CN105656888B - Method for processing business, device and the system to maintain secrecy for user information - Google Patents
Method for processing business, device and the system to maintain secrecy for user information Download PDFInfo
- Publication number
- CN105656888B CN105656888B CN201511024082.4A CN201511024082A CN105656888B CN 105656888 B CN105656888 B CN 105656888B CN 201511024082 A CN201511024082 A CN 201511024082A CN 105656888 B CN105656888 B CN 105656888B
- Authority
- CN
- China
- Prior art keywords
- service
- business
- information
- link
- isp
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention relates to computer application technologies, in particular to a kind of method for processing business, device and system to maintain secrecy for user information.Including:Receive the service request of user terminal uploads;Determine the corresponding service procedure of the service request;Customer information is divided into multiple sub-informations corresponding with the service procedure;Service identification is generated according to the service request, establishes being associated with for client and the ISP of each service link of service procedure described in each;When the service identification that the ISP for receiving current service link uploads, sub-information corresponding with the current business link is returned to the ISP of the current business link.This method enables to the information of the various need for confidentiality of service object to be protected in the process of service being provided for service object, reduces the possibility that the relevant information of service object is leaked.
Description
Technical field
The present invention relates to computer application technologies, being directed to what user information maintained secrecy in particular to a kind of
Method for processing business, device and system.
Background technology
Currently, in many industries, enterprise is to need under normal circumstances when providing service for the service object of oneself
The relevant information of service object is first obtained, then according to the relevant information of service object, applies mechanically in-company service procedure
Complete the service to service object.By taking express company services as an example, when first posts thing to Person B, need to fill in mail piece
Detail-list (such as sender's name, address, contact method, addressee's name, address, contact method, the letters such as mail items of product
Breath), it send to service station after pickup person's pickup, service station is according to the object inside the address of the addressee of the express mail and the said firm
Flow path by express mail entrucking, is transported to the service station of destination, then again by sending part person will be fast according to addressee's contact method
Part is sent to addressee.Involved in the above process to staff have pickup person, send part person, intermediate express mail treatment people, transport
Personnel etc. post part side or recipient since the opening of express transportation process or even incoherent people also can easily be known
Personal information.Same information leakage problem, other service industries (such as:It calls a taxi the services such as service provider, service of cars on hire quotient
Quotient) also happen occasionally.
The problem of being easy leakage for customer information in service industry, currently no effective solution has been proposed.
Invention content
In view of this, the embodiment of the present invention is designed to provide a kind of business processing to maintain secrecy for user information
Method, apparatus and system enable to the information of the various need for confidentiality of service object providing service for service object
It in process, is protected, reduces the possibility that the relevant information of service object is leaked.
In a first aspect, an embodiment of the present invention provides a kind of method for processing business to maintain secrecy for user information, it should
Method is applied to server end, and executive agent is server, including:
Receive the service request of user terminal uploads, wherein the service request includes:It is the type identification of business, described
The corresponding customer information of business;
The corresponding service procedure of the service request is determined according to the type identification of the business;
The customer information is divided into multiple sub-informations corresponding with the service procedure;Wherein, each sub- letter
A service link in the corresponding service procedure of breath;
Service identification is generated according to the service request, and client and each institute are established by the service identification
State the association of the ISP of each service link of service procedure;
When the service identification that the ISP for receiving current service link uploads, to the current industry
The ISP for link of being engaged in returns to sub-information corresponding with the current business link, so that the service of current business link carries
Donor completes the corresponding business of the current business link.
With reference to first aspect, an embodiment of the present invention provides the first possible embodiment of first aspect, to described
Before the ISP of current business link returns to sub-information corresponding with the current business link, further include:To described
Sub-information is encrypted respectively.
With reference to first aspect, an embodiment of the present invention provides second of possible embodiment of first aspect, further include:
Acquire multiple service procedure information;
Parsing statistics is carried out to the service procedure information, obtains service procedure summary information corresponding with type of service;
The service procedure summary information is compared and analyzed, service regulation flow corresponding with type of service is generated.
With reference to first aspect, described right an embodiment of the present invention provides the third possible embodiment of first aspect
The service procedure information carries out parsing statistics, obtains service procedure summary information corresponding with type of service and specifically includes:
Multiple service procedure information are parsed, are obtained corresponding multiple with service procedure information described in each
Service link, and be each service link addition description label;
According to the description label, multiple service links are counted respectively, generate service procedure summary information.
With reference to first aspect, an embodiment of the present invention provides the 4th kind of possible embodiments of first aspect, described to incite somebody to action
The service procedure summary information compares and analyzes, and generates service regulation flow corresponding with type of service and specifically includes:
Service link corresponding to multiple service procedures in the service procedure summary information is carried out to pair of necessity
Than analysis;
If the necessity of presently described service link is within predetermined threshold value, using the current service link as necessity
Service link;
If the necessity of current business link is except preset threshold value, using current business link as inessential industry
Business link;
The necessary business link is combined, service regulation flow corresponding with type of service is generated.
With reference to first aspect, an embodiment of the present invention provides the 5th kind of possible embodiment of first aspect, further include:
Different business modules is generated, wherein there are one service links for each described business module correspondence;
Receive the service procedure organizing-request of user;The service procedure organizing-request includes:Business module information with
And with the ISP corresponding to business module information described in each;
According to the business module information, select business module, and by business module and with corresponding to business module information
ISP association, according to the business module of selection generate service procedure.
Second aspect, the embodiment of the present invention also provide a kind of method for processing business to maintain secrecy for user information, should
Method is applied to the client corresponding to the ISP of each service link, is and the method institute described in above-mentioned first aspect
Corresponding exchange method, executive agent are the client corresponding to ISP, including:
The service identification is obtained, and the service identification is uploaded to server end;
The sub-information that the server end is returned according to the service identification is received, and is completed currently according to sub-information
The corresponding business of service link.
The third aspect, the embodiment of the present invention also provide a kind of business processing device to maintain secrecy for user information, answer
For server end, including:
Request receiving module, the service request for receiving user terminal uploads, wherein the service request includes:Industry
The type identification of business, the corresponding customer information of the business;
Service procedure determining module, for determining the corresponding service of the service request according to the type identification of the business
Flow;
Sub-information generation module, for the customer information to be divided into multiple sub- letters corresponding with the service procedure
Breath;Wherein, each sub-information corresponds to a service link in the service procedure;
Relating module for generating service identification according to the service request, and is established by the service identification
Client is associated with the ISP's of each service link of service procedure described in each;
Sub-information returns to module, the business mark for being uploaded as the ISP for receiving current service link
When knowing code, sub-information corresponding with the current business link is returned to the ISP of the current business link, so that
The ISP of current business link completes the corresponding business of the current business link.
Fourth aspect, the embodiment of the present invention are also provided applied to the client corresponding to ISP, are and above-mentioned the
The interactive device corresponding to device described in three aspects, including:
Service identification acquisition device:It is uploaded to clothes for obtaining the service identification, and by the service identification
Business device end;
Sub-information reception device, the sub-information returned according to the service identification for receiving the server end,
And the corresponding business of current business link is completed according to sub-information.
5th aspect, the embodiment of the present invention also provide a kind of transaction processing system to maintain secrecy for user information, packet
It includes:Service receives server and service providing client;
Wherein, the service receives server and is provided with the device described in the above-mentioned third aspect;
The service providing client is additionally provided with the device as described in above-mentioned fourth aspect.
Method for processing business, device and the system to maintain secrecy for user information that the embodiment of the present invention is provided,
Customer information is divided into multiple sub-informations corresponding with service procedure, each sub-information is corresponding with one in service procedure
A service link, and for client each service request, can all generate with the service identification corresponding to the service request,
It is associated with it establish client and the ISP of each service link of each service procedure by service identification
Afterwards, be the equal of passing through client, the ISP of each service link, the corresponding sub-information of each ISP
Service identification is together in series.When ISP provides service, it is only necessary to which service identification is uploaded onto the server
End, server end can get the sub-information that the client corresponds to the ISP by the service identification, and a certain
The ISP of service link can not obtain the son letter of the client corresponding to the ISP of other service links
Breath, other non-service provider can not directly directly obtain the customer information of client so that client's from service identification
Information is not easy to reveal.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment cited below particularly, and coordinate
Appended attached drawing, is described in detail below.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached
Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair
The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 shows a kind of method for processing business to maintain secrecy for user information that the embodiment of the present invention is provided
Flow chart;
Fig. 2 shows the another kinds that the embodiment of the present invention is provided to be directed to the method for processing business that user information maintains secrecy
Flow chart;
Fig. 3 shows a kind of method for processing business to maintain secrecy for user information that the embodiment of the present invention is provided
In, the service procedure summary information is compared and analyzed, the flow of service regulation flow corresponding with type of service is generated
Figure;
Fig. 4 shows that the another kind that the embodiment of the present invention is provided is directed to the method for processing business that user information maintains secrecy
In, obtain the flow chart of service procedure summary information corresponding with type of service;
Fig. 5 shows that the another kind that the embodiment of the present invention is provided is directed to the method for processing business that user information maintains secrecy
Flow chart;
Fig. 6 shows a kind of method for processing business to maintain secrecy for user information that the embodiment of the present invention is provided
Flow chart;
Fig. 7 shows the structure for the business processing device to maintain secrecy for user information that the embodiment of the present invention is provided
Schematic diagram;
Fig. 8 shows that the another kind that the embodiment of the present invention is provided is directed to the business processing device that user information maintains secrecy
Structural schematic diagram.
Specific implementation mode
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete
Ground describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist
The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause
This, the detailed description of the embodiment of the present invention to providing in the accompanying drawings is not intended to limit claimed invention below
Range, but it is merely representative of the selected embodiment of the present invention.Based on the embodiment of the present invention, those skilled in the art are not doing
The every other embodiment obtained under the premise of going out creative work, shall fall within the protection scope of the present invention.
At present in many industries, enterprise for the service object of oneself when providing service, the related letter of service object
The ISP that breath can be almost provided with respective service is known;Even in certain industries, such as logistic industry, service
The relevant information of object can illegally be stolen by altogether irrelevant people also easily is based on this, one kind provided by the present application
Method for processing business, device and the system to maintain secrecy for user information can make service object need letter to be protected
Breath is protected in the process of service being provided for service object, and the possibility that the relevant information of service object is leaked is reduced.
This method, device and system are commonly used in the service industry for be easy to causeing the leakage of client's personal information, such as logistic industry,
The relevant information of the clients such as intellectual property agency may circulate in multiple portions, multiple process flows, but need
In the industry to maintain secrecy, at the same time it can also be also required in the other industry of protection used in the processing of certain internal processes.Specific
When implementation, be by client corresponding with client, with ISP corresponding to client and with two clients
End can realize that the server of information exchange realizes method provided by the present invention.
For ease of understanding the present embodiment, one kind public to the embodiment of the present invention first for user information into
The method for processing business of row secrecy describes in detail, shown in Figure 1, and what the embodiment of the present invention was provided is directed to user information
The method for processing business to maintain secrecy, this method are applied to server end, and executive agent is server, and this method specifically includes:
S101:Receive the service request of user terminal uploads, wherein the service request includes:The type identification of business,
The corresponding customer information of the business;
When specific implementation, which is mainly used in server end, and executive agent is server.With client
Corresponding client, that is, user terminal, user terminal show human-computer interaction interface to client, are obtained and are used by human-computer interaction interface
The demand for services at family, and corresponding service request is generated according to demand for services, pass through user terminal uploads to server.The business
It is generally comprised in request:The corresponding customer information of type identification and business of business.And the corresponding customer information of business is general
It will include privacy information;Privacy information generally refers to the information of client's need for confidentiality, and the type identification of business refers to client's
In demand for services, the mark etc. corresponding to the type information of service, project information.Since different enterprises is directed to same type
Service or same enterprise be directed to different types of service, different types of service may be provided to the user, therefore take
Business require information needs client specifically to be selected, and each service can all correspond to the type identification there are one business, because
This can include the type identification of business in the service request of generation after client selects required service.
It should be noted that service object's (main body for using user terminal) can be personal, can also be enterprise, group
Body etc., service object can only there are one, it is possibility to have it is multiple.The privacy information of service object is typically all service object oneself
It provides.Such as in logistic industry, there are two service objects:Sender, addressee;The privacy information of service object generally can
Including:Sender's name, address, contact method, mail items, addressee's name, address, contact method etc..And service request
Information is exactly to post.Service request information can be that service object provides, and can also be that enterprises provide.
S102:The corresponding service procedure of the service request is determined according to the type identification of the business.
Specific implementation when, due to the service procedure corresponding to different types of service may be it is different, often
A kind of service procedure may correspond to the type identification of at least one business.Even and same enterprise, when its for service pair
When as providing same kind of service, service procedure may also be different, therefore will be first according to the type identification of business
Determine that service procedure, each service procedure are corresponding at least one service link, each service link is corresponding at least one
A ISP.
S103:The customer information is divided into multiple sub-informations corresponding with the service procedure;Wherein, each described
Sub-information corresponds to a service link in the service procedure;
When specific implementation, customer information is classified according to preset classifying rules, is divided into and the clothes
The corresponding multiple sub-informations of flow of being engaged in.The preset classifying rules needs service item, service procedure of the enterprise according to oneself, clothes
Service type, the service content being specifically related in service are specifically arranged.Such as in logistic industry, it is assumed that include
Pickup transports, send part three flows.When pickup flow, pickup person is only concerned address or the contact method of sender;
In transport courses, logistics personnel are only concerned the transportation route of package;Sending part flow, send part person be only concerned addressee address or
Person's contact method, then classifying rules can be set as:Using the address of sender or contact method as the first kind
Sub-information, and make the sub-information of the first kind corresponding with the service procedure of pickup;Using the address of addressee as the son of the second class
Information, and make the sub-information of the second class corresponding with the service procedure of transport;Using the address of addressee or contact method as
The sub-information of third class, and the sub-information of third class is corresponding with the service procedure of part is sent.In another example in hotel service industry,
Assuming that include register, four service procedures, in registering flow, room are quit the subscription of in room management, room service, room
Between the personnel that check in only register the name of people, ID card No.;In room management process, room administrative staff are only concerned visitor
Room, which is known, no is registered use;In room service flow, room service personnel is also only concerned whether guest room is registered use, and
When quitting the subscription of;In flow is quit the subscription of in room, personnel are quit the subscription of in room it is only necessary to know that the name of client, the room number to be quit the subscription of,
The information on services of client will be so divided into corresponding four classes sub-information.It should be noted that at least being wrapped in per class sub-information
Include a kind of customer information.And customer information included in different types of sub-information can it is identical, can be different, can also portion
Split-phase is same.
S104:Generate service identification according to the service request, and by the service identification establish client with it is every
The association of the ISP of each service link of one service procedure;
When specific implementation, due to maintain secrecy to customer information, business can be generated according to service request
Identification code, and establish by service identification the pass of the ISP of each service link of client and each service procedure
Connection.After client and ISP are associated by traffic flag code, as long as the ISP of each service link
Service identification corresponding in client is known, the son letter of client associated therewith just can be inquired according to service identification
Breath, the sub-information is only in specific ISP.
S105:When the service identification that the ISP for receiving current service link uploads, to described
The ISP of current business link returns to sub-information corresponding with the current business link, so that current business link
ISP completes the corresponding business of the current business link.
The method for processing business to maintain secrecy for user information that the embodiment of the present invention is provided, customer information is divided
For multiple sub-informations corresponding with service procedure, each sub-information is corresponding with a service link in service procedure, and
For each service request of client, can all generate with the service identification corresponding to the service request, passing through business mark
Know after code establishes being associated with of client and the ISP of each service link of each service procedure, be the equal of by
Client, the ISP of each service link, the corresponding sub-information of each ISP pass through service identification sequence
Connection gets up.When ISP provides service, it is only necessary to service identification be uploaded onto the server end, server end leads to
The sub-information that the client corresponds to the ISP, and the service of a certain service link can be got by crossing the service identification
Supplier can not obtain the sub-information of the client corresponding to the ISP of other service links, other non-serving carry
Donor can not directly directly obtain the customer information of client so that the information of client is not easy to reveal from service identification.
The embodiment of the present invention also provides another method for processing business to maintain secrecy for user information.In above-mentioned implementation
On the basis of example, to the ISP of the current business link return corresponding with current business link sub-information it
Before, this method further includes:
The sub-information is encrypted respectively.
Specific implementation when, under normal circumstances, sub-information is encrypted respectively, be so that each sub-information only with
Corresponding ISP it can be decrypted.To sub-information encryption, there are many modes:
1:Each ISP is there are one the encryption key appointed in advance, this encryption key is in server
End, preservation is associated with the ISP, and (this encryption key can be changed, and can voluntarily be changed by server end, also may be used
To be changed by ISP oneself).Due to when customer information is divided into multiple sub-informations, just by each height
Information is all associated from different ISPs, therefore server is in the business for receiving some ISP and being uploaded
When identification code, server can will be sent to ISP by the encrypted sub-information of certain encryption keys.And it services and provides
Person can be according to decruption key corresponding with encryption key (encryption key can be identical as decruption key can not also be identical)
It is decrypted, corresponding sub-information is obtained.In this case, encryption key is usually fixed, removes non-serving
Device or ISP are modified encryption key.
2:Due to ISP be typically necessary using the client corresponding to ISP and between server it is real
The interaction of existing information, is equivalent to each ISP and is required for logging on server end, Huo Zheyi by specific account
There is (such as bar code scanning in the main body that the client corresponding to a ISP is just regarded as login service device end
Device), and the sub-information that server can be directed to each client generates Crypted password and corresponding clear crytpographic key at random.
It, can be by giving birth at random in server end before receiving the service identification uploaded by the client corresponding to ISP
At encryption key sub-information is encrypted.And it is uploaded to by the client corresponding to ISP in received server-side
Service identification after, the sub-information after encryption can be sent to the client corresponding to ISP, while can will
Decruption key be sent to ISP (can be sent by other approach such as short message, mail, can also directly with after encryption
Sub-information send jointly to and the client corresponding to ISP), it is automatic with the client corresponding to ISP
Or after ISP is actively entered decruption key, encrypted sub-information is decrypted.
It should be noted that it is above-mentioned it is encrypted during, a variety of encryption methods can be used, such as des encryption, Hash add
Close, AES encryption etc. is existing or sub-information is encrypted in following occurred all Encryption Algorithm, unrestricted herein.
And encryption key and decruption key can it is identical can not also be identical.In addition, server end is only determining ISP
Identity after sub-information can be just sent to corresponding to ISP client (ISP can be by specific
Account number cipher, using the accessing server by customer end corresponding to ISP to confirm identity).
For example, the present invention provides a kind of method being encrypted using rivest, shamir, adelman sub-information, including:Obtain with
The public key of ISP corresponding to each service link.
In rivest, shamir, adelman, the public key and private key occurred in pairs generally will include, i.e. public keys and privately owned close
Key.If A wants to send with information to B, A can be encrypted with the information to be sent to it of the public key disclosed in B, then will be added
Information after close is sent to B, and the encrypted information can only be decrypted by the private key of B, can obtain original letter
Breath.Therefore in this application, server can be each service procedure year corresponding ISP distribute a pair of of public key with
Private key.Certainly, public key and private key can also be generated by specific ISP, and be gone out public key publication by ISP
Come, which can be accessible to the server.
The corresponding sub-information of service link supplier is encrypted using the public key of ISP;
Specific implementation when, after obtaining service procedure, due to each service link be corresponding with it is at least one
ISP, therefore relative to each service link, can use the public key pair of ISP corresponding with service link
Sub-information is encrypted, and when being encrypted for a certain sub-information, only can use service corresponding with the service link
The public key of supplier.For example, there are tetra- service procedures of A, B, C, D, it is corresponding with four first, second, third, fourth ISPs respectively.
And sub-information corresponding with each ISP is respectively:This four class of information one, information two, information three, information four, this four
A ISP has public key 1, public key 2, public key 3 and public key 4 respectively, then being encrypted, information one is added with public key 1
It is close;Information two is encrypted with public key 2;Information three is encrypted with public key 3, and information four is encrypted with public key 4.
Shown in Figure 2, the embodiment of the present invention also provides another and is directed to the business processing that user information maintains secrecy
Method, on the basis of the above embodiments, this method further includes:
S201:Acquire multiple service procedure information;
When specific implementation, multiple service procedure information are acquired for business multiple same or not of the same race
Service procedure information is acquired, including:The procedure information for the same business that different enterprises are provided | (such as different objects
Stream company is provided which logistics business), the procedure information of the different business that different enterprises are provided (such as food delivery business of making a reservation on the net
And logistics express delivery), the procedure information for the variety classes business that same enterprise is provided, the difference that different enterprises are provided
The procedure information of type business.
S202:Parsing statistics is carried out to the service procedure information, service procedure corresponding with type of service is obtained and summarizes
Information;
When specific implementation, since service link of the different enterprises when service of offer is different.It can
With by computer technology carry out intelligently parsing, including language identification, classifying content, flow make, related side (service object with
And ISP) selection etc..
Shown in Figure 3, an embodiment of the present invention provides one kind carrying out parsing statistics to the service procedure, obtains and industry
The specific method of the corresponding service procedure summary information of service type, including:
S301:Multiple service procedure information are parsed, are obtained corresponding with service procedure information described in each
Multiple service links, and to buy service link addition description label;
S302:Multiple service links are counted respectively according to the description label, service procedure is generated and summarizes
Information.
When specific implementation, multiple service procedure information are parsed, due to each service procedure
Multiple service links are corresponding with, and in the same industry, it is multiple corresponding to the same services flow that different enterprises is provided
Service procedure is also likely to be different, and even if being different service procedure, wherein may also be able to include the identical clothes in part
Business link, therefore after being parsed service procedure information, multiple business rings corresponding to different service procedures can be obtained
Section.Each service link has its definition, computer can directly by according to functional analysis, to the definition of business neutralizing into
Row parsing, the operations such as classifying content can finally parse the description corresponding to each service link, be each industry
The corresponding description label of link of being engaged in addition, the description label of each service link can be multiple.Label is described to be used for industry
Business link is described.Then multiple service links are counted respectively according to description label, generates service procedure and summarizes letter
Breath.
S203:The service procedure summary information is compared and analyzed, service regulation corresponding with type of service is generated
Flow.
Shown in Figure 4, the embodiment of the present invention also provides one kind and specifically compares the service procedure summary information
Analysis, generates the specific method of service regulation flow corresponding with type of service, and this method includes:
S401:Service link corresponding to multiple service procedures in the service procedure summary information is subjected to necessity
Analysis;
S402:If within predetermined threshold value, which is made for the necessity of presently described service link
For necessary business link;
S403:If the necessity of current business link is except preset threshold value, using current business link as non-
Necessary business link;
S404:The necessary business link is combined, service regulation flow corresponding with type of service is generated.
When specific implementation, the service procedure summary information is compared and analyzed, being will be to service procedure
The service link corresponding to multiple service procedures in summary information is compared, due in service procedure summary information, often
One service link all correspondences are described label, when comparison, can be realized between service link according to description label
Comparison.For example, if in the description label of certain service links, the meaning of words of description itself or words of description it is similar
Property reaches certain threshold value or more, and it is same or similar service link to be considered as these service links.And if cannot reach
The threshold value, then it is assumed that these service links are different service link.
Currently, it for the provided operation flow of same service is all different there are many service industries, and take
It is extensive that business is related to content, is managed it is difficult to carry out unified standardization, despite the operation flow in same industry also absent standardized
Industry standard, quality is irregular when at each company in the service of offer.In the service that these industries are provided,
Some service links are not especially necessary.Each service link in service procedure summary information can thus be carried out
Analysis on Necessity, if the service link is necessary, just using the service link as necessary business link, if the industry
Link of being engaged in is non-essential, just using the service link as inessential service link.When being analyzed, tool can be set
The analysis rule of body is corresponding with the service procedure of same or similar type for example, in certain service industries, if certain
Service link be complete the service procedure it is essential, then just using these service links as necessary service link.
And if certain service links are that complete the service procedure not essential, but after being the increase in the service link, customer perception degree
It preferably, can be using these service links as intermediate service link;And if certain service links are It is not necessary to exist
, then can be using these links as inessential service link.Wherein, intermediate service link can be used as necessary business ring
Section can also be used as non-essential service link.
After analyzing each service link, all necessary business links are combined into service procedure, are made
For service regulation flow corresponding with type of service.
In addition, carrying out necessity to the service link corresponding to multiple service procedures in service procedure summary information
When comparative analysis, it is generally based on multiple similar service procedures or different service procedures to carry out.Usually, such as
The multiple service procedures of fruit have some service link simultaneously, then generally can all think that the service link is necessary business link;
If most of service procedure all has some similar service link, then it is assumed that the service link may be necessary business
Link needs the analysis comparison for carrying out next step, that is, investigates whether the service link is not essential, but if having can bring
Better customer perception;If only least a portion of service procedure has some same or similar service link, recognize
It is more to be intended to non-essential service link for the service link.The necessity comparative analysis rule of specific service link
It can specifically be set according to practical situation.
Shown in Figure 5, the embodiment of the present invention also provides another and is directed to the business processing that user information maintains secrecy
Method, on the basis of above-mentioned several embodiments, this method includes:
S501:Different business modules is generated, wherein there are one service links for each described business module correspondence;
When specific implementation, business module can be generated by server end, be to business when generating
Module adds corresponding process description or business description.The business module can also be generated by client.Such as certain client exists
Specify some service procedure when, if some service link and be not present corresponding business module, the visitor
Family can send the generation request of business module to server, in the generation request of the business module, may include:Business mould
The corresponding service link title of group, the job description to be completed, the service procedure type field of application, application scenarios, etc., this
A little descriptions all can serve as the corresponding description of the business module.After client generates the business module, it can incite somebody to action
The business module is opened to all clients.
S502:Receive the service procedure organizing-request of user;The service procedure organizing-request includes:Business module is believed
Breath and with the ISP corresponding to business module information described in each;
When specific implementation, if client wants to formulate the service procedure of some business, only need pair
Already existing business module is selected.And since each business module is corresponding, there are one service links, also need
ISP corresponding to business module is provided.Business module is obtained by above-mentioned S501.Service flow can be sent in user
It is formulated by client oneself before journey organizing-request, can also be selected to use other existing business modules by client.
S503:According to the business module information, select business module, and by business module and with business module information institute
Corresponding ISP's association, service procedure is generated according to the business module of selection.
When specific implementation, due to having contained business module information and each in service procedure organizing-request
ISP corresponding to a business module information, therefore client is when receiving the service procedure organizing-request,
The business module selected by client can be transferred in the business module preserved from it, and according to client's according to business module information
It is required that by business module combination producing service procedure, and by corresponding business module information corresponding to ISP close
Connection gets up, that is, generates a service procedure.
In this process, it can be also that each service procedure is tied up to use the service procedure, client in order to facilitate client
The type identification of a fixed business, so that client subsequently uses.
Shown in Figure 6, the embodiment of the present invention also provides another and is directed to the business processing that user information maintains secrecy
Method, this method apply the client corresponding to the ISP of each service link in family, are carried with above-described embodiment
Exchange method corresponding to the method for confession, executive agent are the client corresponding to ISP.This method includes:
S601:The service identification is obtained, and the service identification is uploaded to server end;
S602:The sub-information that the server end is returned according to the service identification is received, and complete according to sub-information
At the corresponding business of current business link.
Specific implementation when, due in the embodiment corresponding to above-mentioned Fig. 1-Fig. 5 to needle on server end
The method for processing business that user information maintains secrecy is described in detail, therefore which is not described herein again.When service provides
Person obtains service identification, it is desirable to when obtaining the sub-information of corresponding client according to service identification, need business mark
Know code and is uploaded to server.Server, can be by the son corresponding to the ISP after receiving the service identification
Information completes current business link institute back to the client corresponding to ISP, then ISP according to sub-information
Corresponding business.
In this process, if the sub-information that the client corresponding to ISP is received is encrypted sub- letter
Breath, then just needing that the encrypted business sub-information is decrypted.
For example, when server is encrypted sub-information using rivest, shamir, adelman, since each service carries
Donor can only decrypt corresponding service sub-information, use the service to carry when servicing sub-information and being encrypted
The public key of donor, and ISP is then responsible for generating a pair of of public key and private key, and issue public key so that public key being capable of bedding and clothing
Business device is obtained.
After ISP receives sub-information, the encrypted sub-information can be solved by the private key of oneself
It is close, then according to the service content of the service procedure and sub-information, reach service, and service flow is generated according to the result of service
Cheng Dacheng information, is sent to service object.
The method for processing business to maintain secrecy for user information that the embodiment of the present invention is provided, ISP are connecing
After receiving service sub-information, corresponding service sub-information can only be decrypted, and can not others be serviced with son letter
Breath is decrypted, it is avoided to know excessive information on services, thus also can preferably ensure the information on services of service object
Confidentiality.
Further embodiment of this invention also provides a kind of business processing device to maintain secrecy for user information, which answers
It is shown in Figure 7 for server end, including:
Request receiving module 10, the service request for receiving user terminal uploads, wherein the service request includes:
The type identification of business, the corresponding customer information of the business;
Service procedure determining module 20, for determining the corresponding clothes of the service request according to the type identification of the business
Business flow;
Sub-information generation module 30, for the customer information to be divided into multiple sub- letters corresponding with the service procedure
Breath;Wherein, each sub-information corresponds to a service link in the service procedure;
Relating module 40 for generating service identification according to the service request, and is built by the service identification
Vertical client is associated with the ISP's of each service link of service procedure described in each;
Sub-information returns to module 50, the business for being uploaded as the ISP for receiving current service link
When identification code, sub-information corresponding with the current business link is returned to the ISP of the current business link, with
The ISP of current business link is set to complete the corresponding business of the current business link.
In the present embodiment, request receiving module 10, service procedure determining module 20, sub-information generation module 30, association mould
Block 40 and sub-information return to the concrete function and interactive mode of module 50, reference can be made to the record of the corresponding embodiments of Fig. 1, herein not
It repeats again.
The business processing device to maintain secrecy for user information that the embodiment of the present invention is provided, customer information is divided
For multiple sub-informations corresponding with service procedure, each sub-information is corresponding with a service link in service procedure, and
For each service request of client, can all generate with the service identification corresponding to the service request, passing through business mark
Know after code establishes being associated with of client and the ISP of each service link of each service procedure, be the equal of by
Client, the ISP of each service link, the corresponding sub-information of each ISP pass through service identification sequence
Connection gets up.When ISP provides service, it is only necessary to service identification be uploaded onto the server end, server end leads to
The sub-information that the client corresponds to the ISP, and the service of a certain service link can be got by crossing the service identification
Supplier can not obtain the sub-information of the client corresponding to the ISP of other service links, other non-serving carry
Donor can not directly directly obtain the customer information of client so that the information of client is not easy to reveal from service identification.
Further embodiment of this invention also provides another business processing device to maintain secrecy for user information, is applied to
Client corresponding to ISP is and the interactive device corresponding to the device in the embodiment corresponding to above-mentioned Fig. 7 packet
It includes:
Service identification acquisition device 60:It is uploaded to for obtaining the service identification, and by the service identification
Server end;
Sub-information reception device 70 is believed for receiving the server end according to the son that the service identification is returned
Breath, and the corresponding business of current business link is completed according to sub-information.In the present embodiment, service identification acquisition device 60, son
The concrete function and interactive mode of information receiver 70, reference can be made to the record of the corresponding embodiments of Fig. 6, details are not described herein.
Further embodiment of this invention also provides a kind of transaction processing system to maintain secrecy for user information, including:Clothes
Business receives server and service providing client;
Wherein, the service receives server and is provided with the device provided such as the corresponding embodiments of above-mentioned Fig. 7;
The service providing client is additionally provided with the device that the embodiment as corresponding to above-mentioned Fig. 8 is provided.
Method for processing business, device and the system to maintain secrecy for user information that the embodiment of the present invention is provided
Computer program product, including the computer readable storage medium of program code is stored, the instruction that said program code includes
It can be used for executing the method described in previous methods embodiment, specific implementation can be found in embodiment of the method, and details are not described herein.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description
It with the specific work process of device, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in a computer read/write memory medium.Based on this understanding, technical scheme of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be expressed in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be
People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic disc or CD.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain
Lid is within protection scope of the present invention.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (7)
1. a kind of method for processing business to maintain secrecy for user information, this method are applied to server end, executive agent
For server, which is characterized in that including:
Different business modules is generated, wherein there are one service links for each described business module correspondence;
Receive the service procedure organizing-request of user;The service procedure organizing-request includes:Business module information and with
ISP corresponding to each described business module information;
According to the business module information, select business module, and by business module and with the clothes corresponding to business module information
Business supplier's association, service procedure is generated according to the business module of selection;
Receive the service request of user terminal uploads, wherein the service request includes:The type identification of business, the business
Corresponding customer information;
The corresponding service procedure of the service request is determined according to the type identification of the business;
The customer information is divided into multiple sub-informations corresponding with the service procedure;Wherein, each sub-information pair
Answer a service link in the service procedure;
Service identification is generated according to the service request, and client and each described clothes are established by the service identification
The association of the ISP of each service link for flow of being engaged in;
When the service identification that the ISP for receiving current service link uploads, to the current business ring
The ISP of section returns to sub-information corresponding with the current business link, so that the ISP of current business link
Complete the corresponding business of the current business link.
2. according to the method described in claim 1, it is characterized in that, to the ISP of the current business link return with
Before the corresponding sub-information of the current business link, further include:The sub-information is encrypted respectively.
3. method according to claim 1 or 2, which is characterized in that further include:Acquire multiple service procedure information;
Parsing statistics is carried out to the service procedure information, obtains service procedure summary information corresponding with type of service;By institute
It states service procedure summary information to compare and analyze, generates service regulation flow corresponding with type of service.
4. according to the method described in claim 3, it is characterized in that, described carry out parsing statistics to the service procedure information,
Service procedure summary information corresponding with type of service is obtained to specifically include:
Multiple service procedure information are parsed, multiple business corresponding with service procedure information described in each are obtained
Link, and be each service link addition description label;
According to the description label, multiple service links are counted respectively, generate service procedure summary information.
5. according to the method described in claim 4, it is characterized in that, described carry out the service procedure summary information to score
Analysis generates service regulation flow corresponding with type of service and specifically includes:
By the service link progress necessity corresponding to multiple service procedures in the service procedure summary information to score
Analysis;
If the necessity of presently described service link is within predetermined threshold value, using the current service link as necessary business
Link;
If the necessity of current business link is except preset threshold value, using current business link as inessential business ring
Section;
The necessary business link is combined, service regulation flow corresponding with type of service is generated.
6. a kind of business processing device to maintain secrecy for user information, is applied to server end, which is characterized in that including:
Module generation module, for generating different business modules, wherein there are one business for each described business module correspondence
Link;
Organizing-request receiving module, the service procedure organizing-request for receiving user;It is wrapped in the service procedure organizing-request
It includes:Business module information and with the ISP corresponding to business module information described in each;
Operation flow generation module, for according to the business module information, selecting business module, and by business module and and industry
ISP's association corresponding to module information of being engaged in, service procedure is generated according to the business module of selection;
Request receiving module, the service request for receiving user terminal uploads, wherein the service request includes:Business
Type identification, the corresponding customer information of the business;
Service procedure determining module, for determining the corresponding service flow of the service request according to the type identification of the business
Journey;
Sub-information generation module, for the customer information to be divided into multiple sub-informations corresponding with the service procedure;Its
In, each sub-information corresponds to a service link in the service procedure;
Relating module for generating service identification according to the service request, and establishes client by the service identification
With being associated with for the ISP of each service link of service procedure described in each;
Sub-information returns to module, the service identification for being uploaded as the ISP for receiving current service link
When, sub-information corresponding with the current business link is returned to the ISP of the current business link, so that currently
The ISP of service link completes the corresponding business of the current business link.
7. a kind of transaction processing system to maintain secrecy for user information, which is characterized in that including:Service receive server with
And service providing client;
Wherein, the service receives server and is provided with the device described in claim 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511024082.4A CN105656888B (en) | 2015-12-29 | 2015-12-29 | Method for processing business, device and the system to maintain secrecy for user information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511024082.4A CN105656888B (en) | 2015-12-29 | 2015-12-29 | Method for processing business, device and the system to maintain secrecy for user information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105656888A CN105656888A (en) | 2016-06-08 |
CN105656888B true CN105656888B (en) | 2018-09-11 |
Family
ID=56490013
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201511024082.4A Active CN105656888B (en) | 2015-12-29 | 2015-12-29 | Method for processing business, device and the system to maintain secrecy for user information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105656888B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106779363A (en) * | 2016-12-02 | 2017-05-31 | 浪潮通信信息系统有限公司 | A kind of method for processing business and device |
CN109684863B (en) * | 2018-09-07 | 2024-01-19 | 平安科技(深圳)有限公司 | Data leakage prevention method, device, equipment and storage medium |
CN111460129B (en) * | 2020-03-27 | 2023-08-22 | 泰康保险集团股份有限公司 | Method, device, electronic equipment and storage medium for generating identification |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102279945A (en) * | 2010-06-09 | 2011-12-14 | 中国电信股份有限公司 | Business-level process customizing platform and method based on SOA (Service Oriented Architecture) |
CN102790761A (en) * | 2012-06-13 | 2012-11-21 | 浙江浙大中控信息技术有限公司 | Regional medical treatment information system and access authority control method |
CN103886398A (en) * | 2012-12-20 | 2014-06-25 | 中国电信股份有限公司 | Service monitoring method and system in cross-system heterogeneous environment |
CN104240005A (en) * | 2013-06-21 | 2014-12-24 | 刘伟 | Application information management system, device and method |
CN104850947A (en) * | 2015-05-07 | 2015-08-19 | 国家计算机网络与信息安全管理中心 | Gridded multi-service procedure unified management method and device |
CN104899713A (en) * | 2015-03-02 | 2015-09-09 | 深圳市腾讯计算机系统有限公司 | Logistic control method, logistic control device and logistic control system based on identification codes |
CN104899518A (en) * | 2015-03-12 | 2015-09-09 | 深圳市腾讯计算机系统有限公司 | Service processing method and apparatus |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9769244B2 (en) * | 2014-06-18 | 2017-09-19 | Microsoft Technology Licensing, Llc | Courier network service |
-
2015
- 2015-12-29 CN CN201511024082.4A patent/CN105656888B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102279945A (en) * | 2010-06-09 | 2011-12-14 | 中国电信股份有限公司 | Business-level process customizing platform and method based on SOA (Service Oriented Architecture) |
CN102790761A (en) * | 2012-06-13 | 2012-11-21 | 浙江浙大中控信息技术有限公司 | Regional medical treatment information system and access authority control method |
CN103886398A (en) * | 2012-12-20 | 2014-06-25 | 中国电信股份有限公司 | Service monitoring method and system in cross-system heterogeneous environment |
CN104240005A (en) * | 2013-06-21 | 2014-12-24 | 刘伟 | Application information management system, device and method |
CN104899713A (en) * | 2015-03-02 | 2015-09-09 | 深圳市腾讯计算机系统有限公司 | Logistic control method, logistic control device and logistic control system based on identification codes |
CN104899518A (en) * | 2015-03-12 | 2015-09-09 | 深圳市腾讯计算机系统有限公司 | Service processing method and apparatus |
CN104850947A (en) * | 2015-05-07 | 2015-08-19 | 国家计算机网络与信息安全管理中心 | Gridded multi-service procedure unified management method and device |
Also Published As
Publication number | Publication date |
---|---|
CN105656888A (en) | 2016-06-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107040922B (en) | Wireless network connecting method, apparatus and system | |
US20190034923A1 (en) | Secure and confidential custodial transaction system, method and device using zero-knowledge protocol | |
US8972612B2 (en) | Collecting asymmetric data and proxy data on a communication network | |
CN106888183A (en) | Data encryption, decryption, the method and apparatus and system of key request treatment | |
US9372987B1 (en) | Apparatus and method for masking a real user controlling synthetic identities | |
CN110780829B (en) | Advertisement printing method, device, equipment and medium based on cloud service | |
CN105656920B (en) | A kind of encryption and decryption method and system for posting number of packages evidence based on express delivery | |
CN108537549A (en) | A kind of purview certification method and device | |
CN107180328B (en) | Logistics method based on QR two-dimensional code | |
CN104106241A (en) | System and Method to Generate Secure Name Records | |
CN101964080A (en) | Be used for file as method and the system thereof of fragments store on memory element | |
CN102215225A (en) | Techniques for monetizing anonymized context | |
CN110717698B (en) | Goods position tracking method, goods position tracking device, logistics management system and storage medium | |
CN105871805A (en) | Anti-stealing-link method and device | |
CN106507344A (en) | Quantum communication system and its communication means | |
CN105656888B (en) | Method for processing business, device and the system to maintain secrecy for user information | |
US9124565B2 (en) | Radio frequency identification devices and reader systems | |
CN106127441A (en) | A kind of network system preventing personal information from leaking and implementation method | |
CN107395587B (en) | Data management method and system based on multipoint cooperation mechanism | |
CN101911055B (en) | Distributed demographics is used to select the method and apparatus of e-advertising | |
CN107196918A (en) | A kind of method and apparatus of matched data | |
CN110198320A (en) | A kind of ciphered information transmission method | |
CN106156650B (en) | Data protection system and method | |
CN106254226A (en) | A kind of information synchronization method and device | |
CN106295366A (en) | Sensitive data recognition methods and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |