。In this embodiment, based on at least two data processing strategies selected by self-definition, a combination of data processing strategies corresponding to the target service is configured for the initial security control, so as to obtain the target security control bound to the target service. In this way, the business side can customize and flexibly generate various combinations of data processing strategies, and the combined data processing strategies are more secure for data conversion processing. When the target data under the target business is obtained, the data processing policy combination is parsed into an instruction call sequence through the target security control, and then the target data is converted and processed according to the instruction call sequence, so that the target data can be converted and processed more safely , so that the converted data is not easy to be cracked and leaked, thereby effectively improving the security of the target data.

本申请还提供一种应用场景,该应用场景应用上述的数据处理方法。具体地,用户终端中运行了目标业务对应的应用程序或访问对应的业务系统网站,例如各通讯业务、银行业务、支付业务等。其中,目标业务对应的应用程序或访问对应的业务系统网站中可以预先配置对应的目标安全控件,目标安全控件是基于目标业务方从初始安全控件提供的多种数据处理策略中,自定义选择的数据处理策略组合配置得到的。The present application also provides an application scenario, where the above-mentioned data processing method is applied. Specifically, the user terminal runs an application program corresponding to the target service or accesses a corresponding service system website, such as various communication services, banking services, payment services, and the like. Among them, the corresponding target security control can be pre-configured in the application program corresponding to the target business or accessing the corresponding business system website. The target security control is based on the target business party's custom selection from the various data processing strategies provided by the initial security control. It is obtained by configuring the combination of data processing strategies.

用户可以通过用户终端在应用程序输入目标业务下的数据。当用户输入的数据为目标业务下的目标数据,如密码、个人信息等,终端则调用对应的目标安全控件,通过目标安全控件加载对应的数据处理策略组合并进行解析,以通过解析得到的指令调用序列对用户输入的目标数据进行实时转换处理,从而得到转换后的数据。由此在用户输入目标数据的过程中,有效保证了目标数据的明文不会被泄露。对于安全级别较高的密码输入、支付金融等场景,能够有效保证密码安全和支付安全,从而有效提高了关键目标数据的安全性。The user can input the data under the target service in the application program through the user terminal. When the data entered by the user is the target data under the target business, such as passwords, personal information, etc., the terminal calls the corresponding target security control, loads the corresponding data processing strategy combination through the target security control and analyzes it, so that the instructions obtained through the analysis The call sequence performs real-time conversion processing on the target data input by the user, so as to obtain the converted data. Therefore, in the process of the user inputting the target data, it is effectively guaranteed that the plaintext of the target data will not be leaked. For scenarios such as password input and payment finance with a higher security level, it can effectively guarantee password security and payment security, thereby effectively improving the security of key target data.

应该理解的是,虽然图2、图5、图7的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,这些步骤可以以其它的顺序执行。而且,图2、图5、图7中的至少一部分步骤可以包括多个步骤或者多个阶段,这些步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,这些步骤或者阶段的执行顺序也不必然是依次进行,而是可以与其它步骤或者其它步骤中的步骤或者阶段的至少一部分轮流或者交替地执行。It should be understood that although the steps in the flow charts of FIG. 2 , FIG. 5 , and FIG. 7 are shown sequentially as indicated by the arrows, these steps are not necessarily executed sequentially in the order indicated by the arrows. Unless otherwise specified herein, there is no strict order restriction on the execution of these steps, and these steps can be executed in other orders. Moreover, at least some of the steps in FIG. 2, FIG. 5, and FIG. 7 may include multiple steps or multiple stages, and these steps or stages are not necessarily executed at the same time, but may be executed at different times. These steps Or the execution sequence of the stages is not necessarily performed sequentially, but may be executed in turn or alternately with other steps or at least a part of steps or stages in other steps.

在一个实施例中,如图8所示,提供了一种数据处理装置800,该装置可以采用软件模块或硬件模块,或者是二者的结合成为计算机设备的一部分,该装置具体包括:策略获取模块802、安全控件配置模块804、安全控件调用模块806和数据转换处理模块808,其中:In one embodiment, as shown in FIG. 8 , a data processing device 800 is provided. The device may use software modules or hardware modules, or a combination of the two to become a part of computer equipment. The device specifically includes: policy acquisition Module 802, security control configuration module 804, security control calling module 806 and data conversion processing module 808, wherein:

策略获取模块802,用于获取初始安全控件所提供的多种数据处理策略。The policy acquisition module 802 is configured to acquire various data processing policies provided by the initial security control.

安全控件配置模块804,用于基于自定义选择的至少两种数据处理策略,针对初始安全控件配置对应于目标业务的数据处理策略组合,得到与目标业务绑定的目标安全控件。The security control configuration module 804 is configured to configure a combination of data processing policies corresponding to the target service for the initial security control based on at least two data processing policies selected by self-definition, and obtain a target security control bound to the target service.

安全控件调用模块806,用于当基于目标安全控件获取到目标业务下的目标数据时,通过目标安全控件调用数据处理策略组合。The security control calling module 806 is configured to call the data processing strategy combination through the target security control when the target data under the target service is acquired based on the target security control.

数据转换处理模块808,用于将数据处理策略组合解析为指令调用序列;按照指令调用序列对目标数据进行转换处理,得到转换后的数据。The data conversion processing module 808 is configured to analyze the combination of data processing strategies into an instruction call sequence; perform conversion processing on the target data according to the instruction call sequence to obtain converted data.

在一个实施例中,安全控件配置模块804,还用于获取基于自定义选择的对应于目标业务的至少两种数据处理策略;根据至少两种数据处理策略,生成与目标业务相应的嵌套调用函数;在初始安全控件中配置嵌套调用函数,得到与目标业务绑定的目标安全控件。In one embodiment, the security control configuration module 804 is also used to obtain at least two data processing strategies corresponding to the target business based on self-defined selection; according to the at least two data processing strategies, generate nested calls corresponding to the target business Function; configure the nested call function in the initial security control to obtain the target security control bound to the target business.

在一个实施例中,安全控件配置模块804,还用于确定自定义选择的至少两种数据处理策略所对应的嵌套调用顺序;按照嵌套调用顺序,将至少两种数据处理策略解析为与目标业务相应的嵌套调用函数。In one embodiment, the security control configuration module 804 is further configured to determine the nested invocation sequence corresponding to at least two data processing strategies selected by self-definition; according to the nested invocation sequence, at least two data processing strategies are parsed into The corresponding nested calling function of the target business.

在一个实施例中,安全控件配置模块804,还用于对初始安全控件配置数据处理策略;基于配置的数据处理策略,在初始安全控件中配置对应的组合策略,生成提供多种数据处理策略的初始安全控件。In one embodiment, the security control configuration module 804 is also used to configure the data processing policy for the initial security control; based on the configured data processing policy, configure the corresponding combined policy in the initial security control, and generate a policy that provides multiple data processing policies. Initial security controls.

在一个实施例中,安全控件调用模块804,还用于当获取的目标业务下的数据为目标数据时,通过目标安全控件调用表达式解析器和数据处理策略组合;通过表达式解析器,确定数据处理策略组合中表达式的顺序,按照顺序将数据处理策略组合解析为指令调用序列。In one embodiment, the security control calling module 804 is also used to call the expression parser and data processing strategy combination through the target security control when the acquired data under the target business is target data; through the expression parser, determine The order of the expressions in the data processing strategy combination is used to parse the data processing strategy combination into a sequence of instruction calls.

在一个实施例中,安全控件调用模块806,还用于通过表达式解析器初始化指令列表;确定数据处理策略组合的外层函数接口;若根据外层函数接口识别出数据处理策略组合包括嵌套调用函数,则对嵌套调用函数进行逐层解析,得到嵌套调用函数中的嵌套的各表达式,将解析的表达式按解析顺序添加至指令列表,得到指令调用序列。In one embodiment, the security control calling module 806 is also used to initialize the instruction list through the expression parser; determine the outer layer function interface of the data processing strategy combination; if it is identified according to the outer layer function interface that the data processing strategy combination includes nested To call a function, the nested call function is analyzed layer by layer to obtain nested expressions in the nested call function, and the parsed expressions are added to the instruction list in order of analysis to obtain an instruction call sequence.

在一个实施例中,安全控件调用模块806,还用于对嵌套调用函数进行逐层解析,确定解析得到的当前表达式中输入参数的位置和数量;若解析得到的当前表达式中包括一个输入参数,则将当前表达式加入至指令列表;若解析得到的当前表达式中包括至少两个输入参数,则根据输入参数的位置和数量,生成参数拼接表达式并加入至指令列表。In one embodiment, the security control calling module 806 is also used to analyze the nested calling function layer by layer to determine the position and quantity of input parameters in the current expression obtained by parsing; if the current expression obtained by parsing includes a For input parameters, add the current expression to the instruction list; if the parsed current expression includes at least two input parameters, generate a parameter concatenation expression according to the position and quantity of the input parameters and add it to the instruction list.

在一个实施例中,安全控件调用模块806,还用于分别对解析得到的表达式进行合法性校验;若合法性校验通过后,将解析得到的表达式按解析顺序添加至指令列表,得到指令调用序列。In one embodiment, the security control calling module 806 is also used to check the validity of the parsed expressions respectively; if the legality check is passed, the parsed expressions are added to the instruction list in the order of parsing, Get the command call sequence.

在一个实施例中,指令调用序列中包括具有执行顺序的至少两个调用指令;数据转换处理模块808,还用于按照执行顺序执行指令调用序列中的调用指令,在执行过程中,将上一个调用指令的执行结果作为下一个调用指令的输入,以对目标数据进行转换处理,得到转换后的数据。In one embodiment, the instruction call sequence includes at least two call instructions with an execution order; the data conversion processing module 808 is also used to execute the call instructions in the instruction call sequence according to the execution order, and during the execution process, the previous The execution result of the call instruction is used as the input of the next call instruction to perform conversion processing on the target data to obtain the converted data.

在一个实施例中,目标安全控件中包括对应于目标业务自定义配置的加密策略;数据处理装置还包括加密模块,用于若目标数据的属性为加密属性,通过目标安全控件调用加密策略;按照加密策略对转换后的数据进行加密处理。According to The encryption policy encrypts the converted data.

在一个实施例中,初始安全控件是基于母应用的运行环境下的安全控件,母应用为多个子应用提供运行环境;安全控件配置模块804,还用于获取针对目标子应用的自定义选择的至少两种数据处理策略;对初始安全控件配置对应于目标子应用中目标业务的数据处理策略组合,得到与目标业务绑定的目标安全控件;目标安全控件用于对目标子应用中目标业务下的目标数据进行转换处理。In one embodiment, the initial security control is a security control based on the operating environment of the parent application, and the parent application provides the operating environment for multiple sub-applications; the security control configuration module 804 is also used to obtain the customized selection for the target sub-application At least two data processing strategies; configure the initial security control with a combination of data processing strategies corresponding to the target business in the target sub-application, and obtain the target security control bound to the target business; the target security control is used to control the target business in the target sub-application The target data is converted.

在一个实施例中,数据转换处理模块808,还用于当在母应用的运行环境中运行的目标子应用,获取到对应于目标子应用的目标业务下目标数据时,则通过目标子应用中的目标安全控件调用对应的自定义配置的数据处理策略组合,以根据数据处理策略组合对目标数据进行转换处理。In one embodiment, the data conversion processing module 808 is further configured to, when the target sub-application running in the operating environment of the parent application obtains the target data corresponding to the target business of the target sub-application, The target security control calls the corresponding custom-configured data processing strategy combination, so as to convert and process the target data according to the data processing strategy combination.

关于数据处理装置的具体限定可以参见上文中对于数据处理方法的限定,在此不再赘述。上述数据处理装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。For specific limitations on the data processing device, refer to the above-mentioned limitations on the data processing method, which will not be repeated here. Each module in the above-mentioned data processing device can be fully or partially realized by software, hardware and a combination thereof. The above-mentioned modules can be embedded in or independent of the processor in the computer device in the form of hardware, and can also be stored in the memory of the computer device in the form of software, so that the processor can invoke and execute the corresponding operations of the above-mentioned modules.

在一个实施例中,提供了一种计算机设备,该计算机设备可以是服务器,其内部结构图可以如图9所示。该计算机设备包括通过系统总线连接的处理器、存储器和网络接口。其中,该计算机设备的处理器用于提供计算和控制能力。该计算机设备的存储器包括非易失性存储介质、内存储器。该非易失性存储介质存储有操作系统和计算机程序。该内存储器为非易失性存储介质中的操作系统和计算机程序的运行提供环境。该计算机设备的网络接口用于与外部的终端通过网络连接通信。该计算机程序被处理器执行时以实现一种数据处理方法。In one embodiment, a computer device is provided. The computer device may be a server, and its internal structure may be as shown in FIG. 9 . The computer device includes a processor, memory and a network interface connected by a system bus. Wherein, the processor of the computer device is used to provide calculation and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and computer programs. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used to communicate with an external terminal via a network connection. When the computer program is executed by the processor, a data processing method is realized.

另在一个实施例中,提供了一种计算机设备,该计算机设备可以是终端,其内部结构图可以如图10所示。该计算机设备包括通过系统总线连接的处理器、存储器、通信接口、显示屏和输入装置。其中,该计算机设备的处理器用于提供计算和控制能力。该计算机设备的存储器包括非易失性存储介质、内存储器。该非易失性存储介质存储有操作系统和计算机程序。该内存储器为非易失性存储介质中的操作系统和计算机程序的运行提供环境。该计算机设备的通信接口用于与外部的终端进行有线或无线方式的通信,无线方式可通过WIFI、运营商网络、NFC(近场通信)或其他技术实现。该计算机程序被处理器执行时以实现一种数据处理方法。该计算机设备的显示屏可以是液晶显示屏或者电子墨水显示屏,该计算机设备的输入装置可以是显示屏上覆盖的触摸层,也可以是计算机设备外壳上设置的按键、轨迹球或触控板,还可以是外接的键盘、触控板或鼠标等。In another embodiment, a computer device is provided. The computer device may be a terminal, and its internal structure may be as shown in FIG. 10 . The computer device includes a processor, a memory, a communication interface, a display screen and an input device connected through a system bus. Wherein, the processor of the computer device is used to provide calculation and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and computer programs. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage medium. The communication interface of the computer device is used to communicate with an external terminal in a wired or wireless manner, and the wireless manner can be realized through WIFI, an operator network, NFC (Near Field Communication) or other technologies. When the computer program is executed by the processor, a data processing method is realized. The display screen of the computer device may be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer device may be a touch layer covered on the display screen, or a button, a trackball or a touch pad provided on the casing of the computer device , and can also be an external keyboard, touchpad or mouse.

本领域技术人员可以理解,图9和图10中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的计算机设备的限定,具体的计算机设备可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。Those skilled in the art can understand that the structures shown in Figure 9 and Figure 10 are only block diagrams of partial structures related to the solution of this application, and do not constitute a limitation on the computer equipment on which the solution of this application is applied, specifically The computer device may include more or fewer components than shown in the figures, or combine certain components, or have a different arrangement of components.

在一个实施例中,还提供了一种计算机设备,包括存储器和处理器,存储器中存储有计算机程序,该处理器执行计算机程序时实现上述各方法实施例中的步骤。In one embodiment, there is also provided a computer device, including a memory and a processor, where a computer program is stored in the memory, and the processor implements the steps in the above method embodiments when executing the computer program.

在一个实施例中,提供了一种计算机可读存储介质,存储有计算机程序,该计算机程序被处理器执行时实现上述各方法实施例中的步骤。In one embodiment, a computer-readable storage medium is provided, storing a computer program, and implementing the steps in the foregoing method embodiments when the computer program is executed by a processor.

在一个实施例中,提供了一种计算机程序产品或计算机程序,该计算机程序产品或计算机程序包括计算机指令,该计算机指令存储在计算机可读存储介质中。计算机设备的处理器从计算机可读存储介质读取该计算机指令,处理器执行该计算机指令,使得该计算机设备执行上述各方法实施例中的步骤。In one embodiment there is provided a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instruction from the computer-readable storage medium, and the processor executes the computer instruction, so that the computer device executes the steps in the foregoing method embodiments.

本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的计算机程序可存储于一非易失性计算机可读取存储介质中,该计算机程序在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的各实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和易失性存储器中的至少一种。非易失性存储器可包括只读存储器(Read-Only Memory,ROM)、磁带、软盘、闪存或光存储器等。易失性存储器可包括随机存取存储器(Random Access Memory,RAM)或外部高速缓冲存储器。作为说明而非局限,RAM可以是多种形式,比如静态随机存取存储器(Static Random Access Memory,SRAM)或动态随机存取存储器(Dynamic Random Access Memory,DRAM)等。Those of ordinary skill in the art can understand that all or part of the processes in the methods of the above embodiments can be implemented through computer programs to instruct related hardware, and the computer programs can be stored in a non-volatile computer-readable memory In the medium, when the computer program is executed, it may include the processes of the embodiments of the above-mentioned methods. Wherein, any references to memory, storage, database or other media used in the various embodiments provided in the present application may include at least one of non-volatile memory and volatile memory. The non-volatile memory may include read-only memory (Read-Only Memory, ROM), magnetic tape, floppy disk, flash memory or optical memory, and the like. Volatile memory may include random access memory (Random Access Memory, RAM) or external cache memory. By way of illustration and not limitation, RAM can be in various forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM).

以上实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。The technical features of the above embodiments can be combined arbitrarily. To make the description concise, all possible combinations of the technical features in the above embodiments are not described. However, as long as there is no contradiction in the combination of these technical features, they should be It is considered to be within the range described in this specification.

以上所述实施例仅表达了本申请的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对发明专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请专利的保护范围应以所附权利要求为准。The above-mentioned embodiments only represent several implementation modes of the present application, and the description thereof is relatively specific and detailed, but it should not be construed as limiting the scope of the patent for the invention. It should be noted that those skilled in the art can make several modifications and improvements without departing from the concept of the present application, and these all belong to the protection scope of the present application. Therefore, the scope of protection of the patent application should be based on the appended claims.

Claims (15)

1.一种数据处理方法,其特征在于,所述方法包括:1. A data processing method, characterized in that the method comprises: 获取初始安全控件所提供的多种数据处理策略;Obtain a variety of data processing strategies provided by the initial security controls; 基于自定义选择的至少两种所述数据处理策略,针对所述初始安全控件配置对应于目标业务的数据处理策略组合,得到与所述目标业务绑定的目标安全控件;Based on the at least two data processing strategies selected by self-definition, configure a combination of data processing strategies corresponding to the target business for the initial security control, and obtain a target security control bound to the target business; 当基于所述目标安全控件获取到所述目标业务下的目标数据时,通过所述目标安全控件调用所述数据处理策略组合;When the target data under the target service is obtained based on the target security control, the data processing strategy combination is invoked through the target security control; 将所述数据处理策略组合解析为指令调用序列;parsing the combination of data processing strategies into an instruction call sequence; 按照所述指令调用序列对所述目标数据进行转换处理,得到转换后的数据。Perform conversion processing on the target data according to the instruction calling sequence to obtain converted data. 2.根据权利要求1所述的方法,其特征在于,所述基于自定义选择的至少两种所述数据处理策略,针对所述初始安全控件配置对应于目标业务的数据处理策略组合,得到与所述目标业务绑定的目标安全控件,包括:2. The method according to claim 1, characterized in that, based on at least two kinds of the data processing strategies selected by self-definition, the data processing strategy combination corresponding to the target business is configured for the initial security control, and the result is the same as The target security control bound by the target business includes: 获取基于自定义选择的对应于目标业务的至少两种所述数据处理策略;Obtaining at least two data processing strategies corresponding to the target business based on self-defined selection; 根据至少两种所述数据处理策略,生成与所述目标业务相应的嵌套调用函数;Generate a nested call function corresponding to the target service according to at least two of the data processing strategies; 在所述初始安全控件中配置所述嵌套调用函数,得到与所述目标业务绑定的目标安全控件。The nested call function is configured in the initial security control to obtain a target security control bound to the target service. 3.根据权利要求2所述的方法,其特征在于,所述根据至少两种所述数据处理策略,生成与所述目标业务相应的嵌套调用函数,包括:3. The method according to claim 2, wherein said generating a nested call function corresponding to said target business according to at least two of said data processing strategies comprises: 确定自定义选择的至少两种所述数据处理策略所对应的嵌套调用顺序;Determining the nested call sequence corresponding to at least two of the data processing strategies selected by the user; 按照所述嵌套调用顺序,将所述至少两种所述数据处理策略解析为与所述目标业务相应的嵌套调用函数。According to the nested calling sequence, the at least two data processing strategies are parsed into nested calling functions corresponding to the target service. 4.根据权利要求1所述的方法,其特征在于,在所述获取初始安全控件所提供的多种数据处理策略之前,所述方法还包括初始安全控件的配置步骤,所述初始安全控件的配置步骤包括:4. The method according to claim 1, characterized in that, before the acquisition of multiple data processing strategies provided by the initial security control, the method further comprises a configuration step of the initial security control, the initial security control The configuration steps include: 对初始安全控件配置数据处理策略;Configure data processing policies for initial security controls; 基于配置的数据处理策略,在所述初始安全控件中配置对应的组合策略,生成提供多种数据处理策略的初始安全控件。Based on the configured data processing strategy, a corresponding combined strategy is configured in the initial security control to generate an initial security control that provides multiple data processing strategies. 5.根据权利要求1所述的方法,其特征在于,所述当基于所述目标安全控件获取到所述目标业务下的目标数据时,通过所述目标安全控件调用所述数据处理策略组合,包括:5. The method according to claim 1, wherein when the target data under the target service is obtained based on the target security control, the data processing policy combination is invoked through the target security control, include: 当获取的所述目标业务下的数据为目标数据时,通过所述目标安全控件调用表达式解析器和所述数据处理策略组合;When the acquired data under the target service is target data, invoke the combination of an expression parser and the data processing strategy through the target security control; 所述将所述数据处理策略组合解析为指令调用序列,包括:The parsing the combination of data processing strategies into an instruction call sequence includes: 通过所述表达式解析器,确定所述数据处理策略组合中表达式的顺序,按照所述顺序将所述数据处理策略组合解析为指令调用序列。The sequence of expressions in the data processing strategy combination is determined by the expression parser, and the data processing strategy combination is parsed into an instruction calling sequence according to the sequence. 6.根据权利要求5所述的方法,其特征在于,所述通过所述表达式解析器,确定所述数据处理策略组合中表达式的顺序,按照所述顺序将所述数据处理策略组合解析为指令调用序列,包括:6. The method according to claim 5, wherein the order of the expressions in the data processing strategy combination is determined through the expression parser, and the data processing strategy combination is analyzed according to the order Call sequences for instructions, including: 通过所述表达式解析器初始化指令列表;initializing a list of instructions by said expression parser; 确定所述数据处理策略组合的外层函数接口;Determine the outer layer function interface of the data processing strategy combination; 若根据所述外层函数接口识别出所述数据处理策略组合包括嵌套调用函数,则对所述嵌套调用函数进行逐层解析,得到嵌套调用函数中的嵌套的各表达式,将解析的所述表达式按解析顺序添加至所述指令列表,得到指令调用序列。If it is recognized that the data processing strategy combination includes a nested call function according to the outer layer function interface, then the nested call function is analyzed layer by layer to obtain each nested expression in the nested call function, and the The parsed expressions are added to the instruction list in a parsing order to obtain an instruction calling sequence. 7.根据权利要求6所述的方法,其特征在于,所述对所述嵌套调用函数进行逐层解析,得到嵌套调用函数中的嵌套的各表达式包括:7. The method according to claim 6, wherein said nested call function is analyzed layer by layer to obtain nested expressions in the nested call function comprising: 对所述嵌套调用函数进行逐层解析,确定解析得到的当前表达式中输入参数的位置和数量;Analyzing the nested calling function layer by layer to determine the position and quantity of input parameters in the current expression obtained by parsing; 若解析得到的当前表达式中包括一个输入参数,则将所述当前表达式加入至所述指令列表;If the current expression obtained by parsing includes an input parameter, adding the current expression to the instruction list; 若解析得到的当前表达式中包括至少两个输入参数,则根据所述输入参数的位置和数量,生成参数拼接表达式并加入至所述指令列表。If the parsed current expression includes at least two input parameters, then according to the position and quantity of the input parameters, a parameter concatenation expression is generated and added to the instruction list. 8.根据权利要求6所述的方法,其特征在于,所述将解析的所述表达式按解析顺序添加至所述指令列表,得到指令调用序列,包括:8. The method according to claim 6, wherein the said expressions to be parsed are added to the command list in a parsing order to obtain a command call sequence, comprising: 分别对解析得到的表达式进行合法性校验;Check the validity of the parsed expressions respectively; 若所述合法性校验通过后,将解析得到的所述表达式按解析顺序添加至所述指令列表,得到指令调用序列。If the validity check is passed, the expressions obtained by parsing are added to the instruction list in order of parsing to obtain an instruction calling sequence. 9.根据权利要求1所述的方法,其特征在于,所述指令调用序列中包括具有执行顺序的至少两个调用指令;所述按照所述指令调用序列对所述目标数据进行转换处理,得到转换后的数据,包括:9. The method according to claim 1, wherein the instruction calling sequence includes at least two calling instructions having an execution order; the target data is converted according to the instruction calling sequence to obtain Transformed data, including: 按照所述执行顺序执行所述指令调用序列中的调用指令,在执行过程中,将上一个调用指令的执行结果作为下一个调用指令的输入,以对所述目标数据进行转换处理,得到转换后的数据。Execute the call instruction in the instruction call sequence according to the execution order, and during the execution process, use the execution result of the previous call instruction as the input of the next call instruction to convert the target data, and obtain the converted The data. 10.根据权利要求1所述的方法,其特征在于,所述目标安全控件中包括对应于所述目标业务自定义配置的加密策略;10. The method according to claim 1, wherein the target security control includes an encryption policy corresponding to the custom configuration of the target business; 在所述按照所述指令调用序列对所述目标数据进行转换处理,得到转换后的数据之后,所述方法还包括:After converting the target data according to the instruction calling sequence to obtain the converted data, the method further includes: 若所述目标数据的属性为加密属性,通过所述目标安全控件调用加密策略;If the attribute of the target data is an encryption attribute, invoke an encryption strategy through the target security control; 按照所述加密策略对所述转换后的数据进行加密处理。Encrypt the converted data according to the encryption policy. 11.根据权利要求1至10任意一项所述的方法,其特征在于,所述初始安全控件是基于母应用的运行环境下的安全控件,所述母应用为多个子应用提供运行环境;11. The method according to any one of claims 1 to 10, wherein the initial security control is a security control based on the operating environment of a parent application, and the parent application provides an operating environment for multiple sub-applications; 所述基于自定义选择的至少两种所述数据处理策略,针对所述初始安全控件配置对应于目标业务的数据处理策略组合,得到与所述目标业务绑定的目标安全控件,包括:The at least two data processing strategies based on self-defined selection, configuring a combination of data processing strategies corresponding to the target business for the initial security control, and obtaining the target security control bound to the target business, include: 获取针对目标子应用的自定义选择的至少两种所述数据处理策略;obtaining at least two of said data processing strategies for a custom selection of a target sub-application; 对所述初始安全控件配置对应于所述目标子应用中目标业务的数据处理策略组合,得到与所述目标业务绑定的目标安全控件;所述目标安全控件用于对所述目标子应用中目标业务下的目标数据进行转换处理。Configure the initial security control corresponding to the data processing policy combination of the target business in the target sub-application, and obtain the target security control bound to the target business; the target security control is used for the target sub-application The target data under the target business is converted. 12.根据权利要求11所述的方法,其特征在于,所述当基于所述目标安全控件获取到所述目标业务下的目标数据时,通过所述目标安全控件调用所述数据处理策略组合,包括:12. The method according to claim 11, wherein when the target data under the target service is obtained based on the target security control, the data processing strategy combination is invoked through the target security control, include: 当在所述母应用的运行环境中运行的目标子应用,获取到对应于所述目标子应用的目标业务下目标数据时,则When the target sub-application running in the running environment of the parent application acquires the target data corresponding to the target service of the target sub-application, then 通过所述目标子应用中的目标安全控件调用对应的自定义配置的数据处理策略组合,以根据所述数据处理策略组合对所述目标数据进行转换处理。The target security control in the target sub-application invokes a corresponding custom configured data processing policy combination, so as to perform conversion processing on the target data according to the data processing policy combination. 13.一种数据处理装置,其特征在于,所述装置包括:13. A data processing device, characterized in that the device comprises: 策略获取模块,用于获取初始安全控件所提供的多种数据处理策略;A strategy acquisition module, configured to acquire various data processing strategies provided by the initial security control; 安全控件生成模块,用于基于自定义选择的至少两种所述数据处理策略,针对所述初始安全控件配置对应于目标业务的数据处理策略组合,得到与所述目标业务绑定的目标安全控件;A security control generation module, configured to configure a combination of data processing policies corresponding to the target service for the initial security control based on at least two of the data processing strategies selected by self-definition, and obtain a target security control bound to the target service ; 安全控件调用模块,用于当基于所述目标安全控件获取到所述目标业务下的目标数据时,通过所述目标安全控件调用所述数据处理策略组合;A security control calling module, configured to call the data processing strategy combination through the target security control when the target data under the target service is obtained based on the target security control; 数据转换处理模块,用于将所述数据处理策略组合解析为指令调用序列;按照所述指令调用序列对所述目标数据进行转换处理,得到转换后的数据。The data conversion processing module is configured to analyze the combination of data processing strategies into an instruction calling sequence; perform conversion processing on the target data according to the instruction calling sequence to obtain converted data. 14.一种计算机设备,包括存储器和处理器,所述存储器存储有计算机程序,其特征在于,所述处理器执行所述计算机程序时实现权利要求1至12中任一项所述的方法的步骤。14. A computer device, comprising a memory and a processor, the memory stores a computer program, wherein the processor implements the method according to any one of claims 1 to 12 when executing the computer program step. 15.一种计算机可读存储介质,存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现权利要求1至12中任一项所述的方法的步骤。15. A computer-readable storage medium storing a computer program, characterized in that, when the computer program is executed by a processor, the steps of the method according to any one of claims 1 to 12 are implemented.
CN202110984547.XA 2021-08-25 2021-08-25 Data processing method, data processing device, computer equipment and storage medium Pending CN115730319A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110984547.XA CN115730319A (en) 2021-08-25 2021-08-25 Data processing method, data processing device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110984547.XA CN115730319A (en) 2021-08-25 2021-08-25 Data processing method, data processing device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115730319A true CN115730319A (en) 2023-03-03

Family

ID=85289831

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110984547.XA Pending CN115730319A (en) 2021-08-25 2021-08-25 Data processing method, data processing device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115730319A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117252676A (en) * 2023-11-20 2023-12-19 成都新希望金融信息有限公司 Service processing method, device, electronic equipment and index policy system
CN117527399A (en) * 2023-11-28 2024-02-06 广州视声智能股份有限公司 Information security encryption method and system for intelligent home

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160259946A1 (en) * 2015-03-05 2016-09-08 Tata Consultancy Services Limited Implementation and management of information security for distributed data storage systems
CN110059110A (en) * 2019-04-12 2019-07-26 北京百度网讯科技有限公司 Business datum security processing, device, computer equipment and storage medium
CN110113318A (en) * 2019-04-16 2019-08-09 深圳壹账通智能科技有限公司 Front-end system data processing method, device, computer equipment and storage medium
CN111193740A (en) * 2019-12-31 2020-05-22 苏宁金融科技(南京)有限公司 Encryption method, device, decryption method, computer device and storage medium
CN111431707A (en) * 2020-03-19 2020-07-17 腾讯科技(深圳)有限公司 Service data information processing method, device, equipment and readable storage medium
CN111787094A (en) * 2020-06-29 2020-10-16 腾讯科技(深圳)有限公司 Data processing method, device, storage medium and equipment
CN112287376A (en) * 2020-11-20 2021-01-29 支付宝(杭州)信息技术有限公司 Method and device for processing private data

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160259946A1 (en) * 2015-03-05 2016-09-08 Tata Consultancy Services Limited Implementation and management of information security for distributed data storage systems
CN110059110A (en) * 2019-04-12 2019-07-26 北京百度网讯科技有限公司 Business datum security processing, device, computer equipment and storage medium
CN110113318A (en) * 2019-04-16 2019-08-09 深圳壹账通智能科技有限公司 Front-end system data processing method, device, computer equipment and storage medium
CN111193740A (en) * 2019-12-31 2020-05-22 苏宁金融科技(南京)有限公司 Encryption method, device, decryption method, computer device and storage medium
CN111431707A (en) * 2020-03-19 2020-07-17 腾讯科技(深圳)有限公司 Service data information processing method, device, equipment and readable storage medium
CN111787094A (en) * 2020-06-29 2020-10-16 腾讯科技(深圳)有限公司 Data processing method, device, storage medium and equipment
CN112287376A (en) * 2020-11-20 2021-01-29 支付宝(杭州)信息技术有限公司 Method and device for processing private data

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117252676A (en) * 2023-11-20 2023-12-19 成都新希望金融信息有限公司 Service processing method, device, electronic equipment and index policy system
CN117252676B (en) * 2023-11-20 2024-02-02 成都新希望金融信息有限公司 Service processing method, device, electronic equipment and index policy system
CN117527399A (en) * 2023-11-28 2024-02-06 广州视声智能股份有限公司 Information security encryption method and system for intelligent home
CN117527399B (en) * 2023-11-28 2024-05-17 广州视声智能股份有限公司 Information security encryption method and system for intelligent home

Similar Documents

Publication Publication Date Title
US20250071098A1 (en) Data Computation in a Multi-Domain Cloud Environment
CN111488598B (en) Access control method, device, computer equipment and storage medium
US9015845B2 (en) Transit control for data
CN110569658A (en) User information processing method, device, electronic equipment and storage medium based on block chain network
Carter et al. Blockchain-based interoperable electronic health record sharing framework
US11082219B2 (en) Detection and protection of data in API calls
US12206782B2 (en) Multi-directional zero-knowledge attestation systems and methods
JP2017112592A (en) System and method for encrypted transmission of web page
WO2022116761A1 (en) Self auditing blockchain
US20250150440A1 (en) Automatically encrypting sensitive data in a distributed microservice framework
Akram et al. Digital trust-trusted computing and beyond: A position paper
Heiss et al. Trustworthy pre-processing of sensor data in data on-chaining workflows for blockchain-based IoT applications
CN115730319A (en) Data processing method, data processing device, computer equipment and storage medium
Xu et al. A symbolic model for systematically analyzing TEE-based protocols
US20150310206A1 (en) Password management
CN110502888B (en) A mobile office method based on trusted metrics-based mobile software whitelist mechanism
Chen et al. BSPPF: Blockchain‐Based Security and Privacy Preventing Framework for Data Middle Platform in the Era of IR 4.0
CN110851851A (en) Authority management method, device and equipment in block chain type account book
US20100030805A1 (en) Propagating information from a trust chain processing
CN117708842B (en) Data processing method and data processing engine based on trusted execution environment
Khan et al. B-ERAC: Blockchain-Enabled Role-Based Access Control for Secure IoT Device Communication
CN115099767A (en) Method, equipment and storage medium for carrying out project approval based on block chain
Hasimi Cost-effective solutions in cloud computing security
HK40084180A (en) Data processing method, device, computer equipment and storage medium
Latha et al. Secure cloud web application in an industrial environment: a study

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40084180

Country of ref document: HK