CN110516471A - Product promotion method and relevant device based on information security - Google Patents

Product promotion method and relevant device based on information security Download PDF

Info

Publication number
CN110516471A
CN110516471A CN201910763208.1A CN201910763208A CN110516471A CN 110516471 A CN110516471 A CN 110516471A CN 201910763208 A CN201910763208 A CN 201910763208A CN 110516471 A CN110516471 A CN 110516471A
Authority
CN
China
Prior art keywords
desensitization
identity information
information
subindex
cryptographic hash
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910763208.1A
Other languages
Chinese (zh)
Other versions
CN110516471B (en
Inventor
王俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Puhui Enterprise Management Co Ltd
Original Assignee
Ping An Puhui Enterprise Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Puhui Enterprise Management Co Ltd filed Critical Ping An Puhui Enterprise Management Co Ltd
Priority to CN201910763208.1A priority Critical patent/CN110516471B/en
Publication of CN110516471A publication Critical patent/CN110516471A/en
Application granted granted Critical
Publication of CN110516471B publication Critical patent/CN110516471B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Game Theory and Decision Science (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention belongs to data processing fields, disclose a kind of product promotion method and relevant device based on information security, comprising: desensitize to subscriber identity information, obtain the first desensitization identity information;Calculate the cryptographic Hash of the first desensitization identity information;When being matched to consistent cryptographic Hash in subindex library, it is determined as subindex library belonging to the first desensitization identity information;The index of the plaintext of the first desensitization identity information of building and corresponding phone number;When receiving popularization number acquisition request, extract the second desensitization identity information and corresponding phone number plaintext promoted in number acquisition request, calculate the cryptographic Hash of the second desensitization identity information, and corresponding index is obtained, corresponding target desensitization identity information and target mobile phones number are searched in plain text according to the index got;Request for product authorization link is generated based on target mobile phones number plaintext and target desensitization identity information, is linked based on request for product authorization and carries out product promotion.Improve the accuracy of product promotion.

Description

Product promotion method and relevant device based on information security
Technical field
The present invention relates to technical field of data processing more particularly to a kind of product promotion methods based on information security, dress It sets, equipment and computer readable storage medium.
Background technique
Currently, various products emerge one after another in the market, such as electronic product, loan product.It is produced corresponding to every kind Product need to be promoted according to the customer information safeguarded in own system.
Existing product promotion generally sends promotion message to client's end using to the customer information safeguarded in own system The mode at end, wherein the customer information of self maintained is that the customer information based on historical time acquisition obtains, but the connection of client It is that mode may change, it is inconsistent so as to cause the contact method safeguarded in the practical contact method and system of client Situation, and be usually used directly contact the contact method safeguarded in system with what is obtained from product promotion end in the prior art The mode that mode compares, whether the contact method to judge user is consistent, and directly compares the information leakage that will lead to user, peace Full property is lower, not can guarantee the information security of user.
Summary of the invention
It is a primary object of the present invention to propose it is a kind of by the product promotion method, apparatus of information security, equipment and based on Calculation machine readable storage medium storing program for executing, it is intended to solve the low technical problem of safety when user information change.
To achieve the above object, the present invention provides a kind of product promotion method based on information security, which comprises
Subscriber identity information is obtained, and is desensitized to the subscriber identity information, the first desensitization of each user is obtained Identity information;
Calculate it is each it is described first desensitization identity information cryptographic Hash, by it is described first desensitization identity information cryptographic Hash with Cryptographic Hash in each subindex library is matched;
When the consistent Hash of cryptographic Hash for being matched to the identity information that desensitizes with described first in each subindex library When value, determine that the subindex library being matched to is subindex library belonging to the first desensitization identity information;
By the stored in clear of each first desensitization identity information and the phone number of corresponding user to described affiliated Subindex library in, and construct in the affiliated subindex library the first desensitization identity information and corresponding phone number Plaintext index;
When receiving the popularization number acquisition request of product promotion terminal transmission, the popularization number acquisition request is extracted In the second desensitization identity information and the corresponding phone number of the second desensitization identity information in plain text, and calculate described second The cryptographic Hash of desensitization identity information;
Corresponding index is obtained according to the cryptographic Hash of the second desensitization identity information, and is searched according to the index got Corresponding target desensitization identity information and corresponding target mobile phones number are in plain text;
When phone number corresponding with the second desensitization identity information is consistent in plain text in plain text for the target mobile phones number, Request for product authorization chain is generated based on the target mobile phones number plaintext and corresponding target desensitization identity information found It connects, and request for product authorization link is sent to the corresponding product promotion terminal, so that product promotion terminal will The request for product authorization link is sent to corresponding target terminal user.
In addition, to achieve the above object, the present invention also provides a kind of product promotion device, described device includes:
Module is obtained, desensitizes for obtaining subscriber identity information, and to the subscriber identity information, obtains each use The first desensitization identity information at family;
Computing module, for calculating the cryptographic Hash of each first desensitization identity information, by the first desensitization identity The cryptographic Hash of information is matched with the cryptographic Hash in each subindex library;
Determining module, for when the Hash for being matched to the identity information that desensitizes with described first in each subindex library When being worth consistent cryptographic Hash, determine that the subindex library being matched to is subindex library belonging to the first desensitization identity information;
Memory module, for depositing the plaintext of each first desensitization identity information and the phone number of corresponding user Store up in the affiliated subindex library, and construct in the affiliated subindex library the first desensitization identity information and The index of the plaintext of corresponding phone number;
Extraction module, for being pushed away described in extraction when receiving the popularization number acquisition request of product promotion terminal transmission The second desensitization identity information and the corresponding phone number plaintext of the second desensitization identity information in wide number acquisition request, And calculate the cryptographic Hash of the second desensitization identity information;
Searching module, for obtaining corresponding index according to the cryptographic Hash of the second desensitization identity information, and according to obtaining The index got searches corresponding target desensitization identity information and corresponding target mobile phones number in plain text;
Generation module, for when target mobile phones number plaintext cell-phone number corresponding with the second desensitization identity information When code is consistent in plain text, generates and produce based on the target mobile phones number plaintext and corresponding target desensitization identity information found Product application authorization link, and request for product authorization link is sent to the corresponding product promotion terminal, so that producing Product promote terminal and request for product authorization link are sent to corresponding target terminal user.
In addition, to achieve the above object, the present invention also provides a kind of product promotion equipment based on information security, the base In the product promotion equipment of information security include the product promotion program based on information security, the product based on information security Promotion program is realized when being executed by the product promotion equipment based on information security as described above based on the production of information security The step of product promotion method.
In addition, to achieve the above object, it is described computer-readable the present invention also provides a kind of computer readable storage medium The product promotion program based on information security is stored on storage medium, the product promotion program based on information security is located Manage the step of realizing product promotion method based on information security as described above when device executes.
Product promotion method, apparatus, equipment and computer readable storage medium proposed by the present invention based on information security, It by obtaining subscriber identity information, and desensitizes to subscriber identity information, obtains the first desensitization identity information of each user; The cryptographic Hash for calculating each first desensitization identity information, will be in the cryptographic Hash and each subindex library of the first desensitization identity information Cryptographic Hash is matched;When the consistent cryptographic Hash of cryptographic Hash for being matched to the identity information that desensitizes with first in each subindex library When, determine that the subindex library being matched to is subindex library belonging to the first desensitization identity information;By each first desensitization identity letter The stored in clear of breath and the phone number of corresponding user is constructed into affiliated subindex library, and in affiliated subindex library The index of the plaintext of first desensitization identity information and corresponding phone number;In the popularization number for receiving the transmission of product promotion terminal When code acquisition request, the second desensitization identity information and the second desensitization identity information in extraction popularization number acquisition request are corresponding Phone number in plain text, and calculate second desensitization identity information cryptographic Hash;It is obtained according to the cryptographic Hash of the second desensitization identity information Corresponding index is taken, and corresponding target desensitization identity information and corresponding target mobile phones number are searched according to the index got Code in plain text, to reduce the time for searching user contact details, improves search efficiency;When target mobile phones number is de- with second in plain text When the corresponding phone number of quick identity information is consistent in plain text, in plain text and corresponding target based on the target mobile phones number found The identity information that desensitizes generates request for product authorization link, compares lookup by the user information after desensitization, ensure that user Information security prevents user information from revealing, and request for product authorization link is sent to the corresponding product promotion terminal, with So that request for product authorization link is sent to corresponding target terminal user by product promotion terminal.
Detailed description of the invention
Fig. 1 is that the present invention is based on the flow diagrams of the product promotion method first embodiment of information security;
Fig. 2 is to obtain corresponding index according to the cryptographic Hash of the second desensitization identity information in Fig. 1, and according to getting The refinement process of index the step of searching corresponding target desensitization identity information and corresponding target mobile phones number plaintext show It is intended to;
Fig. 3 is that the present invention is based on the flow diagrams of the product promotion method second embodiment of information security;
Fig. 4 is the structural schematic diagram for the hardware running environment that the embodiment of the present invention is related to.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The present invention provides a kind of product promotion method based on information security.
Referring to Fig.1, Fig. 1 is that the present invention is based on the flow diagrams of the product promotion method first embodiment of information security.
In the present embodiment, this method comprises:
Step S10 obtains subscriber identity information, and desensitizes to the subscriber identity information, obtains each user's First desensitization identity information;
In the present embodiment, subscriber identity information can be obtained from goal systems, wherein goal systems is referred to wait promote The corresponding system of product, for example, goal systems refers to loan platform for loan product;The goal systems of the present embodiment with Incidence relation is established at the product promotion end for carrying out products cooperating popularization.Product promotion end refers to the product to be promoted to goal systems Carry out the system for assisting popularization.One goal systems can carry out establishing incidence relation with multiple product promotion ends in advance, utilize Multiple product promotion ends carry out product promotion.For example, the goal systems of loan product can be looked forward to the different subjects of automobile industry Industry is as product promotion end.The client identity information of goal systems maintenance can be adopted based on historical transaction record information or business personnel The user information of collection obtains, and is stored in predeterminated position, and subscriber identity information includes the contact details such as the phone number of user, with And the user informations such as address name and ID card No..After acquiring subscriber identity information, user identity can be believed Breath carries out desensitization process, and the digest value that the Message Digest 5s such as MD5, SHA256 generate subscriber identity information specifically can be used, Desensitization process is carried out, and using the digest value of client identity information as the first desensitization identity information.
Step S20 calculates the cryptographic Hash of each first desensitization identity information, by the first desensitization identity information Cryptographic Hash is matched with the cryptographic Hash in each subindex library;
Step S30, when the cryptographic Hash one for being matched to the identity information that desensitizes with described first in each subindex library When the cryptographic Hash of cause, determine that the subindex library being matched to is subindex library belonging to the first desensitization identity information;
After obtaining the first desensitization identity information of each user, each first desensitization identity information is calculated separately Cryptographic Hash, calculate first desensitization identity information hash value algorithms may include: CRC32_HASH, FNV1_32_HASH, KETAMA_HASH scheduling algorithm obtains the less cryptographic Hash of digit by above-mentioned algorithm.Then by the first desensitization identity information Cryptographic Hash matched with the cryptographic Hash that each subindex library identifies, when being matched to and described first in each subindex library Desensitize identity information cryptographic Hash consistent cryptographic Hash when, determine that the subindex library being matched to is the first desensitization identity information Affiliated subindex library;Therefore before implementing the present embodiment, need to construct subindex library, for storing the first desensitization identity letter Breath, first desensitization identity information correspond to client phone number in plain text and first desensitize identity information and corresponding phone number it is bright The contingency table of text.Specifically, in first time building mobile phone plaintext and the index database of the desensitization information of subscriber identity information, in advance The cryptographic Hash of each subindex library identification information is calculated, available current production, which is promoted, to be used to store the pre- of customer information in end If all user informations in position, for the user information of each user's individual, first address name and user identity are demonstrate,proved The identity informations such as number carry out desensitization process, obtain the first desensitization identity information of each user's individual, wherein each user First desensitization identity information of body includes at least the first desensitization name information and the first desensitization identity card of corresponding user's individual Number information.Then the corresponding cryptographic Hash of the first desensitization information is calculated, it, will in the cryptographic Hash after identity information is desensitized in acquisition first The cryptographic Hash and the cryptographic Hash of subindex library identification information of first desensitization identity information compare, and determine the according to comparing result The ownership subindex library of one desensitization information will be used to store corresponding first desensitization information, corresponding phone number in plain text and close Join the subindex library of table, it can be between the cryptographic Hash of the first desensitization identity information and the cryptographic Hash of subindex library identification information Hash difference determines subindex library belonging to the first desensitization identity information, for example the smallest subindex library of Hash difference is determined For the ownership subindex library of the first desensitization information.Specifically, the first desensitization identity letter can be calculated using consistent hashing algorithm Hash difference between the cryptographic Hash of breath and the cryptographic Hash of subindex library identification information finds out memcached server (section first Point), i.e. the cryptographic Hash of subindex library identification information, and be configured on 0~232 circle (continuum), then using same The method of sample finds out the key of data to be stored, i.e., the cryptographic Hash of each first desensitization identity information, and is mapped on identical circle, Then it is searched clockwise the position being mapped to since data, when finding consistent cryptographic Hash, then by the first desensitization identity Information is saved.After more than 232, the first desensitization identity information of server still can not find, it can be by first Desensitization identity information is saved on the smallest server of Hash difference, or is saved to First memcached server.
It is subsequent user information periodically to be obtained from goal systems after first time constructs index database, and to each The subscriber identity information of goal systems maintenance carries out desensitization update.Therefore, subscriber identity information is being got, and desensitized, It, can be by the Hash of the cryptographic Hash of the first desensitization identity information and each subindex library mark and after calculating cryptographic Hash Value compares, and determines subindex library belonging to each first desensitization identity information.
Step S40 arrives the stored in clear of each first desensitization identity information and the phone number of corresponding user In subindex library belonging to described, and the first desensitization identity information and correspondence are constructed in the affiliated subindex library The index of the plaintext of phone number;
It, can be by each first desensitization identity letter after determining subindex library belonging to the first desensitization identity information It ceases and the stored in clear of the phone number of corresponding user is into the affiliated subindex library, and in the affiliated subindex The index of the plaintext of the first desensitization identity information and corresponding phone number is constructed in library.
Step S50 extracts the popularization number when receiving the popularization number acquisition request of product promotion terminal transmission The second desensitization identity information and the corresponding phone number of the second desensitization identity information in acquisition request in plain text, and calculate The cryptographic Hash of the second desensitization identity information;
For in the user information of product promotion end maintenance, due to the case where replacing information there are user, goal systems exists When receiving the popularization number acquisition request that cooperation channel is sent, the second desensitization body can be first extracted from popularization number acquisition request Part information and the corresponding phone number of the second desensitization identity information in plain text, are then calculated using algorithm identical with step S20 The cryptographic Hash of second desensitization identity information.
Further, in the user information safeguarded for product promotion end, if the user information of some user only has name With ID card No. information, and phone number information is lacked, product promotion end needs to obtain the hand of the user from goal systems Machine number, product promotion end can be first to the name information of this user and ID card No. information using identical as step S10 Desensitization algorithm carry out desensitization process, obtain the second desensitization identity information, then based on the second desensitization identity information to target terminal Send the popularization number acquisition request for obtaining the subscriber phone number.
Step S60 obtains corresponding index according to the cryptographic Hash of the second desensitization identity information, and according to getting Index searches corresponding target desensitization identity information and corresponding target mobile phones number in plain text;
After obtaining the second desensitization information, corresponding index can be obtained according to the cryptographic Hash of the second desensitization identity information, Then the plaintext of corresponding first desensitization identity information and the phone number of corresponding user, specifically, ginseng are searched according to index According to Fig. 2, the step S60 includes:
Step S61 compares the cryptographic Hash of the second desensitization identity information with the cryptographic Hash in each subindex library, really The subindex library to be checked inquired calmly;
Step S62 determines corresponding index based on the second desensitization information and the subindex library to be checked, is based on Determining index determines that the corresponding target mobile phones number of the second desensitization identity information is bright from the subindex library to be checked Text;
Step S63 searches corresponding first desensitization identity letter based on the target mobile phones number plaintext and the index Breath.
It in the present embodiment, specifically can be by the way that the cryptographic Hash of the second desensitization identity information and each subindex library be identified Cryptographic Hash compare, determine the subindex library to be checked inquired, i.e., determined using consistent hashing algorithm Sub- search library to be checked specifically specifically, using consistent hashing algorithm, finds out the cryptographic Hash of subindex library mark first, And be configured on 0~232 circle (continuum), the second desensitization identity information is then found out using same method Cryptographic Hash, and be mapped on identical circle, it is searched clockwise the position being then mapped to since data, stores data into and look for The first sub- index database arrived, is determined as subindex library to be checked, is then based on the second desensitization identity information and described The index that subindex library to be checked has constructed determines that the second desensitization identity information is corresponding from the subindex library to be checked Target mobile phones numbers in plain text, in plain text and the index searches corresponding first and desensitizes identity based on the target mobile phones number Information.
Step S70, when phone number corresponding with the second desensitization identity information is bright in plain text for the target mobile phones number When text is consistent, product Shen is generated based on the target mobile phones number plaintext and corresponding target desensitization identity information found Link please be authorize, and request for product authorization link is sent to the corresponding product promotion terminal, so that product pushes away Request for product authorization link is sent to corresponding target terminal user by wide terminal.
When phone number corresponding with the second desensitization identity information is consistent in plain text in plain text for the target mobile phones number, Confirmation user does not carry out the change of contact method, can be based on the phone number plaintext and corresponding first desensitization found Identity information generates request for product authorization link, and request for product authorization link is sent to the corresponding product promotion Terminal, so that request for product authorization link is sent to corresponding client terminal by product promotion terminal;Further, when When target mobile phones number plaintext phone number corresponding with the second desensitization identity information is inconsistent in plain text, need de- to second The corresponding phone number of quick identity information is verified in plain text, and the corresponding phone number of confirmation the second desensitization identity information is in plain text And be the phone number in use with user-association, then based on the corresponding phone number of the second desensitization identity information in plain text with And corresponding first desensitization identity information generates request for product authorization link, so that it is guaranteed that the contact method of user is effective connection It is mode.
Further, product promotion terminal can combination producing one to each address name and ID card No. it is random Sequence, and to the identification code of random sequence addition product promotion terminal itself, as the user number of specific user, by user number Combination with name and ID card No. is associated binding.First desensitization customer information is being sent to goal systems, product It promotes terminal and the user number not desensitized and the first desensitization customer information is sent to goal systems, goal systems will generate and authorize chain When connecing, with user number substitution name desensitization information and the desensitization information of ID card No., as user identifier, i.e., with user Number, (loan limit), first desensitization identity information in client token character, authorization validity period and product type generation award Authorization link is sent to corresponding product promotion terminal according to the mark of product promotion terminal by power link.Product promotion terminal When receiving authorization link, phone number is extracted from authorization link in plain text, the phone number based on extraction in plain text will authorization Contact method of the link based on user is sent to corresponding client terminal.Client terminal shows the authorization received link Come, when detecting that user clicks the movement of authorization link, client terminal shows the request for product page, so that client carries out Shen Please.
The present embodiment propose the product promotion method based on information security, by obtain subscriber identity information, and to Family identity information desensitizes, and obtains the first desensitization identity information of each user;Calculate each first desensitization identity information Cryptographic Hash matches the cryptographic Hash of the first desensitization identity information with the cryptographic Hash in each subindex library;When in each height When being matched to cryptographic Hash consistent with the cryptographic Hash of the first desensitization identity information in index database, determine that the subindex library being matched to is Subindex library belonging to first desensitization identity information;By each first desensitization identity information and the phone number of corresponding user Stored in clear is into affiliated subindex library, and the first desensitization identity information of building and corresponding hand in affiliated subindex library The index of the plaintext of machine number;When receiving the popularization number acquisition request of product promotion terminal transmission, extracts and promote number The second desensitization identity information and the corresponding phone number of the second desensitization identity information in acquisition request in plain text, and calculate second The cryptographic Hash of desensitization identity information;Corresponding index is obtained according to the cryptographic Hash of the second desensitization identity information, and according to getting Index search corresponding target desensitization identity information and corresponding target mobile phones number in plain text, search user's connection to reduce It is the time of mode, improves search efficiency;When target mobile phones number plaintext phone number corresponding with the second desensitization identity information When consistent in plain text, request for product is generated based on the target mobile phones number plaintext and corresponding target desensitization identity information found Authorization link compares lookup by the user information after desensitization, ensure that user information safety, prevent user information from letting out Dew, and request for product authorization link is sent to the corresponding product promotion terminal, so that product promotion terminal is by product Application authorization link is sent to corresponding target terminal user.
Further, referring to Fig. 3, based on the present invention is based on the product promotion method first embodiments of information security to propose this Product promotion method second embodiment of the invention based on information security.
In the present embodiment, the step S10 includes:
Step S11 obtains subscriber identity information, determines the desensitization strategy to the subscriber identity information, wherein described de- Quick strategy includes sensitive data matching strategy corresponding with the subscriber identity information type, and is directed to the sensitive data Desensitization algorithm;
Step S12 carries out desensitization process to the subscriber identity information according to determining desensitization strategy, obtains each user First desensitization identity information.
In the present embodiment, the subscriber identity information is taken off by the specifying information item determination in subscriber identity information Quick strategy obtains the first desensitization of each user to carry out desensitization process to subscriber identity information based on determining desensitization strategy Identity information makes it possible to the sensitive information in automatic shield subscriber identity information, has ensured user information safety, and can The automation for realizing data call process, improves operating efficiency.
Specifically, desensitization process packet is carried out to the subscriber identity information according to determining desensitization strategy in step S12 It includes:
According to the sensitive data matching strategy for including in the desensitization strategy, to the number in the subscriber identity information According to being matched, with the sensitive data in the determination subscriber identity information:
According to the desensitization algorithm for including in the desensitization strategy, desensitization process is carried out to the sensitive data.
In the present embodiment, since sensitive data matching strategy is opposite with the identity information for including in subscriber identity information It answers, therefore by being carried out according to the sensitive data matching strategy for including in desensitization strategy to the data in subscriber identity information Matching makes it possible to be matched to corresponding sensitive data for the identity information for including in subscriber identity information, and then to matching The sensitive data arrived carries out desensitization process.
Further, step carries out the sensitive data according to the desensitization algorithm for including in the desensitization strategy Desensitization process includes:
Processing is replaced to the sensitive data, to sensitivity according to the desensitization algorithm for including in the desensitization strategy Data are encrypted, carry out Fuzzy Processing to sensitive data, based on random character displacement sensitive data.
In the present embodiment, the desensitization algorithm includes following any one or more combination: being replaced to sensitive data Processing is changed, sensitive data is encrypted, Fuzzy Processing is carried out to sensitive data, sensitive number is replaced based on random character According to, the customized desensitization algorithm of user, being replaced processing to sensitive data is by scheduled character (such as letter, number, symbol Number etc.) sensitive data is replaced: desensitization can only be checked after sensitive data is encrypted by decryption processing Treated sensitive data: carrying out Fuzzy Processing to sensitive data is by sensitive data processing to be not easy the fuzzy shape checked State: being to be replaced by random character to sensitive data based on random character displacement sensitive data: user is customized de- Quick algorithm is the customized other desensitization algorithms of user.
The embodiment of the present invention further provides for a kind of product promotion device, and described device includes:
Module is obtained, desensitizes for obtaining subscriber identity information, and to the subscriber identity information, obtains each use The first desensitization identity information at family;
Computing module, for calculating the cryptographic Hash of each first desensitization identity information, by the first desensitization identity The cryptographic Hash of information is matched with the cryptographic Hash in each subindex library;
Determining module, for when the Hash for being matched to the identity information that desensitizes with described first in each subindex library When being worth consistent cryptographic Hash, determine that the subindex library being matched to is subindex library belonging to the first desensitization identity information;
Memory module, for depositing the plaintext of each first desensitization identity information and the phone number of corresponding user Store up in the affiliated subindex library, and construct in the affiliated subindex library the first desensitization identity information and The index of the plaintext of corresponding phone number;
Extraction module, for being pushed away described in extraction when receiving the popularization number acquisition request of product promotion terminal transmission The second desensitization identity information and the corresponding phone number plaintext of the second desensitization identity information in wide number acquisition request, And calculate the cryptographic Hash of the second desensitization identity information;
Searching module, for obtaining corresponding index according to the cryptographic Hash of the second desensitization identity information, and according to obtaining The index got searches corresponding target desensitization identity information and corresponding target mobile phones number in plain text;
Generation module, for when target mobile phones number plaintext cell-phone number corresponding with the second desensitization identity information When code is consistent in plain text, generates and produce based on the target mobile phones number plaintext and corresponding target desensitization identity information found Product application authorization link, and request for product authorization link is sent to the corresponding product promotion terminal, so that producing Product promote terminal and request for product authorization link are sent to corresponding target terminal user.
It should be noted that each embodiment of the product promotion device based on information security is based on information security with above-mentioned Product promotion method each embodiment it is essentially identical, in this not go into detail.
In addition, the embodiment of the present invention also provides a kind of product promotion equipment based on information security.As shown in figure 4, Fig. 4 is The structural schematic diagram for the hardware running environment that the embodiment of the present invention is related to.
It should be noted that Fig. 4 is the structure that may be based on the hardware running environment of product promotion equipment of information security Schematic diagram.The embodiment of the present invention can be PC, the terminal devices such as portable computer based on the product promotion equipment of information security.
As shown in figure 4, being somebody's turn to do the product promotion equipment based on information security may include: processor 1001, such as CPU, net Network interface 1004, memory 1005, user interface 1003, communication bus 1002.Wherein, communication bus 1002 is for realizing these Connection communication between component.User interface 1003 may include display screen (Display), input unit such as keyboard (Keyboard), optional user interface 1003 can also include standard wireline interface and wireless interface.Network interface 1004 is optional May include standard wireline interface and wireless interface (such as WI-FI interface).Memory 1005 can be high speed RAM memory, It is also possible to stable memory (non-volatile memory), such as magnetic disk storage.Memory 1005 optionally may be used also To be independently of the storage device of aforementioned processor 1001.
Optionally, the product promotion equipment based on information security can also include camera, RF (Radio Frequency, Radio frequency) circuit, sensor, voicefrequency circuit, WiFi module etc..
It will be understood by those skilled in the art that the product promotion device structure shown in Fig. 4 based on information security is not The restriction to the product promotion equipment based on information security is constituted, may include than illustrating more or fewer components or group Close certain components or different component layouts.
As shown in figure 4, as may include that operating system, network are logical in a kind of memory 1005 of computer storage medium Believe module, Subscriber Interface Module SIM and the product promotion program based on information security.Wherein, operating system is to manage and control base In the product promotion device hardware of information security and the program of software resource, support the product promotion program based on information security with And the operation of other softwares or program.
In product promotion equipment shown in Fig. 4 based on information security, user interface 1003 is mainly used for obtaining to be passed Transmission of data, and output prompt information etc., network interface 1004 are mainly used for connecting receiving end, and it is logical to carry out data with receiving end Letter;Processor 1001 can be used for calling the product promotion program based on information security stored in memory 1005, and execute The step of product promotion method based on information security as described above.
The present invention is based on the product promotion equipment specific embodiments of information security and the above-mentioned product based on information security Each embodiment of promotion method is essentially identical, and details are not described herein.
In addition, the embodiment of the present invention also proposes a kind of computer readable storage medium, the computer readable storage medium On be stored with the product promotion program based on information security, the product promotion program based on information security is executed by processor Shi Shixian as described above product promotion method based on information security the step of.
Computer readable storage medium specific embodiment of the present invention and the above-mentioned product promotion method based on information security Each embodiment is essentially identical, and details are not described herein.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, computer, clothes Business device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of product promotion method based on information security, which is characterized in that the described method comprises the following steps:
Subscriber identity information is obtained, and is desensitized to the subscriber identity information, the first desensitization identity of each user is obtained Information;
Calculate it is each it is described first desensitization identity information cryptographic Hash, by it is described first desensitization identity information cryptographic Hash with it is each Cryptographic Hash in subindex library is matched;
When being matched to cryptographic Hash consistent with the cryptographic Hash of the first desensitization identity information in each subindex library, Determine that the subindex library being matched to is subindex library belonging to the first desensitization identity information;
By the stored in clear of each first desensitization identity information and the phone number of corresponding user to the affiliated son In index database, and the first desensitization identity information is constructed in the affiliated subindex library and corresponds to the bright of phone number The index of text;
When receiving the popularization number acquisition request of product promotion terminal transmission, extract in the popularization number acquisition request Second desensitization identity information and the corresponding phone number of the second desensitization identity information in plain text, and calculate second desensitization The cryptographic Hash of identity information;
Corresponding index is obtained according to the cryptographic Hash of the second desensitization identity information, and is searched and is corresponded to according to the index got Target desensitization identity information and corresponding target mobile phones number in plain text;
When phone number corresponding with the second desensitization identity information is consistent in plain text in plain text for the target mobile phones number, it is based on The target mobile phones number found is in plain text and corresponding target desensitization identity information generates request for product authorization link, and Request for product authorization link is sent to the corresponding product promotion terminal, so that product promotion terminal is by the production Product application authorization link is sent to corresponding target terminal user.
2. the product promotion method based on information security as described in claim 1, which is characterized in that described according to described second The cryptographic Hash of desensitization identity information obtains corresponding index, and searches corresponding target desensitization identity letter according to the index got Breath and the step of corresponding target mobile phones number plaintext include:
The cryptographic Hash of second desensitization identity information is compared with the cryptographic Hash in each subindex library, determination is looked into The subindex library to be checked ask;
Based on it is described second desensitization information and the subindex library to be checked determine corresponding index, based on determining index from The corresponding target mobile phones number of the second desensitization identity information is determined in the subindex library to be checked in plain text;
Corresponding first desensitization identity information is searched based on the target mobile phones number plaintext and the index.
3. the product promotion method based on information security as described in claim 1, which is characterized in that the acquisition user identity Information, and the step of desensitizing to the subscriber identity information, obtaining the first desensitization identity information of each user includes:
Obtain subscriber identity information, determine to the desensitization strategy of the subscriber identity information, wherein the desensitization strategy include with The corresponding sensitive data matching strategy of the subscriber identity information type, and the desensitization algorithm for the sensitive data;
Desensitization process is carried out to the subscriber identity information according to determining desensitization strategy, obtains the first desensitization body of each user Part information.
4. the product promotion method based on information security as claimed in claim 3, which is characterized in that described to be taken off according to determining It is quick strategy to the subscriber identity information carry out desensitization process the step of include:
According to it is described desensitization strategy in include the sensitive data matching strategy, to the data in the subscriber identity information into Row matching, with the sensitive data in the determination subscriber identity information:
According to the desensitization algorithm for including in the desensitization strategy, desensitization process is carried out to the sensitive data.
5. the product promotion method based on information security as claimed in claim 4, which is characterized in that described to the sensitive number Include: according to the step of carrying out desensitization process
To the sensitive data be replaced processing, sensitive data is encrypted, to sensitive data carry out Fuzzy Processing, Based on random character displacement sensitive data.
6. a kind of product promotion device based on information security, which is characterized in that described device includes:
Module is obtained, desensitizes for obtaining subscriber identity information, and to the subscriber identity information, obtains each user's First desensitization identity information;
Computing module, for calculating the cryptographic Hash of each first desensitization identity information, by the first desensitization identity information Cryptographic Hash matched with the cryptographic Hash in each subindex library;
Determining module, for when the cryptographic Hash one for being matched to the identity information that desensitizes with described first in each subindex library When the cryptographic Hash of cause, determine that the subindex library being matched to is subindex library belonging to the first desensitization identity information;
Memory module, for arriving the stored in clear of each first desensitization identity information and the phone number of corresponding user In subindex library belonging to described, and the first desensitization identity information and correspondence are constructed in the affiliated subindex library The index of the plaintext of phone number;
Extraction module, for extracting the popularization number when receiving the popularization number acquisition request of product promotion terminal transmission The second desensitization identity information and the corresponding phone number of the second desensitization identity information in code acquisition request in plain text, and are counted Calculate the cryptographic Hash of the second desensitization identity information;
Searching module, for obtaining corresponding index according to the cryptographic Hash of the second desensitization identity information, and according to getting Index search corresponding target desensitization identity information and corresponding target mobile phones number in plain text;
Generation module, for phone number corresponding with the second desensitization identity information to be bright in plain text when the target mobile phones number When text is consistent, product Shen is generated based on the target mobile phones number plaintext and corresponding target desensitization identity information found Link please be authorize, and request for product authorization link is sent to the corresponding product promotion terminal, so that product pushes away Request for product authorization link is sent to corresponding target terminal user by wide terminal.
7. a kind of product promotion equipment based on information security, which is characterized in that the product promotion based on information security is set Standby includes the product promotion program based on information security, and the product promotion program based on information security is by the product promotion Equipment also realizes following steps when executing:
Subscriber identity information is obtained, and is desensitized to the subscriber identity information, the first desensitization identity of each user is obtained Information;
Calculate it is each it is described first desensitization identity information cryptographic Hash, by it is described first desensitization identity information cryptographic Hash with it is each Cryptographic Hash in subindex library is matched;
When being matched to cryptographic Hash consistent with the cryptographic Hash of the first desensitization identity information in each subindex library, Determine that the subindex library being matched to is subindex library belonging to the first desensitization identity information;
By the stored in clear of each first desensitization identity information and the phone number of corresponding user to the affiliated son In index database, and the first desensitization identity information is constructed in the affiliated subindex library and corresponds to the bright of phone number The index of text;
When receiving the popularization number acquisition request of product promotion terminal transmission, extract in the popularization number acquisition request Second desensitization identity information and the corresponding phone number of the second desensitization identity information in plain text, and calculate second desensitization The cryptographic Hash of identity information;
Corresponding index is obtained according to the cryptographic Hash of the second desensitization identity information, and is searched and is corresponded to according to the index got Target desensitization identity information and corresponding target mobile phones number in plain text;
When phone number corresponding with the second desensitization identity information is consistent in plain text in plain text for the target mobile phones number, it is based on The target mobile phones number found is in plain text and corresponding target desensitization identity information generates request for product authorization link, and Request for product authorization link is sent to the corresponding product promotion terminal, so that product promotion terminal is by the production Product application authorization link is sent to corresponding target terminal user.
8. the product promotion equipment based on information security as claimed in claim 7, which is characterized in that described to be based on information security Product promotion equipment include the product promotion program based on information security, the product promotion program quilt based on information security The product promotion equipment based on information security also realizes following steps when executing:
The cryptographic Hash of second desensitization identity information is compared with the cryptographic Hash in each subindex library, determination is looked into The subindex library to be checked ask;
Based on it is described second desensitization information and the subindex library to be checked determine corresponding index, based on determining index from The corresponding target mobile phones number of the second desensitization identity information is determined in the subindex library to be checked in plain text;
Corresponding first desensitization identity information is searched based on the target mobile phones number plaintext and the index.
9. the product promotion equipment based on information security as claimed in claim 7, which is characterized in that the product promotion equipment Including product promotion program, the product promotion program realizes following steps when being executed by the product promotion equipment:
Obtain subscriber identity information, determine to the desensitization strategy of the subscriber identity information, wherein the desensitization strategy include with The corresponding sensitive data matching strategy of the subscriber identity information type, and the desensitization algorithm for the sensitive data;
Desensitization process is carried out to the subscriber identity information according to determining desensitization strategy, obtains the first desensitization body of each user Part information.
10. a kind of computer readable storage medium, which is characterized in that be stored on the computer readable storage medium based on letter The product promotion program for ceasing safety is realized when the product promotion program based on information security is executed by processor as right is wanted The step of product promotion method described in asking any one of 1 to 5 based on information security.
CN201910763208.1A 2019-08-15 2019-08-15 Product promotion method based on information security and related equipment Active CN110516471B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910763208.1A CN110516471B (en) 2019-08-15 2019-08-15 Product promotion method based on information security and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910763208.1A CN110516471B (en) 2019-08-15 2019-08-15 Product promotion method based on information security and related equipment

Publications (2)

Publication Number Publication Date
CN110516471A true CN110516471A (en) 2019-11-29
CN110516471B CN110516471B (en) 2022-05-17

Family

ID=68625706

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910763208.1A Active CN110516471B (en) 2019-08-15 2019-08-15 Product promotion method based on information security and related equipment

Country Status (1)

Country Link
CN (1) CN110516471B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111177537A (en) * 2019-12-13 2020-05-19 未鲲(上海)科技服务有限公司 Data exchange processing method, device, equipment and medium based on parallel processing
CN111262835A (en) * 2020-01-09 2020-06-09 青岛海尔科技有限公司 Desensitization storage method and device for sensitive data
CN112100651A (en) * 2020-08-14 2020-12-18 国网宁夏电力有限公司吴忠供电公司 Data desensitization method and system and electronic equipment
CN113438234A (en) * 2021-06-24 2021-09-24 字极(上海)网络科技有限公司 Network data security protection encryption method
CN114630314A (en) * 2020-12-10 2022-06-14 中移(苏州)软件技术有限公司 Updating method, device, equipment and storage medium of terminal information base

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101561815A (en) * 2009-05-19 2009-10-21 华中科技大学 Distributed cryptograph full-text retrieval system
CN106407843A (en) * 2016-10-17 2017-02-15 深圳中兴网信科技有限公司 Data desensitization method and data desensitization device
CN107704770A (en) * 2017-09-28 2018-02-16 平安普惠企业管理有限公司 Sensitive information desensitization method, system, equipment and readable storage medium storing program for executing
CN109271564A (en) * 2018-11-13 2019-01-25 泰康保险集团股份有限公司 Declaration form querying method and equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101561815A (en) * 2009-05-19 2009-10-21 华中科技大学 Distributed cryptograph full-text retrieval system
CN106407843A (en) * 2016-10-17 2017-02-15 深圳中兴网信科技有限公司 Data desensitization method and data desensitization device
CN107704770A (en) * 2017-09-28 2018-02-16 平安普惠企业管理有限公司 Sensitive information desensitization method, system, equipment and readable storage medium storing program for executing
CN109271564A (en) * 2018-11-13 2019-01-25 泰康保险集团股份有限公司 Declaration form querying method and equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
侯建刚等: "基于搜索引擎的网络敏感信息检索系统", 《信息技术与信息化》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111177537A (en) * 2019-12-13 2020-05-19 未鲲(上海)科技服务有限公司 Data exchange processing method, device, equipment and medium based on parallel processing
CN111262835A (en) * 2020-01-09 2020-06-09 青岛海尔科技有限公司 Desensitization storage method and device for sensitive data
CN112100651A (en) * 2020-08-14 2020-12-18 国网宁夏电力有限公司吴忠供电公司 Data desensitization method and system and electronic equipment
CN114630314A (en) * 2020-12-10 2022-06-14 中移(苏州)软件技术有限公司 Updating method, device, equipment and storage medium of terminal information base
CN114630314B (en) * 2020-12-10 2023-09-05 中移(苏州)软件技术有限公司 Updating method, device, equipment and storage medium of terminal information base
CN113438234A (en) * 2021-06-24 2021-09-24 字极(上海)网络科技有限公司 Network data security protection encryption method

Also Published As

Publication number Publication date
CN110516471B (en) 2022-05-17

Similar Documents

Publication Publication Date Title
CN110516471A (en) Product promotion method and relevant device based on information security
CN108259643B (en) Binding method and device of intelligent device and user operation terminal, and electronic device
CN107908485B (en) Interface parameter transmission method, device, equipment and computer readable storage medium
EP3179790B1 (en) Method and apparatus for determining location of target portable device
CN103259795A (en) Method for executing automatic register and login, mobile terminal and server
CN109040970B (en) Service planning handling method based on cloud computing and terminal equipment
CN111063183B (en) Bluetooth-based electric energy meter statistical method and device and storage medium
US20150264095A1 (en) Web service push method and web service push server and web service providing server performing same
WO2018121266A1 (en) Method and device for obtaining application and terminal device
CN112685799A (en) Device fingerprint generation method and device, electronic device and computer readable medium
CN109978114B (en) Data processing method, device, server and storage medium
CN112910741B (en) Interface testing method and device, computer equipment and storage medium
CN113268179B (en) Session message processing method, device, equipment and storage medium
CN110619204A (en) Invitation code generation method and device, terminal equipment and storage medium
CN110234082A (en) A kind of addressing method of mobile terminal, device, storage medium and server
CN113656098A (en) Configuration acquisition method and system
CN113626509A (en) Data access method and device, electronic equipment and readable storage medium
CN110874365B (en) Information query method and related equipment thereof
CN109600738B (en) User information updating method, device, equipment and storage medium
CN105610596B (en) Resource directory management method and network terminal
US20230007008A1 (en) Systems and methods for secure selection of a user profile in a shared context
CN108156071B (en) Method for adding members to community, terminal device and computer readable storage medium
CN110503455A (en) Product promotion method and relevant device based on information security
CN111159509B (en) Data processing method and related product
CN110944320B (en) Smart card identification method, smart card identification system and computer-readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant