CN110516471A - Product promotion method and relevant device based on information security - Google Patents
Product promotion method and relevant device based on information security Download PDFInfo
- Publication number
- CN110516471A CN110516471A CN201910763208.1A CN201910763208A CN110516471A CN 110516471 A CN110516471 A CN 110516471A CN 201910763208 A CN201910763208 A CN 201910763208A CN 110516471 A CN110516471 A CN 110516471A
- Authority
- CN
- China
- Prior art keywords
- desensitization
- identity information
- information
- subindex
- cryptographic hash
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0251—Targeted advertisements
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Health & Medical Sciences (AREA)
- Development Economics (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Entrepreneurship & Innovation (AREA)
- Databases & Information Systems (AREA)
- Game Theory and Decision Science (AREA)
- Medical Informatics (AREA)
- Economics (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention belongs to data processing fields, disclose a kind of product promotion method and relevant device based on information security, comprising: desensitize to subscriber identity information, obtain the first desensitization identity information;Calculate the cryptographic Hash of the first desensitization identity information;When being matched to consistent cryptographic Hash in subindex library, it is determined as subindex library belonging to the first desensitization identity information;The index of the plaintext of the first desensitization identity information of building and corresponding phone number;When receiving popularization number acquisition request, extract the second desensitization identity information and corresponding phone number plaintext promoted in number acquisition request, calculate the cryptographic Hash of the second desensitization identity information, and corresponding index is obtained, corresponding target desensitization identity information and target mobile phones number are searched in plain text according to the index got;Request for product authorization link is generated based on target mobile phones number plaintext and target desensitization identity information, is linked based on request for product authorization and carries out product promotion.Improve the accuracy of product promotion.
Description
Technical field
The present invention relates to technical field of data processing more particularly to a kind of product promotion methods based on information security, dress
It sets, equipment and computer readable storage medium.
Background technique
Currently, various products emerge one after another in the market, such as electronic product, loan product.It is produced corresponding to every kind
Product need to be promoted according to the customer information safeguarded in own system.
Existing product promotion generally sends promotion message to client's end using to the customer information safeguarded in own system
The mode at end, wherein the customer information of self maintained is that the customer information based on historical time acquisition obtains, but the connection of client
It is that mode may change, it is inconsistent so as to cause the contact method safeguarded in the practical contact method and system of client
Situation, and be usually used directly contact the contact method safeguarded in system with what is obtained from product promotion end in the prior art
The mode that mode compares, whether the contact method to judge user is consistent, and directly compares the information leakage that will lead to user, peace
Full property is lower, not can guarantee the information security of user.
Summary of the invention
It is a primary object of the present invention to propose it is a kind of by the product promotion method, apparatus of information security, equipment and based on
Calculation machine readable storage medium storing program for executing, it is intended to solve the low technical problem of safety when user information change.
To achieve the above object, the present invention provides a kind of product promotion method based on information security, which comprises
Subscriber identity information is obtained, and is desensitized to the subscriber identity information, the first desensitization of each user is obtained
Identity information;
Calculate it is each it is described first desensitization identity information cryptographic Hash, by it is described first desensitization identity information cryptographic Hash with
Cryptographic Hash in each subindex library is matched;
When the consistent Hash of cryptographic Hash for being matched to the identity information that desensitizes with described first in each subindex library
When value, determine that the subindex library being matched to is subindex library belonging to the first desensitization identity information;
By the stored in clear of each first desensitization identity information and the phone number of corresponding user to described affiliated
Subindex library in, and construct in the affiliated subindex library the first desensitization identity information and corresponding phone number
Plaintext index;
When receiving the popularization number acquisition request of product promotion terminal transmission, the popularization number acquisition request is extracted
In the second desensitization identity information and the corresponding phone number of the second desensitization identity information in plain text, and calculate described second
The cryptographic Hash of desensitization identity information;
Corresponding index is obtained according to the cryptographic Hash of the second desensitization identity information, and is searched according to the index got
Corresponding target desensitization identity information and corresponding target mobile phones number are in plain text;
When phone number corresponding with the second desensitization identity information is consistent in plain text in plain text for the target mobile phones number,
Request for product authorization chain is generated based on the target mobile phones number plaintext and corresponding target desensitization identity information found
It connects, and request for product authorization link is sent to the corresponding product promotion terminal, so that product promotion terminal will
The request for product authorization link is sent to corresponding target terminal user.
In addition, to achieve the above object, the present invention also provides a kind of product promotion device, described device includes:
Module is obtained, desensitizes for obtaining subscriber identity information, and to the subscriber identity information, obtains each use
The first desensitization identity information at family;
Computing module, for calculating the cryptographic Hash of each first desensitization identity information, by the first desensitization identity
The cryptographic Hash of information is matched with the cryptographic Hash in each subindex library;
Determining module, for when the Hash for being matched to the identity information that desensitizes with described first in each subindex library
When being worth consistent cryptographic Hash, determine that the subindex library being matched to is subindex library belonging to the first desensitization identity information;
Memory module, for depositing the plaintext of each first desensitization identity information and the phone number of corresponding user
Store up in the affiliated subindex library, and construct in the affiliated subindex library the first desensitization identity information and
The index of the plaintext of corresponding phone number;
Extraction module, for being pushed away described in extraction when receiving the popularization number acquisition request of product promotion terminal transmission
The second desensitization identity information and the corresponding phone number plaintext of the second desensitization identity information in wide number acquisition request,
And calculate the cryptographic Hash of the second desensitization identity information;
Searching module, for obtaining corresponding index according to the cryptographic Hash of the second desensitization identity information, and according to obtaining
The index got searches corresponding target desensitization identity information and corresponding target mobile phones number in plain text;
Generation module, for when target mobile phones number plaintext cell-phone number corresponding with the second desensitization identity information
When code is consistent in plain text, generates and produce based on the target mobile phones number plaintext and corresponding target desensitization identity information found
Product application authorization link, and request for product authorization link is sent to the corresponding product promotion terminal, so that producing
Product promote terminal and request for product authorization link are sent to corresponding target terminal user.
In addition, to achieve the above object, the present invention also provides a kind of product promotion equipment based on information security, the base
In the product promotion equipment of information security include the product promotion program based on information security, the product based on information security
Promotion program is realized when being executed by the product promotion equipment based on information security as described above based on the production of information security
The step of product promotion method.
In addition, to achieve the above object, it is described computer-readable the present invention also provides a kind of computer readable storage medium
The product promotion program based on information security is stored on storage medium, the product promotion program based on information security is located
Manage the step of realizing product promotion method based on information security as described above when device executes.
Product promotion method, apparatus, equipment and computer readable storage medium proposed by the present invention based on information security,
It by obtaining subscriber identity information, and desensitizes to subscriber identity information, obtains the first desensitization identity information of each user;
The cryptographic Hash for calculating each first desensitization identity information, will be in the cryptographic Hash and each subindex library of the first desensitization identity information
Cryptographic Hash is matched;When the consistent cryptographic Hash of cryptographic Hash for being matched to the identity information that desensitizes with first in each subindex library
When, determine that the subindex library being matched to is subindex library belonging to the first desensitization identity information;By each first desensitization identity letter
The stored in clear of breath and the phone number of corresponding user is constructed into affiliated subindex library, and in affiliated subindex library
The index of the plaintext of first desensitization identity information and corresponding phone number;In the popularization number for receiving the transmission of product promotion terminal
When code acquisition request, the second desensitization identity information and the second desensitization identity information in extraction popularization number acquisition request are corresponding
Phone number in plain text, and calculate second desensitization identity information cryptographic Hash;It is obtained according to the cryptographic Hash of the second desensitization identity information
Corresponding index is taken, and corresponding target desensitization identity information and corresponding target mobile phones number are searched according to the index got
Code in plain text, to reduce the time for searching user contact details, improves search efficiency;When target mobile phones number is de- with second in plain text
When the corresponding phone number of quick identity information is consistent in plain text, in plain text and corresponding target based on the target mobile phones number found
The identity information that desensitizes generates request for product authorization link, compares lookup by the user information after desensitization, ensure that user
Information security prevents user information from revealing, and request for product authorization link is sent to the corresponding product promotion terminal, with
So that request for product authorization link is sent to corresponding target terminal user by product promotion terminal.
Detailed description of the invention
Fig. 1 is that the present invention is based on the flow diagrams of the product promotion method first embodiment of information security;
Fig. 2 is to obtain corresponding index according to the cryptographic Hash of the second desensitization identity information in Fig. 1, and according to getting
The refinement process of index the step of searching corresponding target desensitization identity information and corresponding target mobile phones number plaintext show
It is intended to;
Fig. 3 is that the present invention is based on the flow diagrams of the product promotion method second embodiment of information security;
Fig. 4 is the structural schematic diagram for the hardware running environment that the embodiment of the present invention is related to.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The present invention provides a kind of product promotion method based on information security.
Referring to Fig.1, Fig. 1 is that the present invention is based on the flow diagrams of the product promotion method first embodiment of information security.
In the present embodiment, this method comprises:
Step S10 obtains subscriber identity information, and desensitizes to the subscriber identity information, obtains each user's
First desensitization identity information;
In the present embodiment, subscriber identity information can be obtained from goal systems, wherein goal systems is referred to wait promote
The corresponding system of product, for example, goal systems refers to loan platform for loan product;The goal systems of the present embodiment with
Incidence relation is established at the product promotion end for carrying out products cooperating popularization.Product promotion end refers to the product to be promoted to goal systems
Carry out the system for assisting popularization.One goal systems can carry out establishing incidence relation with multiple product promotion ends in advance, utilize
Multiple product promotion ends carry out product promotion.For example, the goal systems of loan product can be looked forward to the different subjects of automobile industry
Industry is as product promotion end.The client identity information of goal systems maintenance can be adopted based on historical transaction record information or business personnel
The user information of collection obtains, and is stored in predeterminated position, and subscriber identity information includes the contact details such as the phone number of user, with
And the user informations such as address name and ID card No..After acquiring subscriber identity information, user identity can be believed
Breath carries out desensitization process, and the digest value that the Message Digest 5s such as MD5, SHA256 generate subscriber identity information specifically can be used,
Desensitization process is carried out, and using the digest value of client identity information as the first desensitization identity information.
Step S20 calculates the cryptographic Hash of each first desensitization identity information, by the first desensitization identity information
Cryptographic Hash is matched with the cryptographic Hash in each subindex library;
Step S30, when the cryptographic Hash one for being matched to the identity information that desensitizes with described first in each subindex library
When the cryptographic Hash of cause, determine that the subindex library being matched to is subindex library belonging to the first desensitization identity information;
After obtaining the first desensitization identity information of each user, each first desensitization identity information is calculated separately
Cryptographic Hash, calculate first desensitization identity information hash value algorithms may include: CRC32_HASH, FNV1_32_HASH,
KETAMA_HASH scheduling algorithm obtains the less cryptographic Hash of digit by above-mentioned algorithm.Then by the first desensitization identity information
Cryptographic Hash matched with the cryptographic Hash that each subindex library identifies, when being matched to and described first in each subindex library
Desensitize identity information cryptographic Hash consistent cryptographic Hash when, determine that the subindex library being matched to is the first desensitization identity information
Affiliated subindex library;Therefore before implementing the present embodiment, need to construct subindex library, for storing the first desensitization identity letter
Breath, first desensitization identity information correspond to client phone number in plain text and first desensitize identity information and corresponding phone number it is bright
The contingency table of text.Specifically, in first time building mobile phone plaintext and the index database of the desensitization information of subscriber identity information, in advance
The cryptographic Hash of each subindex library identification information is calculated, available current production, which is promoted, to be used to store the pre- of customer information in end
If all user informations in position, for the user information of each user's individual, first address name and user identity are demonstrate,proved
The identity informations such as number carry out desensitization process, obtain the first desensitization identity information of each user's individual, wherein each user
First desensitization identity information of body includes at least the first desensitization name information and the first desensitization identity card of corresponding user's individual
Number information.Then the corresponding cryptographic Hash of the first desensitization information is calculated, it, will in the cryptographic Hash after identity information is desensitized in acquisition first
The cryptographic Hash and the cryptographic Hash of subindex library identification information of first desensitization identity information compare, and determine the according to comparing result
The ownership subindex library of one desensitization information will be used to store corresponding first desensitization information, corresponding phone number in plain text and close
Join the subindex library of table, it can be between the cryptographic Hash of the first desensitization identity information and the cryptographic Hash of subindex library identification information
Hash difference determines subindex library belonging to the first desensitization identity information, for example the smallest subindex library of Hash difference is determined
For the ownership subindex library of the first desensitization information.Specifically, the first desensitization identity letter can be calculated using consistent hashing algorithm
Hash difference between the cryptographic Hash of breath and the cryptographic Hash of subindex library identification information finds out memcached server (section first
Point), i.e. the cryptographic Hash of subindex library identification information, and be configured on 0~232 circle (continuum), then using same
The method of sample finds out the key of data to be stored, i.e., the cryptographic Hash of each first desensitization identity information, and is mapped on identical circle,
Then it is searched clockwise the position being mapped to since data, when finding consistent cryptographic Hash, then by the first desensitization identity
Information is saved.After more than 232, the first desensitization identity information of server still can not find, it can be by first
Desensitization identity information is saved on the smallest server of Hash difference, or is saved to First memcached server.
It is subsequent user information periodically to be obtained from goal systems after first time constructs index database, and to each
The subscriber identity information of goal systems maintenance carries out desensitization update.Therefore, subscriber identity information is being got, and desensitized,
It, can be by the Hash of the cryptographic Hash of the first desensitization identity information and each subindex library mark and after calculating cryptographic Hash
Value compares, and determines subindex library belonging to each first desensitization identity information.
Step S40 arrives the stored in clear of each first desensitization identity information and the phone number of corresponding user
In subindex library belonging to described, and the first desensitization identity information and correspondence are constructed in the affiliated subindex library
The index of the plaintext of phone number;
It, can be by each first desensitization identity letter after determining subindex library belonging to the first desensitization identity information
It ceases and the stored in clear of the phone number of corresponding user is into the affiliated subindex library, and in the affiliated subindex
The index of the plaintext of the first desensitization identity information and corresponding phone number is constructed in library.
Step S50 extracts the popularization number when receiving the popularization number acquisition request of product promotion terminal transmission
The second desensitization identity information and the corresponding phone number of the second desensitization identity information in acquisition request in plain text, and calculate
The cryptographic Hash of the second desensitization identity information;
For in the user information of product promotion end maintenance, due to the case where replacing information there are user, goal systems exists
When receiving the popularization number acquisition request that cooperation channel is sent, the second desensitization body can be first extracted from popularization number acquisition request
Part information and the corresponding phone number of the second desensitization identity information in plain text, are then calculated using algorithm identical with step S20
The cryptographic Hash of second desensitization identity information.
Further, in the user information safeguarded for product promotion end, if the user information of some user only has name
With ID card No. information, and phone number information is lacked, product promotion end needs to obtain the hand of the user from goal systems
Machine number, product promotion end can be first to the name information of this user and ID card No. information using identical as step S10
Desensitization algorithm carry out desensitization process, obtain the second desensitization identity information, then based on the second desensitization identity information to target terminal
Send the popularization number acquisition request for obtaining the subscriber phone number.
Step S60 obtains corresponding index according to the cryptographic Hash of the second desensitization identity information, and according to getting
Index searches corresponding target desensitization identity information and corresponding target mobile phones number in plain text;
After obtaining the second desensitization information, corresponding index can be obtained according to the cryptographic Hash of the second desensitization identity information,
Then the plaintext of corresponding first desensitization identity information and the phone number of corresponding user, specifically, ginseng are searched according to index
According to Fig. 2, the step S60 includes:
Step S61 compares the cryptographic Hash of the second desensitization identity information with the cryptographic Hash in each subindex library, really
The subindex library to be checked inquired calmly;
Step S62 determines corresponding index based on the second desensitization information and the subindex library to be checked, is based on
Determining index determines that the corresponding target mobile phones number of the second desensitization identity information is bright from the subindex library to be checked
Text;
Step S63 searches corresponding first desensitization identity letter based on the target mobile phones number plaintext and the index
Breath.
It in the present embodiment, specifically can be by the way that the cryptographic Hash of the second desensitization identity information and each subindex library be identified
Cryptographic Hash compare, determine the subindex library to be checked inquired, i.e., determined using consistent hashing algorithm
Sub- search library to be checked specifically specifically, using consistent hashing algorithm, finds out the cryptographic Hash of subindex library mark first,
And be configured on 0~232 circle (continuum), the second desensitization identity information is then found out using same method
Cryptographic Hash, and be mapped on identical circle, it is searched clockwise the position being then mapped to since data, stores data into and look for
The first sub- index database arrived, is determined as subindex library to be checked, is then based on the second desensitization identity information and described
The index that subindex library to be checked has constructed determines that the second desensitization identity information is corresponding from the subindex library to be checked
Target mobile phones numbers in plain text, in plain text and the index searches corresponding first and desensitizes identity based on the target mobile phones number
Information.
Step S70, when phone number corresponding with the second desensitization identity information is bright in plain text for the target mobile phones number
When text is consistent, product Shen is generated based on the target mobile phones number plaintext and corresponding target desensitization identity information found
Link please be authorize, and request for product authorization link is sent to the corresponding product promotion terminal, so that product pushes away
Request for product authorization link is sent to corresponding target terminal user by wide terminal.
When phone number corresponding with the second desensitization identity information is consistent in plain text in plain text for the target mobile phones number,
Confirmation user does not carry out the change of contact method, can be based on the phone number plaintext and corresponding first desensitization found
Identity information generates request for product authorization link, and request for product authorization link is sent to the corresponding product promotion
Terminal, so that request for product authorization link is sent to corresponding client terminal by product promotion terminal;Further, when
When target mobile phones number plaintext phone number corresponding with the second desensitization identity information is inconsistent in plain text, need de- to second
The corresponding phone number of quick identity information is verified in plain text, and the corresponding phone number of confirmation the second desensitization identity information is in plain text
And be the phone number in use with user-association, then based on the corresponding phone number of the second desensitization identity information in plain text with
And corresponding first desensitization identity information generates request for product authorization link, so that it is guaranteed that the contact method of user is effective connection
It is mode.
Further, product promotion terminal can combination producing one to each address name and ID card No. it is random
Sequence, and to the identification code of random sequence addition product promotion terminal itself, as the user number of specific user, by user number
Combination with name and ID card No. is associated binding.First desensitization customer information is being sent to goal systems, product
It promotes terminal and the user number not desensitized and the first desensitization customer information is sent to goal systems, goal systems will generate and authorize chain
When connecing, with user number substitution name desensitization information and the desensitization information of ID card No., as user identifier, i.e., with user
Number, (loan limit), first desensitization identity information in client token character, authorization validity period and product type generation award
Authorization link is sent to corresponding product promotion terminal according to the mark of product promotion terminal by power link.Product promotion terminal
When receiving authorization link, phone number is extracted from authorization link in plain text, the phone number based on extraction in plain text will authorization
Contact method of the link based on user is sent to corresponding client terminal.Client terminal shows the authorization received link
Come, when detecting that user clicks the movement of authorization link, client terminal shows the request for product page, so that client carries out Shen
Please.
The present embodiment propose the product promotion method based on information security, by obtain subscriber identity information, and to
Family identity information desensitizes, and obtains the first desensitization identity information of each user;Calculate each first desensitization identity information
Cryptographic Hash matches the cryptographic Hash of the first desensitization identity information with the cryptographic Hash in each subindex library;When in each height
When being matched to cryptographic Hash consistent with the cryptographic Hash of the first desensitization identity information in index database, determine that the subindex library being matched to is
Subindex library belonging to first desensitization identity information;By each first desensitization identity information and the phone number of corresponding user
Stored in clear is into affiliated subindex library, and the first desensitization identity information of building and corresponding hand in affiliated subindex library
The index of the plaintext of machine number;When receiving the popularization number acquisition request of product promotion terminal transmission, extracts and promote number
The second desensitization identity information and the corresponding phone number of the second desensitization identity information in acquisition request in plain text, and calculate second
The cryptographic Hash of desensitization identity information;Corresponding index is obtained according to the cryptographic Hash of the second desensitization identity information, and according to getting
Index search corresponding target desensitization identity information and corresponding target mobile phones number in plain text, search user's connection to reduce
It is the time of mode, improves search efficiency;When target mobile phones number plaintext phone number corresponding with the second desensitization identity information
When consistent in plain text, request for product is generated based on the target mobile phones number plaintext and corresponding target desensitization identity information found
Authorization link compares lookup by the user information after desensitization, ensure that user information safety, prevent user information from letting out
Dew, and request for product authorization link is sent to the corresponding product promotion terminal, so that product promotion terminal is by product
Application authorization link is sent to corresponding target terminal user.
Further, referring to Fig. 3, based on the present invention is based on the product promotion method first embodiments of information security to propose this
Product promotion method second embodiment of the invention based on information security.
In the present embodiment, the step S10 includes:
Step S11 obtains subscriber identity information, determines the desensitization strategy to the subscriber identity information, wherein described de-
Quick strategy includes sensitive data matching strategy corresponding with the subscriber identity information type, and is directed to the sensitive data
Desensitization algorithm;
Step S12 carries out desensitization process to the subscriber identity information according to determining desensitization strategy, obtains each user
First desensitization identity information.
In the present embodiment, the subscriber identity information is taken off by the specifying information item determination in subscriber identity information
Quick strategy obtains the first desensitization of each user to carry out desensitization process to subscriber identity information based on determining desensitization strategy
Identity information makes it possible to the sensitive information in automatic shield subscriber identity information, has ensured user information safety, and can
The automation for realizing data call process, improves operating efficiency.
Specifically, desensitization process packet is carried out to the subscriber identity information according to determining desensitization strategy in step S12
It includes:
According to the sensitive data matching strategy for including in the desensitization strategy, to the number in the subscriber identity information
According to being matched, with the sensitive data in the determination subscriber identity information:
According to the desensitization algorithm for including in the desensitization strategy, desensitization process is carried out to the sensitive data.
In the present embodiment, since sensitive data matching strategy is opposite with the identity information for including in subscriber identity information
It answers, therefore by being carried out according to the sensitive data matching strategy for including in desensitization strategy to the data in subscriber identity information
Matching makes it possible to be matched to corresponding sensitive data for the identity information for including in subscriber identity information, and then to matching
The sensitive data arrived carries out desensitization process.
Further, step carries out the sensitive data according to the desensitization algorithm for including in the desensitization strategy
Desensitization process includes:
Processing is replaced to the sensitive data, to sensitivity according to the desensitization algorithm for including in the desensitization strategy
Data are encrypted, carry out Fuzzy Processing to sensitive data, based on random character displacement sensitive data.
In the present embodiment, the desensitization algorithm includes following any one or more combination: being replaced to sensitive data
Processing is changed, sensitive data is encrypted, Fuzzy Processing is carried out to sensitive data, sensitive number is replaced based on random character
According to, the customized desensitization algorithm of user, being replaced processing to sensitive data is by scheduled character (such as letter, number, symbol
Number etc.) sensitive data is replaced: desensitization can only be checked after sensitive data is encrypted by decryption processing
Treated sensitive data: carrying out Fuzzy Processing to sensitive data is by sensitive data processing to be not easy the fuzzy shape checked
State: being to be replaced by random character to sensitive data based on random character displacement sensitive data: user is customized de-
Quick algorithm is the customized other desensitization algorithms of user.
The embodiment of the present invention further provides for a kind of product promotion device, and described device includes:
Module is obtained, desensitizes for obtaining subscriber identity information, and to the subscriber identity information, obtains each use
The first desensitization identity information at family;
Computing module, for calculating the cryptographic Hash of each first desensitization identity information, by the first desensitization identity
The cryptographic Hash of information is matched with the cryptographic Hash in each subindex library;
Determining module, for when the Hash for being matched to the identity information that desensitizes with described first in each subindex library
When being worth consistent cryptographic Hash, determine that the subindex library being matched to is subindex library belonging to the first desensitization identity information;
Memory module, for depositing the plaintext of each first desensitization identity information and the phone number of corresponding user
Store up in the affiliated subindex library, and construct in the affiliated subindex library the first desensitization identity information and
The index of the plaintext of corresponding phone number;
Extraction module, for being pushed away described in extraction when receiving the popularization number acquisition request of product promotion terminal transmission
The second desensitization identity information and the corresponding phone number plaintext of the second desensitization identity information in wide number acquisition request,
And calculate the cryptographic Hash of the second desensitization identity information;
Searching module, for obtaining corresponding index according to the cryptographic Hash of the second desensitization identity information, and according to obtaining
The index got searches corresponding target desensitization identity information and corresponding target mobile phones number in plain text;
Generation module, for when target mobile phones number plaintext cell-phone number corresponding with the second desensitization identity information
When code is consistent in plain text, generates and produce based on the target mobile phones number plaintext and corresponding target desensitization identity information found
Product application authorization link, and request for product authorization link is sent to the corresponding product promotion terminal, so that producing
Product promote terminal and request for product authorization link are sent to corresponding target terminal user.
It should be noted that each embodiment of the product promotion device based on information security is based on information security with above-mentioned
Product promotion method each embodiment it is essentially identical, in this not go into detail.
In addition, the embodiment of the present invention also provides a kind of product promotion equipment based on information security.As shown in figure 4, Fig. 4 is
The structural schematic diagram for the hardware running environment that the embodiment of the present invention is related to.
It should be noted that Fig. 4 is the structure that may be based on the hardware running environment of product promotion equipment of information security
Schematic diagram.The embodiment of the present invention can be PC, the terminal devices such as portable computer based on the product promotion equipment of information security.
As shown in figure 4, being somebody's turn to do the product promotion equipment based on information security may include: processor 1001, such as CPU, net
Network interface 1004, memory 1005, user interface 1003, communication bus 1002.Wherein, communication bus 1002 is for realizing these
Connection communication between component.User interface 1003 may include display screen (Display), input unit such as keyboard
(Keyboard), optional user interface 1003 can also include standard wireline interface and wireless interface.Network interface 1004 is optional
May include standard wireline interface and wireless interface (such as WI-FI interface).Memory 1005 can be high speed RAM memory,
It is also possible to stable memory (non-volatile memory), such as magnetic disk storage.Memory 1005 optionally may be used also
To be independently of the storage device of aforementioned processor 1001.
Optionally, the product promotion equipment based on information security can also include camera, RF (Radio Frequency,
Radio frequency) circuit, sensor, voicefrequency circuit, WiFi module etc..
It will be understood by those skilled in the art that the product promotion device structure shown in Fig. 4 based on information security is not
The restriction to the product promotion equipment based on information security is constituted, may include than illustrating more or fewer components or group
Close certain components or different component layouts.
As shown in figure 4, as may include that operating system, network are logical in a kind of memory 1005 of computer storage medium
Believe module, Subscriber Interface Module SIM and the product promotion program based on information security.Wherein, operating system is to manage and control base
In the product promotion device hardware of information security and the program of software resource, support the product promotion program based on information security with
And the operation of other softwares or program.
In product promotion equipment shown in Fig. 4 based on information security, user interface 1003 is mainly used for obtaining to be passed
Transmission of data, and output prompt information etc., network interface 1004 are mainly used for connecting receiving end, and it is logical to carry out data with receiving end
Letter;Processor 1001 can be used for calling the product promotion program based on information security stored in memory 1005, and execute
The step of product promotion method based on information security as described above.
The present invention is based on the product promotion equipment specific embodiments of information security and the above-mentioned product based on information security
Each embodiment of promotion method is essentially identical, and details are not described herein.
In addition, the embodiment of the present invention also proposes a kind of computer readable storage medium, the computer readable storage medium
On be stored with the product promotion program based on information security, the product promotion program based on information security is executed by processor
Shi Shixian as described above product promotion method based on information security the step of.
Computer readable storage medium specific embodiment of the present invention and the above-mentioned product promotion method based on information security
Each embodiment is essentially identical, and details are not described herein.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, computer, clothes
Business device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of product promotion method based on information security, which is characterized in that the described method comprises the following steps:
Subscriber identity information is obtained, and is desensitized to the subscriber identity information, the first desensitization identity of each user is obtained
Information;
Calculate it is each it is described first desensitization identity information cryptographic Hash, by it is described first desensitization identity information cryptographic Hash with it is each
Cryptographic Hash in subindex library is matched;
When being matched to cryptographic Hash consistent with the cryptographic Hash of the first desensitization identity information in each subindex library,
Determine that the subindex library being matched to is subindex library belonging to the first desensitization identity information;
By the stored in clear of each first desensitization identity information and the phone number of corresponding user to the affiliated son
In index database, and the first desensitization identity information is constructed in the affiliated subindex library and corresponds to the bright of phone number
The index of text;
When receiving the popularization number acquisition request of product promotion terminal transmission, extract in the popularization number acquisition request
Second desensitization identity information and the corresponding phone number of the second desensitization identity information in plain text, and calculate second desensitization
The cryptographic Hash of identity information;
Corresponding index is obtained according to the cryptographic Hash of the second desensitization identity information, and is searched and is corresponded to according to the index got
Target desensitization identity information and corresponding target mobile phones number in plain text;
When phone number corresponding with the second desensitization identity information is consistent in plain text in plain text for the target mobile phones number, it is based on
The target mobile phones number found is in plain text and corresponding target desensitization identity information generates request for product authorization link, and
Request for product authorization link is sent to the corresponding product promotion terminal, so that product promotion terminal is by the production
Product application authorization link is sent to corresponding target terminal user.
2. the product promotion method based on information security as described in claim 1, which is characterized in that described according to described second
The cryptographic Hash of desensitization identity information obtains corresponding index, and searches corresponding target desensitization identity letter according to the index got
Breath and the step of corresponding target mobile phones number plaintext include:
The cryptographic Hash of second desensitization identity information is compared with the cryptographic Hash in each subindex library, determination is looked into
The subindex library to be checked ask;
Based on it is described second desensitization information and the subindex library to be checked determine corresponding index, based on determining index from
The corresponding target mobile phones number of the second desensitization identity information is determined in the subindex library to be checked in plain text;
Corresponding first desensitization identity information is searched based on the target mobile phones number plaintext and the index.
3. the product promotion method based on information security as described in claim 1, which is characterized in that the acquisition user identity
Information, and the step of desensitizing to the subscriber identity information, obtaining the first desensitization identity information of each user includes:
Obtain subscriber identity information, determine to the desensitization strategy of the subscriber identity information, wherein the desensitization strategy include with
The corresponding sensitive data matching strategy of the subscriber identity information type, and the desensitization algorithm for the sensitive data;
Desensitization process is carried out to the subscriber identity information according to determining desensitization strategy, obtains the first desensitization body of each user
Part information.
4. the product promotion method based on information security as claimed in claim 3, which is characterized in that described to be taken off according to determining
It is quick strategy to the subscriber identity information carry out desensitization process the step of include:
According to it is described desensitization strategy in include the sensitive data matching strategy, to the data in the subscriber identity information into
Row matching, with the sensitive data in the determination subscriber identity information:
According to the desensitization algorithm for including in the desensitization strategy, desensitization process is carried out to the sensitive data.
5. the product promotion method based on information security as claimed in claim 4, which is characterized in that described to the sensitive number
Include: according to the step of carrying out desensitization process
To the sensitive data be replaced processing, sensitive data is encrypted, to sensitive data carry out Fuzzy Processing,
Based on random character displacement sensitive data.
6. a kind of product promotion device based on information security, which is characterized in that described device includes:
Module is obtained, desensitizes for obtaining subscriber identity information, and to the subscriber identity information, obtains each user's
First desensitization identity information;
Computing module, for calculating the cryptographic Hash of each first desensitization identity information, by the first desensitization identity information
Cryptographic Hash matched with the cryptographic Hash in each subindex library;
Determining module, for when the cryptographic Hash one for being matched to the identity information that desensitizes with described first in each subindex library
When the cryptographic Hash of cause, determine that the subindex library being matched to is subindex library belonging to the first desensitization identity information;
Memory module, for arriving the stored in clear of each first desensitization identity information and the phone number of corresponding user
In subindex library belonging to described, and the first desensitization identity information and correspondence are constructed in the affiliated subindex library
The index of the plaintext of phone number;
Extraction module, for extracting the popularization number when receiving the popularization number acquisition request of product promotion terminal transmission
The second desensitization identity information and the corresponding phone number of the second desensitization identity information in code acquisition request in plain text, and are counted
Calculate the cryptographic Hash of the second desensitization identity information;
Searching module, for obtaining corresponding index according to the cryptographic Hash of the second desensitization identity information, and according to getting
Index search corresponding target desensitization identity information and corresponding target mobile phones number in plain text;
Generation module, for phone number corresponding with the second desensitization identity information to be bright in plain text when the target mobile phones number
When text is consistent, product Shen is generated based on the target mobile phones number plaintext and corresponding target desensitization identity information found
Link please be authorize, and request for product authorization link is sent to the corresponding product promotion terminal, so that product pushes away
Request for product authorization link is sent to corresponding target terminal user by wide terminal.
7. a kind of product promotion equipment based on information security, which is characterized in that the product promotion based on information security is set
Standby includes the product promotion program based on information security, and the product promotion program based on information security is by the product promotion
Equipment also realizes following steps when executing:
Subscriber identity information is obtained, and is desensitized to the subscriber identity information, the first desensitization identity of each user is obtained
Information;
Calculate it is each it is described first desensitization identity information cryptographic Hash, by it is described first desensitization identity information cryptographic Hash with it is each
Cryptographic Hash in subindex library is matched;
When being matched to cryptographic Hash consistent with the cryptographic Hash of the first desensitization identity information in each subindex library,
Determine that the subindex library being matched to is subindex library belonging to the first desensitization identity information;
By the stored in clear of each first desensitization identity information and the phone number of corresponding user to the affiliated son
In index database, and the first desensitization identity information is constructed in the affiliated subindex library and corresponds to the bright of phone number
The index of text;
When receiving the popularization number acquisition request of product promotion terminal transmission, extract in the popularization number acquisition request
Second desensitization identity information and the corresponding phone number of the second desensitization identity information in plain text, and calculate second desensitization
The cryptographic Hash of identity information;
Corresponding index is obtained according to the cryptographic Hash of the second desensitization identity information, and is searched and is corresponded to according to the index got
Target desensitization identity information and corresponding target mobile phones number in plain text;
When phone number corresponding with the second desensitization identity information is consistent in plain text in plain text for the target mobile phones number, it is based on
The target mobile phones number found is in plain text and corresponding target desensitization identity information generates request for product authorization link, and
Request for product authorization link is sent to the corresponding product promotion terminal, so that product promotion terminal is by the production
Product application authorization link is sent to corresponding target terminal user.
8. the product promotion equipment based on information security as claimed in claim 7, which is characterized in that described to be based on information security
Product promotion equipment include the product promotion program based on information security, the product promotion program quilt based on information security
The product promotion equipment based on information security also realizes following steps when executing:
The cryptographic Hash of second desensitization identity information is compared with the cryptographic Hash in each subindex library, determination is looked into
The subindex library to be checked ask;
Based on it is described second desensitization information and the subindex library to be checked determine corresponding index, based on determining index from
The corresponding target mobile phones number of the second desensitization identity information is determined in the subindex library to be checked in plain text;
Corresponding first desensitization identity information is searched based on the target mobile phones number plaintext and the index.
9. the product promotion equipment based on information security as claimed in claim 7, which is characterized in that the product promotion equipment
Including product promotion program, the product promotion program realizes following steps when being executed by the product promotion equipment:
Obtain subscriber identity information, determine to the desensitization strategy of the subscriber identity information, wherein the desensitization strategy include with
The corresponding sensitive data matching strategy of the subscriber identity information type, and the desensitization algorithm for the sensitive data;
Desensitization process is carried out to the subscriber identity information according to determining desensitization strategy, obtains the first desensitization body of each user
Part information.
10. a kind of computer readable storage medium, which is characterized in that be stored on the computer readable storage medium based on letter
The product promotion program for ceasing safety is realized when the product promotion program based on information security is executed by processor as right is wanted
The step of product promotion method described in asking any one of 1 to 5 based on information security.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910763208.1A CN110516471B (en) | 2019-08-15 | 2019-08-15 | Product promotion method based on information security and related equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910763208.1A CN110516471B (en) | 2019-08-15 | 2019-08-15 | Product promotion method based on information security and related equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110516471A true CN110516471A (en) | 2019-11-29 |
CN110516471B CN110516471B (en) | 2022-05-17 |
Family
ID=68625706
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910763208.1A Active CN110516471B (en) | 2019-08-15 | 2019-08-15 | Product promotion method based on information security and related equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110516471B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111177537A (en) * | 2019-12-13 | 2020-05-19 | 未鲲(上海)科技服务有限公司 | Data exchange processing method, device, equipment and medium based on parallel processing |
CN111262835A (en) * | 2020-01-09 | 2020-06-09 | 青岛海尔科技有限公司 | Desensitization storage method and device for sensitive data |
CN112100651A (en) * | 2020-08-14 | 2020-12-18 | 国网宁夏电力有限公司吴忠供电公司 | Data desensitization method and system and electronic equipment |
CN113438234A (en) * | 2021-06-24 | 2021-09-24 | 字极(上海)网络科技有限公司 | Network data security protection encryption method |
CN114630314A (en) * | 2020-12-10 | 2022-06-14 | 中移(苏州)软件技术有限公司 | Updating method, device, equipment and storage medium of terminal information base |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101561815A (en) * | 2009-05-19 | 2009-10-21 | 华中科技大学 | Distributed cryptograph full-text retrieval system |
CN106407843A (en) * | 2016-10-17 | 2017-02-15 | 深圳中兴网信科技有限公司 | Data desensitization method and data desensitization device |
CN107704770A (en) * | 2017-09-28 | 2018-02-16 | 平安普惠企业管理有限公司 | Sensitive information desensitization method, system, equipment and readable storage medium storing program for executing |
CN109271564A (en) * | 2018-11-13 | 2019-01-25 | 泰康保险集团股份有限公司 | Declaration form querying method and equipment |
-
2019
- 2019-08-15 CN CN201910763208.1A patent/CN110516471B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101561815A (en) * | 2009-05-19 | 2009-10-21 | 华中科技大学 | Distributed cryptograph full-text retrieval system |
CN106407843A (en) * | 2016-10-17 | 2017-02-15 | 深圳中兴网信科技有限公司 | Data desensitization method and data desensitization device |
CN107704770A (en) * | 2017-09-28 | 2018-02-16 | 平安普惠企业管理有限公司 | Sensitive information desensitization method, system, equipment and readable storage medium storing program for executing |
CN109271564A (en) * | 2018-11-13 | 2019-01-25 | 泰康保险集团股份有限公司 | Declaration form querying method and equipment |
Non-Patent Citations (1)
Title |
---|
侯建刚等: "基于搜索引擎的网络敏感信息检索系统", 《信息技术与信息化》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111177537A (en) * | 2019-12-13 | 2020-05-19 | 未鲲(上海)科技服务有限公司 | Data exchange processing method, device, equipment and medium based on parallel processing |
CN111262835A (en) * | 2020-01-09 | 2020-06-09 | 青岛海尔科技有限公司 | Desensitization storage method and device for sensitive data |
CN112100651A (en) * | 2020-08-14 | 2020-12-18 | 国网宁夏电力有限公司吴忠供电公司 | Data desensitization method and system and electronic equipment |
CN114630314A (en) * | 2020-12-10 | 2022-06-14 | 中移(苏州)软件技术有限公司 | Updating method, device, equipment and storage medium of terminal information base |
CN114630314B (en) * | 2020-12-10 | 2023-09-05 | 中移(苏州)软件技术有限公司 | Updating method, device, equipment and storage medium of terminal information base |
CN113438234A (en) * | 2021-06-24 | 2021-09-24 | 字极(上海)网络科技有限公司 | Network data security protection encryption method |
Also Published As
Publication number | Publication date |
---|---|
CN110516471B (en) | 2022-05-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110516471A (en) | Product promotion method and relevant device based on information security | |
CN108259643B (en) | Binding method and device of intelligent device and user operation terminal, and electronic device | |
CN107908485B (en) | Interface parameter transmission method, device, equipment and computer readable storage medium | |
EP3179790B1 (en) | Method and apparatus for determining location of target portable device | |
CN103259795A (en) | Method for executing automatic register and login, mobile terminal and server | |
CN109040970B (en) | Service planning handling method based on cloud computing and terminal equipment | |
CN111063183B (en) | Bluetooth-based electric energy meter statistical method and device and storage medium | |
US20150264095A1 (en) | Web service push method and web service push server and web service providing server performing same | |
WO2018121266A1 (en) | Method and device for obtaining application and terminal device | |
CN110457346A (en) | Data query method, apparatus and computer readable storage medium | |
CN111541649B (en) | Password resetting method and device, server and storage medium | |
CN112685799A (en) | Device fingerprint generation method and device, electronic device and computer readable medium | |
CN109978114B (en) | Data processing method, device, server and storage medium | |
CN110234082A (en) | A kind of addressing method of mobile terminal, device, storage medium and server | |
CN110874365B (en) | Information query method and related equipment thereof | |
CN109600738B (en) | User information updating method, device, equipment and storage medium | |
CN105610596B (en) | Resource directory management method and network terminal | |
US20230007008A1 (en) | Systems and methods for secure selection of a user profile in a shared context | |
CN108156071B (en) | Method for adding members to community, terminal device and computer readable storage medium | |
CN110503455A (en) | Product promotion method and relevant device based on information security | |
CN112910741B (en) | Interface testing method and device, computer equipment and storage medium | |
CN113268179B (en) | Session message processing method, device, equipment and storage medium | |
CN107968799B (en) | Information acquisition method, terminal equipment and system | |
CN111159509B (en) | Data processing method and related product | |
CN114968822A (en) | Interface testing method and device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |