CN110166644A - Data processing method, device, computer equipment and storage medium - Google Patents
Data processing method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN110166644A CN110166644A CN201910300396.4A CN201910300396A CN110166644A CN 110166644 A CN110166644 A CN 110166644A CN 201910300396 A CN201910300396 A CN 201910300396A CN 110166644 A CN110166644 A CN 110166644A
- Authority
- CN
- China
- Prior art keywords
- banquet
- encrypted
- target
- attending
- obtains
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/38—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42008—Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/50—Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
- H04M3/51—Centralised call answering arrangements requiring operator intervention, e.g. call or contact centers for telemarketing
- H04M3/523—Centralised call answering arrangements requiring operator intervention, e.g. call or contact centers for telemarketing with call distribution or queueing
- H04M3/5232—Call distribution algorithms
- H04M3/5233—Operator skill based call distribution
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Marketing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention discloses a kind of data processing method, device, computer equipment and storage medium, and this method includes obtaining system login request, and system login request includes mark of attending a banquet;According to identifier lookup database of attending a banquet, obtains and identify corresponding security level with attending a banquet;If security level is not up to predetermined level, preset disabling program is called to carry out disable operation to user terminal, and controls the user terminal display disabling page;Based on the disabling page, if getting the customer information acquisition request of user terminal transmission, according to customer information acquisition request, the customer data that the mark that obtains and attend a banquet matches, and original number is extracted from customer data;Original number is encrypted, corresponding target encrypted number is obtained and target shows number;Target is shown that number is shown in user terminal, and the displaying target encrypted number in Hidden field corresponding with target display number, to solve the problems, such as that the customer data obtained is unreasonable and client's number cannot get secrecy.
Description
Technical field
The present invention relates to technical field of data processing more particularly to a kind of data processing method, device, computer equipment and
Storage medium.
Background technique
With the development of science and technology, most of company is received calls by attending a banquet or out-going call is adopted to handle information
The affairs such as collection, Products Show and business return visit.When out-going call of attending a banquet carrys out processing business etc., need first to obtain from database
To the corresponding telephone number of client, since each ability of attending a banquet is different, if the telephone number got it is excessive perhaps very few or
It is that when mismatching with the processing business for attending a banquet be good at, will affect treatment effeciency of attending a banquet, and part attends a banquet and gets number of user
After code, client is harassed in violation of rules and regulations or customer information leaks outside, client's number is caused to have a risk of leakage, to distribute phase to attend a banquet
The customer data matched, client's number, which obtains secrecy, becomes a urgent problem to be solved.
Summary of the invention
The embodiment of the present invention provides a kind of data processing method, device, computer equipment and storage medium, to solve to attend a banquet
The problem of customer data of acquisition mismatches, and client's number cannot get secrecy.
A kind of data processing method, comprising:
System login request is obtained, the system login request includes mark of attending a banquet;
According to the identifier lookup database of attending a banquet, obtains and identify corresponding security level with described attend a banquet;
If the security level is not up to predetermined level, preset disabling program is called to carry out disabling behaviour to user terminal
Make, and controls the user terminal display disabling page;
Based on the disabling page, if getting the customer information acquisition request of user terminal transmission, believed according to the client
Acquisition request is ceased, obtains the customer data to match with the mark of attending a banquet, and extract original number from the customer data;
The original number is encrypted, corresponding target encrypted number is obtained and target shows number;
The target is shown that number is shown in user terminal, and in Hidden field corresponding with target display number
The middle display target encrypted number.
A kind of data processing equipment, comprising:
Request module, for obtaining system login request, the system login request includes mark of attending a banquet;
Security level obtains module, for identifier lookup database of attending a banquet according to, obtains and the mark pair of attending a banquet
The security level answered;
It disables page display module and calls preset disabling journey if being not up to predetermined level for the security level
Ordered pair user terminal carries out disable operation, and controls the user terminal display disabling page;
Original number obtains module, for being based on the disabling page, if the customer information for getting user terminal transmission obtains
Request is taken, according to the customer information acquisition request, obtains the customer data to match with the mark of attending a banquet, and from the visitor
Original number is extracted in user data;
Encrypting module obtains corresponding target encrypted number and target for the original number to be encrypted
Show number;
Number display module, for the target to be shown that number is shown in user terminal, and aobvious with the target
Show and shows the target encrypted number in the corresponding Hidden field of number.
A kind of computer equipment, including memory, processor and storage are in the memory and can be in the processing
The computer program run on device, the processor realize the step of above-mentioned data processing method when executing the computer program
Suddenly.
A kind of computer readable storage medium, the computer-readable recording medium storage have computer program, the meter
The step of calculation machine program realizes above-mentioned data processing method when being executed by processor.
It is above-mentioned that a kind of data processing method, device, computer equipment and storage medium are provided, when detect attend a banquet login plus
When close system, according to identifier lookup database of attending a banquet, obtains and identify corresponding security level with attending a banquet, so as to according to security level
Show the corresponding page.If security level is not up to predetermined level, preset disabling program is called to disable user terminal
Operation, and the user terminal display disabling page is controlled, it realizes and partial function progress is carried out to the terminal of attending a banquet of not up to predetermined level
Disabling, avoiding attending a banquet gets client's number by security breaches, to improve number safety.When attend a banquet carry out outer dial when, first
Customer information acquisition request is sent, the customer data that the mark that obtains and attend a banquet matches avoids in the customer data got
Original number is excessive or very few, does not match that with the ability of attending a banquet, and to guarantee to attend a banquet that corresponding business is effectively treated, distributes phase
The customer data matched, so that the ability of attending a banquet is embodied.Original number is encrypted, avoid attending a banquet harassing and wrecking client in violation of rules and regulations
Or leakage client's number, to improve number safety.Target is shown that number is shown in user terminal, and is shown with target
Displaying target encrypted number in the corresponding Hidden field of number realizes telephone number encryption display.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention
Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention
Example, for those of ordinary skill in the art, without any creative labor, can also be according to these attached drawings
Obtain other attached drawings.
Fig. 1 is the application environment schematic diagram of data processing method in one embodiment of the invention;
Fig. 2 is the flow chart of data processing method in one embodiment of the invention;
Fig. 3 is the flow chart of data processing method in one embodiment of the invention;
Fig. 4 is the flow chart of data processing method in one embodiment of the invention;
Fig. 5 is the flow chart of data processing method in one embodiment of the invention;
Fig. 6 is the flow chart of data processing method in one embodiment of the invention;
Fig. 7 is the flow chart of data processing method in one embodiment of the invention;
Fig. 8 is the functional block diagram of data processing equipment in one embodiment of the invention;
Fig. 9 is a schematic diagram of computer equipment in one embodiment of the invention.
Specific embodiment
Below by the attached drawing in knot and the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
Data processing method provided in an embodiment of the present invention can be applicable in the application environment such as Fig. 1, is particularly applicable in and adds
In close system, encryption system includes user terminal and server-side, wherein user terminal is communicated by network with server-side.According to
Attend a banquet and identify determining security level, the corresponding disabling page is shown according to security level, when attend a banquet need out-going call when, first obtain
The customer data that the mark that takes and attend a banquet matches, is effectively treated corresponding business so that attending a banquet, and to the customer data got
Middle original number is encrypted, and is obtained target encrypted number and target and is shown number, in the display page displaying target show
Number, and the displaying target encrypted number in Hidden field realize number encipherment protection.Wherein, user terminal can be, but not limited to respectively
Kind personal computer, laptop, smart phone, tablet computer and portable wearable device.Server-side can be with independently
The server-side cluster of server-side either multiple server-sides composition realize.
In one embodiment, as shown in Fig. 2, providing a kind of data processing method, the service in Fig. 1 is applied in this way
It is illustrated, specifically comprises the following steps: for end
S10: obtaining system login request, and system login request includes mark of attending a banquet.
Wherein, system login request, which refers to attend a banquet, logs in the request of encryption system according to account number cipher etc..It attends a banquet mark
Refer to mark corresponding with attending a banquet, mark of attending a banquet has uniqueness, for example, it may be the work number etc. attended a banquet, passes through mark of attending a banquet
Knowledge, which can determine, uniquely attends a banquet.
Specifically, encryption system provides an account login interface, attends a banquet through work number password login encryption system, server-side
It include mark of attending a banquet in system login request by account login interface to get system login request.Pass through work number password
It is logged in, to realize that account is verified, improves safety, if subsequent generation number is revealed, there is trackability by work number.
S20: it according to identifier lookup database of attending a banquet, obtains and identifies corresponding security level with attending a banquet.
Wherein, security level, which refers to, preconfigured identifies corresponding grade with attending a banquet.
Specifically, database purchase has each attend a banquet to identify corresponding data of attending a banquet, and includes attending a banquet in the data of attending a banquet
Grade.Database and server-side are connected to the network, server-side is got attend a banquet mark after, according to identifier lookup database of attending a banquet, obtain
Corresponding grade of attending a banquet is identified with attending a banquet, further according to ranked queries database of attending a banquet, obtains corresponding security level.Wherein, it sits
Seat grade refers to the grade divided according to position of attending a banquet.Grade of attending a banquet can be divided into the business personnel that attends a banquet, department manager and show
Field manager etc..
S30: if security level is not up to predetermined level, preset disabling program is called to carry out disabling behaviour to user terminal
Make, and controls the user terminal display disabling page.
Wherein, predetermined level refers to the preset grade for being used to determine whether to be disabled.Disabling program refers to pre-
The code for the certain functions of disabling of first writing.The disabling page refers to the page of certain function disablings, and concretely right button disables boundary
Face, to ensure the safety of user number information.
Specifically, some companies can carry out client's number simply to hide, and client's number, right button are stored in Hidden field
The frame for the telephone number that the duplication page is shown, pastes in Excel, thus the available content to Hidden field can be got
Client's number causes client's number that cannot protect.Therefore it first determines corresponding security level of attending a banquet, by security level and presets
Grade is compared, if security level reaches predetermined level, i.e. the security level of the user is height, then without calling disabling journey
Sequence directly shows the page of encryption system;If security level is not up to predetermined level, i.e. the security level of the user is
It is low, then preset disabling program is called, corresponding user terminal carries out right button disabling to attending a banquet, and controls user terminal display and prohibit
With the page, avoids attending a banquet replicating by right button and paste loophole acquisition client's number, so that client's number is protected.Wherein, it uses
Family end is to identify corresponding terminal of attending a banquet with attending a banquet.
S40: it is obtained if getting the customer information acquisition request of user terminal transmission according to customer information based on the disabling page
Request is taken, the customer data that the mark that obtains and attend a banquet matches, and original number is extracted from customer data.
Wherein, customer data refers to that being stored in database needs to attend a banquet out-going call to handle information collection, Products Show
With business pay a return visit etc. affairs client data.Original number refers to the client's number extracted from customer data.
Specifically, attending a banquet for task is to receive calls or out-going call handles information collection, Products Show and industry
The affairs such as business return visit.Business personnel in advance deposits the customer data to be processed of the affairs such as information collection, Products Show and business return visit
Storage carries out type of service label into database, and for each customer data to be processed, and subsequent distribution gives what is matched to attend a banquet
It is handled.When attend a banquet need out-going call when processing business when, first based on disabling the page to server-side send customer information obtain
Request is taken, server-side is according to customer information acquisition request, and obtain and attend a banquet the customer data for identifying and matching, wherein client's number
Include client's number in, original number (client's number) corresponding with each client is extracted from customer data.Can specifically it lead to
It crosses regular expression and obtains original number from customer data.Wherein, refer to acquisition with the customer data that mark matches of attending a banquet
To quantity and the grade of attending a banquet (processing can be accepted by attending a banquet) of customer data match, and the customer data got is corresponding
Type of service should match with mark of attending a banquet corresponding business is effectively treated so that attending a banquet and identifying corresponding attend a banquet.
S50: being encrypted original number, obtains corresponding target encrypted number and target shows number.
Wherein, target encrypted number, which refers to, carries out encrypted character string to original number, specially 36 16 systems
Character string.Target shows that number refers to and shows that the page shows number corresponding with original number in user terminal, wherein target is aobvious
Show that number is to be hidden rear obtained number to part digital number in original number.
Specifically, after server-side gets original number, original number is added using preset Encryption Algorithm
It is close, to obtain target encrypted number;Part is carried out to original number to hide, and is obtained target and is shown number.In the present embodiment, encryption
Algorithm concretely aes algorithm, wherein AES (Advanced Encryption Standard, Advanced Encryption Standardalgorithm),
It is also known as Rijndael enciphered method in cryptography, is a kind of block encryption standard that U.S. Federal Government uses, aes algorithm uses
Be replacement-permutation network, rather than Feistel framework, on software and hardware can rapidly encryption and decryption, added with improving target
The acquisition efficiency of close number.
S60: target is shown that number is shown in user terminal, and is shown in Hidden field corresponding with target display number
Show target encrypted number.
Wherein, Hidden field refers to the region for being hidden element.
Specifically, after server-side gets target display number and target encrypted number, each customer data is corresponding
Target shows that number carries out display in the display interface of user terminal and will identify distributing for the type of service to match with attending a banquet
Number in the customer data of quantity is shown, and corresponding target encrypted number is shown in Hidden field.It is understood that
Ground, target show that number is corresponding with target encrypted number.By avoiding right button of attending a banquet in Hidden field displaying target encrypted number
The operation such as duplication gets original number corresponding with target display number, improves the safety of client's number.
In step S10-S60, when detect attend a banquet log in encryption system when, according to identifier lookup database of attending a banquet, obtain
Corresponding security level is identified with attending a banquet, to show the corresponding page according to security level.If security level is not up to default
Grade then calls preset disabling program to carry out disable operation to user terminal, and controls the user terminal display disabling page, realization pair
The not up to partial function disabling of the corresponding user terminal of attending a banquet of predetermined level, avoiding attending a banquet gets client by security breaches
Number, to improve the safety of client's number.When attend a banquet carry out outer dial when, customer information acquisition request is first sent, with mark of attending a banquet
Sensible matched customer data avoids the original number in the customer data got excessive or very few, not with the ability of attending a banquet
Match, to guarantee to attend a banquet that corresponding business is effectively treated, the customer data to match is distributed, so that the ability of attending a banquet obtains body
It is existing.Original number is encrypted, avoid attending a banquet harassing and wrecking client in violation of rules and regulations or leakage client's number, to improve client's number peace
Quan Xing.Target is shown that number is shown in user terminal, and the displaying target in Hidden field corresponding with target display number
Encrypted number realizes telephone number encryption display.
In one embodiment, in step S50, original number is encrypted, obtains corresponding target encrypted number
Number is shown with target, comprising:
(1) if original number does not meet preset rules, original number is pre-processed, obtains number to be encrypted, it is right
Number to be encrypted is encrypted, and obtains corresponding target encrypted number and target shows number.
Wherein, preset rules refer to preset rule corresponding with original number, for example, original number can not wrap
Containing prefix.Wherein, prefix refers to the IP number of dialling in corresponding with operator's informaiton belonging to loCal number, international access code, country
Code or prefix etc..Number to be encrypted, which refers to, carries out pretreated number to original number.
Specifically, the phone number that China uses is continuous 11 digit, wherein each section has different coding directions: first 3:
Network identification mark;4th~7: area code;8th~11: Subscriber Number.Server-side is according to preset rules to getting
Each original number is judged judge whether the original number got includes prefix, if original number be by prefix and
Telephone number composition, then the original number does not meet preset rules.For example, original number is by prefix 0,86 ,+86 and cell-phone number
Code composition, then pre-process original number, that is, determines whether first 3 of original number are network identification mark;If network
Identifier then meets preset rules, includes prefix, by original number if first 3 of original number are not network identification marks
Prefix is filtered, and to obtain number to be encrypted, and is treated encrypted number and is encrypted, and corresponding target encryption numbers are obtained
Code and target show number, and the step of encryption herein is identical as step S50, does not do and specifically repeats.By judging whether to accord with
Preset rules are closed, so that the subsequent target encrypted number got is more accurate.
(2) if original number meets preset rules, original number is encrypted, obtains corresponding target encryption
Number and target show number.
Specifically, if original number meets preset rules, i.e. original number does not include prefix, thens follow the steps S50, herein
It does not do and specifically repeats.
In one embodiment, it as shown in figure 3, before step S20, i.e., according to identifier lookup database of attending a banquet, obtains
With attend a banquet before identifying corresponding security level, data processing method further includes following steps:
S21: obtaining grade configuring request, and grade configuring request includes attend a banquet grade and security level.
Wherein, grade configuring request be directed to server-side transmission for configuring corresponding security level for grade of attending a banquet
Request.Grade of attending a banquet, which refers to, identifies corresponding grade with attending a banquet, the grade that can be specifically determined according to the position attended a banquet.
Specifically, server-side obtains the grade configuring request that user terminal is sent, and carries out safety etc. according to grade configuring request
Grade configuration, wherein include attend a banquet grade and security level in grade configuring request.It is specifically corresponding for each grade configuration of attending a banquet
Ground security level, for example, attend a banquet grade be attend a banquet business personnel and department manager when, then configure corresponding security level be it is low,
When grade of attending a banquet is site manager etc., then corresponding security level is configured as height.By being in advance each grade configuration of attending a banquet
Corresponding security level, compared to directly corresponding security level is configured for each mark of attending a banquet, avoiding attending a banquet identifies corresponding seat
Seat grade is replaced, and causing to attend a banquet identifies the situation of corresponding security level mistake, and being attended a banquet with raising acquisition, it is corresponding to identify
The accuracy of security level.
S22: determining that each attend a banquet identifies corresponding type of service of attending a banquet, and can divide accordingly for each grade configuration of attending a banquet
With quantity.
Wherein, type of service of attending a banquet refer to attend a banquet identify it is corresponding carry out processing business type, concretely with seat
Seat identifies corresponding attend a banquet and is good at the type of service of processing, for example, type of service is that information collection, Products Show and business are paid a return visit
Deng.Can quantity allotted refer to the amount of undertaking corresponding with each grade of attending a banquet.
Specifically, after server-side gets the grade configuring request of user terminal transmission, each mark pair of attending a banquet first is determined
Corresponding customer data is distributed to this and attended a banquet by the type of service of attending a banquet answered so as to subsequent, and to attend a banquet, quickly processing is corresponding
Business, then accordingly can quantity allotted to attend a banquet grade configuration, it is possible to understand that ground, higher grade of attending a banquet, and corresponding accepts
It measures bigger.By configure accordingly can quantity allotted, so as to it is subsequent attend a banquet obtain customer data when, can according to can quantity allotted into
Row distribution avoids and attends a banquet that identify corresponding customer data quantity excessive or very few, to realize reasonable distribution.
S23: the type of service that will attend a banquet, grade of attending a banquet, security level and can quantity allotted associated storage in the database.
Specifically, server-side will attend a banquet type of service, grade of attending a banquet, corresponding security level with can quantity allotted be associated with and deposit
Storage into database, attend a banquet for subsequent basis identify determine corresponding type of service of attending a banquet, security level and can quantity allotted mention
For technical foundation.
In step S21-S23, grade configuring request is obtained, grade configuring request includes attend a banquet grade and security level, is kept away
Exempt from it is subsequent attend a banquet identify corresponding grade change of attending a banquet after, the case where security level is not modified, improves security level and obtains
Accuracy rate.It determines that each attend a banquet identifies corresponding type of service of attending a banquet, corresponding customer data is distributed to the seat so as to subsequent
Seat quickly handles corresponding business to attend a banquet, for it is each attend a banquet grade configuration accordingly can quantity allotted, with realize determine it is every
One, which attends a banquet, identifies corresponding undertaking amount, subsequent basis can quantity allotted be allocated, realize reasonable distribution.
In one embodiment, as shown in figure 4, in step S40, according to customer information acquisition request, obtain and attend a banquet mark
The customer data to match, specifically comprises the following steps:
S41: it according to the identifier lookup database of attending a banquet in customer information acquisition request, obtains and identifies corresponding seat with attending a banquet
Seat grade and type of service of attending a banquet.
Wherein, the corresponding relationship of each attend a banquet mark, grade of attending a banquet and type of service of attending a banquet is stored in database.Work as seat
When seat needs out-going call, customer information acquisition request is sent to server-side, server-side is taken according in customer information acquisition request
The identifier lookup database of attending a banquet of band obtains and identifies corresponding grade and the type of service of attending a banquet of attending a banquet with attending a banquet.It should by determining
Attend a banquet grade and the type of service of attending a banquet for mark of attending a banquet, so that the subsequent customer data got is more accurate.
S42: according to attend a banquet grade search database, obtain it is corresponding with grade of attending a banquet can quantity allotted.
Specifically, due to each grade of attending a banquet it is corresponding can quantity allotted it is different, it is possible to understand that ground, higher grade of attending a banquet,
It is corresponding can quantity allotted it is bigger, conversely, lower grade of attending a banquet, it is corresponding can quantity allotted it is smaller, stored in database
Have attend a banquet grade and can quantity allotted incidence relation, by attend a banquet grade search database, can get and grade phase of attending a banquet
It is corresponding can quantity allotted.By determine with attend a banquet identify it is corresponding can quantity allotted, with after an action of the bowels need to show the page on show
With can quantity allotted target show number, so as to attend a banquet to target show number carry out business processing, by distribute and attend a banquet
The customer data of the corresponding quantity of grade, compared to the customer data for being randomly assigned any amount or identical quantity, to improve
The quantity of customer data distributes accuracy rate.
S43: classify to institute's customer data to be handled, obtain corresponding to be processed with each customer data to be processed
Type of service matches type of service to be processed and type of service of attending a banquet.
Wherein, customer data to be processed, which refers to attend a banquet, does not carry out respective treated customer data also.Type of service to be processed
Refer to type of service corresponding with customer data to be processed.
Specifically, it is stored with institute's customer data to be handled in database, institute's customer data to be handled is carried out in advance
Classification, specifically, first determining whether there is missing values in customer data, if it exists missing values, then corresponding service class to be processed
Type is information collection;Missing values if it does not exist then determine type of service to be processed further according to order status;If order status is not
Processing, then corresponding type of service to be processed is Products Show;If order status is to be completed, then corresponding wait locate
Type of service is managed as business return visit, is classified with this to each customer data to be processed, determines each customer data to be processed
Corresponding type of service to be processed, then type of service to be processed is matched with type of service of attending a banquet, to be mark of attending a banquet
Distribute customer data corresponding with type of service of attending a banquet.
S44: customer data to be processed corresponding with the type of service to be processed of type of service successful match of attending a banquet is obtained.
Wherein, customer data to be processed, which refers to attend a banquet, does not carry out respective treated customer data also.
Specifically, if attending a banquet type of service and type of service successful match of attending a banquet, the industry to be processed of successful match is obtained
The corresponding customer data to be processed of service type, that is, get the customer data to be processed attended a banquet and can handled.For example, to be processed
Type of service is information collection, Products Show and business return visit etc., then the type of service that will attend a banquet is matched with business to be processed,
If type of service of attending a banquet and data acquire successful match, client's number to be processed that type of service to be processed is data acquisition is obtained
According to.
S45: from institute's customer data to be handled, obtain with can the customer data that matches of quantity allotted.
Specifically, large number of due to the customer data to be processed that gets, it first obtains opposite with type of service of attending a banquet
The institute's customer data to be handled answered, then obtain from institute's customer data to be handled and can client's number for matching of quantity allotted
According to.So that the type of service to be processed of the customer data got with attend a banquet that identify corresponding type of service of attending a banquet corresponding, and
The quantity of customer data be this attend a banquet identify that corresponding grade of attending a banquet is corresponding can quantity allotted.
In step S41-S45, corresponding attend a banquet grade and type of service of attending a banquet are determined according to attending a banquet to identify, is subsequent acquisition
Technical support is provided to accurately customer data.According to attend a banquet grade search database, obtain it is corresponding with grade of attending a banquet can
Quantity allotted, to realize the quantity for determining the customer data for needing to extract from customer data to be processed.To institute client to be handled
Data are classified, and type of service to be processed corresponding with each customer data to be processed is obtained, by type of service to be processed with
Type of service of attending a banquet is matched, and realizes that the customer data of subsequent allocations is the industry to be processed with type of service successful match of attending a banquet
The corresponding customer data to be processed of service type, from institute's customer data to be handled, obtain with can the visitor that matches of quantity allotted
User data so that terminal of attending a banquet show with can the customer data that matches of quantity allotted and type of service of attending a banquet, attend a banquet to visitor
User data carries out respective handling.According to can quantity allotted be allocated, realize reasonable distribution, according to the customer data of distribution be with
The customer data that type of service of attending a banquet matches improves processing speed of attending a banquet.
In one embodiment, original number includes at least two digital numbers.Wherein, digital number refers to original number of composition
Each number in code.
As shown in figure 5, original number is encrypted in step S50, corresponding target encrypted number and mesh are obtained
Mark display number, specifically comprises the following steps:
S51: being based at least two digital numbers, obtain corresponding station location marker, carries out part covert to original number
Reason obtains display digital number and hiding digital number.
Wherein, station location marker refers to that the corresponding mark of each digital number, station location marker concretely count in original number
Word can determine each digital number in the sequence of original number according to station location marker.For example, a certain original number is
131000000, the station location marker of digital number 1 is 1, and the station location marker of digital number 3 is 2, is successively determined every in original number
The station location marker of one digital number.Display digital number, which refers to, does not need hiding digital number in original number.Hide number
Number, which refers to, hides treated number to carrying out part in original number.
Specifically, it first determines in original number and needs the corresponding digital number of hiding station location marker, be based on station location marker
To needing the hiding corresponding digital number of station location marker to be hidden, the digital number after hiding is replaced with *, acquisition is not required to
The display digital number to be hidden and the hiding digital number being hidden, herein not to the digit for the digital number for needing to hide
It is specifically limited.For example, a certain original number is 13100000000, according to station location marker, determines and need hiding digital number
Code, the digital number being such as hidden the 0000 of the 4th to the 7th as needs, and the digital number that needs are hidden
Code replaces with *, determine show in original number digital number such as original number the 1st to the 3rd and the 8th to the 11st with it is hidden
The 4th to the 7th for hiding digital number such as original number.It is to be appreciated that hiding digital number is specially four *.
S52: being based on station location marker, splices to display digital number and hiding digital number, obtains corresponding target
Show number.
Specifically, server-side obtains the station location marker of each digital number, according to station location marker to display digital number and
Hiding digital number is spliced, and shows number to get target.For example, according to station location marker by the 1st to the 3rd
131, the * * * * of 0000 and the 4th to the 7th of the 8th to the 11st is spliced, and shows that number is to get target
131****0000。
S53: original number is encrypted using preset AES encryption algorithm, obtains corresponding target encrypted number.
Specifically, server-side obtains original number, and is encrypted using preset aes algorithm to original number, obtains
Target encrypted number corresponding with original number.It should be noted that the principle of aes algorithm is (original number) will first to cut in plain text
It is divided into several segments, presets initialization vector (InitializationVector, IV), added with initialization vector and key
Ciphertext after first group of data encryption, is then assigned to IV by close first group of data again, then carries out the second group encryption, circulation
It carries out encrypted characters string being obtained, using encrypted characters string as target encrypted number until terminating.For example, a certain number to be encrypted
Be 13100000000, encrypted number 13100000000 treated using preset aes algorithm and is encrypted, obtain with it is to be added
The corresponding target encrypted number of close number 13100000000.
In step S51-S53, part is carried out to original number and hides processing, obtains display digital number and hiding digital number
Code hides original number part with realizing.Based on station location marker, display digital number and hiding digital number are spelled
It connects, shows number in display page displaying target so as to subsequent, target shows number part digital hiding, improves client's number
Safety.Original number is encrypted using preset AES encryption algorithm, shows corresponding mesh in the display page so as to subsequent
Encrypted number is marked, target encrypted number is shown in Hidden field, avoiding attending a banquet gets client's number by security breaches, mentions
The safety of high client's number.
In one embodiment, as shown in fig. 6, in step S53, i.e., using preset AES encryption algorithm to original number into
Row encryption, obtains in corresponding target encrypted number, specifically comprises the following steps:
S531: obtaining the key and initialization vector of presetting digit capacity, using key and initialization vector to original number into
Row encryption, obtains encrypted characters string.
Wherein, key is for encrypting to original number, and key can be generated using random number functions, wherein pre-
If digit is configured according to specific Encryption Algorithm or actual encrypted needs, in the present embodiment, the length of key is 48 characters.
Encrypted characters string refers to original number is encrypted after character string obtained.Initialization vector (initialization
It vector), is the input value of a regular length.The initialization generated by random number or quasi-random numbers (pseudorandom)
Vector reaches Semantic Security, and attacker is allowed to be difficult to crack the ciphertext of key to same.
Specifically, original number is encrypted by the aes algorithm of CBC mode, AES encryption data block block length must
It must be 128 bits, i.e. 16 byte datas.It in the present embodiment, needs to encrypt original number, i.e., only includes 11 bytes, it will
Original number is filled using PKCS5Padding to 16 bytes.It is encrypted using the key of presetting digit capacity, wherein presetting digit capacity
Key be key that pre-generated length is 48 characters, using two hexadecimal representation key bytes.Wherein, CBC
The aes algorithm of (Cipher Block Chaining, cipher block chaining mode) mode is first will (original number) cutting in plain text
At several segments, initialization vector (Initialization Vector, IV) is preset, is added with initialization vector and key
Then the encrypted ciphertext of first digit number is assigned to IV by close first digit number again, then to second number
Font size code encryption, circulation carry out obtaining encrypted characters string, specially 32 hexadecimal digits until terminating.Pass through CBC mould
The aes algorithm of formula is encrypted, it is not easy to which active attack, safety are better than ECB (Electronic Codebook Book, electricity
Codebooks modes), the message for being suitble to conveying length long.
S532: encrypted identifier is configured for encrypted characters string, encrypted characters string and encrypted identifier are spliced into corresponding
Target encrypted number.
Wherein, encrypted identifier refers to that preconfigured identifier, encrypted identifier include starting identifier and terminating to mark
Know symbol.When target encrypted number is decrypted, which partial character directly can be directly targeted to according to the encrypted identifier
String is the encrypted characters string by encryption.
Specifically, encrypted identifier is configured for encrypted characters string in advance, encrypted identifier includes starting identifier and end
Identifier, wherein starting identifier specifically can be used " LN " to indicate, end identifier specifically can be used " CS " to indicate.By encrypted characters
It goes here and there and is spliced with encrypted identifier, include 2 beginning identifiers, 32 and original to get 36 character strings, 36 for number
The corresponding encrypted characters string of beginning number and 2 end identifiers, using 36 character strings as target encrypted number.
In step S531-S532, the key and initialization vector of presetting digit capacity are obtained, using key and initialization vector pair
Original number is encrypted, and to get encrypted characters string, is realized the ciphering process of original number, is improved the safety of client's number
Property.Encrypted identifier is configured for encrypted characters string, encrypted characters string and encrypted identifier are spliced into corresponding target encryption numbers
Code increases encrypted identifier, can determine which partial character string needs are decrypted, quickly to improve subsequent decryption speed.
In one embodiment, as shown in fig. 7, after step S60, i.e., target is being shown that number is shown in user terminal
Show, and shown in the corresponding Hidden field of number after displaying target encrypted number with target, data processing method further include as
Lower step:
S61: it obtains the number that user terminal is sent and dials request, it includes target encrypted number in request that number, which dials,.
Wherein, number call request is referred to attend a banquet and is needed to show target that dials outside number progress asks based on the display page
It asks.
Specifically, the display page of encryption system show with can the corresponding customer data of quantity allotted, wrap in customer data
Number is shown containing target, and attending a banquet can show that number carries out outer dial based on target.Show that number carries out outer dial based on target when attending a banquet
When, user terminal will send target encrypted number to server-side, and server-side is to obtain target encrypted number.
S62: being decrypted target encrypted number using preset AES decipherment algorithm, obtains and target encrypted number pair
The object decryption number answered.
Wherein, decipherment algorithm refers to the pre-configured algorithm for target encrypted number to be decrypted, and specifically may be used
To be that target encrypted number is decrypted by preconfigured AES decipherment algorithm.
Specifically, target encrypted number is input to aes algorithm decryption entrance, is based on encrypted identifier, judges that target adds
Whether close number is the encrypted number of Encryption Algorithm, i.e., according to the incoming target encrypted number of encrypted identifier judgement whether be
What the algorithm for encryption was crossed.If target encrypted number is the encrypted number of Encryption Algorithm, the beginning identifier in character string is intercepted
And end identifier, to obtain number to be decrypted.Wherein, when target encrypted number is not encrypted target encrypted number, then
Target encrypted number is directly sent into third party's interface and carries out outer dial.If target encrypted number is Encryption Algorithm encrypted number
Code will then start identifier and end identifier be filtered, to get number to be decrypted.For example, target encrypted number is
36 character strings " LN195734A89183B44536566ABCDE426578CS ", interception start identifier LN and end identifier
CS, to get number to be decrypted as " 195734A89183B44536566ABCDE426578 ".Using key and initialize to
Number to be decrypted is decrypted in amount, obtains object decryption number corresponding with number to be decrypted.Wherein, the ginseng inputted when decryption
Number is target encrypted number, secret key and initialization vector IV.Secret key and initialization vector when decryption should be with secret keys when encryption
It is consistent with initialization vector, number to be decrypted is decrypted using key and initialization vector, is obtained and number pair to be decrypted
The object decryption number answered.
S63: being sent to third party's interface for object decryption number, carries out outer dial to object decryption number.
Specifically, the object decryption number after being decrypted is sent to third party's interface, by third party's interface to mesh
Mark decryption number carries out outer dial.Wherein, object decryption number shows that the corresponding original number of number is identical with target.
In step S61-S63, when attend a banquet carry out it is outer dial target and show number when, first by target using preset AES decryption
Target encrypted number is decrypted in algorithm, to obtain object decryption number, to realize that number is decrypted.Object decryption number is sent out
Third party's interface is given, outer dial is carried out to object decryption number.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process
Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit
It is fixed.
In one embodiment, a kind of data processing equipment is provided, in the data processing equipment and above-described embodiment at data
Reason method corresponds.As shown in figure 8, the data processing equipment include request module 10, security level obtain module 20,
Disable page display module 30, original number obtains module 40, encrypting module 50 and number display module 60.Each functional module is detailed
Carefully it is described as follows:
Request module 10, for obtaining system login request, system login request includes mark of attending a banquet.
Security level obtains module 20, identifies corresponding peace for according to identifier lookup database of attending a banquet, obtaining and attending a banquet
Congruent grade.
It disables page display module 30 and calls preset disabling program if being not up to predetermined level for security level
Disable operation is carried out to user terminal, and controls the user terminal display disabling page.
Original number obtains module 40, for being obtained if getting the customer information that user terminal is sent based on the disabling page
Request, according to customer information acquisition request, the customer data that the mark that obtains and attend a banquet matches, and original is extracted from customer data
Beginning number.
Encrypting module 50 obtains corresponding target encrypted number and target is aobvious for original number to be encrypted
Show number.
Number display module 60 for target to be shown that number is shown in user terminal, and is showing number with target
Displaying target encrypted number in corresponding Hidden field.
In one embodiment, encrypting module 50 includes the first judging unit and second judgment unit.
First judging unit pre-processes original number if not meeting preset rules for original number, obtains
Number to be encrypted is treated encrypted number and is encrypted, and obtains corresponding target encrypted number and target shows number.
Second judgment unit is encrypted original number if meeting preset rules for original number, obtains
Corresponding target encrypted number and target show number.
In one embodiment, before security level obtains module 20, data processing equipment includes that configuring request obtains list
Member, quantity configuration unit and storage unit.
Configuring request acquiring unit, for obtaining grade configuring request, grade configuring request includes attend a banquet grade and safety
Grade.
Quantity configuration unit for determining that each attend a banquet identifies corresponding type of service of attending a banquet, and is each grade of attending a banquet
Configuration accordingly can quantity allotted.
Storage unit, for the type of service that will attend a banquet, grade of attending a banquet, security level and can quantity allotted associated storage in number
According in library.
In one embodiment, original number obtain module 40, including information acquisition unit, can quantity allotted determination unit,
Type of service matching unit, customer data determination unit to be processed and customer data extraction unit.
Information acquisition unit, for obtaining and sitting according to the identifier lookup database of attending a banquet in customer information acquisition request
Corresponding grade and the type of service of attending a banquet of attending a banquet of seat mark.
Can quantity allotted determination unit, for according to attend a banquet grade search database, obtain corresponding with grade of attending a banquet
It can quantity allotted.
Type of service matching unit obtains and each visitor to be processed for classifying to institute's customer data to be handled
The corresponding type of service to be processed of user data matches type of service to be processed and type of service of attending a banquet.
Customer data determination unit to be processed, the type of service to be processed for the type of service successful match that obtains and attend a banquet
Corresponding customer data to be processed.
Customer data extraction unit, for from institute's customer data to be handled, obtain with can quantity allotted match
Customer data.
In one embodiment, original number includes at least two digital numbers.
Encrypting module 50 includes hiding processing unit, target display number acquiring unit and target encrypted number to obtain list
Member.
Hide processing unit, for be based at least two digital numbers, obtain corresponding station location marker, to original number into
Row part hides processing, obtains display digital number and hiding digital number.
Target show number acquiring unit, for be based on station location marker, to display digital number and hiding digital number into
Row splicing obtains corresponding target and shows number.
Target encrypted number acquiring unit is obtained for being encrypted using preset AES encryption algorithm to original number
Corresponding target encrypted number.
In one embodiment, target encrypted number acquiring unit includes that encrypted characters string obtains subelement and splicing son list
Member.
Encrypted characters string obtains subelement, for obtaining the key and initialization vector of presetting digit capacity, using key and just
Beginningization vector encrypts original number, obtains encrypted characters string.
Splice list member, for configuring encrypted identifier for encrypted characters string, encrypted characters string and encrypted identifier are spelled
It is connected into corresponding target encrypted number.
In one embodiment, after number display module 60, data processing equipment further include dial request unit,
Decryption unit and outer transfer slip member.
Request unit is dialed, the number for obtaining user terminal transmission dials request, and number, which dials in request, includes
Target encrypted number.
Decryption unit, for target encrypted number to be decrypted using preset AES decipherment algorithm, acquisition adds with target
The corresponding object decryption number of close number.
Outer transfer slip member carries out outer dial to object decryption number for object decryption number to be sent to third party's interface.
Specific about data processing equipment limits the restriction that may refer to above for data processing method, herein not
It repeats again.Modules in above-mentioned data processing equipment can be fully or partially through software, hardware and its group and to realize.On
Stating each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also store in a software form
In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be server-side, internal junction
Composition can be as shown in Figure 9.The computer equipment include by system bus connect processor, memory, network interface and
Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment
Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data
Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating
The database of machine equipment is used for the data for generating or obtaining during storing execution data processing method, service class of such as attending a banquet
Type, grade of attending a banquet, can quantity allotted and the corresponding relationship of security level etc..The network interface of the computer equipment is used for and outside
Terminal by network connection communication.To realize a kind of data processing method when the computer program is executed by processor.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory simultaneously
The computer program that can be run on a processor, processor realize data processing side in above-described embodiment when executing computer program
The step of method, for example, step S10 shown in Fig. 2 to step S60.Alternatively, processor realizes above-mentioned reality when executing computer program
The function of each module in example in data processing equipment is applied, for example, function of the module 10 shown in Fig. 8 to module 60.To avoid weight
Multiple, details are not described herein again.
In one embodiment, a kind of computer readable storage medium is provided, computer program, computer are stored thereon with
Data processing method in above method embodiment is realized when program is executed by processor, for example, step S10 shown in Fig. 2 is extremely walked
Rapid S60.Alternatively, the computer program realizes the function of each module in data processing equipment in above-described embodiment when being executed by processor
Can, for example, function of the module 10 shown in Fig. 8 to module 60.To avoid repeating, details are not described herein again.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, computer program can be stored in a non-volatile computer and can be read
In storage medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the application
To any reference of memory, storage, database or other media used in provided each embodiment, may each comprise non-
Volatibility and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM),
Electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include arbitrary access
Memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, such as static
RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhanced SDRAM
(ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (RambuS) directly RAM (RDRAM), straight
Connect memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function
Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different
Functional unit, module are completed, i.e., the internal structure of device are divided into different functional unit or module, to complete above description
All or part of function.
The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to the foregoing embodiments
Invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each implementation
Technical solution documented by example is modified or equivalent replacement of some of the technical features;And these modification or
Replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all include
Within protection scope of the present invention.
Claims (10)
1. a kind of data processing method characterized by comprising
System login request is obtained, the system login request includes mark of attending a banquet;
According to the identifier lookup database of attending a banquet, obtains and identify corresponding security level with described attend a banquet;
If the security level is not up to predetermined level, preset disabling program is called to carry out disable operation to user terminal, and
Control the user terminal display disabling page;
Based on the disabling page, if getting the customer information acquisition request of user terminal transmission, obtained according to the customer information
Request is taken, obtains the customer data to match with the mark of attending a banquet, and extract original number from the customer data;
The original number is encrypted, corresponding target encrypted number is obtained and target shows number;
The target is shown that number is shown in user terminal, and is shown in Hidden field corresponding with target display number
Show the target encrypted number.
2. data processing method as described in claim 1, which is characterized in that described to be carried out at encryption to the original number
Reason, obtains corresponding target encrypted number and target shows number, comprising:
If the original number does not meet preset rules, the original number is pre-processed, obtains number to be encrypted, it is right
The number to be encrypted is encrypted, and obtains corresponding target encrypted number and target shows number;
If the original number meets preset rules, the original number is encrypted, corresponding target is obtained and adds
Close number and target show number.
3. data processing method as described in claim 1, which is characterized in that in the identifier lookup data of attending a banquet according to
Library, acquisition are attended a banquet before identifying corresponding security level with described, and the data processing method includes:
Grade configuring request is obtained, the grade configuring request includes attend a banquet grade and security level;
It determines that each described attend a banquet identifies corresponding type of service of attending a banquet, and can divide accordingly for each grade configuration of attending a banquet
With quantity;
By the type of service of attending a banquet, the grade of attending a banquet, the security level and it is described can quantity allotted associated storage in number
According in library.
4. data processing method as claimed in claim 3, which is characterized in that it is described according to the customer information acquisition request,
Obtain the customer data to match with the mark of attending a banquet, comprising:
According to the identifier lookup database of attending a banquet in the customer information acquisition request, obtains and identify corresponding seat with described attend a banquet
Seat grade and type of service of attending a banquet;
Database is searched according to the grade of attending a banquet, acquisition is corresponding with the grade of attending a banquet can quantity allotted;
Classify to institute's customer data to be handled, obtains business to be processed corresponding with each customer data to be processed
Type matches the type of service to be processed and the type of service of attending a banquet;
Obtain target customer's data corresponding with the type of service to be processed of the type of service successful match of attending a banquet;
From all target customer's data, obtain with it is described can the customer data that matches of quantity allotted.
5. data processing method as described in claim 1, which is characterized in that the original number includes at least two digital numbers
Code;
It is described that the original number is encrypted, it obtains corresponding target encrypted number and target shows number, comprising:
Based at least two digital numbers, corresponding station location marker is obtained, part is carried out to the original number and hides processing, is obtained
Take display digital number and hiding digital number;
Based on the station location marker, the display digital number and the hiding digital number are spliced, obtained corresponding
Target shows number;
The original number is encrypted using preset AES encryption algorithm, obtains corresponding target encrypted number.
6. data processing method as claimed in claim 5, which is characterized in that described to use preset AES encryption algorithm to institute
It states original number to be encrypted, obtains corresponding target encrypted number, comprising:
The key and initialization vector for obtaining presetting digit capacity, using the key and the initialization vector to the original number
It is encrypted, obtains encrypted characters string;
Encrypted identifier is configured for the encrypted characters string, the encrypted characters string and the encrypted identifier are spliced into correspondence
Target encrypted number.
7. data processing method as described in claim 1, which is characterized in that show number in user the target described
End shown, and after showing with the target and showing the target encrypted number in the corresponding Hidden field of number, described
Data processing method further include:
It obtains the number that user terminal is sent and dials request, it includes target encrypted number in request that the number, which dials,;
The target encrypted number is decrypted using preset AES decipherment algorithm, is obtained and the target encrypted number pair
The object decryption number answered;
The object decryption number is sent to third party's interface, outer dial is carried out to the object decryption number.
8. a kind of data processing equipment characterized by comprising
Request module, for obtaining system login request, the system login request includes mark of attending a banquet;
Security level obtains module, for identifier lookup database of attending a banquet according to, acquisition with it is described attend a banquet identify it is corresponding
Security level;
It disables page display module and calls preset disabling program pair if being not up to predetermined level for the security level
User terminal carries out disable operation, and controls the user terminal display disabling page;
Original number obtains module, for being based on the disabling page, if the customer information acquisition for getting user terminal transmission is asked
It asks, according to the customer information acquisition request, obtains the customer data to match with the mark of attending a banquet, and from client's number
According to middle extraction original number;
Encrypting module obtains corresponding target encrypted number and target is shown for the original number to be encrypted
Number;
Number display module, for the target to be shown that number is shown in user terminal, and with the target number of display
The target encrypted number is shown in the corresponding Hidden field of code.
9. a kind of computer equipment, including memory, processor and storage are in the memory and can be in the processor
The computer program of upper operation, which is characterized in that the processor realized when executing the computer program as claim 1 to
The step of any one of 7 data processing method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists
In the step of realization data processing method as described in any one of claim 1 to 7 when the computer program is executed by processor
Suddenly.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910300396.4A CN110166644A (en) | 2019-04-15 | 2019-04-15 | Data processing method, device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910300396.4A CN110166644A (en) | 2019-04-15 | 2019-04-15 | Data processing method, device, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110166644A true CN110166644A (en) | 2019-08-23 |
Family
ID=67639536
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910300396.4A Pending CN110166644A (en) | 2019-04-15 | 2019-04-15 | Data processing method, device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110166644A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111246465A (en) * | 2019-12-13 | 2020-06-05 | 深圳市智微智能软件开发有限公司 | After-sale customer calling method and system |
CN111416711A (en) * | 2020-03-31 | 2020-07-14 | 中国银行股份有限公司 | Transaction message processing method and device |
CN111460484A (en) * | 2020-04-20 | 2020-07-28 | 深圳市云智融科技有限公司 | Information encryption method, information encryption device and computer readable storage medium |
CN116132079A (en) * | 2022-08-09 | 2023-05-16 | 马上消费金融股份有限公司 | Data processing method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108629484A (en) * | 2018-03-30 | 2018-10-09 | 平安科技(深圳)有限公司 | It attends a banquet qualification management method, apparatus and storage medium |
CN108650674A (en) * | 2017-08-12 | 2018-10-12 | 我要家网络科技有限公司 | A kind of information security enciphering hiding coding system |
CN108920946A (en) * | 2018-07-30 | 2018-11-30 | 美通云动(北京)科技有限公司 | Data security control method and device based on browser |
-
2019
- 2019-04-15 CN CN201910300396.4A patent/CN110166644A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108650674A (en) * | 2017-08-12 | 2018-10-12 | 我要家网络科技有限公司 | A kind of information security enciphering hiding coding system |
CN108629484A (en) * | 2018-03-30 | 2018-10-09 | 平安科技(深圳)有限公司 | It attends a banquet qualification management method, apparatus and storage medium |
CN108920946A (en) * | 2018-07-30 | 2018-11-30 | 美通云动(北京)科技有限公司 | Data security control method and device based on browser |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111246465A (en) * | 2019-12-13 | 2020-06-05 | 深圳市智微智能软件开发有限公司 | After-sale customer calling method and system |
CN111416711A (en) * | 2020-03-31 | 2020-07-14 | 中国银行股份有限公司 | Transaction message processing method and device |
CN111416711B (en) * | 2020-03-31 | 2022-11-25 | 中国银行股份有限公司 | Transaction message processing method and device |
CN111460484A (en) * | 2020-04-20 | 2020-07-28 | 深圳市云智融科技有限公司 | Information encryption method, information encryption device and computer readable storage medium |
CN116132079A (en) * | 2022-08-09 | 2023-05-16 | 马上消费金融股份有限公司 | Data processing method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110166644A (en) | Data processing method, device, computer equipment and storage medium | |
CN107766741A (en) | Data desensitization system and method | |
Arockiam et al. | Efficient cloud storage confidentiality to ensure data security | |
CN108712412B (en) | Database encryption and decryption methods and devices, storage medium and terminal | |
CN107948152A (en) | Information storage means, acquisition methods, device and equipment | |
CN104243149B (en) | Encrypt and Decrypt method, device and server | |
CN108418785B (en) | Password calling method, server and storage medium | |
CN106572076A (en) | Web service access method, client side and server side | |
US11695740B2 (en) | Anonymization method and apparatus, device, and storage medium | |
CN110061967A (en) | Business datum providing method, device, equipment and computer readable storage medium | |
CN107333262A (en) | A kind of system and method based on CN39 code authentication phone numbers | |
CN109697370A (en) | Database data encipher-decipher method, device, computer equipment and storage medium | |
CN101252596A (en) | Method and system for protecting number information privacy | |
CN106022159B (en) | ERP data processing methods based on cloud computing | |
CN109274716A (en) | Method, apparatus, computer equipment and the storage medium of file process | |
CN113127915A (en) | Data encryption desensitization method and device, electronic equipment and storage medium | |
CN111666558B (en) | Key rotation method, device, computer equipment and storage medium | |
CN111917725A (en) | Encryption system and encryption method for multi-tenant SaaS platform | |
CN104601820A (en) | Mobile terminal information protection method based on TF password card | |
CN113591117A (en) | Social platform daily conversation encryption method and system, storage medium and computing device | |
CN108540591B (en) | Address book management method, address book management device and electronic equipment | |
CN106022158A (en) | A takeout management system for file datas | |
CN112995413A (en) | Number information tracing method and device and server | |
CN112751823A (en) | Outgoing data generation method, outgoing safety control method and system | |
CN114866317B (en) | Multi-party data security calculation method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190823 |
|
RJ01 | Rejection of invention patent application after publication |