CN111191255B - Information encryption processing method, server, terminal, device and storage medium - Google Patents

Information encryption processing method, server, terminal, device and storage medium Download PDF

Info

Publication number
CN111191255B
CN111191255B CN201910731726.5A CN201910731726A CN111191255B CN 111191255 B CN111191255 B CN 111191255B CN 201910731726 A CN201910731726 A CN 201910731726A CN 111191255 B CN111191255 B CN 111191255B
Authority
CN
China
Prior art keywords
server
encryption result
text information
terminal
text
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910731726.5A
Other languages
Chinese (zh)
Other versions
CN111191255A (en
Inventor
黎新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910731726.5A priority Critical patent/CN111191255B/en
Publication of CN111191255A publication Critical patent/CN111191255A/en
Application granted granted Critical
Publication of CN111191255B publication Critical patent/CN111191255B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The embodiment of the application discloses an information encryption processing method, which comprises the following steps: the server receives a service request message sent by a terminal; converting the service request message into a query command, wherein the query command is used for a server to query text information corresponding to the service request message from a text database; processing the text information through a first coding algorithm to obtain a first encryption result, and processing the text information through a second coding algorithm by a server to obtain a second encryption result; and sending the first encryption result and the second encryption result to the terminal so that the terminal obtains corresponding text information. The embodiment of the application also provides a corresponding server, a terminal, equipment and a storage medium. After the text information is encrypted through the encoding algorithm, the text information is not easy to leak, and the terminal does not need to decode the first encryption result and the second encryption result any more, but directly uses the first encryption result and the second encryption result as a model to obtain the text information.

Description

Information encryption processing method, server, terminal, device and storage medium
Technical Field
The embodiment of the application relates to the technical field of computer processing, in particular to an information encryption processing method, a server, a terminal, equipment and a storage medium.
Background
Currently, a large amount of information exists on a network, and people can inquire, browse and read the required information through the network. The text information of the user often relates to some private information, such as user-generated content (UGC) text information of user production content published on a social platform, such as posts published by microblogs, reading amount and clicking behavior on the platform, and the like. If the user has set the corresponding visible range for the issued UGC text information, if the social platform needs to analyze interests, preferences and the like of the user in order to promote the viscosity of the product to the user, the UGC text information issued by the user on the social platform is inevitably used, so that the UGC text information is randomly revealed, and a certain hidden danger exists for the safety of the UGC text information of the user.
In order to ensure the safety of UGC text information of a user, a method for encrypting the UGC text information of the user is currently proposed, which mainly converts plaintext information into ciphertext information by using a secret key and an encryption algorithm, and a service requiring party decrypts ciphertext data by using a decryption secret key and then uses the ciphertext data. The purpose of encrypting the plaintext information is to avoid that the plaintext information is illegally grasped in the transmission process and the plaintext information is used by an illegitimate user.
However, with the current encryption method, although the secure encryption is implemented to a certain extent, it is impossible for the service demander to directly use the UGC text information, and the UGC text information must be decrypted into plaintext by using a key, and the decrypted plaintext is easily revealed, so that there is a great risk of security.
Disclosure of Invention
The embodiment of the application provides an information encryption processing method, a server, a terminal, equipment and a storage medium, which are used for realizing encryption processing of text information through an encoding algorithm, so that the text information is not easy to leak.
In a first aspect, an embodiment of the present application provides a method for encrypting information, including:
the server receives a service request message sent by a terminal;
the server converts the service request message into a query command, wherein the query command is used for the server to query text information corresponding to the service request message from a text database;
the server processes the text information through a first coding algorithm to obtain a first encryption result, and processes the text information through a second coding algorithm to obtain a second encryption result;
and the server sends the first encryption result and the second encryption result to the terminal so that the terminal obtains corresponding text information.
In a second aspect, an embodiment of the present application provides a method for encrypting information, including:
the terminal acquires a service request message;
the terminal sends the service request message to a server, so that the server can inquire text information corresponding to the service request message from a text database after converting the service request message into an inquiry command, and the text information is processed through a first coding algorithm and a second coding algorithm respectively to obtain a first encryption result and a second encryption result;
the terminal receives the first encryption result and the second encryption result sent by the server;
and the terminal determines corresponding text information according to the first encryption result and the second encryption result.
In a third aspect, an embodiment of the present application provides a server, including:
a receiving unit, configured to receive a service request message sent by a terminal;
the conversion unit is used for converting the service request message received by the receiving unit into a query command, wherein the query command is used for querying text information corresponding to the service request message from a text database;
the processing unit is used for processing the text information through a first coding algorithm to obtain a first encryption result, and processing the text information through a second coding algorithm to obtain a second encryption result;
And the sending unit is used for sending the first encryption result and the second encryption result obtained by the processing unit to the terminal so as to enable the terminal to obtain corresponding text information.
In a first possible implementation manner of the third aspect of the embodiments of the present application, the processing unit includes:
the first word segmentation module is used for segmenting the text information to obtain a first input text sequence with N dimensions, wherein N is a positive integer;
the conversion module is used for converting each word in the first input text sequence obtained by the first word segmentation module into an N-dimensional floating point number vector;
the first coding module is used for coding the N-dimensional floating point number vector obtained by the conversion module by adopting a first long-short-term memory LSTM model so as to obtain an intermediate description vector, wherein the dimension of the intermediate description vector is the same as that of the floating point number vector;
and the first processing module is used for taking the intermediate description vector obtained by the first encoding module as a first encryption result.
In a second possible implementation manner of the third aspect of the embodiments of the present application, the server further includes:
The updating unit is used for updating M words in the first input text sequence under the condition that a preset condition is met after the first word segmentation module segments the text information to obtain the first input text sequence with N dimensions, wherein the preset condition is a small probability event, and M is a positive integer and smaller than N. In a third possible implementation manner of the third aspect of the embodiments of the present application, the processing unit includes:
the second word segmentation module is used for segmenting the text information to obtain a second input text sequence with N dimensions, wherein N is a positive integer;
the obtaining module is used for obtaining keywords from the second input text sequence obtained by the second keyword module;
the second encoding module is used for encoding the keyword obtained by the obtaining module based on a random term2ID conversion function so as to obtain a random number ID;
the generation module is used for generating a first variable sequence based on the random number ID obtained by the second coding module and the frequency corresponding to the random number ID;
and the second processing module is used for taking the first variable sequence generated by the generating module as a second encryption result.
In a fourth aspect, an embodiment of the present application provides a terminal, including:
an acquisition unit, configured to acquire a service request message;
the sending unit is used for sending the service request message acquired by the acquisition unit to a server, inquiring text information corresponding to the service request message from a text database after the server converts the service request message into an inquiry command, and processing the text information through a first coding algorithm and a second coding algorithm respectively to acquire a first encryption result and a second encryption result;
the receiving unit is used for receiving the first encryption result and the second encryption result sent by the server;
and the determining unit is used for determining corresponding text information according to the first encryption result and the second encryption result received by the receiving unit.
In a first possible implementation manner of the fourth aspect of the embodiments of the present application, the determining unit includes:
the processing module is used for processing the intermediate description variable by adopting a second LSTM model to obtain a first output text sequence, wherein the intermediate description variable is a first encryption result obtained after the server encodes an N-dimensional floating point number vector converted by each word in a first input text sequence based on the first LSTM model, the dimension of the first output text sequence is the same as the dimension of the first input text sequence, the step size of the second LSTM model is the same as the step size of the first LSTM model, and the first input text sequence is a sequence obtained after the server queries text information corresponding to the service request message from a text database based on the query command.
And the determining module is used for determining corresponding text information from the first output text sequence processed by the processing module.
In a fifth aspect, embodiments of the present application provide a computer device, comprising: the computer device includes:
input/output (I/O) interfaces, a processor and memory,
program instructions are stored in the memory;
the processor is configured to execute program instructions stored in the memory for implementing the method according to any one of the possible implementations of the first aspect, the second aspect, the third aspect and the fourth aspect.
A sixth aspect of the present application provides a computer readable storage medium having stored therein computer executable instructions for performing a method as any one of the possible implementations of the first, second, third and fourth aspects.
A seventh aspect of embodiments of the present application provides a computer program product comprising instructions which, when run on a computer or processor, cause the computer or processor to perform the method of any of the above aspects. From the above technical solutions, the embodiments of the present application have the following advantages:
In the embodiment of the application, after converting the service request message sent by the terminal into the query command, the server queries corresponding text information from the text database, so that the text information is encoded by a first encoding algorithm to obtain a first encryption result, and the text information is encoded by a second encoding algorithm to obtain a second encryption result, so that the terminal can obtain the corresponding text information after receiving the first encryption result and the second encryption result. Therefore, after the text information is encrypted through the encoding algorithm, the text information is not easy to leak, and the terminal does not need to decode the first encryption result and the second encryption result after receiving the first encryption result and the second encryption result, but directly uses the first encryption result and the second encryption result to perform model analysis to obtain the corresponding text information.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of a system architecture for information processing in an embodiment of the present application;
FIG. 2 is a schematic diagram of one embodiment of a method of information encryption processing provided in an embodiment of the present application;
FIG. 3 is a schematic diagram of another embodiment of a method of information encryption processing provided in an embodiment of the present application;
FIG. 4 is a schematic diagram of one embodiment of a server provided in an embodiment of the present application;
FIG. 5 is a schematic diagram of another embodiment of a server provided in an embodiment of the present application;
FIG. 6 is a schematic diagram of one embodiment of a terminal provided in an embodiment of the present application;
FIG. 7 is a schematic diagram of another embodiment of a terminal provided in an embodiment of the present application;
fig. 8 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
The embodiment of the application provides an information encryption processing method, a server, a terminal, equipment and a storage medium, which are used for realizing encryption processing of text information through an encoding algorithm, so that the text information is not easy to leak.
The following description of the technical solutions in the embodiments of the present application will be made clearly and completely with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, are intended to be within the scope of the present application.
The terms "first," "second," "third," "fourth" and the like in the description and in the claims of this application and in the above-described figures, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that embodiments of the present application described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. The naming or numbering of the steps in the present application does not mean that the steps in the method flow must be executed according to the time/logic sequence indicated by the naming or numbering, and the execution sequence of the steps in the flow that are named or numbered may be changed according to the technical purpose to be achieved, so long as the same or similar technical effects can be achieved.
The following describes a system architecture adapted to embodiments of the present application:
the method provided by the embodiment of the application is mainly applied to the scene of encrypting the text information. For example: when the service demand party needs to consult the browsed text information, the request message is sent to the server, so that the server can encrypt the text information in the plaintext state by using the secret key and then send the encrypted text information to the service demand party, and the service demand party can acquire the wanted text information after decoding by using the corresponding private key. However, the encryption mode plays a role in encrypting text information to a certain extent, but the text information cannot be directly used by a business demand party, but is required to be decrypted into plaintext information by using a private key, and the decrypted plaintext information is easy to steal, so that a great potential safety hazard exists.
In order to solve the above-mentioned problems, an embodiment of the present application provides a method for information encryption processing, which can be applied to the information processing system shown in fig. 1, please refer to fig. 1, which is a schematic diagram of a system architecture for information processing in the embodiment of the present application. As can be seen from fig. 1, the system architecture may include a server, and a terminal, where the terminal is a terminal device held by a service requirement, such as: mobile terminal, wearable smart device, tablet computer, notebook, user equipment etc. the terminal and the server are connected through the network. In a specific application, a terminal sends a service demand message to a server, and the server converts the service demand message into a query command after the service demand message is taken, so that the corresponding text information is found in a text database and then encrypted through an encoding algorithm, the text information is not easy to leak, and the terminal does not need to decode the encryption result after receiving the encryption result, but directly uses the encryption result to make model analysis to obtain the corresponding text information.
The method of information encryption processing in this embodiment may be applicable to other system architectures besides the system architecture shown in fig. 1, and is not limited herein.
In order to better understand the solution proposed in the embodiments of the present application, a specific flow in this embodiment is described below, referring to fig. 2, which is a schematic diagram of one embodiment of a method for encrypting information provided in the embodiments of the present application, where the method includes:
201. the terminal acquires the service request message.
In this embodiment, the service request message may include a request rule, and each request rule may be composed of a logical relationship between keywords, where the logical relationship includes: the three logical relationships "AND", "OR" AND "NOT" are expressed as logical AND, logical OR AND logical NOT, respectively. For example, the service request message may include "QQ AND hundred degrees", which indicates that "QQ" AND "hundred degrees" appear in the service request message at the same time, that is, the terminal needs to obtain text information including that QQ AND hundred degrees appear at the same time. Of course, the service request message may also include "QQ OR hundred degrees", which indicates that the service request message is text in which "QQ" OR "hundred degrees" occur simultaneously; or this may also include "QQ NOT hundred degrees", indicating that the service request message is text that has both "QQ" and "hundred degrees" present. The QQ and the hundred degrees described above are merely examples, and other text keywords may be included in practical applications, which are not specifically limited in the embodiments of the present application.
202. And the terminal sends a service request message to the server.
In this embodiment, after the terminal obtains the service request message, the service request message may be sent to the server, so that the server finds the corresponding text information and feeds back the text information to the terminal. In particular, the service request message may be sent to the server by invoking the network communication interface of rpc.
203. The server converts the service request message into a query command, wherein the query command is used for the server to query text information corresponding to the service request message from the text database.
In this embodiment, after receiving the service request message sent by the terminal, the server may convert the service request message into a query command, for example, a MySQL query command or a hive query command, and in practical application, may also convert the service request message into other query commands, which is not specifically limited in this embodiment. It should be noted that, for converting the service request message into which query command, these are mainly determined by the storage format of the text database, if the storage format of the text database is MySQL database, then the service request message is converted into MySQL query command; if the storage format of the text database is a hive database, converting the service request message into a hive query command; if the text database is stored in another database, the service request message is converted into a corresponding query command, which is not limited in the embodiment of the present application.
It should be understood that after converting the service request message into the query command, the server may find the text information corresponding to the service request message from the corresponding text database according to the query command. It should be understood that the text information queried is original text data, and is text information which is provided for the terminal in the following and is not analyzed by the internet platform, so that the terminal can query the correct text information.
204. The server processes the text information through a first coding algorithm to obtain a first encryption result, and processes the text information through a second coding algorithm to obtain a second encryption result.
In this embodiment, after the server queries the original text information corresponding to the service request message from the text database according to the query command, encryption processing needs to be performed on the text information, so as to prevent leakage when the text information is returned to the terminal, and influence the security of the text information. Specifically, the queried text information may be processed by a first encoding algorithm, and a first encryption result may be obtained, for example: the text information can be coded and processed by a long short-term memory (LSTM) model; the second encryption result may be obtained by processing the queried text information through a second encoding algorithm, for example: the text information can be subjected to coding processing and the like through a random text random term2id conversion function, so that the first encryption result and the second encryption result are fed back to the terminal together, and the terminal can use different encryption results in different scenes according to service requirements.
It should be noted that, in the embodiment of the present application, the text information is encrypted by means of encoding, so that after the obtained encryption result is sent to the terminal, the encryption result can be used as a model by the terminal to analyze the corresponding text information, and decryption by a key is not required.
205. The server sends the first encryption result and the second encryption result to the terminal.
In this embodiment, after obtaining the first encryption result and the second decryption result of the text information, the server may send the first encryption result and the second decryption result to the terminal at the same time, so that the terminal may obtain the corresponding text information.
206. The terminal determines corresponding text information according to the first encryption result and determines corresponding text information according to the second encryption result.
In this embodiment, after the server sends the first encryption result and the second encryption result to the terminal, the terminal may use the first encryption result or the second encryption result in different scenarios according to the service requirement, so as to determine text information corresponding to the service request message according to the first encryption result or the second encryption result.
In the embodiment of the application, after converting the service request message sent by the terminal into the query command, the server queries corresponding text information from the text database, so that the text information is encoded by a first encoding algorithm to obtain a first encryption result, and the text information is encoded by a second encoding algorithm to obtain a second encryption result, so that the terminal can obtain the corresponding text information after receiving the first encryption result and the second encryption result. Therefore, after the text information is subjected to encryption processing under the trial of an encoding algorithm, the text information is not easy to leak, and the terminal does not need to decode the first encryption result and the second encryption result after receiving the first encryption result and the second encryption result, but directly uses the first encryption result and the second encryption result to perform model analysis to obtain the corresponding text information.
In order to better understand the solution proposed in the embodiments of the present application, a specific flow of how the server encrypts in the embodiment is further described below, and referring to fig. 3, a schematic diagram of another embodiment of a method for encrypting information provided in the embodiments of the present application is shown, where the method specifically includes:
301. the terminal acquires the service request message.
In this embodiment, the service request message may include a request rule, and each request rule may be composed of a logical relationship between keywords, where the logical relationship includes: the three logical relationships "AND", "OR" AND "NOT" are expressed as logical AND, logical OR AND logical NOT, respectively. For example, the service request message may include "QQ AND hundred degrees", which indicates that "QQ" AND "hundred degrees" appear in the service request message at the same time, that is, the terminal needs to obtain text information including that QQ AND hundred degrees appear at the same time. Of course, the service request message may also include "QQ OR hundred degrees", which indicates that the service request message is text in which "QQ" OR "hundred degrees" occur simultaneously; or this may also include "QQ NOT hundred degrees", indicating that the service request message is text that has both "QQ" and "hundred degrees" present. The QQ and the hundred degrees described above are merely examples, and other text keywords may be included in practical applications, which are not specifically limited in the embodiments of the present application.
302. And the terminal sends a service request message to the server.
In this embodiment, after the terminal obtains the service request message, the service request message may be sent to the server, so that the server finds the corresponding text information and feeds back the text information to the terminal. In particular, the service request message may be sent to the server by invoking the network communication interface of rpc.
303. The server converts the service request message into a query command, wherein the query command is used for the server to query text information corresponding to the service request message from the text database.
In this embodiment, after receiving the service request message sent by the terminal, the server may convert the service request message into a query command, for example, a MySQL query command or a hive query command, and in practical application, may also convert the service request message into other query commands, which is not specifically limited in this embodiment. It should be noted that, for converting the service request message into which query command, these are mainly determined by the storage format of the text database, if the storage format of the text database is MySQL database, then the service request message is converted into MySQL query command; if the storage format of the text database is a hive database, converting the service request message into a hive query command; if the text database is stored in another database, the service request message is converted into a corresponding query command, which is not limited in the embodiment of the present application.
It should be understood that after converting the service request message into the query command, the server may find the text information corresponding to the service request message from the corresponding text database according to the query command. It should be understood that the text information queried is original text data, and is text information which is provided for the terminal in the following and is not analyzed by the internet platform, so that the terminal can query the correct text information.
304. The server performs word segmentation on the text information to obtain a first input text sequence in N dimensions.
In this embodiment, after the server queries text information corresponding to the service request message, the server needs to segment the text information, so that each word after the segmentation is used as a variable, and a first input text sequence in N dimensions can be obtained. It should be noted that N is a positive integer greater than zero, and is specifically determined according to the number of words after word segmentation of the text information, which is not specifically limited in the embodiment of the present application.
For example: after word segmentation for a certain text message, a variable X1 may be used to represent a word, a variable X2 may be used to represent a word, a variable X3 may be used to represent a word, and so on, and the resulting first input text sequence may be represented as x= { X1, X2, X3, X4, … … xn }.
In other embodiments, after the text information is segmented to obtain the first input text sequence, the method may further include: and the server updates M words in the first input text sequence under the condition that the preset condition is met. In particular, the M words in the first input text sequence may be replaced by a symbol having no special meaning, such as: the method mainly aims at enhancing the robustness of the model of the intermediate description variable obtained later, so that the model of the intermediate description variable can be prevented from being excessively fitted with original text information by applying extra small noise, and the model of the intermediate description variable can also have better adaptability in the face of new text information. For example: for the first input text sequence X= { X1, X2, X3, X4, … … xn }, the variables X1, X3, etc. may be replaced by S, #, respectively, so the first input text sequence becomes X= { S, # X2, X4, … … xn }. It should be noted that, the symbols having no special meaning described above include: the embodiments of the present application are merely examples, and should be applied to the actual application as the case may be, the embodiments of the present application will not be specifically limited.
305. The server converts each word in the first input text sequence into an N-dimensional floating point number vector.
In this embodiment, after the first input text sequence corresponding to the text information is obtained, each word may be correspondingly converted into a floating point number vector in N dimensions. For example, if the first input text sequence is a sequence of words corresponding to an article title, the words corresponding to the article title may be converted into N-dimensional floating point vectors by text embedding, so that the article title is represented by the floating point vectors, e.g., the floating point vectors corresponding to the words represented by the variable x1 may be represented as v= { V1, V2, V3, V4, … … vn }, so that a word length as short as possible may be used to achieve a table number range as large as possible and a table number precision as high as possible.
It should be noted that, the dimension of the floating point number vector may be 300, and other dimensions may be used in practical applications, and the embodiment of the present application is not specifically limited as appropriate.
306. The server adopts a first long-short-term memory LSTM model to encode the N-dimensional floating point number vector so as to obtain an intermediate description vector, wherein the dimension of the intermediate description vector is the same as the dimension of the floating point number vector.
In this embodiment, the LSTM model is a time recurrent neural network, which is suitable for processing and predicting important events with relatively long intervals and delays in a time series, is a modified structure of the recurrent neural network (recurrentneural networks, RNN), and is capable of memorizing values of indefinite length, and an entry in the LSTM block is included to determine whether an input is important enough to be memorized and not outputted. The server may thus encode the N-dimensional floating point number vector converted by each word using the first LSTM model, and may derive an intermediate descriptive variable C, i.e., c=lstm (V). Specifically, the N-dimensional floating point number vector into which each word is converted may be encoded using a self-encoder.
It should be noted that the dimension of the intermediate description variable C is the same as the dimension of the floating point variable V, that is, 300 dimensions are taken for the floating point variable V. The specific determination is determined according to the actual situation, and the embodiment of the application is not specifically limited.
307. The server takes the intermediate description vector as a first encryption result.
In this embodiment, the intermediate description variable is directly used as the first encryption result, mainly for avoiding leakage of text information when the intermediate description variable is sent to the terminal, and the terminal may also directly use the intermediate description variable to make a model, so as to obtain corresponding text information.
308. The server performs word segmentation on the text information to obtain a second input text sequence in the N dimension.
In this embodiment, after the server queries the text information corresponding to the service request message, the server needs to segment the text information, so that each word after the segmentation is used as a variable, and a second input text sequence in N dimensions can be obtained. It should be noted that N is a positive integer greater than zero, and is specifically determined according to the number of words after word segmentation of the text information, which is not specifically limited in the embodiment of the present application.
For example: after word segmentation for a certain text message, variable a1 may be used to represent a word, variable a2 may be used to represent a word, variable a3 may be used to represent a word, etc., and the resulting second input text sequence may be represented as a= { a1, a2, a3, a4, … … an }.
309. The server obtains keywords from the second input text sequence.
In this embodiment, the keywords may roughly characterize what is to be described by one text message, so that the server may obtain the keywords included in the text message from the second input text sequence after obtaining the second input text sequence.
310. The server encodes the keyword based on a random term2ID transfer function to obtain a random number ID.
In this embodiment, the random term2ID conversion function refers to that, for each service request message, the conversion of the keyword in the text information corresponding to the service request message into the digital ID is random, so that the second encryption result obtained by the service demander corresponding to each terminal can be different to the greatest extent, and the high security of the text information is ensured.
Specifically, the definition of the random term2id transfer function is:
term_id=Hash(term+appid)
wherein term is a keyword, app ID is a random number string which is unique to each application requirement, hash is a Hash mapping function, and the inputted keyword is converted into a random number ID. For example: for the second input text sequence a= { a1, a2, a3, a4, …, an }, wherein the keywords are a3, a8, a10, a15, the random numbers ID obtained after conversion by the random term2ID conversion function are respectively: ID3, ID8, ID10, ID15. The specific determination is determined according to the actual situation, and the embodiment of the application is not specifically limited.
311. The server generates a first variable sequence based on the random number ID and the frequency corresponding to the random number ID.
In this embodiment, the frequency corresponding to the random number ID refers to the number or frequency of occurrence of the keyword in the text information, so a first variable sequence may be generated according to the random number ID and the frequency corresponding to the random number ID, where i is a positive integer less than N, and the first variable sequence may be represented as b= { IDi: fi, …, …, IDn: fn }. For example: based on the embodiment described in the above step 310, the keywords are a3, a8, a10, a15, a20, and the corresponding frequencies are 8, 15, 12, 15, respectively, and the generated first variable sequence is b= { ID3:8, ID8: 15. ID10:12, id15:15}.
312. The server takes the first variable sequence as a second encryption result.
In this embodiment, the first variable sequence is directly used as the second encryption result, mainly to avoid leakage of text information when the first variable sequence is sent to the terminal, and the terminal may also directly use the first variable sequence to make a model, so as to obtain corresponding text information.
It should be noted that, in the embodiment of the present application, the text information is encrypted by means of encoding, so that after the obtained first encryption result and second encryption result are sent to the terminal, the first encryption result and the second encryption result can be used as models by the terminal to analyze the corresponding text information, and decryption by a key is not required.
It should be understood that, for the execution sequence of steps 304-307, 308-312, in addition to executing steps 304-307 and then 308-312, steps 308-312 may be executed first and then 304-307 may be executed, or steps 304-307 and 308-312 may be executed synchronously, which is not specifically limited in the embodiment of the present application.
313. The server sends the first encryption result and the second encryption result to the terminal.
In this embodiment, after obtaining the first encryption result and the second decryption result of the text information, the server may send the first encryption result and the second decryption result to the terminal at the same time, so that the terminal may obtain the corresponding text information.
314. The terminal determines corresponding text information according to the first encryption result and determines corresponding text information according to the second encryption result.
In this embodiment, after the server sends the first encryption result and the second encryption result to the terminal, the terminal may use the first encryption result or the second encryption result in different scenarios according to the service requirement, so as to determine text information corresponding to the service request message according to the first encryption result or the second encryption result.
Specifically, the terminal may process the first encryption result, that is, the intermediate description variable, by using the second LSTM model to obtain a first output text sequence, and determine corresponding text information from the first output text sequence. It should be noted that the step size of the second LSTM model needs to be set to be the same as the step size of the first LSTM model, so that the terminal can generate all the original text information through the intermediate description variable under the condition that the loss function of the intermediate description variable is minimum, and the dimension of the first output text sequence is the same as the dimension of the first input text sequence.
Specifically, after the second encryption result is obtained, the terminal obtains the first variable sequence, and then obtains the random number ID and the frequency corresponding to the random number ID, and the ID feature training classifier performs deep learning analysis on the random number ID and the frequency corresponding to the random number ID, so as to obtain the keyword and the text information corresponding to the random number ID.
In the embodiment of the application, after converting the service request message sent by the terminal into the query command, the server queries corresponding text information from the text database, so that the text information is encoded by a first encoding algorithm to obtain a first encryption result, and the text information is encoded by a second encoding algorithm to obtain a second encryption result, so that the terminal can obtain the corresponding text information after receiving the first encryption result and the second encryption result. Therefore, after the text information is subjected to encryption processing under the trial of an encoding algorithm, the text information is not easy to leak, and the terminal does not need to decode the first encryption result and the second encryption result after receiving the first encryption result and the second encryption result, but directly uses the first encryption result and the second encryption result to perform model analysis to obtain the corresponding text information.
The foregoing describes the method provided by the embodiments of the present application mainly from the interaction perspective. It should be understood that, in order to implement the above-described functions, hardware structures and/or software modules corresponding to the respective functions are included. Those of skill in the art will readily appreciate that the various illustrative modules and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is implemented as hardware or computer software driven hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The embodiment of the application may divide the functional modules of the apparatus according to the above method example, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated modules may be implemented in hardware or in software functional modules. It should be noted that, in the embodiment of the present application, the division of the modules is schematic, which is merely a logic function division, and other division manners may be implemented in actual implementation.
Referring to fig. 4, fig. 4 is a schematic diagram of an embodiment of a server 40 provided in an embodiment of the present application, where the server 40 may include:
a receiving unit 401, configured to receive a service request message sent by a terminal;
a conversion unit 402, configured to convert the service request message received by the receiving unit 401 into a query command, where the query command is used to query text information corresponding to the service request message from the text database;
a processing unit 403, configured to process the text information obtained by the conversion unit 402 by using a first encoding algorithm to obtain a first encryption result, and process the text information obtained by the conversion unit 402 by using a second encoding algorithm to obtain a second encryption result;
And a sending unit 404, configured to send the first encryption result and the second encryption result obtained by the processing unit 403 to the terminal, so that the terminal obtains the corresponding text information.
Optionally, referring to fig. 5 on the basis of the embodiment corresponding to fig. 4, fig. 5 is a schematic diagram of another embodiment of a server provided in the embodiment of the present application, where the processing unit 403 may include:
the first word segmentation module 4031 is configured to segment the text information to obtain a first input text sequence in N dimensions, where N is a positive integer;
the conversion module 4032 is configured to convert each word in the first input text sequence obtained by the first word segmentation module 4031 into an N-dimensional floating point number vector;
the first encoding module 4033 is configured to encode the N-dimensional floating point number vector obtained by the conversion module 4032 by using the first long-short-term memory LSTM model, so as to obtain an intermediate description vector, where a dimension of the intermediate description vector is the same as a dimension of the floating point number vector;
the first processing module 4034 is configured to take the intermediate description vector obtained by the first encoding module 4033 as a first encryption result.
Optionally, in another embodiment of the server provided in the embodiment of the present application, based on the embodiment described in fig. 5, the server 40 may further include: the updating unit is used for segmenting the text information by the first word segmentation module to obtain a first input text sequence with N dimensions, and then updating M words in the first input text sequence under the condition that the preset condition is met, wherein the preset condition is a small probability event, and M is a positive integer and smaller than N.
Alternatively, in another embodiment of the server provided in the embodiment of the present application, based on the embodiment described in fig. 4, the processing unit 403 may include: the second word segmentation module is used for segmenting the text information to obtain a second input text sequence with N dimensions, wherein N is a positive integer; the acquisition module is used for acquiring keywords from the second input text sequence obtained by the second word segmentation module; the second coding module is used for coding the keywords obtained by the obtaining module based on the random term2ID conversion function so as to obtain a random number ID; the generation module is used for generating a first variable sequence based on the random number ID obtained by the second coding module and the frequency corresponding to the random number ID; and the second processing module is used for taking the first variable sequence generated by the generating module as a second encryption result.
Having described the server in detail above, and the following description of the terminal 50 in the embodiments of the present application in detail, please refer to fig. 6, fig. 6 is a schematic diagram of an embodiment of the terminal provided in the embodiments of the present application, the terminal 50 may include:
an obtaining unit 501, configured to obtain a service request message;
a sending unit 502, configured to send the service request message acquired by the acquiring unit 501 to a server, so that the server queries text information corresponding to the service request message from a text database after converting the service request message into a query command, and processes the text information through a first encoding algorithm and a second encoding algorithm to obtain a first encryption result and a second encryption result;
A receiving unit 503, configured to receive the first encryption result and the second encryption result sent by the server;
a determining unit 504, configured to determine corresponding text information according to the first encryption result and the second encryption result received by the receiving unit 503.
Optionally, on the basis of the embodiment described in fig. 6, referring to fig. 7, fig. 7 is a schematic diagram of another embodiment of a terminal provided in an embodiment of the present application, where the determining unit 504 may include:
the processing module 5041 is configured to process the intermediate description variable by using a second LSTM model to obtain a first output text sequence, where the intermediate description variable is a first encryption result obtained after the server encodes an N-dimensional floating point number vector converted from each word in the first input text sequence based on the first LSTM model, a dimension of the first output text sequence is the same as a dimension of the first input text sequence, a step size of the second LSTM model is the same as a step size of the first LSTM model, and the first input text sequence is a sequence obtained after the server queries text information corresponding to the service request message from the text database based on the query command and performs word segmentation.
A determining module 5042, configured to determine corresponding text information from the first output text sequence processed by the processing module 5041.
In the embodiment of the application, after the text information is encrypted by the encoding algorithm, the text information is not easy to leak, and the terminal does not need to decode the first encryption result and the second encryption result after receiving the first encryption result and the second encryption result, but directly uses the first encryption result and the second encryption result to perform model analysis to obtain the corresponding text information.
The server and the terminal in the embodiments of the present application are described above from the point of view of the modularized functional entity, and the server and the terminal in the embodiments of the present application are described below from the point of view of hardware processing. Fig. 8 is a schematic structural diagram of a computer device provided in an embodiment of the present application, where the computer device may include the server or the terminal described above, and the computer device may have a relatively large difference due to different configurations or performances, and the computer device may include at least one processor 601, a communication line 607, a memory 603, and at least one communication interface 604.
The processor 601 may be a general purpose central processing unit (central processing unit, CPU), microprocessor, application-specific integrated circuit (server IC), or one or more integrated circuits for controlling the execution of programs in accordance with aspects of the present application.
Communication line 607 may include a path to communicate information between the above components.
The communication interface 604 uses any transceiver-like device for communicating with other devices or communication networks, such as ethernet, radio access network (radio access network, RAN), wireless local area network (wireless local area networks, WLAN), etc.
The memory 603 may be a read-only memory (ROM) or other type of static storage device that may store static information and instructions, a random access memory (random accessmemory, RAM) or other type of dynamic storage device that may store information and instructions, and the memory may be stand-alone and coupled to the processor via a communication line 607. The memory may also be integrated with the processor.
The memory 603 is used for storing computer-executable instructions for executing the embodiments of the present application, and is controlled by the processor 601 to execute the instructions. The processor 601 is configured to execute computer-executable instructions stored in the memory 603, thereby implementing the method for information encryption processing provided in the above-described embodiment of the present application.
Alternatively, the computer-executable instructions in the embodiments of the present application may be referred to as application program codes, which are not specifically limited in the embodiments of the present application.
In a particular implementation, the computer device may include multiple processors, such as processor 601 and processor 602 in FIG. 8, as one embodiment. Each of these processors may be a single-core (single-CPU) processor or may be a multi-core (multi-CPU) processor. A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
In a specific implementation, the computer device may also include an output device 605 and an input device 606, as one embodiment. The output device 605 communicates with the processor 601 and may display information in a variety of ways. The input device 606 is in communication with the processor 601 and may receive user input in a variety of ways. For example, the input device 606 may be a mouse, a touch screen device, a sensing device, or the like.
The computer apparatus described above may be a general-purpose device or a special-purpose device. In a specific implementation, the computer device may be a desktop, a laptop, a nas server, a wireless terminal apparatus, an embedded apparatus, or an apparatus having a similar structure as in fig. 8. The embodiments of the present application are not limited in the type of computer device.
In the embodiment of the present application, the processor 601 included in the computer device further has the following functions:
receiving a service request message sent by a terminal;
converting the service request message into a query command, wherein the query command is used for querying text information corresponding to the service request message from a text database;
processing the text information through a first coding algorithm to obtain a first encryption result, and processing the text information through a second coding algorithm to obtain a second encryption result;
and sending the first encryption result and the second encryption result to the terminal so that the terminal obtains corresponding text information.
In some embodiments of the present application, the processor 601 may also be specifically configured to,
word segmentation is carried out on the text information to obtain a first input text sequence with N dimensions, wherein N is a positive integer;
converting each word in the first input text sequence into an N-dimensional floating point number vector;
adopting a first long-short-term memory LSTM model to encode the N-dimensional floating point number vector so as to obtain an intermediate description vector, wherein the dimension of the intermediate description vector is the same as the dimension of the floating point number vector;
the intermediate description vector is taken as a first encryption result.
In some embodiments of the present application, the processor 601 may also be specifically configured to,
After word segmentation is carried out on the text information to obtain a first input text sequence with N dimensions, M words in the first input text sequence are updated under the condition that the preset condition is met, wherein the preset condition is a small probability event, and M is a positive integer and smaller than N.
In some embodiments of the present application, the processor 601 may also be specifically configured to,
word segmentation is carried out on the text information to obtain a second input text sequence with N dimensions, wherein N is a positive integer;
obtaining keywords from the second input text sequence;
encoding the keyword based on a random term2ID conversion function to obtain a random number ID;
generating a first variable sequence based on the random number ID and the frequency corresponding to the random number ID;
the first variable sequence is used as a second encryption result.
In the embodiment of the present application, the processor 601 included in the computer device further has the following functions:
acquiring a service request message;
the method comprises the steps of sending a service request message to a server, wherein the service request message is used for inquiring text information corresponding to the service request message from a text database after the server converts the service request message into an inquiry command, and processing the text information through a first coding algorithm and a second coding algorithm respectively to obtain a first encryption result and a second encryption result;
Receiving a first encryption result and a second encryption result sent by a server;
corresponding text information is determined according to the first encryption result, and corresponding text information is determined according to the second encryption result.
In some embodiments of the present application, the processor 601 may also be specifically configured to,
and processing the intermediate description variable by adopting a second LSTM model to obtain a first output text sequence, wherein the intermediate description variable is a first encryption result obtained after the server codes an N-dimensional floating point number vector converted by each word in the first input text sequence based on the first LSTM model, the dimension of the first output text sequence is the same as the dimension of the first input text sequence, the step length of the second LSTM model is the same as the step length of the first LSTM model, and the first input text sequence is a sequence obtained after the server queries text information corresponding to a service request message from a text database based on a query command and performs word segmentation.
Corresponding text information is determined from the first output text sequence.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
In the several embodiments provided in this application, it should be understood that the disclosed systems, apparatuses, and methods may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of elements is merely a logical functional division, and there may be additional divisions of actual implementation, e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a storage medium, including several instructions to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods of the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a read-only memory (ROM), a random access memory (random access memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the corresponding technical solutions.

Claims (11)

1. A method of information encryption processing, the method comprising:
the server receives a service request message sent by a terminal;
the server converts the service request message into a query command, wherein the query command is used for the server to query text information corresponding to the service request message from a text database;
the server processes the text information through a first coding algorithm to obtain a first encryption result, and processes the text information through a second coding algorithm to obtain a second encryption result;
the server sends the first encryption result and the second encryption result to the terminal so that the terminal obtains corresponding text information;
the server processes the text information through a first coding algorithm to obtain a first encryption result, and the method comprises the following steps:
the server performs word segmentation on the text information to obtain a first input text sequence with N dimensions, wherein N is a positive integer;
the server updates M words in the first input text sequence under the condition that a preset condition is met, wherein the preset condition is a small probability event, and M is a positive integer and smaller than N;
The server converts each word in the first input text sequence into an N-dimensional floating point number vector;
the server adopts a first long-short-term memory LSTM model to encode the N-dimensional floating point number vector so as to obtain an intermediate description vector, wherein the dimension of the intermediate description vector is the same as the dimension of the floating point number vector;
the server takes the intermediate description vector as a first encryption result.
2. The method according to claim 1, characterized in that: the server processes the text information through a second coding algorithm to obtain a second encryption result, and the method comprises the following steps:
the server performs word segmentation on the text information to obtain a second input text sequence with N dimensions, wherein N is a positive integer;
the server acquires keywords from the second input text sequence;
the server encodes the keyword based on a random term2ID conversion function to obtain a random number ID;
the server generates a first variable sequence based on the random number ID and the frequency corresponding to the random number ID;
the server takes the first variable sequence as a second encryption result.
3. A method of information encryption processing, the method comprising:
the terminal acquires a service request message;
the terminal sends the service request message to a server, so that the server can inquire text information corresponding to the service request message from a text database after converting the service request message into an inquiry command, and the text information is processed through a first coding algorithm and a second coding algorithm respectively to obtain a first encryption result and a second encryption result;
the terminal receives the first encryption result and the second encryption result sent by the server;
the terminal determines corresponding text information according to the first encryption result and determines corresponding text information according to the second encryption result;
the server processes the text information through a first coding algorithm to obtain a first encryption result, and the method comprises the following steps:
the server performs word segmentation on the text information to obtain a first input text sequence with N dimensions, wherein N is a positive integer;
the server updates M words in the first input text sequence under the condition that a preset condition is met, wherein the preset condition is a small probability event, and M is a positive integer and smaller than N;
The server converts each word in the first input text sequence into an N-dimensional floating point number vector;
the server adopts a first long-short-term memory LSTM model to encode the N-dimensional floating point number vector so as to obtain an intermediate description vector, wherein the dimension of the intermediate description vector is the same as the dimension of the floating point number vector;
the server takes the intermediate description vector as a first encryption result.
4. A method according to claim 3, wherein the terminal determining the corresponding text information based on the first encryption result comprises:
the terminal processes an intermediate description variable by adopting a second LSTM model to obtain a first output text sequence, wherein the intermediate description variable is a first encryption result obtained after the server encodes an N-dimensional floating point number vector converted by each word in a first input text sequence based on the first LSTM model, the dimension of the first output text sequence is the same as the dimension of the first input text sequence, the step length of the second LSTM model is the same as the step length of the first LSTM model, and the first input text sequence is a sequence obtained after the server queries text information corresponding to the service request message from a text database based on the query command to perform word segmentation;
And the terminal determines corresponding text information from the first output text sequence.
5. A server, comprising:
a receiving unit, configured to receive a service request message sent by a terminal;
the conversion unit is used for converting the service request message received by the receiving unit into a query command, wherein the query command is used for querying text information corresponding to the service request message from a text database;
the processing unit is used for processing the text information through a first coding algorithm to obtain a first encryption result, and processing the text information through a second coding algorithm to obtain a second encryption result;
the sending unit is used for sending the first encryption result and the second encryption result obtained by the processing unit to the terminal so as to enable the terminal to obtain corresponding text information;
the processing unit includes:
the first word segmentation module is used for segmenting the text information to obtain a first input text sequence with N dimensions, wherein N is a positive integer;
the updating unit is used for updating M words in the first input text sequence under the condition that the preset condition is met, wherein the preset condition is a small probability event, and M is a positive integer and smaller than N;
The conversion module is used for converting each word in the first input text sequence obtained by the first word segmentation module into an N-dimensional floating point number vector;
the first coding module is used for coding the N-dimensional floating point number vector obtained by the conversion module by adopting a first long-short-term memory LSTM model so as to obtain an intermediate description vector, wherein the dimension of the intermediate description vector is the same as that of the floating point number vector;
the first processing module is used for taking the intermediate description vector obtained by the first encoding module as a first encryption result.
6. The server of claim 5, wherein the processing unit comprises:
the second word segmentation module is used for segmenting the text information to obtain a second input text sequence with N dimensions, wherein N is a positive integer;
the acquisition module is used for acquiring keywords from the second input text sequence obtained by the second word segmentation module;
the second coding module is used for coding the keywords obtained by the obtaining module based on the random term2ID conversion function so as to obtain a random number ID;
the generation module is used for generating a first variable sequence based on the random number ID obtained by the second coding module and the frequency corresponding to the random number ID;
And the second processing module is used for taking the first variable sequence generated by the generating module as a second encryption result.
7. A terminal, comprising:
an acquisition unit, configured to acquire a service request message;
the sending unit is used for sending the service request message acquired by the acquisition unit to a server, inquiring text information corresponding to the service request message from a text database after the server converts the service request message into an inquiry command, and processing the text information through a first coding algorithm and a second coding algorithm respectively to acquire a first encryption result and a second encryption result;
the receiving unit is used for receiving the first encryption result and the second encryption result sent by the server;
a determining unit, configured to determine corresponding text information according to the first encryption result and the second encryption result received by the receiving unit;
the server processes the text information through a first coding algorithm to obtain a first encryption result, and the method comprises the following steps:
the server performs word segmentation on the text information to obtain a first input text sequence with N dimensions, wherein N is a positive integer;
The server updates M words in the first input text sequence under the condition that a preset condition is met, wherein the preset condition is a small probability event, and M is a positive integer and smaller than N;
the server converts each word in the first input text sequence into an N-dimensional floating point number vector;
the server adopts a first long-short-term memory LSTM model to encode the N-dimensional floating point number vector so as to obtain an intermediate description vector, wherein the dimension of the intermediate description vector is the same as the dimension of the floating point number vector;
the server takes the intermediate description vector as a first encryption result.
8. The terminal according to claim 7, wherein the determining unit includes:
the processing module is used for processing the intermediate description variable by adopting a second LSTM model to obtain a first output text sequence, wherein the intermediate description variable is a first encryption result obtained after the server codes an N-dimensional floating point number vector converted by each word in the first input text sequence based on the first LSTM model, the dimension of the first output text sequence is the same as that of the first input text sequence, the step length of the second LSTM model is the same as that of the first LSTM model, and the first input text sequence is a sequence obtained after the server inquires text information corresponding to a service request message from a text database based on an inquiry command and divides the text information;
And the determining module is used for determining corresponding text information from the first output text sequence processed by the processing module.
9. A computer device, the computer device comprising: input/output (I/O) interfaces, a processor and memory,
program instructions are stored in the memory;
the processor is configured to execute program instructions stored in a memory and to perform the method of any one of claims 1-2 or 3-4.
10. A computer readable storage medium comprising instructions which, when run on a computer device, cause the computer device to perform the method of any of claims 1-2 or 3-4.
11. A computer program product comprising instructions which, when run on a computer device, cause the computer device to perform the method of any of claims 1-2 or 3-4.
CN201910731726.5A 2019-08-08 2019-08-08 Information encryption processing method, server, terminal, device and storage medium Active CN111191255B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910731726.5A CN111191255B (en) 2019-08-08 2019-08-08 Information encryption processing method, server, terminal, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910731726.5A CN111191255B (en) 2019-08-08 2019-08-08 Information encryption processing method, server, terminal, device and storage medium

Publications (2)

Publication Number Publication Date
CN111191255A CN111191255A (en) 2020-05-22
CN111191255B true CN111191255B (en) 2024-04-05

Family

ID=70709065

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910731726.5A Active CN111191255B (en) 2019-08-08 2019-08-08 Information encryption processing method, server, terminal, device and storage medium

Country Status (1)

Country Link
CN (1) CN111191255B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112084523A (en) * 2020-09-29 2020-12-15 深圳壹账通智能科技有限公司 Text encryption method and device, terminal equipment and storage medium
CN112632588A (en) * 2020-12-30 2021-04-09 中国农业银行股份有限公司 Text encryption method and device
CN113284494B (en) * 2021-05-25 2023-12-01 北京基智科技有限公司 Voice assistant recognition method, device, equipment and computer readable storage medium
CN116089620B (en) * 2023-04-07 2023-06-09 日照蓝鸥信息科技有限公司 Electronic archive data management method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105159998A (en) * 2015-09-08 2015-12-16 海南大学 Keyword calculation method based on document clustering
CN108537062A (en) * 2018-04-24 2018-09-14 山东华软金盾软件股份有限公司 A kind of method of database data dynamic encryption
CN109886388A (en) * 2019-01-09 2019-06-14 平安科技(深圳)有限公司 A kind of training sample data extending method and device based on variation self-encoding encoder

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105159998A (en) * 2015-09-08 2015-12-16 海南大学 Keyword calculation method based on document clustering
CN108537062A (en) * 2018-04-24 2018-09-14 山东华软金盾软件股份有限公司 A kind of method of database data dynamic encryption
CN109886388A (en) * 2019-01-09 2019-06-14 平安科技(深圳)有限公司 A kind of training sample data extending method and device based on variation self-encoding encoder

Also Published As

Publication number Publication date
CN111191255A (en) 2020-05-22

Similar Documents

Publication Publication Date Title
CN111191255B (en) Information encryption processing method, server, terminal, device and storage medium
CN111695674B (en) Federal learning method, federal learning device, federal learning computer device, and federal learning computer readable storage medium
US10972251B2 (en) Secure web browsing via homomorphic encryption
JP6926429B2 (en) Data processing equipment, data processing methods, and programs
CN109150499B (en) Method and device for dynamically encrypting data, computer equipment and storage medium
CN109858263B (en) Data storage and retrieval method and device, electronic equipment and storage medium
CN109241770B (en) Information value calculation method and device based on homomorphic encryption and readable storage medium
CN107786331B (en) Data processing method, device, system and computer readable storage medium
US8769302B2 (en) Encrypting data and characterization data that describes valid contents of a column
US11251936B2 (en) System and method for performing homomorphic aggregation over encrypted data
CN107483432A (en) File encryption processing method and processing device
CN107277028B (en) Method, device, equipment and storage medium for transmitting chat emoticons among applications
CN105827582A (en) Communication encryption method, device and system
US10476661B2 (en) Polynomial-based homomorphic encryption
CN114817943A (en) Data matching method, device, equipment and medium
CN115269938A (en) Keyword track hiding query method and system based on homomorphic encryption and related device
CN106888213B (en) Cloud ciphertext access control method and system
CN111898135A (en) Data processing method, data processing apparatus, computer device, and medium
CN112887297B (en) Privacy-protecting differential data determining method, device, equipment and system
CN112436943B (en) Request deduplication method, device, equipment and storage medium based on big data
CN110765238A (en) Data encryption query method and device
CN114329644B (en) Method, device and storage medium for carrying out encryption simulation on logic system design
CN108985109A (en) A kind of date storage method and device
CN112800467B (en) Online model training method, device and equipment based on data privacy protection
US20180019977A1 (en) Multi-layered data security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant