CN109558748A - Data processing method, device, electronic equipment and storage medium - Google Patents

Data processing method, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN109558748A
CN109558748A CN201811407905.5A CN201811407905A CN109558748A CN 109558748 A CN109558748 A CN 109558748A CN 201811407905 A CN201811407905 A CN 201811407905A CN 109558748 A CN109558748 A CN 109558748A
Authority
CN
China
Prior art keywords
information
user data
desensitization
sensitive information
catenary system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811407905.5A
Other languages
Chinese (zh)
Other versions
CN109558748B (en
Inventor
王寰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taikang Insurance Group Co Ltd
Original Assignee
Taikang Insurance Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taikang Insurance Group Co Ltd filed Critical Taikang Insurance Group Co Ltd
Priority to CN201811407905.5A priority Critical patent/CN109558748B/en
Publication of CN109558748A publication Critical patent/CN109558748A/en
Application granted granted Critical
Publication of CN109558748B publication Critical patent/CN109558748B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The embodiment provides a kind of data processing method, device, electronic equipment and storage mediums, are related to block chain technical field.This method comprises: obtaining user data, and whether judge in the user data comprising sensitive information;If it is determined that then carrying out desensitization process to the sensitive information by the intelligent contract disposed on block catenary system comprising sensitive information, desensitization information is generated;The desensitization information is stored to the block catenary system, and returns to the index value of the desensitization information of the block catenary system record;The sensitive information in the user data is replaced by the index value, stores the replaced user data.The sensitive information that the technical solution of the embodiment of the present invention can be avoided user is leaked to be distorted with malice, reduces the security risk of user data.

Description

Data processing method, device, electronic equipment and storage medium
Technical field
The present invention relates to block chain technical field, in particular to a kind of data processing method, data processing equipment, Electronic equipment and computer readable storage medium.
Background technique
With the development of internet technology, more and more people carry out various consumption, financing and amusement work by network Dynamic, how the data using user on network become focus.
Currently, in a kind of technical solution, it is shown referring to Fig.1, several user data collection points are set in operation system Data acquisition is carried out, according to different business scenarios by the behavioral data of user such as operating time, action type, operating result Etc. information by database purchase, model and use for subsequent analysis.However, in this technical solution, due in user data It often include part sensitive information or privacy information, it is difficult to guarantee the safety of user data.
Therefore, how to guarantee that the safety of user data becomes technical problem urgently to be resolved.
It should be noted that information is only used for reinforcing the reason to background of the present invention disclosed in above-mentioned background technology part Solution, therefore may include the information not constituted to the prior art known to persons of ordinary skill in the art.
Summary of the invention
The embodiment of the present invention be designed to provide a kind of data processing method, data processing equipment, electronic equipment and Computer readable storage medium, and then overcome the limitation and defect due to the relevant technologies at least to a certain extent and lead to not The problem of guaranteeing the safety of user data.
According to a first aspect of the embodiments of the present invention, a kind of data processing method is provided, comprising: user data is obtained, And whether judge in the user data comprising sensitive information;If it is determined that then passing through block catenary system top comprising sensitive information The intelligent contract of administration carries out desensitization process to the sensitive information, generates desensitization information;The desensitization information is stored to described Block catenary system, and return to the index value of the desensitization information of the block catenary system record;It is replaced by the index value The sensitive information in the user data stores the replaced user data.
In some exemplary embodiments of the invention, aforementioned schemes are based on, the intelligence disposed on block catenary system is passed through Contract carries out desensitization process to the sensitive information, comprising: calls the intelligent contract-defined interface of first disposed on block catenary system, institute The first intelligent contract-defined interface is stated to be used to carry out desensitization process to the sensitive information;By the described first intelligent contract-defined interface to institute It states sensitive information and carries out desensitization process.
In some exemplary embodiments of the invention, it is based on aforementioned schemes, the data processing method further include: connecing When receiving the inquiry request for inquiring the user data, the identification information of the user data is extracted from the inquiry request; The user data is obtained based on the identification information, obtains the index value for the desensitization information that the user data includes; The desensitization information is inquired from the block catenary system based on the index value, and it is described to obtain to restore the desensitization information Sensitive information.
In some exemplary embodiments of the invention, aforementioned schemes are based on, are based on the index value from the block chain The desensitization information is inquired in system, comprising: call the second intelligent contract-defined interface of the block catenary system, second intelligence Contract-defined interface from the block catenary system for inquiring the desensitization information;Pass through second intelligence based on the index value Contract-defined interface inquires the sensitive information from the block catenary system.
In some exemplary embodiments of the invention, aforementioned schemes are based on, it is described to obtain to restore the desensitization information Sensitive information, comprising: call the third intelligence contract-defined interface of the block catenary system, the third intelligence contract-defined interface for pair The desensitization information carries out reduction treatment;The sensitivity is restored from the user data by the third intelligence contract-defined interface Information.
In some exemplary embodiments of the invention, aforementioned schemes are based on, store the replaced user data, packet It includes: by the replaced user data storage into target database or in target journaling file.
In some exemplary embodiments of the invention, be based on aforementioned schemes, judge in the user data whether include Sensitive information, comprising: whether judged in the user data according to sensitive information definition rule comprising sensitive information.
According to a second aspect of the embodiments of the present invention, a kind of data processing equipment is provided, comprising: judging unit, for obtaining User data is taken, and whether is judged in the user data comprising sensitive information;Desensitization process unit, for if it is determined that comprising quick Feel information, then desensitization process is carried out to the sensitive information by the intelligent contract disposed on block catenary system, generates desensitization letter Breath;Generation unit being indexed, for storing the desensitization information to the block catenary system, and returning to the block catenary system note The index value of the desensitization information of record;Storage unit, described in being replaced in the user data by the index value Sensitive information stores the replaced user data.
According to a third aspect of the embodiments of the present invention, a kind of electronic equipment is provided, comprising: processor;And memory, institute It states and is stored with computer-readable instruction on memory, realize when the computer-readable instruction is executed by the processor as above-mentioned Data processing method described in any one of first aspect.
According to a fourth aspect of the embodiments of the present invention, a kind of computer readable storage medium is provided, calculating is stored thereon with Machine program realizes the data processing as described in any one of above-mentioned first aspect when the computer program is executed by processor Method.
In the technical solution provided by some embodiments of the present invention, on the one hand, comprising quick in determining user data When feeling information, desensitization process is carried out to sensitive information by the intelligent contract disposed on block catenary system, by desensitization information storage Into block catenary system, due to deposit block chain data can not distort, so as to guarantee user sensitive information safety Property and reliability;On the other hand, the sensitive information in user data is replaced by the index value of the desensitization information of block chained record, Replaced user data is stored, the sensitive information that can further avoid user is leaked to be distorted with malice, reduces user The security risk of data;In another aspect, combining due to being able to use heritage storage system with the mode that block catenary system combines User data is saved, so as to further increase the safety of user data.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not It can the limitation present invention.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention Example, and be used to explain the principle of the present invention together with specification.It should be evident that the accompanying drawings in the following description is only the present invention Some embodiments for those of ordinary skill in the art without creative efforts, can also basis These attached drawings obtain other attached drawings.In the accompanying drawings:
Fig. 1 shows a kind of flow diagram of the data processing method in technical solution;
Fig. 2 shows the flow diagrams of data processing method according to some embodiments of the invention;
Fig. 3 shows the flow diagram for inquiring data according to some embodiments of the present invention;
Fig. 4 shows the flow diagram of the data processing method of other embodiments according to the present invention;
Fig. 5 shows the schematic diagram of intelligent contract operating process according to some embodiments of the present invention;
Fig. 6 shows the schematic block diagram of the data processing equipment of an exemplary embodiment according to the present invention;
Fig. 7 shows the structural schematic diagram for being suitable for the computer system for the electronic equipment for being used to realize the embodiment of the present invention.
Specific embodiment
Example embodiment is described more fully with reference to the drawings.However, example embodiment can be real in a variety of forms It applies, and is not understood as limited to embodiment set forth herein;On the contrary, thesing embodiments are provided so that the present invention will be comprehensively and complete It is whole, and the design of example embodiment is comprehensively communicated to those skilled in the art.Identical appended drawing reference indicates in figure Same or similar part, thus repetition thereof will be omitted.
In addition, described feature, structure or characteristic can be incorporated in one or more implementations in any suitable manner In example.In the following description, many details are provided to provide and fully understand to the embodiment of the present invention.However, It will be appreciated by persons skilled in the art that technical solution of the present invention can be practiced without one or more in specific detail, Or it can be using other methods, constituent element, device, step etc..In other cases, it is not shown in detail or describes known side Method, device, realization or operation are to avoid fuzzy each aspect of the present invention.
Block diagram shown in the drawings is only functional entity, not necessarily must be corresponding with physically separate entity. I.e., it is possible to realize these functional entitys using software form, or realized in one or more hardware modules or integrated circuit These functional entitys, or these functional entitys are realized in heterogeneous networks and/or processor device and/or microcontroller device.
Flow chart shown in the drawings is merely illustrative, it is not necessary to including all content and operation/step, It is not required to execute by described sequence.For example, some operation/steps can also decompose, and some operation/steps can close And or part merge, therefore the sequence actually executed is possible to change according to the actual situation.
Fig. 2 shows the flow diagrams of data processing method according to some embodiments of the invention.The data processing side Part or all of method is applied to block catenary system.The data processing method includes step S210 to step S240, below it is right Data processing method in the example embodiment of Fig. 2 is described in detail.
Referring to shown in Fig. 2, in step S210, user data is obtained, and whether is judged in the user data comprising quick Feel information.
In the exemplary embodiment, user data can be the user data of various businesses system.For example, user data can be with For the user data of the operation systems such as insurance business system, stock exchange transaction system, financial service system.
In the exemplary embodiment, sensitive information can be defined according to the characteristics of business scenario of operation system, for example, sensitive Information may include the information such as the name of user, the identification card number of user, phone number, home address, but example of the invention Sensitive information in embodiment is without being limited thereto, for example, sensitive information can also be the letter such as the health status of user or financial information Breath.
Further, in the exemplary embodiment, can be judged in user data according to the definition rule of above-mentioned sensitive information It whether include sensitive information.For example, according to the definition rule of sensitive information judge in user data whether include user identity Card number or phone number determine in user data if identification card number or phone number comprising user comprising sensitive information.This Outside, whether can also be judged according to the definition rule combination regular expression of above-mentioned sensitive information in user data comprising sensitive letter Breath.
In other example embodiments, the intelligence for the sensitive information for identification being deployed on block catenary system can be passed through Can contract judge in user data whether to write comprising sensitive information, such as by the definition rule of sensitive information and recognition rule Enter the intelligent contract onto block catenary system, when collecting user data, triggering in intelligence contract identification user data is No includes sensitive information.
In step S220, if it is determined that then passing through the intelligent contract disposed on block catenary system to institute comprising sensitive information It states sensitive information and carries out desensitization process, generate desensitization information.
In the exemplary embodiment, it when in determining user data comprising sensitive information, is disposed on calling block catenary system Intelligent contract-defined interface, that is, sc_encode interface pair of the intelligent contract (smart contract abbreviation sc) for example for data desensitization Sensitive information carries out desensitization process, generates desensitization information.
In the exemplary embodiment, desensitization process, example are carried out to sensitive information using abstract Encryption Algorithm in intelligent contract Such as desensitization process can be carried out to sensitive information using SHA-256, MD5, SHA-512, HMAC Encryption Algorithm, generate sensitive letter The summary info of breath is as desensitization information.It should be noted that can also be using other Encryption Algorithm examples in intelligent contract Such as RSA, DSA Digital Signature Algorithm carries out desensitization process to sensitive information, this is same within the scope of the present invention.
In step S230, the desensitization information is stored to the block catenary system, and return to the block catenary system The index value of the desensitization information of record.
In the exemplary embodiment, by calling the i.e. sc_save of storage intelligence contract pre-defined in block catenary system Desensitization information is stored onto block catenary system, the index value i.e. bc_ of the desensitization information recorded on block catenary system is returned Index, the index value can be the index that the block of the sensitive information is stored in block catenary system, or store the sensitivity The address of the block of information.
In step S240, the sensitive information in the user data, storage replacement are replaced by the index value The user data afterwards.
In the exemplary embodiment, user is replaced with the i.e. bc_index of the index value of the desensitization information recorded on block catenary system Sensitive information in data, by the replaced user data storage comprising the index value to target database or target journaling In file.
The data processing method in example embodiment according to fig. 2, on the one hand, include sensitive letter in determining user data When breath, desensitization process is carried out to sensitive information by the intelligent contract disposed on block catenary system, by desensitization information storage to area In block catenary system, due to deposit block chain data can not distort, so as to guarantee user sensitive information safety and Reliability;On the other hand, the sensitive information in user data, storage are replaced by the index value of the desensitization information of block chained record Replaced user data, the sensitive information that can further avoid user is leaked to be distorted with malice, reduces user data Security risk;In another aspect, combining preservation with the mode that block catenary system combines due to being able to use heritage storage system User data, so as to further increase the safety of user data.
Further, in some embodiments, when in determining user data comprising sensitive information, block catenary system is called Intelligent contract-defined interface, that is, sc_encode the interface of the first of upper deployment, first intelligence interface is for taking off the sensitive information Quick processing carries out desensitization process to the sensitive information by first intelligence interface.For example, can be on block catenary system in advance The first intelligent contract for carrying out desensitization process to sensitive information is disposed, which can execute encryption for one section The code of function when in determining user data comprising sensitive information, calls the first intelligent contract of the first intelligent contract to connect Mouth carries out desensitization process to the sensitive information.
Fig. 3 shows the flow diagram for inquiring data according to some embodiments of the present invention.
Referring to shown in Fig. 3, in step s310, when receiving the inquiry request for inquiring the user data, from described The identification information of the user data is extracted in inquiry request.
In the exemplary embodiment, when needing to obtain user data, inquiry is initiated to the server of storage user data and is asked It asks.When server receives the inquiry request to user data, the mark letter of the user data is extracted from the inquiry request Cease user name, that is, User ID (IDENTIFICATION, mark) of such as user.
In step s 320, the user data is obtained based on the identification information, obtains the described of the user data The index value for the information that desensitizes.
In the exemplary embodiment, in the exemplary embodiment, based on the identification information of user from the target data of server end Corresponding user data is inquired in library, and the index value of corresponding desensitization information is extracted from the user data inquired.
In step S330, the desensitization information is inquired from the block catenary system based on the index value, and restore The desensitization information is to obtain the sensitive information.
In the exemplary embodiment, the index value based on desensitization information inquires corresponding desensitization information from block catenary system, For example, corresponding block in the index value inquiry block catenary system based on desensitization information, inquires corresponding desensitization from the block Information.
In the exemplary embodiment, when information is desensitized in inquiry, the dispose on block catenary system second intelligent contract is called to connect Mouthful, the second intelligent contract-defined interface from the block catenary system for inquiring corresponding desensitization information;Rope based on desensitization information Draw value and corresponding desensitization information is inquired from block catenary system by the second intelligent contract-defined interface.For example, can be in block chain The second intelligence contract i.e. sc_fetch for carrying out data query is disposed in system in advance, which can be one Code or SQL (Structured Query Language, structured query language) sentence of Duan Zhihang query function, is being looked into When asking desensitization information, the second intelligent contract-defined interface of the second intelligent contract is called, the index value based on desensitization information is from block Corresponding desensitization information is inquired in catenary system.
Further, in the exemplary embodiment, desensitization is believed by using reverse decipherment algorithm corresponding with desensitization process Breath carries out reduction treatment, to obtain sensitive information corresponding with the information that desensitizes.Specifically, being restored to desensitization information When, the third intelligence contract-defined interface of the block catenary system is called, which is used to carry out the desensitization information Reduction treatment;Corresponding sensitive information is restored from the user data by the third intelligence contract-defined interface.For example, can be The third intelligence i.e. sc_decode of contract for carrying out reduction treatment to desensitization information is disposed on block catenary system in advance, this Three intelligent contracts can be one section of code being restored to desensitization information, the third intelligence contract and for desensitization process One intelligent contract is corresponding, for example, third is intelligently closed when the first intelligent contract encrypts sensitive data using public-key cryptography About restored using private cipher key pair corresponding with the disclosure key desensitization information.When being restored to desensitization information, adjust With the third intelligence contract-defined interface of the third intelligence contract, decryption operation corresponding with the first intelligence contract is based on from the number of users Corresponding sensitive information is restored in.
Fig. 4 shows the flow diagram of the data processing method of other embodiments according to the present invention.
Referring to shown in Fig. 4, in step S410, sensitive information is determined according to business scenario.Such as business scenario be protect When dangerous business, sensitive information is the identification card number and telephone number of user.
In the step s 420, user data is obtained.For example, needing user in the user registration module of insurance business system The information such as name, certificate number, cell-phone number, the pet name, hobby are filled in, after user completes data input and submits, insurance business System will receive user data below: [2017-8-2013:55:20] #user-registry:doRegistry: {‘name’:’jack’,’identity’:’1234567xxx’,’mobile’:’1234567890’,’nickname’:’ xxxxxxxx’,’hobby’:’cooking’}。
In step S430, identify in user data whether include sensitive information according to sensitive information definition rule.For example, Judged according to sensitive information definition rule whether comprising identification card number or cell-phone number in user data, if including identification card number or hand Machine number then determines in user data comprising sensitive information.Further, in the exemplary embodiment, it is wrapped in identification user data When containing sensitive information, triggers the data desensitization process for the intelligent contract disposed on block catenary system.
In step S440, desensitization process is carried out to user data according to the intelligent contract disposed on block catenary system.
In the exemplary embodiment, using desensitization module (the abbreviation sc_ of intelligence contract predetermined in block catenary system Encode) to the sensitive information in user data into desensitization process.For example, to ' name ' in above-mentioned user data: ' Jack ', ' identity ': ' 1234567xxx ', ' mobile ': the part such as ' 1234567890 ' (hereinafter referred to as data) is taken off Quick processing returns to the corresponding desensitization information abstract_data of the sensitive information i.e.: intelligent and about sc_encode (data)= => abstract_data.
In step S450, the information that desensitizes is passed through in the intelligent contract storage to block catenary system disposed in advance.For example, Desensitization information abstract_data is stored by intelligence predetermined and about sc_save onto block chain node block, is returned Return the index value bc_index recorded on block chain.
Then, in the exemplary embodiment, the index value bc_index of the sensitive information recorded on block chain is replaced into original The part of sensitive information in beginning user data, it is final to store by the storage of replaced result into database or journal file Result it is as follows: [2017-8-2013:55:20] #user-registry:doRegistry:{ %bc_index%, ' nickname’:’xxxxxxxx’,’hobby’:’cooking’}。
In step S460, however, it is determined that do not include sensitive information in user data, then store number of users using usual manner According to for example, directly by user data storage into database.
In addition, in the exemplary embodiment, when needing to use the user data comprising sensitive information, according to sensitive information Index value bc_index obtains inquiry by the intelligence disposed in block catenary system and about sc_fetch from block catenary system Abstract_data, and the sensitive letter of sensitivity reduction is obtained by intelligence and about sc_decode combination private key or reverse decipherment algorithm Cease data original value.
Intelligent contract is, in the case where certain condition is satisfied, can be automatically triggered execution in block catenary system Program.It should be noted that intelligence and about sc_encode, intelligence and about sc_save, intelligence and about sc_fetch, intelligence are closed About sc_decode is the program code for the corresponding function of execution being deployed on block catenary system in advance.Block catenary system top The intelligent contract of administration is difficult to be tampered, not by the intervention of block chain node in implementation procedure.In an exemplary embodiment of the invention, Different code logics is executed using intelligent contract in different steps, different code logics can pass through different intelligence Contract executes, and can also be executed by unified intelligent contract, the present invention is to this without particular determination.
Fig. 5 shows the schematic diagram of intelligent contract operating process according to some embodiments of the present invention.
Referring to Figure 5, in step S510, intelligent contract is compiled on block chain development platform such as JUICE platform, Such as to above-mentioned intelligence and about sc_encode, intelligence and about sc_save, intelligence and about sc_fetch, intelligence and about sc_ Decode is compiled.
In step S520, corresponding intelligent contract is created in block chain development platform and to the interface of intelligent contract.
In step S530, corresponding intelligent contract is disposed in block chain development platform, for example, by above-mentioned intelligent contract Sc_encode, intelligence and about sc_save, intelligence and about sc_fetch, intelligence and about sc_decode are deployed to block catenary system On.
In step S540, the instruction for whether having received and triggering corresponding intelligent contract is monitored, such as receive inquiry and refer to When enabling, triggering intelligence and about sc_fetch are determined.
In step S550, which is called by corresponding intelligent contract-defined interface, for example, passing through intelligent contract The interface of sc_fetch calls the intelligence contract.
In step S550, when the intelligence contract is finished, intelligent contract corresponding with above-metioned instruction is removed.Example Such as, after a transaction is finished, intelligent contract corresponding with the transaction is removed.
In addition, in an exemplary embodiment of the invention, additionally providing a kind of data processing equipment.Referring to shown in Fig. 6, the number It may include: judging unit 610, desensitization process unit 620, index generation unit 630 and storage unit according to processing unit 640.Wherein: whether judging unit 610 judges in the user data for obtaining user data comprising sensitive information;It is de- Quick processing unit 620 is used to then pass through the intelligent contract disposed on block catenary system to described quick if it is determined that comprising sensitive information Feel information and carry out desensitization process, generates desensitization information;Generation unit 630 is indexed to be used for desensitization information storage to the area Block catenary system, and return to the index value of the desensitization information of the block catenary system record;Storage unit 640 is for passing through institute It states index value and replaces the sensitive information in the user data, store the replaced user data.
In some exemplary embodiments of the invention, aforementioned schemes are based on, desensitization process unit 620 includes: to call list Member, for calling the dispose on block catenary system first intelligent contract-defined interface, the described first intelligent contract-defined interface is used for described Sensitive information carries out desensitization process;Processing unit, for being carried out by the described first intelligent contract-defined interface to the sensitive information Desensitization process.
In some exemplary embodiments of the invention, it is based on aforementioned schemes, the data processing equipment 600 further include: Extraction unit, for extracting the use from the inquiry request when receiving the inquiry request for inquiring the user data The identification information of user data;Acquiring unit is indexed, for obtaining the user data based on the identification information, obtains the use The index value for the desensitization information that user data includes;Reduction unit is inquired, for being based on the index value from the block chain The desensitization information is inquired in system, and restores the desensitization information to obtain the sensitive information.
In some exemplary embodiments of the invention, aforementioned schemes are based on, inquiry reduction unit is configured to: calling institute The second intelligent contract-defined interface of block catenary system is stated, the described second intelligent contract-defined interface from the block catenary system for inquiring The desensitization information;Described in being inquired from the block catenary system based on the index value by the described second intelligent contract-defined interface Sensitive information.
In some exemplary embodiments of the invention, aforementioned schemes are based on, inquiry reduction unit is configured to: calling institute The third intelligence contract-defined interface of block catenary system is stated, the third intelligence contract-defined interface is for restoring the desensitization information Processing;The sensitive information is restored from the user data by the third intelligence contract-defined interface.
In some exemplary embodiments of the invention, aforementioned schemes are based on, storage unit 640 is configured to: will be replaced The user data afterwards is stored into target database or in target journaling file.
In some exemplary embodiments of the invention, aforementioned schemes are based on, judging unit 610 is configured to: according to quick Whether sense information definition rule judges in the user data comprising sensitive information.
Each functional module and above-mentioned data processing side due to the data processing equipment 600 of example embodiments of the present invention The step of example embodiment of method, is corresponding, therefore details are not described herein.
In an exemplary embodiment of the present invention, a kind of electronic equipment that can be realized the above method is additionally provided.
Below with reference to Fig. 7, it illustrates the computer systems 700 for the electronic equipment for being suitable for being used to realize the embodiment of the present invention Structural schematic diagram.The computer system 700 of electronic equipment shown in Fig. 7 is only an example, should not be to the embodiment of the present invention Function and use scope bring any restrictions.
As shown in fig. 7, computer system 700 includes central processing unit (CPU) 701, it can be read-only according to being stored in Program in memory (ROM) 702 or be loaded into the program in random access storage device (RAM) 703 from storage section 708 and Execute various movements appropriate and processing.In RAM 703, it is also stored with various programs and data needed for system operatio.CPU 701, ROM 702 and RAM 703 is connected with each other by bus 704.Input/output (I/O) interface 705 is also connected to bus 704。
I/O interface 705 is connected to lower component: the importation 706 including keyboard, mouse etc.;It is penetrated including such as cathode The output par, c 707 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 708 including hard disk etc.; And the communications portion 709 of the network interface card including LAN card, modem etc..Communications portion 709 via such as because The network of spy's net executes communication process.Driver 710 is also connected to I/O interface 705 as needed.Detachable media 711, such as Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 710, in order to read from thereon Computer program be mounted into storage section 708 as needed.
Particularly, according to an embodiment of the invention, may be implemented as computer above with reference to the process of flow chart description Software program.For example, the embodiment of the present invention includes a kind of computer program product comprising be carried on computer-readable medium On computer program, which includes the program code for method shown in execution flow chart.In such reality It applies in example, which can be downloaded and installed from network by communications portion 709, and/or from detachable media 711 are mounted.When the computer program is executed by central processing unit (CPU) 701, executes and limited in the system of the application Above-mentioned function.
It should be noted that computer-readable medium shown in the present invention can be computer-readable signal media or meter Calculation machine readable storage medium storing program for executing either the two any combination.Computer readable storage medium for example can be --- but not Be limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above combination.Meter The more specific example of calculation machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, just of one or more conducting wires Taking formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type may be programmed read-only storage Device (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device, Or above-mentioned any appropriate combination.In the present invention, computer readable storage medium can be it is any include or storage journey The tangible medium of sequence, the program can be commanded execution system, device or device use or in connection.And at this In invention, computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but unlimited In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for By the use of instruction execution system, device or device or program in connection.Include on computer-readable medium Program code can transmit with any suitable medium, including but not limited to: wireless, electric wire, optical cable, RF etc. are above-mentioned Any appropriate combination.
Flow chart and block diagram in attached drawing are illustrated according to the system of various embodiments of the invention, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of above-mentioned module, program segment or code include one or more Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical On can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it wants It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction It closes to realize.
Being described in unit involved in the embodiment of the present invention can be realized by way of software, can also be by hard The mode of part realizes that described unit also can be set in the processor.Wherein, the title of these units is in certain situation Under do not constitute restriction to the unit itself.
As on the other hand, present invention also provides a kind of computer-readable medium, which be can be Included in electronic equipment described in above-described embodiment;It is also possible to individualism, and without in the supplying electronic equipment. Above-mentioned computer-readable medium carries one or more program, when the electronics is set by one for said one or multiple programs When standby execution, so that the electronic equipment realizes such as above-mentioned data processing method as described in the examples.
For example, the electronic equipment may be implemented as shown in Figure 1: step S110 obtains user data, and judges institute It whether states in user data comprising sensitive information;Step S120, if it is determined that then passing through block catenary system top comprising sensitive information The intelligent contract of administration carries out desensitization process to the sensitive information, generates desensitization information;Step S130 deposits the desensitization information The block catenary system is stored up, and returns to the index value of the desensitization information of the block catenary system record;Step S140 leads to It crosses the index value and replaces the sensitive information in the user data, store the replaced user data.
It should be noted that although being referred to several modules for acting the device executed in the above detailed description Or unit, but this division is not enforceable.In fact, embodiment according to the present invention, above-described two Or more the feature and function of module or unit can be embodied in a module or unit.Conversely, above-described One module or the feature and function of unit can be to be embodied by multiple modules or unit with further division.
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the present invention The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating Equipment (can be personal computer, server, touch control terminal or network equipment etc.) executes embodiment according to the present invention Method.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to of the invention its Its embodiment.This application is intended to cover any variations, uses, or adaptations of the invention, these modifications, purposes or Person's adaptive change follows general principle of the invention and including the undocumented common knowledge in the art of the present invention Or conventional techniques.The description and examples are only to be considered as illustrative, and true scope and spirit of the invention are by following Claim is pointed out.
It should be understood that the present invention is not limited to the precise structure already described above and shown in the accompanying drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present invention is limited only by the attached claims.

Claims (10)

1. a kind of data processing method characterized by comprising
User data is obtained, and whether is judged in the user data comprising sensitive information;
If it is determined that then being desensitized by the intelligent contract disposed on block catenary system to the sensitive information comprising sensitive information Processing generates desensitization information;
The desensitization information is stored to the block catenary system, and returns to the desensitization information of the block catenary system record Index value;
The sensitive information in the user data is replaced by the index value, stores the replaced user data.
2. data processing method according to claim 1, which is characterized in that closed by the intelligence disposed on block catenary system Desensitization process about is carried out to the sensitive information, comprising:
The intelligent contract-defined interface of first disposed on block catenary system is called, the described first intelligent contract-defined interface is used for the sensitivity Information carries out desensitization process;
Desensitization process is carried out to the sensitive information by the described first intelligent contract-defined interface.
3. data processing method according to claim 1, which is characterized in that the data processing method further include:
When receiving the inquiry request for inquiring the user data, the mark of the user data is extracted from the inquiry request Know information;
The user data is obtained based on the identification information, obtains the index for the desensitization information that the user data includes Value;
The desensitization information is inquired from the block catenary system based on the index value, and restores the desensitization information to obtain The sensitive information.
4. data processing method according to claim 3, which is characterized in that be based on the index value from the block linkwork The desensitization information is inquired in system, comprising:
The second intelligent contract-defined interface of the block catenary system is called, the described second intelligent contract-defined interface is used for from the block chain The desensitization information is inquired in system;
The sensitive information is inquired from the block catenary system by the described second intelligent contract-defined interface based on the index value.
5. data processing method according to claim 3, which is characterized in that the reduction desensitization information is described quick to obtain Feel information, comprising:
The third intelligence contract-defined interface of the block catenary system is called, the third intelligence contract-defined interface is used to believe the desensitization Breath carries out reduction treatment;
The sensitive information is restored from the user data by the third intelligence contract-defined interface.
6. data processing method according to claim 1, which is characterized in that the replaced user data of storage, packet It includes:
By the replaced user data storage into target database or in target journaling file.
7. data processing method according to any one of claim 1 to 6, which is characterized in that judge the user data In whether include sensitive information, comprising:
Whether judged in the user data according to sensitive information definition rule comprising sensitive information.
8. a kind of data processing equipment characterized by comprising
Whether judging unit for obtaining user data, and judges in the user data comprising sensitive information;
Desensitization process unit is used for if it is determined that then passing through the intelligent contract disposed on block catenary system to institute comprising sensitive information It states sensitive information and carries out desensitization process, generate desensitization information;
Generation unit being indexed, for storing the desensitization information to the block catenary system, and returning to the block catenary system The index value of the desensitization information of record;
Storage unit stores replaced for replacing the sensitive information in the user data by the index value The user data.
9. a kind of electronic equipment characterized by comprising
Processor;And
Memory is stored with computer-readable instruction on the memory, and the computer-readable instruction is held by the processor The data processing method as described in any one of claims 1 to 7 is realized when row.
10. a kind of computer readable storage medium, is stored thereon with computer program, the computer program is executed by processor Data processing method of the Shi Shixian as described in any one of claims 1 to 7.
CN201811407905.5A 2018-11-23 2018-11-23 Data processing method and device, electronic equipment and storage medium Active CN109558748B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811407905.5A CN109558748B (en) 2018-11-23 2018-11-23 Data processing method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811407905.5A CN109558748B (en) 2018-11-23 2018-11-23 Data processing method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109558748A true CN109558748A (en) 2019-04-02
CN109558748B CN109558748B (en) 2020-11-03

Family

ID=65867280

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811407905.5A Active CN109558748B (en) 2018-11-23 2018-11-23 Data processing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109558748B (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110110516A (en) * 2019-01-04 2019-08-09 北京车和家信息技术有限公司 Log recording method, apparatus and system
CN110119429A (en) * 2019-04-22 2019-08-13 矩阵元技术(深圳)有限公司 Data processing method, device, computer equipment and storage medium
CN110135175A (en) * 2019-04-26 2019-08-16 平安科技(深圳)有限公司 Information processing, acquisition methods, device, equipment and medium based on block chain
CN110209744A (en) * 2019-05-07 2019-09-06 深圳壹账通智能科技有限公司 Relevant database and its operating method and device based on alliance's chain
CN110222052A (en) * 2019-05-20 2019-09-10 重庆金融资产交易所有限责任公司 Block chain data processing method, device, computer equipment and storage medium
CN110224817A (en) * 2019-05-29 2019-09-10 中国人民大学 A kind of software popularization intelligent service system and method based on block chain technology
CN110543516A (en) * 2019-07-26 2019-12-06 深圳壹账通智能科技有限公司 Intelligent contract processing method and device, computer equipment and storage medium
CN110598463A (en) * 2019-04-19 2019-12-20 腾讯科技(深圳)有限公司 Block chain-based information processing method and device and computer-readable storage medium
CN110781188A (en) * 2019-10-23 2020-02-11 泰康保险集团股份有限公司 Form information processing method and device, electronic equipment and storage medium
CN111209589A (en) * 2019-12-31 2020-05-29 航天信息股份有限公司 Method and system for dynamic data desensitization based on regional chain
CN111343142A (en) * 2020-01-22 2020-06-26 腾讯科技(深圳)有限公司 Data processing method and device based on block chain network and storage medium
CN111355710A (en) * 2020-02-19 2020-06-30 腾讯科技(深圳)有限公司 Data request method and device of network service
CN111415158A (en) * 2020-03-31 2020-07-14 支付宝(杭州)信息技术有限公司 Wind control method and system based on block chain
CN112487486A (en) * 2020-12-18 2021-03-12 平安普惠企业管理有限公司 Data acquisition method and device based on block chain and computer equipment
CN112580107A (en) * 2021-02-23 2021-03-30 布比(北京)网络技术有限公司 Data opening method based on block chain, data acquisition method and corresponding devices
CN113438234A (en) * 2021-06-24 2021-09-24 字极(上海)网络科技有限公司 Network data security protection encryption method
CN113792342A (en) * 2021-09-17 2021-12-14 平安普惠企业管理有限公司 Desensitization data restoration method and device, computer equipment and storage medium
CN115688184A (en) * 2022-12-26 2023-02-03 平安银行股份有限公司 Log desensitization method and device, electronic equipment and storage medium
WO2023142773A1 (en) * 2022-01-30 2023-08-03 华为技术有限公司 Device control method, device, and distributed digital key system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106599322A (en) * 2017-01-03 2017-04-26 北京网智天元科技股份有限公司 Data desensitization method and device
CN107103087A (en) * 2017-05-02 2017-08-29 成都中远信电子科技有限公司 Block chain big data analysis of market conditions system
CN107315970A (en) * 2016-04-26 2017-11-03 展讯通信(上海)有限公司 The exchange method and device of a kind of sensitive data
CN108389046A (en) * 2018-02-07 2018-08-10 西安交通大学 Secret protection method of commerce based on block chain technology in a kind of e-commerce

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107315970A (en) * 2016-04-26 2017-11-03 展讯通信(上海)有限公司 The exchange method and device of a kind of sensitive data
CN106599322A (en) * 2017-01-03 2017-04-26 北京网智天元科技股份有限公司 Data desensitization method and device
CN107103087A (en) * 2017-05-02 2017-08-29 成都中远信电子科技有限公司 Block chain big data analysis of market conditions system
CN108389046A (en) * 2018-02-07 2018-08-10 西安交通大学 Secret protection method of commerce based on block chain technology in a kind of e-commerce

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陇小渝 等: "区块链技术在我们行业发展中的应用", 《经济研究导刊》 *

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110110516A (en) * 2019-01-04 2019-08-09 北京车和家信息技术有限公司 Log recording method, apparatus and system
WO2020211660A1 (en) * 2019-04-19 2020-10-22 腾讯科技(深圳)有限公司 Information processing method and device based on blockchain, and computer-readable storage medium
KR102459318B1 (en) 2019-04-19 2022-10-27 텐센트 테크놀로지(센젠) 컴퍼니 리미티드 Information processing method and device based on block chain and computer readable storage medium
US11442912B2 (en) 2019-04-19 2022-09-13 Tencent Technology (Shenzhen) Company Limited Blockchain-based information processing method and apparatus and computer-readable storage medium
CN110598463B (en) * 2019-04-19 2021-05-14 腾讯科技(深圳)有限公司 Block chain-based information processing method and device and computer-readable storage medium
KR20210038658A (en) * 2019-04-19 2021-04-07 텐센트 테크놀로지(센젠) 컴퍼니 리미티드 Blockchain-based information processing method and device and computer-readable storage medium
CN110598463A (en) * 2019-04-19 2019-12-20 腾讯科技(深圳)有限公司 Block chain-based information processing method and device and computer-readable storage medium
CN110119429A (en) * 2019-04-22 2019-08-13 矩阵元技术(深圳)有限公司 Data processing method, device, computer equipment and storage medium
CN110119429B (en) * 2019-04-22 2021-12-03 矩阵元技术(深圳)有限公司 Data processing method, data processing device, computer equipment and storage medium
WO2020215685A1 (en) * 2019-04-26 2020-10-29 平安科技(深圳)有限公司 Block chain-based information processing and acquisition methods and apparatus, device, and medium
CN110135175A (en) * 2019-04-26 2019-08-16 平安科技(深圳)有限公司 Information processing, acquisition methods, device, equipment and medium based on block chain
CN110209744A (en) * 2019-05-07 2019-09-06 深圳壹账通智能科技有限公司 Relevant database and its operating method and device based on alliance's chain
CN110222052A (en) * 2019-05-20 2019-09-10 重庆金融资产交易所有限责任公司 Block chain data processing method, device, computer equipment and storage medium
CN110224817A (en) * 2019-05-29 2019-09-10 中国人民大学 A kind of software popularization intelligent service system and method based on block chain technology
CN110543516A (en) * 2019-07-26 2019-12-06 深圳壹账通智能科技有限公司 Intelligent contract processing method and device, computer equipment and storage medium
CN110781188A (en) * 2019-10-23 2020-02-11 泰康保险集团股份有限公司 Form information processing method and device, electronic equipment and storage medium
CN111209589A (en) * 2019-12-31 2020-05-29 航天信息股份有限公司 Method and system for dynamic data desensitization based on regional chain
CN111343142A (en) * 2020-01-22 2020-06-26 腾讯科技(深圳)有限公司 Data processing method and device based on block chain network and storage medium
CN111355710A (en) * 2020-02-19 2020-06-30 腾讯科技(深圳)有限公司 Data request method and device of network service
CN111415158B (en) * 2020-03-31 2022-04-22 支付宝(杭州)信息技术有限公司 Wind control method and system based on block chain
CN111415158A (en) * 2020-03-31 2020-07-14 支付宝(杭州)信息技术有限公司 Wind control method and system based on block chain
CN112487486A (en) * 2020-12-18 2021-03-12 平安普惠企业管理有限公司 Data acquisition method and device based on block chain and computer equipment
CN112580107A (en) * 2021-02-23 2021-03-30 布比(北京)网络技术有限公司 Data opening method based on block chain, data acquisition method and corresponding devices
CN113438234A (en) * 2021-06-24 2021-09-24 字极(上海)网络科技有限公司 Network data security protection encryption method
CN113792342A (en) * 2021-09-17 2021-12-14 平安普惠企业管理有限公司 Desensitization data restoration method and device, computer equipment and storage medium
CN113792342B (en) * 2021-09-17 2023-09-08 山西数字政府建设运营有限公司 Desensitization data reduction method, device, computer equipment and storage medium
WO2023142773A1 (en) * 2022-01-30 2023-08-03 华为技术有限公司 Device control method, device, and distributed digital key system
CN115688184A (en) * 2022-12-26 2023-02-03 平安银行股份有限公司 Log desensitization method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN109558748B (en) 2020-11-03

Similar Documents

Publication Publication Date Title
CN109558748A (en) Data processing method, device, electronic equipment and storage medium
US10963400B2 (en) Smart contract creation and monitoring for event identification in a blockchain
CN109981619A (en) Data capture method, device, medium and electronic equipment
JP2022504440A (en) Secondary fraud detection during transaction verification
CN110032599B (en) Data structure reading and updating method and device, and electronic equipment
US20240089262A1 (en) System and method for aggregating client data and cyber data for authentication determinations
KR101588932B1 (en) Security through metadata orchestrators
CN112241506B (en) User behavior backtracking method, device, equipment and system
EP4100864A1 (en) System and method for conversational middleware platform
CN110084007A (en) Construction method, device and the terminal of risk control model
CN109446259B (en) Data processing method and device, processor and storage medium
CN110245940A (en) Digital asset voucher inherits the information processing method and relevant apparatus in transfer
CN108491267A (en) Method and apparatus for generating information
CN111985703B (en) User identity state prediction method, device and equipment
CN108921712A (en) Data processing method, device, medium and electronic equipment
CN114598671B (en) Session message processing method, device, storage medium and electronic equipment
WO2022206439A1 (en) Method and apparatus for providing cross-chain message
CN108920618A (en) A kind of store method, device, medium and the electronic equipment of object reference relationship
CN111985921B (en) Verification processing method based on block chain offline payment and digital financial service platform
CN110858242A (en) Page skipping method and device
CN109495468A (en) Authentication method, device, electronic equipment and storage medium
CN111177536B (en) Method and device for transmitting customized information to unregistered user based on device fingerprint and electronic device
CN116644473A (en) Data desensitization method and device
CN109271564A (en) Declaration form querying method and equipment
CN110351435A (en) Blacklist setting method of conversing and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant