CN111241573B - Ticket information processing method and device and electronic equipment - Google Patents

Ticket information processing method and device and electronic equipment Download PDF

Info

Publication number
CN111241573B
CN111241573B CN201911236528.8A CN201911236528A CN111241573B CN 111241573 B CN111241573 B CN 111241573B CN 201911236528 A CN201911236528 A CN 201911236528A CN 111241573 B CN111241573 B CN 111241573B
Authority
CN
China
Prior art keywords
terminal
information
database
interception
confirmation information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201911236528.8A
Other languages
Chinese (zh)
Other versions
CN111241573A (en
Inventor
曾铭
陈念
邓青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Qianyu Qiancheng Internet Technology Co ltd
Original Assignee
Guangzhou Erspace Information Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Erspace Information Service Co ltd filed Critical Guangzhou Erspace Information Service Co ltd
Priority to CN201911236528.8A priority Critical patent/CN111241573B/en
Publication of CN111241573A publication Critical patent/CN111241573A/en
Application granted granted Critical
Publication of CN111241573B publication Critical patent/CN111241573B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0239Online discounts or incentives
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information

Abstract

The embodiment of the invention relates to the technical field of information processing, in particular to a coupon information processing method, a device and electronic equipment, in the method, the first terminal can be prevented from directly sending the confirmation information to the second terminal by intercepting and caching the confirmation information when the first terminal acquires the target coupon code and sends the confirmation information to the second terminal, thereby avoiding the second terminal stealing other information of the first terminal according to the confirmation information, and determining the legality and security of the second terminal when the second terminal verifies the target ticket code, and then sends the confirmation information to the second terminal when the obtained verification result represents that the target ticket code passes the verification, therefore, before the confirmation information is sent, the legality and the safety of the second terminal are determined based on the action of the second terminal for verifying the target coupon code, and information leakage of the first terminal is avoided.

Description

Ticket information processing method and device and electronic equipment
Technical Field
The invention relates to the technical field of information processing, in particular to a coupon information processing method and device and electronic equipment.
Background
With the development of internet finance, coupon codes are occasionally pushed out by various large merchants for use by consumers nowadays. The merchant terminal can prepare and push card information according to the payment items of the user; seven coupons are received after each cash payment by the user, wherein three coupons are the coupon information issued by the current payment merchant, and the other four coupons have different logics including merchant labels, user labels, platform locking, time-oriented push and LBS-oriented push. The consumer may book the discount product in advance by purchasing the coupon code and then present the coupon code to the merchant when consuming the discount product. With the development of big data, consumers are at risk of information leakage when interacting with merchants in electronic commerce (buying coupon codes).
Disclosure of Invention
In order to overcome at least the above-mentioned disadvantages of the prior art, an object of the present invention is to provide a method and an apparatus for processing ticket information, and an electronic device.
The embodiment of the invention provides a coupon information processing method which is applied to electronic equipment communicated with a first terminal and a second terminal, and the method comprises the following steps:
when the first terminal sends a ticket code acquisition request to the second terminal and acquires a target ticket code sent by the second terminal based on the ticket code acquisition request, intercepting confirmation information sent by the first terminal to the second terminal;
caching the confirmation information;
obtaining a verification result which is sent by the second terminal and generated by verifying the target coupon code in the first terminal;
and when the verification result shows that the target coupon code passes verification, sending the confirmation information to the second terminal.
In an alternative embodiment, the intercepting the acknowledgement sent by the first terminal to the second terminal includes:
broadcasting an interception instruction from an information interception interface, so that the first terminal receiving the interception instruction adds a terminal identifier and an information feature vector of the first terminal in an instruction code of the interception instruction to obtain interception feedback information and forwards the interception feedback information before sending the confirmation information to the second terminal;
when the interception feedback information is received from the information interception interface, acquiring the terminal identification and the information characteristic vector in the interception feedback information;
sending a matching request carrying the terminal identification and the information characteristic vector to a server so that the server matches the first terminal and the dependency relationship of the confirmation information according to the terminal identification and the information characteristic vector and obtains a matching result;
receiving a matching result sent by the server, and sending an information interception identifier to the first terminal when the matching result represents that the first terminal and the confirmation information have the dependency relationship, so that the first terminal sends the confirmation information to the electronic equipment when receiving the interception identifier.
In an alternative embodiment, the caching the acknowledgement information includes:
determining a first database caching the confirmation information, requesting storage capacity information of the first database from a first cache space of the first database in a reflection calling or system calling mode, and acquiring the storage capacity information of the first database;
determining a second database, sending the storage capacity information of the first database to the second database, so that the second database uses the storage capacity information of the first database as the storage capacity information of the second database, virtualizing the second database as the first database in a second cache space of the second database, obtaining confirmation information obtained by the second database based on the first database, and caching the confirmation information into the second cache space; and the second database requests the first database to perform the associative storage when the storage capacity information of the first database represents that the storage capacity of the first database is insufficient.
In an alternative embodiment, after determining that the verification result characterizes that the target ticket code is verified and before sending the confirmation information to the second terminal, the method further comprises:
acquiring hidden identification information of a data transmission protocol distributed for the second terminal, generating a permission list corresponding to the second terminal and comprising verification characters of the second terminal, a protocol address of the data transmission protocol and the hidden identification information, and sending the permission list corresponding to the second terminal to the first terminal so that the first terminal receives and stores the permission list corresponding to the second terminal; the authority list further comprises communication duration information and communication time period information, wherein the communication duration information is the integration of the historical communication durations of the first terminal and the second terminal; the hidden identification information includes: identification coding, hidden coding and verification coding of a data transmission protocol;
when the first terminal sends a request message for acquiring the communication record corresponding to the second terminal to the electronic equipment, the electronic equipment sends the communication record corresponding to the second terminal to the first terminal;
when the first terminal obtains the communication record of the second terminal corresponding to the request message, the verification character of the second terminal and the authority list corresponding to the protocol address of the data transmission protocol, the electronic device enables the first terminal to verify the information stealing risk of the second terminal according to the hidden identification information corresponding to the communication interval included in the obtained authority list in the communication interval corresponding to the communication duration information and the communication period information included in the obtained authority list, and obtains a verification result;
the sending the confirmation information to the second terminal includes:
and when the verification result represents that the second terminal does not have the information stealing risk, the confirmation information is sent to the second terminal.
The embodiment of the invention provides a coupon information processing device, which is applied to electronic equipment communicated with a first terminal and a second terminal, and comprises the following components:
the intercepting module is used for intercepting confirmation information sent by the first terminal to the second terminal when the first terminal sends a coupon code obtaining request to the second terminal and obtains a target coupon code sent by the second terminal based on the coupon code obtaining request;
the cache module is used for caching the confirmation information;
the acquisition module is used for acquiring a verification result which is sent by the second terminal and is generated by verifying the target ticket code in the first terminal;
and the sending module is used for sending the confirmation information to the second terminal when the verification result shows that the target coupon code passes the verification.
In an alternative embodiment, the intercepting module is to:
broadcasting an interception instruction from an information interception interface, so that the first terminal receiving the interception instruction adds a terminal identifier and an information feature vector of the first terminal in an instruction code of the interception instruction to obtain interception feedback information and forwards the interception feedback information before sending the confirmation information to the second terminal;
when the interception feedback information is received from the information interception interface, acquiring the terminal identification and the information characteristic vector in the interception feedback information;
sending a matching request carrying the terminal identification and the information characteristic vector to a server so that the server matches the first terminal and the dependency relationship of the confirmation information according to the terminal identification and the information characteristic vector and obtains a matching result;
receiving a matching result sent by the server, and sending an information interception identifier to the first terminal when the matching result represents that the first terminal and the confirmation information have the dependency relationship, so that the first terminal sends the confirmation information to the electronic equipment when receiving the interception identifier.
In an alternative embodiment, the cache module is configured to:
determining a first database caching the confirmation information, requesting storage capacity information of the first database from a first cache space of the first database in a reflection calling or system calling mode, and acquiring the storage capacity information of the first database;
determining a second database, sending the storage capacity information of the first database to the second database, so that the second database uses the storage capacity information of the first database as the storage capacity information of the second database, virtualizing the second database as the first database in a second cache space of the second database, obtaining confirmation information obtained by the second database based on the first database, and caching the confirmation information into the second cache space; and the second database requests the first database to perform the associative storage when the storage capacity information of the first database represents that the storage capacity of the first database is insufficient.
In an alternative embodiment, the sending module is further configured to:
acquiring hidden identification information of a data transmission protocol distributed for the second terminal, generating a permission list corresponding to the second terminal and comprising verification characters of the second terminal, a protocol address of the data transmission protocol and the hidden identification information, and sending the permission list corresponding to the second terminal to the first terminal so that the first terminal receives and stores the permission list corresponding to the second terminal; the authority list further comprises communication duration information and communication time period information, wherein the communication duration information is the integration of the historical communication durations of the first terminal and the second terminal; the hidden identification information includes: identification coding, hidden coding and verification coding of a data transmission protocol;
when the first terminal sends a request message for acquiring the communication record corresponding to the second terminal to the electronic equipment, the electronic equipment sends the communication record corresponding to the second terminal to the first terminal;
when the first terminal obtains the communication record of the second terminal corresponding to the request message, the verification character of the second terminal and the authority list corresponding to the protocol address of the data transmission protocol, the electronic device enables the first terminal to verify the information stealing risk of the second terminal according to the hidden identification information corresponding to the communication interval included in the obtained authority list in the communication interval corresponding to the communication duration information and the communication period information included in the obtained authority list, and obtains a verification result;
the sending module is further configured to:
and when the verification result represents that the second terminal does not have the information stealing risk, the confirmation information is sent to the second terminal.
The embodiment of the invention also provides electronic equipment, which comprises a processor, a memory and a bus, wherein the memory and the bus are connected with the processor; wherein, the processor and the memory complete mutual communication through the bus; the processor is used for calling the program instructions in the memory so as to execute the coupon information processing method.
An embodiment of the present invention also provides a readable storage medium, on which a program is stored, which, when executed by a processor, implements the above-described ticket information processing method.
The method, the device and the electronic equipment for processing the ticket information provided by the embodiment of the invention can intercept and cache the confirmation information when the first terminal acquires the target ticket code and sends the confirmation information to the second terminal, thereby avoiding the situation that the first terminal directly sends the confirmation information to the second terminal, thereby avoiding the second terminal stealing other information of the first terminal according to the confirmation information, and determining the legality and security of the second terminal when the second terminal verifies the target ticket code, and then sends the confirmation information to the second terminal when the obtained verification result represents that the target ticket code passes the verification, thereby determining the validity and security of the second terminal based on the action of the second terminal verifying the target ticket code before transmitting the confirmation information, therefore, information leakage of the first terminal is avoided, and the aim of avoiding financial loss of merchants or consumers caused by ticket information leakage is fulfilled.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a flowchart of a coupon information processing method according to an embodiment of the present invention.
Fig. 2 is a functional block diagram of a ticket information processing apparatus according to an embodiment of the present invention.
Fig. 3 is a block diagram of an electronic device according to an embodiment of the present invention.
Icon:
200-a ticket information processing device; 201-an interception module; 202-a cache module; 203-an obtaining module; 204-a sending module;
300-an electronic device; 301-a processor; 302-bus; 303-memory.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The embodiment of the invention provides a coupon information processing method and device, electronic equipment and a readable storage medium, which are used for improving the risk of information leakage when existing consumers and merchants carry out electronic commerce interaction.
In order to better understand the technical solutions of the present invention, the following detailed descriptions of the technical solutions of the present invention are provided with the accompanying drawings and the specific embodiments, and it should be understood that the specific features in the embodiments and the examples of the present invention are the detailed descriptions of the technical solutions of the present invention, and are not limitations of the technical solutions of the present invention, and the technical features in the embodiments and the examples of the present invention may be combined with each other without conflict.
Fig. 1 is a flowchart of a coupon information processing method according to an embodiment of the present invention, applied to an electronic device in communication with a first terminal and a second terminal, where in this embodiment, the first terminal may be a terminal used by a consumer and the second terminal may be a terminal used by a merchant, and the method may include the following steps:
step S21, when the first terminal sends a ticket code acquisition request to the second terminal and acquires a target ticket code sent by the second terminal based on the ticket code acquisition request, intercepting confirmation information sent by the first terminal to the second terminal.
And step S22, caching the confirmation information.
Step S23, acquiring a verification result generated by verifying the target ticket code in the first terminal sent by the second terminal.
And step S24, when the verification result shows that the target ticket code passes the verification, the confirmation information is sent to the second terminal.
Based on the steps S21-S24, the first terminal intercepts and caches the confirmation information when acquiring the target ticket code and sending the confirmation information to the second terminal, so that the first terminal can be prevented from directly sending the confirmation information to the second terminal, and the second terminal can be prevented from stealing other information of the first terminal according to the confirmation information.
In a specific implementation, in order to improve efficiency of intercepting the acknowledgement information and avoid omission of intercepting the acknowledgement information, the first terminal and the acknowledgement information sent by the first terminal need to be verified before intercepting the acknowledgement information, and for this reason, in step S21, the intercepting of the acknowledgement information sent by the first terminal to the second terminal may specifically include the following:
step S211, broadcasting an interception instruction from an information interception interface, so that the first terminal receiving the interception instruction adds a terminal identifier and an information feature vector of the first terminal to an instruction code of the interception instruction to obtain interception feedback information, and forwards the interception feedback information before sending the confirmation information to the second terminal.
Step S212, when the interception feedback information is received from the information interception interface, obtaining the terminal identifier and the information feature vector in the interception feedback information.
Step S213, sending a matching request carrying the terminal identifier and the information feature vector to a server, so that the server matches the affiliation between the first terminal and the confirmation information according to the terminal identifier and the information feature vector, and obtains a matching result.
Step S214, receiving a matching result sent by the server, and sending an information interception identifier to the first terminal when the matching result indicates that the first terminal and the confirmation information have the dependency relationship, so that the first terminal sends the confirmation information to the electronic device when receiving the interception identifier.
It can be understood that, through steps S211 to S214, the interception instruction can be broadcasted, and interception feedback information forwarded by the first terminal based on the interception instruction is obtained, because the interception feedback information carries the terminal identifier and the information feature vector, the electronic device can send the terminal identifier and the information feature vector to the server, so that the server matches the affiliation of the first terminal and the confirmation information, thus, timeliness and accuracy of matching can be improved, further, the electronic device sends the information interception identifier to the first terminal only when receiving a matching result representing that the affiliation exists between the first terminal and the confirmation information, thereby implementing interception of the confirmation information, and thus, accuracy and reliability of interception can be ensured, omission of interception of the confirmation information is avoided, and efficiency of interception of the confirmation information is improved. Meanwhile, the risk of information leakage of the first terminal caused by receiving the confirmation information by the second terminal due to missing interception of the confirmation information is avoided.
In practical implementation, in order to ensure that the confirmation information is safely and effectively cached, it is necessary to ensure that the database has sufficient storage capacity, however, in an actual scenario, due to the expansion of the information data size, it is difficult to ensure that the electronic device can store the confirmation information into the database having sufficient storage capacity in time after intercepting the confirmation information, which may result in loss of the confirmation information, and for this reason, in step S22, the caching of the confirmation information may specifically include the following:
step S221, determining a first database caching the confirmation information, requesting storage capacity information of the first database from a first cache space of the first database in a reflection call or system call manner, and acquiring the storage capacity information of the first database.
Step S222, determining a second database, sending the storage capacity information of the first database to the second database, so that the second database uses the storage capacity information of the first database as the storage capacity information of the second database, virtualizes the second database as the first database in a second cache space of the second database, obtains confirmation information obtained by the second database based on the first database, and caches the confirmation information in the second cache space.
In step S222, the second database requests the first database to perform the associative storage when the storage capacity information of the first database indicates that the storage capacity of the first database is insufficient.
Through the steps S221 to S222, the associated storage of the second database and the first database can be realized when the storage capacity of the first database is insufficient, so that the timely storage of the confirmation information is ensured, and the information leakage of the first terminal device caused by the loss of the confirmation information is avoided.
In particular implementation, in order to ensure the validity and security of the second terminal and further ensure that the second terminal does not steal the information of the first terminal according to the received confirmation information, in step S24, after determining that the verification result represents that the target ticket code passes the verification and before sending the confirmation information to the second terminal, the following may be specifically included:
step S241, obtaining hidden identification information of a data transmission protocol allocated to the second terminal, generating a permission list corresponding to the second terminal and including a verification character of the second terminal, a protocol address of the data transmission protocol, and the hidden identification information, and sending the permission list corresponding to the second terminal to the first terminal, so that the first terminal receives and stores the permission list corresponding to the second terminal.
In S241, the authority list further includes communication duration information and communication period information, where the communication duration information is a combination of historical communication durations of the first terminal and the second terminal; the hidden identification information includes: identification code, hidden code and verification code of data transmission protocol.
Step S242, when the first terminal sends a request message for acquiring the communication record corresponding to the second terminal to the electronic device, the electronic device sends the communication record corresponding to the second terminal to the first terminal.
Step S243, when the first terminal obtains the communication record of the second terminal corresponding to the request message, the verification character of the second terminal, and the authority list corresponding to the protocol address of the data transmission protocol, the electronic device enables the first terminal to verify the information stealing risk of the second terminal according to the hidden identification information corresponding to the communication interval included in the obtained authority list, in the communication interval corresponding to the communication duration information and the communication period information included in the obtained authority list, and obtain a verification result.
Further, on the basis of step S243, the sending the confirmation information to the second terminal specifically includes: and when the verification result represents that the second terminal does not have the information stealing risk, the confirmation information is sent to the second terminal.
It can be understood that, through steps S241 to S243, the second terminal can be verified according to the hidden identification information of the data transmission protocol pre-allocated to the second terminal and in combination with the first terminal, so as to ensure that the verification result sent by the second terminal is safe and reliable, thus, the validity and the security of the second terminal can be verified, and further, after the confirmation information is sent to the second terminal, the second terminal cannot steal the information of the first terminal according to the received confirmation information.
In particular implementation, the electronic device may interact with a plurality of terminals, and to ensure timeliness of interaction between the electronic device and the first terminal for intercepting the instruction and intercepting the feedback information, so as to avoid failure of intercepting the confirmation information due to an interception timeliness problem, before step S21, the method further includes:
step S31, obtaining the information transmission performance parameter of the first terminal, obtaining the current transmission thread of the first terminal according to the information transmission performance parameter, and splitting the current transmission thread to obtain a plurality of sub-threads.
And step S32, compressing the current transmission thread to obtain a plurality of target transmission threads with different thread densities.
Step S33, for each of the plurality of child threads, performing the following steps and obtaining a plurality of optimized threads:
selecting a target transmission thread with a thread density for the sub-thread from the plurality of target transmission threads with different thread densities, judging whether the sub-thread comprises a set pulse frequency band or not based on a signal transmission pulse frequency corresponding to the target transmission thread with the thread density, filtering the sub-thread if the sub-thread does not comprise the set pulse frequency band, and reserving the sub-thread if the sub-thread comprises the set pulse frequency band. And determining the plurality of optimized threads according to the reserved sub-threads.
And step S34, extracting the characteristic vector of the pulse frequency band of each optimization thread.
And step S35, sequencing the plurality of optimization threads according to the feature vectors, and integrating the plurality of optimization threads completing sequencing to obtain a total thread.
And step S36, establishing an interception information transmission channel between the first terminal and the second terminal according to the bus program.
It is to be understood that, in step S36, the interception information transmission channel is used to transmit the interception instruction and the interception feedback information.
It can be understood that, through steps S31-S36, the interception information transmission channel between the electronic device and the first terminal can be established according to the performance parameters of the first terminal, so that the electronic device and the first terminal cannot be interfered by other information when performing interaction between the interception instruction and the interception feedback information, thereby avoiding the occurrence of a serial line phenomenon, and simultaneously avoiding transmission delay of the interception instruction and the interception feedback information caused by channel congestion, and ensuring timeliness of performing interaction between the interception instruction and the interception feedback information between the electronic device and the first terminal, thereby avoiding interception failure of the confirmation information due to the problem of interception timeliness.
On the basis of the above, an embodiment of the present invention provides a ticket information processing apparatus 200. Fig. 2 is a functional block diagram of a ticket information processing apparatus 200 according to an embodiment of the present invention, the ticket information processing apparatus 200 including:
an intercepting module 201, configured to intercept confirmation information sent by the first terminal to the second terminal when the first terminal sends a ticket code obtaining request to the second terminal and obtains a target ticket code sent by the second terminal based on the ticket code obtaining request;
a caching module 202, configured to cache the acknowledgement information;
an obtaining module 203, configured to obtain a verification result, which is generated by verifying the target ticket code in the first terminal and is sent by the second terminal;
and the sending module 204 is configured to send the confirmation information to the second terminal when it is determined that the verification result indicates that the target coupon code passes verification.
In an alternative embodiment, the intercepting module 201 is configured to:
broadcasting an interception instruction from an information interception interface, so that the first terminal receiving the interception instruction adds a terminal identifier and an information feature vector of the first terminal in an instruction code of the interception instruction to obtain interception feedback information and forwards the interception feedback information before sending the confirmation information to the second terminal;
when the interception feedback information is received from the information interception interface, acquiring the terminal identification and the information characteristic vector in the interception feedback information;
sending a matching request carrying the terminal identification and the information characteristic vector to a server so that the server matches the first terminal and the dependency relationship of the confirmation information according to the terminal identification and the information characteristic vector and obtains a matching result;
receiving a matching result sent by the server, and sending an information interception identifier to the first terminal when the matching result represents that the first terminal and the confirmation information have the dependency relationship, so that the first terminal sends the confirmation information to the electronic equipment when receiving the interception identifier.
In an alternative embodiment, the caching module 202 is configured to:
determining a first database caching the confirmation information, requesting storage capacity information of the first database from a first cache space of the first database in a reflection calling or system calling mode, and acquiring the storage capacity information of the first database;
determining a second database, sending the storage capacity information of the first database to the second database, so that the second database uses the storage capacity information of the first database as the storage capacity information of the second database, virtualizing the second database as the first database in a second cache space of the second database, obtaining confirmation information obtained by the second database based on the first database, and caching the confirmation information into the second cache space; and the second database requests the first database to perform the associative storage when the storage capacity information of the first database represents that the storage capacity of the first database is insufficient.
In an alternative embodiment, the sending module 204 is further configured to:
acquiring hidden identification information of a data transmission protocol distributed for the second terminal, generating a permission list corresponding to the second terminal and comprising verification characters of the second terminal, a protocol address of the data transmission protocol and the hidden identification information, and sending the permission list corresponding to the second terminal to the first terminal so that the first terminal receives and stores the permission list corresponding to the second terminal; the authority list further comprises communication duration information and communication time period information, wherein the communication duration information is the integration of the historical communication durations of the first terminal and the second terminal; the hidden identification information includes: identification coding, hidden coding and verification coding of a data transmission protocol;
when the first terminal sends a request message for acquiring the communication record corresponding to the second terminal to the electronic equipment, the electronic equipment sends the communication record corresponding to the second terminal to the first terminal;
when the first terminal obtains the communication record of the second terminal corresponding to the request message, the verification character of the second terminal and the authority list corresponding to the protocol address of the data transmission protocol, the electronic device enables the first terminal to verify the information stealing risk of the second terminal according to the hidden identification information corresponding to the communication interval included in the obtained authority list in the communication interval corresponding to the communication duration information and the communication period information included in the obtained authority list, and obtains a verification result;
the sending module 204 is further configured to:
and when the verification result represents that the second terminal does not have the information stealing risk, the confirmation information is sent to the second terminal.
The electronic device 300 includes a processor and a memory, the intercepting module 201, the caching module 202, the obtaining module 203, the sending module 204, and the like are all stored in the memory as program units, and the processor executes the program units stored in the memory to implement corresponding functions.
The processor comprises a kernel, and the kernel calls the corresponding program unit from the memory. The kernel can be set to be one or more, and information leakage of the first terminal is achieved by adjusting kernel parameters.
An embodiment of the present invention provides a readable storage medium on which a program is stored, the program implementing the ticket information processing method when executed by a processor.
The embodiment of the invention provides a processor, which is used for running a program, wherein the coupon information processing method is executed when the program runs.
In the embodiment of the present invention, as shown in fig. 3, the electronic device 300 includes at least one processor 301, and at least one memory 303 and a bus connected to the processor 301; the processor 301 and the memory 303 complete communication with each other through the bus 302; processor 301 is configured to call program instructions in memory 303 to perform the coupon information processing method described above. The electronic device 300 herein may be an electronic device, a PC, a PAD, a mobile phone, etc.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, electronic devices (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing electronic device to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing electronic device, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, an electronic device includes one or more processors (CPUs), memory, and a bus. The electronic device may also include input/output interfaces, network interfaces, and the like.
The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip. The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage electronic devices, or any other non-transmission medium that can be used to store information that can be accessed by computing electronic devices. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or electronic device that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or electronic device. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or electronic device in which the element is included.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A ticket information processing method applied to an electronic device communicating with a first terminal and a second terminal, the method comprising:
when the first terminal sends a ticket code acquisition request to the second terminal and acquires a target ticket code sent by the second terminal based on the ticket code acquisition request, intercepting confirmation information sent by the first terminal to the second terminal;
caching the confirmation information;
obtaining a verification result which is sent by the second terminal and generated by verifying the target coupon code in the first terminal;
and when the verification result shows that the target coupon code passes verification, sending the confirmation information to the second terminal.
2. The coupon information processing method according to claim 1, wherein the intercepting of the confirmation information sent by the first terminal to the second terminal includes:
broadcasting an interception instruction from an information interception interface, so that the first terminal receiving the interception instruction adds a terminal identifier and an information feature vector of the first terminal in an instruction code of the interception instruction to obtain interception feedback information and forwards the interception feedback information before sending the confirmation information to the second terminal;
when the interception feedback information is received from the information interception interface, acquiring the terminal identification and the information characteristic vector in the interception feedback information;
sending a matching request carrying the terminal identification and the information characteristic vector to a server so that the server matches the first terminal and the dependency relationship of the confirmation information according to the terminal identification and the information characteristic vector and obtains a matching result;
receiving a matching result sent by the server, and sending an information interception identifier to the first terminal when the matching result represents that the first terminal and the confirmation information have the dependency relationship, so that the first terminal sends the confirmation information to the electronic equipment when receiving the interception identifier.
3. The coupon information processing method according to claim 1 or 2, wherein the caching the confirmation information includes:
determining a first database caching the confirmation information, requesting storage capacity information of the first database from a first cache space of the first database in a reflection calling or system calling mode, and acquiring the storage capacity information of the first database;
determining a second database, sending the storage capacity information of the first database to the second database, so that the second database uses the storage capacity information of the first database as the storage capacity information of the second database, virtualizing the second database as the first database in a second cache space of the second database, obtaining confirmation information obtained by the second database based on the first database, and caching the confirmation information into the second cache space; and the second database requests the first database to perform the associative storage when the storage capacity information of the first database represents that the storage capacity of the first database is insufficient.
4. The ticket information processing method of claim 3, wherein after determining that the validation result characterizes that the target ticket code is validated and before sending the validation information to the second terminal, the method further comprises:
acquiring hidden identification information of a data transmission protocol distributed for the second terminal, generating a permission list corresponding to the second terminal and comprising verification characters of the second terminal, a protocol address of the data transmission protocol and the hidden identification information, and sending the permission list corresponding to the second terminal to the first terminal so that the first terminal receives and stores the permission list corresponding to the second terminal; the authority list further comprises communication duration information and communication time period information, wherein the communication duration information is the integration of the historical communication durations of the first terminal and the second terminal; the hidden identification information includes: identification coding, hidden coding and verification coding of a data transmission protocol;
when the first terminal sends a request message for acquiring the communication record corresponding to the second terminal to the electronic equipment, the electronic equipment sends the communication record corresponding to the second terminal to the first terminal;
when the first terminal obtains the communication record of the second terminal corresponding to the request message, the verification character of the second terminal and the authority list corresponding to the protocol address of the data transmission protocol, the electronic device enables the first terminal to verify the information stealing risk of the second terminal according to the hidden identification information corresponding to the communication interval included in the obtained authority list in the communication interval corresponding to the communication duration information and the communication period information included in the obtained authority list, and obtains a verification result;
the sending the confirmation information to the second terminal includes:
and when the verification result represents that the second terminal does not have the information stealing risk, the confirmation information is sent to the second terminal.
5. An apparatus for processing ticket information, applied to an electronic device communicating with a first terminal and a second terminal, comprising:
the intercepting module is used for intercepting confirmation information sent by the first terminal to the second terminal when the first terminal sends a coupon code obtaining request to the second terminal and obtains a target coupon code sent by the second terminal based on the coupon code obtaining request;
the cache module is used for caching the confirmation information;
the acquisition module is used for acquiring a verification result which is sent by the second terminal and is generated by verifying the target ticket code in the first terminal;
and the sending module is used for sending the confirmation information to the second terminal when the verification result shows that the target coupon code passes the verification.
6. The coupon information processing apparatus of claim 5, wherein the interception module is configured to:
broadcasting an interception instruction from an information interception interface, so that the first terminal receiving the interception instruction adds a terminal identifier and an information feature vector of the first terminal in an instruction code of the interception instruction to obtain interception feedback information and forwards the interception feedback information before sending the confirmation information to the second terminal;
when the interception feedback information is received from the information interception interface, acquiring the terminal identification and the information characteristic vector in the interception feedback information;
sending a matching request carrying the terminal identification and the information characteristic vector to a server so that the server matches the first terminal and the dependency relationship of the confirmation information according to the terminal identification and the information characteristic vector and obtains a matching result;
receiving a matching result sent by the server, and sending an information interception identifier to the first terminal when the matching result represents that the first terminal and the confirmation information have the dependency relationship, so that the first terminal sends the confirmation information to the electronic equipment when receiving the interception identifier.
7. The ticket information processing apparatus of claim 5 or 6, wherein the caching module is configured to:
determining a first database caching the confirmation information, requesting storage capacity information of the first database from a first cache space of the first database in a reflection calling or system calling mode, and acquiring the storage capacity information of the first database;
determining a second database, sending the storage capacity information of the first database to the second database, so that the second database uses the storage capacity information of the first database as the storage capacity information of the second database, virtualizing the second database as the first database in a second cache space of the second database, obtaining confirmation information obtained by the second database based on the first database, and caching the confirmation information into the second cache space; and the second database requests the first database to perform the associative storage when the storage capacity information of the first database represents that the storage capacity of the first database is insufficient.
8. The coupon information processing apparatus of claim 7, wherein the sending module is further configured to:
acquiring hidden identification information of a data transmission protocol distributed for the second terminal, generating a permission list corresponding to the second terminal and comprising verification characters of the second terminal, a protocol address of the data transmission protocol and the hidden identification information, and sending the permission list corresponding to the second terminal to the first terminal so that the first terminal receives and stores the permission list corresponding to the second terminal; the authority list further comprises communication duration information and communication time period information, wherein the communication duration information is the integration of the historical communication durations of the first terminal and the second terminal; the hidden identification information includes: identification coding, hidden coding and verification coding of a data transmission protocol;
when the first terminal sends a request message for acquiring the communication record corresponding to the second terminal to the electronic equipment, the electronic equipment sends the communication record corresponding to the second terminal to the first terminal;
when the first terminal obtains the communication record of the second terminal corresponding to the request message, the verification character of the second terminal and the authority list corresponding to the protocol address of the data transmission protocol, the electronic device enables the first terminal to verify the information stealing risk of the second terminal according to the hidden identification information corresponding to the communication interval included in the obtained authority list in the communication interval corresponding to the communication duration information and the communication period information included in the obtained authority list, and obtains a verification result;
the sending module is further configured to:
and when the verification result represents that the second terminal does not have the information stealing risk, the confirmation information is sent to the second terminal.
9. An electronic device comprising a processor and a memory and bus connected to the processor; wherein, the processor and the memory complete mutual communication through the bus; the processor is configured to call program instructions in the memory to perform the coupon information processing method of any one of claims 1 to 4.
10. A readable storage medium, characterized in that a program is stored thereon, which when executed by a processor, implements the ticket information processing method of any one of claims 1 to 4.
CN201911236528.8A 2019-12-05 2019-12-05 Ticket information processing method and device and electronic equipment Expired - Fee Related CN111241573B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911236528.8A CN111241573B (en) 2019-12-05 2019-12-05 Ticket information processing method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911236528.8A CN111241573B (en) 2019-12-05 2019-12-05 Ticket information processing method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN111241573A CN111241573A (en) 2020-06-05
CN111241573B true CN111241573B (en) 2020-10-02

Family

ID=70871510

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911236528.8A Expired - Fee Related CN111241573B (en) 2019-12-05 2019-12-05 Ticket information processing method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN111241573B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112235874B (en) * 2020-10-20 2022-06-10 Tcl通讯(宁波)有限公司 Method, system, storage medium and mobile terminal for reducing front-end wireless transmission time

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103797502A (en) * 2011-08-01 2014-05-14 格特·范德施珀尔 Cookieless ecommerce platform
CN108509806A (en) * 2018-04-09 2018-09-07 北京东方网润科技有限公司 A kind of big data precision marketing system and equipment with secret protection
CN110263563A (en) * 2019-06-24 2019-09-20 北京艾摩瑞策科技有限公司 By means of the ad click data cochain method and its equipment of block chain

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7313635B1 (en) * 2002-03-21 2007-12-25 Cisco Technology Method and apparatus for simulating a load on an application server in a network
CN104753868A (en) * 2013-12-30 2015-07-01 腾讯科技(深圳)有限公司 Safety verification method, service server and safety verification system
CN106161374A (en) * 2015-04-13 2016-11-23 阿里巴巴集团控股有限公司 The exchange method of order data and server
US20170041324A1 (en) * 2015-08-04 2017-02-09 Pawn Detail, LLC Systems and methods for personal property information management
CN109034925A (en) * 2017-06-08 2018-12-18 也买(上海)商贸有限公司 A kind of networked shopping system and its homepage configuration method
CN108053212A (en) * 2017-12-29 2018-05-18 齐宇庆 A kind of bank paying Licensing Authority feedback information system of software and hardware combining

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103797502A (en) * 2011-08-01 2014-05-14 格特·范德施珀尔 Cookieless ecommerce platform
CN108509806A (en) * 2018-04-09 2018-09-07 北京东方网润科技有限公司 A kind of big data precision marketing system and equipment with secret protection
CN110263563A (en) * 2019-06-24 2019-09-20 北京艾摩瑞策科技有限公司 By means of the ad click data cochain method and its equipment of block chain

Also Published As

Publication number Publication date
CN111241573A (en) 2020-06-05

Similar Documents

Publication Publication Date Title
CN108566641B (en) Payment assistance method, device and equipment
CN105099688A (en) Operation method for electronic account, display method and apparatus for payment page
CN111222841B (en) Block chain-based data distribution method and equipment and storage medium thereof
CN107204957B (en) Account binding and service processing method and device
CN111160845A (en) Service processing method and device
CN112199382A (en) Node group creating method and node group-based transaction method in alliance chain network
CN108074024B (en) Trusted data transmission method, device and system
CN111290866A (en) Service processing method and device
CN107040560A (en) A kind of method for processing business and device based on business platform
CN107454041B (en) Method and device for preventing server from being attacked
CN110798490A (en) Method and device for accessing third-party system based on data center and data center
CN111241573B (en) Ticket information processing method and device and electronic equipment
CN111784356A (en) Payment verification method, device, equipment and storage medium
CN107528822B (en) Service execution method and device
CN112100689B (en) Trusted data processing method, device and equipment
CN111125667A (en) Roaming key calling method, device and system
CN110866240A (en) Intelligent password key calling method and system
CN112866265B (en) CSRF attack protection method and device
CN115842866A (en) Data processing method and device, computer readable medium and electronic equipment
CN111814014B (en) Information interaction method, device and storage medium
CN114244826A (en) Webpage identification information sharing method and device, storage medium and processor
CN112069436A (en) Page display method, system and equipment
CN111383025B (en) Method and device for forwarding wind control data and electronic equipment
CN111161012B (en) Information pushing method and device and computer equipment
CN111754235B (en) Resource rollback method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20211214

Address after: 510000 room 1012-007, No. 848, Maogang Road, Huangpu District, Guangzhou City, Guangdong Province

Patentee after: Guangzhou Qianyu Qiancheng Internet Technology Co.,Ltd.

Address before: 510650 301-89m, 3 / F, building 3, No. 133, Yanling Road, Tianhe District, Guangzhou, Guangdong

Patentee before: Guangzhou erspace Information Service Co.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20201002