CN104598782A - Data packaging and analysis method and device - Google Patents

Data packaging and analysis method and device Download PDF

Info

Publication number
CN104598782A
CN104598782A CN201410736571.1A CN201410736571A CN104598782A CN 104598782 A CN104598782 A CN 104598782A CN 201410736571 A CN201410736571 A CN 201410736571A CN 104598782 A CN104598782 A CN 104598782A
Authority
CN
China
Prior art keywords
data
terminal
unique identity
algorithm
communication connection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410736571.1A
Other languages
Chinese (zh)
Inventor
王芷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201410736571.1A priority Critical patent/CN104598782A/en
Publication of CN104598782A publication Critical patent/CN104598782A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a data packaging and analysis method and device. The data packaging method comprises the following steps: constructing a communication connection with a second terminal; obtaining the only identity label of the second terminal through the communication connection; packaging the only identity label of the second terminal into first data based on the preset packaging algorithm and obtaining second data; sending the second data to the second terminal through the communication connection. The data packaging and analysis method and the device solve the problems that the process of finding a secret revelator is complex and the effect is not good in the prior art.

Description

A kind of data encapsulation and analytic method and device
Technical field
The present invention relates to field of computer technology, particularly relate to a kind of data encapsulation and analytic method and device.
Background technology
At present, Mobile Market has changed the general layout of IT industry sharp, the mobile devices such as smart mobile phone, panel computer and lightweight notebook computer play more and more important role in our live and work, and they have become the important tool of carrying out data sharing in live and work.
Such as, people carry out sharing of business meetings data with mobile phone usually, and business meetings often relates to some trade secrets, trade secret is happened occasionally by the thing that participant's malice is divulged a secret, at present, the approach one tracing blabber is that blabber oneself admits, another is exactly that other people expose, the situation of admitting voluntarily for blabber is generally few, for the situation that other people expose, both easily occurred framing a case against, and easily allowed again thing open and cause litigant ugly, also not having a set of reasonable technology can find out the people that divulges a secret simply and effectively at present.
Summary of the invention
Embodiment of the present invention technical matters to be solved is, provides a kind of data encapsulation and analytic method and device, searches that blabber's process is complicated, the problem of poor effect under solving present case.
First aspect, embodiments provides a kind of data encapsulation method, comprising:
Set up the communication connection with the second terminal;
The unique identity of described second terminal is obtained by described communication connection;
Be encapsulated in the first data according to the unique identity of default encapsulation algorithm by described second terminal, obtain the second data;
By described communication connection, described second data are sent to described second terminal.
In conjunction with first aspect, in the implementation that the first is possible, described basis is preset encapsulation algorithm and is encapsulated in the first data by the unique identity of described second terminal, obtains the second data and comprises:
Encode according to the unique identity of pre-arranged code algorithm by described terminal;
According to default interpolation algorithm, the unique identity through coding is added in the first data, obtain the second data.
In conjunction with first aspect, in the implementation that the second is possible, the mode of described communication connection comprises that wireless network Wi-Fi connects, bluetooth connects, near-field communication NFC connect be connected with data line in any one.
In conjunction with implementation that the first and the second of first aspect and first aspect are possible, in the implementation that the third is possible, described unique identity comprises mobile device international identity code IMEI, or MAC Address.
In conjunction with the first possible implementation of first aspect, in the 4th kind of possible implementation, described encryption algorithm to comprise in data encryption algorithm DEA, IDEA IDEA, Digital Signature Algorithm DSA and Advanced Encryption Standard AES any one.
Second aspect, embodiments provides a kind of data analysis method, comprising:
Obtain the second data;
Resolve described second data by the analytical algorithm preset, obtain the unique identity encapsulated in described second data;
When analyzing described unique identity and being the unique identity of the second terminal, after confirming that described second data send to the second terminal by first terminal, forwarded by described second terminal; Wherein, described second data are that first terminal sets up the communication connection with described second terminal, and the unique identity of described second terminal is obtained by described communication connection, according to default encapsulation algorithm, the unique identity of described second terminal is encapsulated into the second data obtained in the first data.
In conjunction with second aspect, in the implementation that the first is possible, the mode of described communication connection comprises that wireless network Wi-Fi connects, bluetooth connects, near-field communication NFC connect be connected with data line in any one.
In conjunction with the first possible implementation of second aspect and second aspect, in the implementation that the second is possible, described unique identity comprises mobile device international identity code IMEI, or MAC Address.
In conjunction with the first possible implementation of second aspect and second aspect, in the implementation that the third is possible, described analytical algorithm to comprise in data encryption algorithm DEA, IDEA IDEA, Digital Signature Algorithm DSA and Advanced Encryption Standard AES any one.
The third aspect, embodiments provides a kind of data encapsulation apparatus, comprising:
Linkage unit, for setting up the communication connection with the second terminal;
Acquiring unit, for obtaining the unique identity of described second terminal by described communication connection;
Encapsulation unit, for being encapsulated in the first data by the unique identity of described second terminal according to presetting encapsulation algorithm, obtains the second data;
Transmitting element, for sending to described second terminal by described communication connection by described second data.
In conjunction with the third aspect, in the implementation that the first is possible, described encapsulation unit comprises:
Coding unit, for encoding according to the unique identity of pre-arranged code algorithm by described terminal;
Adding device, for being added in the first data by the unique identity through coding according to presetting interpolation algorithm, obtains the second data.
In conjunction with the third aspect, in the implementation that the second is possible, the mode of described communication connection comprises that wireless network Wi-Fi connects, bluetooth connects, near-field communication NFC connect be connected with data line in any one.
In conjunction with first and second kinds of third party and the third aspect possible implementations, in the implementation that the third is possible, described unique identity comprises mobile device international identity code IMEI, or MAC Address.
In conjunction with the first possible implementation of the third aspect, in the 4th kind of possible implementation, described encryption algorithm to comprise in data encryption algorithm DEA, IDEA IDEA, Digital Signature Algorithm DSA and Advanced Encryption Standard AES any one.
Fourth aspect, embodiments provides a kind of data analysis device, comprising:
Acquiring unit, for obtaining the second data;
Resolution unit, resolving described second data for the analytical algorithm by presetting, obtaining the unique identity encapsulated in described second data;
Confirmation unit, for when analyzing described unique identity and being the unique identity of the second terminal, after confirming that described second data send to the second terminal by first terminal, is forwarded by described second terminal; Wherein, described second data are that first terminal sets up the communication connection with described second terminal, and the unique identity of described second terminal is obtained by described communication connection, according to default encapsulation algorithm, the unique identity of described second terminal is encapsulated into the second data obtained in the first data.
In conjunction with fourth aspect, in the implementation that the first is possible, the mode of described communication connection comprises that wireless network Wi-Fi connects, bluetooth connects, near-field communication NFC connect be connected with data line in any one.
In conjunction with the first possible implementation of fourth aspect and fourth aspect, in the implementation that the second is possible, described unique identity comprises mobile device international identity code IMEI, or MAC Address.
In conjunction with the first possible implementation of fourth aspect and fourth aspect, in the implementation that the third is possible, described analytical algorithm to comprise in data encryption algorithm DEA, IDEA IDEA, Digital Signature Algorithm DSA and Advanced Encryption Standard AES any one.
By implementing the embodiment of the present invention, during by sharing files to participant, former basis of sharing file is added the unique identity of this participant, revealed after sharing files is to participant, can pass through the parsing of sharing file, find out the unique identity shared in file, and determine by this unique identity terminal of divulging a secret, the problem of blabber's process complexity, poor effect is searched under solving present case, can realize finding out blabber simply and effectively fast, and on participant without impact; Because the corresponding unique IMEI number of each mobile terminal, therefore, using IMEI number as unique identity, after determining terminal of divulging a secret, the IMEI number parsed contributes to related personnel and performs the operations such as location, tracking, format and locking to terminal of divulging a secret; Unique identity is encoded, to be found by participant to prevent this unique identity and deleted.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1-1 is the schematic flow sheet of a kind of data encapsulation method that the embodiment of the present invention provides;
Fig. 1-2 is the application scenarios schematic diagram of a kind of data encapsulation method that the embodiment of the present invention provides;
Fig. 2 is the schematic flow sheet of the another kind of data encapsulation method that the embodiment of the present invention provides;
Fig. 3 is the schematic flow sheet of a kind of data analysis method that the embodiment of the present invention provides;
Fig. 4 is the schematic flow sheet of a kind of data encapsulation apparatus method that the embodiment of the present invention provides;
Fig. 5 is the structural representation of the another kind of data encapsulation apparatus that the embodiment of the present invention provides;
Fig. 6 is the structural representation of a kind of data analysis device that the embodiment of the present invention provides;
Fig. 7 is the structural representation of the another kind of data encapsulation apparatus that the embodiment of the present invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
It should be noted that, the term used in embodiments of the present invention is only for the object describing specific embodiment, and not intended to be limiting the present invention." one ", " described " and " being somebody's turn to do " of the singulative used in the embodiment of the present invention and appended claims is also intended to comprise most form, unless context clearly represents other implications.It is also understood that term "and/or" used herein refer to and comprise one or more project of listing be associated any or all may combine.
See Fig. 1-1, be the schematic flow sheet of a kind of data encapsulation method that the embodiment of the present invention provides, the method comprises:
Step S101: set up the communication connection with the second terminal;
Particularly, first terminal sets up the communication connection with the second terminal, wherein, first terminal can be that mobile terminal is (as mobile phone, panel computer, notebook computer etc.), also can be fixed terminal (as desktop computer), the shared data needing to share to the second terminal are housed in first terminal, wherein, second terminal can be mobile terminal also can be fixed terminal, preferably, in the present embodiment, the second terminal is the mobile phone in mobile terminal, subsequently the description of the second terminal is all launched for mobile phone, Fig. 1-2 is the application scenarios schematic diagram of a kind of data encapsulation method that the embodiment of the present invention provides, wherein, 111 is first terminal, 112 is the second terminal.
It should be noted that, the mode of the communication connection that the first terminal in the embodiment of the present invention and mobile phone are set up comprises wireless network (Wireless Fidelity, Wi-Fi) connect, bluetooth connects, near-field communication (Near FieldCommunication, NFC) connection is connected with data line, also there is other connected mode obviously, the present invention is not as limit.
Step S102: the unique identity being obtained described second terminal by described communication connection;
Particularly, after establishing communication connection, first terminal has just had the authority obtaining the facility information on mobile phone, herein, first terminal obtains the unique identity of mobile phone (or notebook computer), unique identity in the embodiment of the present invention includes but not limited to International Mobile Equipment Identity code (International MobileEquipment Identity, IMEI), whole world unique mobile terminal identification number (Mobile Equipment Identifier, MEID), integrated circuit card identification code (Integrate circuit card identity, or media access control address (Media Access Control Address ICCID), MAC), each mobile phone (or notebook computer) is relative to other mobile phone, its IMEI number, No. MEID, No. ICCID or MAC are unique, therefore may be used for being different from other equipment.
Step S103: be encapsulated in the first data according to the unique identity of default encapsulation algorithm by described second terminal, obtain the second data;
Particularly, the encapsulation algorithm preset can be the method be stored in by unique identity in the first data, also can be the method advanced for unique identity row relax is stored in again in the first data, preferably, be described for the former herein, after first terminal obtains the unique identity of mobile phone, this encapsulation algorithm can open the first data by trigger file software for editing, and then the preset instructions triggered in software for editing, the information comprising (hiding) unique identity is inputted in the prompting territory of display, the first data after editor are preserved, obtain the second data, the position of unique identity in the first data is relatively concealed, or this encapsulation algorithm self is provided with corresponding editting function, to open the first data and to use preset instructions to complete the input of the information comprising (hiding) unique identity in the prompting territory of display, and can the first data after editor be preserved, obtain the second data, the position of unique identity in the first data is relatively concealed, for participant (user of the second terminal), almost do not see the difference of the first data and the second data, do like this and participant's malice can be avoided as far as possible to be deleted from the second data by the unique identity of mobile phone, and the object of marking terminal cannot be reached, such as, when the first data are pdf file, this encapsulation algorithm can trigger pdf software for editing and open this pdf file, trigger the dependent instruction adding watermark in pdf software for editing again, then watermark properties is set according to instruction, the form inserting character or insert pictures can be selected the information comprising IMEI number to be inserted in this pdf file, obtain the pdf file comprising IMEI number information.For another example, when the first data are word file, this encapsulation algorithm can trigger word software for editing and open this word software, the document properties triggered again in pdf software for editing arranges instruction, in the middle of the textview field ejected, input the information comprising (or hiding) IMEI number, obtain the word file comprising IMEI number information.
Further, above-mentioned mention usage data cryptographic algorithm (Data Encryption Algorithm is included but not limited to the mode of the advanced row relax of unique identity, DEA), IDEA (International Data Encryption Algorithm, IDEA), Digital Signature Algorithm (DigitalSignature Algorithm, DSA), Advanced Encryption Standard (Advanced Encryption Standard, AES) is encrypted IMEI number.
Step S104: described second data are sent to described second terminal by described communication connection.
Particularly, after the first data add unique identity, the second data obtained have been exactly unique sharing data, because after first terminal often connects a mobile phone, capital has made based on this mobile phone the sharing data comprising its unique identity, if first terminal successively establishes communication connection with 5 mobile phones, so first terminal is just for person's five mobile phones have made its respective sharing data respectively; After data creating completes, the sharing data correspondence made based on certain mobile phone is sent to this mobile phone by first terminal; So far, the corresponding unique sharing data of each mobile phone, when certain shares after file divulged a secret, makes people can determine by resolving this unique identity of divulging a secret in file terminal of divulging a secret, and then corresponds to the people that divulges a secret accurately.
See Fig. 2, be the another kind of data encapsulation method schematic flow sheet that the embodiment of the present invention provides, the method comprises:
Step S201: set up the communication connection with the second terminal;
Step S202: the unique identity being obtained described second terminal by described communication connection;
Particularly, step S201 and step S202 is corresponding to step S101 and step S102, repeats no more herein.
Step S203: encode according to the unique identity of pre-arranged code algorithm by described terminal;
Particularly, encryption algorithm is the method for carrying out editing conversion to unique identity, the method includes but not limited to data encryption algorithm (Data Encryption Algorithm, DEA), IDEA (International Data Encryption Algorithm, IDEA), Digital Signature Algorithm (DigitalSignature Algorithm, DSA), Advanced Encryption Standard (Advanced Encryption Standard, AES), such as, after first terminal obtains the IMEI number of mobile phone, use IDEA IDEA to be encrypted this IMEI number and obtain encrypt file, cannot see in the second data that there is IMEI number to make the recipient being about to receive this encrypt file, prevent recipient's malicious modification or delete IMEI number information.
Step S204: according to default interpolation algorithm, the unique identity through coding is added in the first data, obtain the second data;
Particularly, add algorithm be by encryption after IMEI number be inserted into method in the first data, which kind of adds the file layout of algorithm depending on the first data in concrete selection, such as, when the first data are pdf file, pdf software for editing is used to open this pdf file, trigger the dependent instruction adding watermark in pdf software for editing, then watermark properties is set according to instruction, the form inserting character or insert pictures can be selected the information comprising IMEI number to be inserted in this pdf file, to obtain the pdf file comprising IMEI number information.For another example, when the first data are word file, word software for editing is used to open this word software, the document properties triggered in pdf software for editing arranges instruction, in the middle of the textview field ejected, input the information comprising (or hiding) IMEI number, obtain the word file comprising IMEI number information.
Step S205: described second data are sent to described second terminal by described communication connection.
Particularly, step S205 is corresponding to step S104, repeats no more herein.
See Fig. 3, be the schematic flow sheet of a kind of data analysis method that the embodiment of the present invention provides, the method comprises:
Step S301: obtain the second data;
Particularly, third terminal obtains the sharing data after divulging a secret, under normal circumstances, sharing data can only be sent by first terminal, second terminal receives, wherein, first terminal can be that mobile terminal is (as mobile phone, panel computer, notebook computer etc.), also can be fixed terminal (as desktop computer), second terminal can be mobile terminal also can be fixed terminal, preferably, in the present embodiment, the second terminal is the mobile phone in mobile terminal, subsequently the description of the second terminal is all launched for mobile phone, if this sharing data can be received from the terminal except first terminal, so, judge that these shared data are divulged a secret.
Step S302: resolve described second data by the analytical algorithm preset, obtain the unique identity encapsulated in described second data;
Particularly, when receiving sharing data from the terminal except first terminal, default analytical algorithm is used to resolve the sharing data that this is divulged a secret, analytical algorithm includes but not limited to data encryption algorithm DEA, IDEA IDEA, Digital Signature Algorithm DSA and Advanced Encryption Standard AES, to obtain being encapsulated in the IMEI number by divulging a secret in data.
It should be noted that, resolve described by the algorithm of shared data of divulging a secret with previously to encapsulate the described algorithm by data of divulging a secret consistent.
Step S303: when analyzing described unique identity and being the unique identity of the second terminal, after confirming that described second data send to the second terminal by first terminal, is forwarded by described second terminal; Wherein, described second data are that first terminal sets up the communication connection with described second terminal, and the unique identity of described second terminal is obtained by described communication connection, according to default encapsulation algorithm, the unique identity of described second terminal is encapsulated into the second data obtained in the first data.
Particularly, resolve after obtaining the IMEI number of terminal, when analyzing this IMEI number and being the IMEI number of certain mobile phone, determine by the data of divulging a secret it is send to this mobile phone by first terminal, and undertaken forwarding by this mobile phone and sharing data is divulged a secret; It should be noted that, by the communication connection that the sharing data of divulging a secret is first terminal foundation and mobile phone, the IMEI number of mobile phone is obtained by the communication connection of setting up, and IMEI number is encapsulated into according to the encapsulation algorithm preset the sharing data obtained in the first data, wherein, the mode of communication connection includes but not limited to comprise wireless network Wi-Fi connection, bluetooth connects, near-field communication NFC connects and is connected with data line; In addition, first data are original sharing datas, for each mobile phone, the sharing data received all is made up of original sharing data and IMEI number information, and the raw data in the sharing data that each mobile phone receives is the same, and uniquely different is IMEI number information (IMEI number information is IMEI number itself or treated IMEI number).
Further, third terminal can be same terminal with first terminal, also can be different terminals, namely makes the terminal sharing data and resolve the terminal sharing data can be the same or different.
The above-mentioned method illustrating the embodiment of the present invention, below for the ease of implementing the such scheme of the embodiment of the present invention better, correspondingly, provided below is the device of the embodiment of the present invention.
See Fig. 4, be the schematic flow sheet of a kind of data encapsulation apparatus 40 that the embodiment of the present invention provides, this device 40 comprises linkage unit 401, acquiring unit 402, encapsulation unit 403 and transmitting element 404, wherein
Linkage unit 401 is for setting up the communication connection with the second terminal;
Acquiring unit 402 is for obtaining the unique identity of described second terminal by described communication connection;
Encapsulation unit 403, for being encapsulated in the first data by the unique identity of described second terminal according to presetting encapsulation algorithm, obtains the second data;
Transmitting element 404 is for sending to described second terminal by described communication connection by described second data.
Will be understood that, in data encapsulation apparatus 40, the function of modules may correspond to the embodiment with reference to Fig. 1-1 embodiment in said method embodiment, repeats no more here.
See Fig. 5, it is the structural representation of the another kind of data encapsulation apparatus 40 that the embodiment of the present invention provides, this device 40 comprises the linkage unit 401 shown in Fig. 4, acquiring unit 402, encapsulation unit 403 and transmitting element 404, and shown encapsulation unit 403 also comprises coding unit 4031 and adding device 4032, wherein
Coding unit 4031 is for encoding according to the unique identity of pre-arranged code algorithm by described terminal;
Adding device 4032, for being added in the first data by the unique identity through coding according to presetting interpolation algorithm, obtains the second data.
Will be understood that, in data encapsulation apparatus 40, the function of modules may correspond to the embodiment with reference to Fig. 2 embodiment in said method embodiment, repeats no more here.
See Fig. 6, be the structural representation of a kind of data analysis device 60 that the embodiment of the present invention provides, this device 40 comprises acquiring unit 601, resolution unit 602 and confirmation unit 603, wherein
Acquiring unit 601 is for obtaining the second data;
Resolution unit 602 resolves described second data for the analytical algorithm by presetting, and obtains the unique identity encapsulated in described second data;
Confirmation unit 603, for when analyzing described unique identity and being the unique identity of the second terminal, after confirming that described second data send to the second terminal by first terminal, is forwarded by described second terminal; Wherein, described second data are that first terminal sets up the communication connection with described second terminal, and the unique identity of described second terminal is obtained by described communication connection, according to default encapsulation algorithm, the unique identity of described second terminal is encapsulated into the second data obtained in the first data.
Will be understood that, in data analysis device 60, the function of modules may correspond to the embodiment with reference to Fig. 3 embodiment in said method embodiment, repeats no more here.
Further, Fig. 7 is the structural representation of the another kind of data encapsulation apparatus 70 that the embodiment of the present invention provides.Wherein, as shown in Figure 7, this data encapsulation apparatus 70 can comprise: at least one processor 701, such as CPU, at least one network interface 704, user interface 703, storer 705, at least one communication bus 702 and display screen 706.Wherein, communication bus 702 is for realizing the connection communication between these assemblies.Wherein, user interface 703 can comprise display screen (Display) 706, and optional user interface 703 can also comprise wireline interface, the wave point of standard.Communication interface 704 optionally can comprise wireline interface (as data line interface, cable interface etc.), the wave point (as WI-FI interface, blue tooth interface, near-field communication interface) of standard.Storer 705 can be high-speed RAM storer, also can be non-labile storer (non-volatile memory), such as at least one magnetic disk memory.Storer 705 can also be optionally that at least one is positioned at the memory storage away from aforementioned processor 701.As shown in Figure 7, operating system, network communication module, Subscriber Interface Module SIM and data encapsulation program can be comprised as in a kind of storer 705 of computer-readable storage medium.
In the data encapsulation apparatus 70 shown in Fig. 7, communication interface 704 is mainly used in connection second terminal, carries out data communication with the second terminal; And processor 701 may be used for calling the data encapsulation program stored in storer 705, and perform following operation:
Set up the communication connection with the second terminal;
The unique identity of described second terminal is obtained by described communication connection;
Be encapsulated in the first data according to the unique identity of default encapsulation algorithm by described second terminal, obtain the second data;
By described communication connection, described second data are sent to described second terminal.
Particularly, described basis is preset encapsulation algorithm and is encapsulated in the first data by the unique identity of described second terminal, obtains the second data and comprises:
Encode according to the unique identity of pre-arranged code algorithm by described terminal;
According to default interpolation algorithm, the unique identity through coding is added in the first data, obtain the second data.
Particularly, the mode of described communication connection comprise wireless network Wi-Fi connect, bluetooth connect, near-field communication NFC connect be connected with data line in any one.
Particularly, described unique identity comprises mobile device international identity code IMEI, or MAC Address.
Further, described encryption algorithm to comprise in data encryption algorithm DEA, IDEA IDEA, Digital Signature Algorithm DSA and Advanced Encryption Standard AES any one.
It should be noted that, data encapsulation apparatus 70 can be concrete server, also can be certain device in server or module, and data encapsulation apparatus 70 according to the description specific implementation in said method embodiment, can repeat no more herein.
In sum, by implementing the embodiment of the present invention, during by sharing files to participant, former basis of sharing file is added the unique identity of this participant, revealed after sharing files is to participant, can pass through the parsing of sharing file, find out the unique identity shared in file, and determine by this unique identity terminal of divulging a secret, the problem of blabber's process complexity, poor effect is searched under solving present case, can realize finding out blabber simply and effectively fast, and on participant without impact; Because the corresponding unique IMEI number of each mobile terminal, therefore, using IMEI number as unique identity, after determining terminal of divulging a secret, the IMEI number parsed contributes to related personnel and performs the operations such as location, tracking, format and locking to terminal of divulging a secret; Unique identity is encoded, to be found by participant to prevent this unique identity and deleted.
One of ordinary skill in the art will appreciate that all or part of flow process realized in above-described embodiment method, that the hardware that can carry out instruction relevant by computer program has come, described program can be stored in a computer read/write memory medium, this program, when performing, can comprise the flow process of the embodiment as above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory, ROM) or random store-memory body (Random Access Memory, RAM) etc.
Above disclosedly be only a kind of preferred embodiment of the present invention, certainly the interest field of the present invention can not be limited with this, one of ordinary skill in the art will appreciate that all or part of flow process realizing above-described embodiment, and according to the equivalent variations that the claims in the present invention are done, still belong to the scope that invention is contained.

Claims (18)

1. a data encapsulation method, is characterized in that, comprising:
Set up the communication connection with the second terminal;
The unique identity of described second terminal is obtained by described communication connection;
Be encapsulated in the first data according to the unique identity of default encapsulation algorithm by described second terminal, obtain the second data;
By described communication connection, described second data are sent to described second terminal.
2. method according to claim 1, is characterized in that, described basis is preset encapsulation algorithm and is encapsulated in the first data by the unique identity of described second terminal, obtains the second data and comprises:
Encode according to the unique identity of pre-arranged code algorithm by described terminal;
According to default interpolation algorithm, the unique identity through coding is added in the first data, obtain the second data.
3. according to the method that claim 1 is stated, it is characterized in that, the mode of described communication connection comprise that wireless network Wi-Fi connects, bluetooth connects, near-field communication NFC connect be connected with data line in any one.
4. method according to claims 1 to 3, is characterized in that, described unique identity comprises mobile device international identity code IMEI, or MAC Address.
5. method according to claim 2, is characterized in that, described encryption algorithm to comprise in data encryption algorithm DEA, IDEA IDEA, Digital Signature Algorithm DSA and Advanced Encryption Standard AES any one.
6. a data analysis method, is characterized in that, comprising:
Obtain the second data;
Resolve described second data by the analytical algorithm preset, obtain the unique identity encapsulated in described second data;
When analyzing described unique identity and being the unique identity of the second terminal, after confirming that described second data send to the second terminal by first terminal, forwarded by described second terminal; Wherein, described second data are that first terminal sets up the communication connection with described second terminal, and the unique identity of described second terminal is obtained by described communication connection, according to default encapsulation algorithm, the unique identity of described second terminal is encapsulated into the second data obtained in the first data.
7. according to the method that claim 6 is stated, it is characterized in that, the mode of described communication connection comprise that wireless network Wi-Fi connects, bluetooth connects, near-field communication NFC connect be connected with data line in any one.
8. the method according to claim 6 or 7, is characterized in that, described unique identity comprises mobile device international identity code IMEI, or MAC Address.
9. the method according to claim 6 or 7, is characterized in that, described analytical algorithm to comprise in data encryption algorithm DEA, IDEA IDEA, Digital Signature Algorithm DSA and Advanced Encryption Standard AES any one.
10. a data encapsulation apparatus, is characterized in that, comprising:
Linkage unit, for setting up the communication connection with the second terminal;
Acquiring unit, for obtaining the unique identity of described second terminal by described communication connection;
Encapsulation unit, for being encapsulated in the first data by the unique identity of described second terminal according to presetting encapsulation algorithm, obtains the second data;
Transmitting element, for sending to described second terminal by described communication connection by described second data.
11. devices according to claim 10, is characterized in that, described encapsulation unit comprises:
Coding unit, for encoding according to the unique identity of pre-arranged code algorithm by described terminal;
Adding device, for being added in the first data by the unique identity through coding according to presetting interpolation algorithm, obtains the second data.
12. devices stated according to claim 10, is characterized in that, the mode of described communication connection comprises that wireless network Wi-Fi connects, bluetooth connects, near-field communication NFC connect be connected with data line in any one.
13., according to the device described in claim 10 ~ 12, is characterized in that, described unique identity comprises mobile device international identity code IMEI, or MAC Address.
14. devices according to claim 11, is characterized in that, described encryption algorithm to comprise in data encryption algorithm DEA, IDEA IDEA, Digital Signature Algorithm DSA and Advanced Encryption Standard AES any one.
15. 1 kinds of data analysis devices, is characterized in that, comprising:
Acquiring unit, for obtaining the second data;
Resolution unit, resolving described second data for the analytical algorithm by presetting, obtaining the unique identity encapsulated in described second data;
Confirmation unit, for when analyzing described unique identity and being the unique identity of the second terminal, after confirming that described second data send to the second terminal by first terminal, is forwarded by described second terminal; Wherein, described second data are that first terminal sets up the communication connection with described second terminal, and the unique identity of described second terminal is obtained by described communication connection, according to default encapsulation algorithm, the unique identity of described second terminal is encapsulated into the second data obtained in the first data.
16. devices stated according to claim 15, is characterized in that, the mode of described communication connection comprises that wireless network Wi-Fi connects, bluetooth connects, near-field communication NFC connect be connected with data line in any one.
17. devices according to claim 15 or 16, it is characterized in that, described unique identity comprises mobile device international identity code IMEI, or MAC Address.
18. devices according to claim 15 or 16, is characterized in that, described analytical algorithm to comprise in data encryption algorithm DEA, IDEA IDEA, Digital Signature Algorithm DSA and Advanced Encryption Standard AES any one.
CN201410736571.1A 2014-12-04 2014-12-04 Data packaging and analysis method and device Pending CN104598782A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410736571.1A CN104598782A (en) 2014-12-04 2014-12-04 Data packaging and analysis method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410736571.1A CN104598782A (en) 2014-12-04 2014-12-04 Data packaging and analysis method and device

Publications (1)

Publication Number Publication Date
CN104598782A true CN104598782A (en) 2015-05-06

Family

ID=53124560

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410736571.1A Pending CN104598782A (en) 2014-12-04 2014-12-04 Data packaging and analysis method and device

Country Status (1)

Country Link
CN (1) CN104598782A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106709362A (en) * 2016-12-06 2017-05-24 武汉斗鱼网络科技有限公司 File encryption method and device and file decryption method and device
CN108476337A (en) * 2016-02-12 2018-08-31 纳格拉影像股份有限公司 The method and apparatus for identifying peripheral equipment from digital content
CN111510421A (en) * 2019-01-31 2020-08-07 金联汇通信息技术有限公司 Data processing method and device, electronic equipment and computer readable storage medium
CN113342288A (en) * 2021-06-29 2021-09-03 北京天空卫士网络安全技术有限公司 Data protection method, client, server and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101196970A (en) * 2007-12-29 2008-06-11 武汉理工大学 Digital copyright management system based on digital watermarking and mobile proxy
US20100153407A1 (en) * 2008-12-16 2010-06-17 Krislov Clinton A Method and system for automated document registration
CN102307320A (en) * 2011-08-11 2012-01-04 江苏亿通高科技股份有限公司 Piracy tracing watermarking method applicable to streaming media environment
CN103336921A (en) * 2013-07-26 2013-10-02 衡阳市劳动保障信息中心 Method capable of tracing blabber

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101196970A (en) * 2007-12-29 2008-06-11 武汉理工大学 Digital copyright management system based on digital watermarking and mobile proxy
US20100153407A1 (en) * 2008-12-16 2010-06-17 Krislov Clinton A Method and system for automated document registration
CN102307320A (en) * 2011-08-11 2012-01-04 江苏亿通高科技股份有限公司 Piracy tracing watermarking method applicable to streaming media environment
CN103336921A (en) * 2013-07-26 2013-10-02 衡阳市劳动保障信息中心 Method capable of tracing blabber

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108476337A (en) * 2016-02-12 2018-08-31 纳格拉影像股份有限公司 The method and apparatus for identifying peripheral equipment from digital content
CN108476337B (en) * 2016-02-12 2021-03-09 纳格拉影像股份有限公司 Method and apparatus for identifying peripheral devices from digital content
US11924494B2 (en) 2016-02-12 2024-03-05 Nagravision S.A. Method and device for identifying a peripheral device from a digital content
CN106709362A (en) * 2016-12-06 2017-05-24 武汉斗鱼网络科技有限公司 File encryption method and device and file decryption method and device
CN111510421A (en) * 2019-01-31 2020-08-07 金联汇通信息技术有限公司 Data processing method and device, electronic equipment and computer readable storage medium
CN111510421B (en) * 2019-01-31 2022-09-16 金联汇通信息技术有限公司 Data processing method and device, electronic equipment and computer readable storage medium
CN113342288A (en) * 2021-06-29 2021-09-03 北京天空卫士网络安全技术有限公司 Data protection method, client, server and system
CN113342288B (en) * 2021-06-29 2024-03-22 北京天空卫士网络安全技术有限公司 Data protection method, client, server and system

Similar Documents

Publication Publication Date Title
CN104602238B (en) A kind of wireless network connecting method, device and system
KR102137673B1 (en) Application connection method and system using same method
CN103873692B (en) Method, device and system for resource sharing
CN102149083B (en) Personalized card writing method, system and device
CN104092644A (en) Interaction method, device, client and server
CN103957522A (en) Intelligent communication method, intelligent communication terminals and intelligent communication system
CN107534566B (en) Multi-user conference system
CN104507080A (en) File processing method and terminal
CN105337950A (en) Form filling method and related terminals
CN104598782A (en) Data packaging and analysis method and device
CN102984335B (en) Dial the identity identifying method of landline telephone, equipment and system
CN103733591A (en) Binding a removable module to an access terminal
CN104378375A (en) Remote access method for mobile phone, terminal device, server and system
JP2007249507A (en) Information leakage prevention method, information leakage prevention system and information terminal
CN103873251A (en) Method and equipment for establishing connection by audio frequency
CN101841783A (en) Short message safety communication method, system and device based on STK (SIM Tool Kit) business
CN105915541A (en) Mobile terminal password preservation and recovery processing method based on NFC and system thereof
CN102984676B (en) Method and terminal for processing message session
CN104219300A (en) Coordinate transformation parameter sharing method and system
CN111866864A (en) Method, device and storage medium for realizing encrypted storage and safe use management of cloud platform certificate based on wireless AP
KR20140043836A (en) Communication system utilizing fingerprint information and use of the system
CN110719590A (en) One-key login method, device, equipment and storage medium based on mobile phone number
CN114697117B (en) Verification method, device, cipher device and system based on positioning information
CN114338527B (en) IPv6 active identifier processing method and system
CN104866881A (en) Real-name system account opening card reading/writing equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150506