CN111767576A - User matching method and system based on privacy information and readable storage medium - Google Patents

User matching method and system based on privacy information and readable storage medium Download PDF

Info

Publication number
CN111767576A
CN111767576A CN202010624212.2A CN202010624212A CN111767576A CN 111767576 A CN111767576 A CN 111767576A CN 202010624212 A CN202010624212 A CN 202010624212A CN 111767576 A CN111767576 A CN 111767576A
Authority
CN
China
Prior art keywords
information
user
client
preset
private
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010624212.2A
Other languages
Chinese (zh)
Inventor
刘熹
王洵湉
王亮
郑文琛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WeBank Co Ltd
Original Assignee
WeBank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WeBank Co Ltd filed Critical WeBank Co Ltd
Priority to CN202010624212.2A priority Critical patent/CN111767576A/en
Publication of CN111767576A publication Critical patent/CN111767576A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2457Query processing with adaptation to user needs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/107License processing; Key processing
    • G06F21/1078Logging; Metering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The invention discloses a user matching method, a system and a readable storage medium based on privacy information, wherein the user matching method based on the privacy information is applied to a client, and the method comprises the following steps: initiating a login request, and receiving privacy information of a user to be matched issued by an intranet area based on a server after a server in communication connection with a client passes the authentication of the login request; activating a preset service to start a preset application based on the preset service; the privacy information is safely processed and then displayed in the preset application, and a matching request is triggered for the privacy information displayed in the preset application based on the preset service so as to match users to be matched. According to the invention, the private information is stored by setting the intranet area, so that the storage safety is ensured; moreover, the intranet area and the server are communicated through a special network, so that the transmission safety is ensured; and meanwhile, the privacy information is displayed after being safely processed in the preset application. The safety of the user information in the user matching process is improved from multiple aspects.

Description

User matching method and system based on privacy information and readable storage medium
Technical Field
The invention relates to the technical field of financial technology (Fintech), in particular to a user matching method and system based on private information and a readable storage medium.
Background
With the continuous development of financial technology (Fintech), especially internet technology and finance, more and more technologies (such as artificial intelligence, big data, cloud storage and the like) are applied to the financial field, but the financial field also puts higher requirements on various technologies, such as the requirement for improving the security of user information in the user matching process.
At present, the coverage of instant messaging software is wider and wider, and the instant messaging software is widely applied to communication of business popularization besides daily communication between relatives and friends and work communication between colleagues. For communication of service popularization, service personnel firstly carry out matching search of user information through a service end, and users obtained through matching search are added as friends, so that service popularization is carried out. Therefore, the user information is directly exposed to the service end of the service personnel, and the user information is easily leaked.
Therefore, for a service popularization scenario, how to improve the security of the user information in the user matching process is a technical problem to be solved urgently at present.
Disclosure of Invention
The invention mainly aims to provide a user matching method and system based on private information and a readable storage medium, and aims to solve the technical problem of how to improve the user information security in the user matching process for a service promotion scene in the prior art.
In order to achieve the above object, the present invention provides a user matching method based on privacy information, which is applied to a client, and comprises the following steps:
initiating a login request, and receiving privacy information of a user to be matched issued by an intranet area based on a server after the server in communication connection with a client passes the authentication of the login request;
activating a preset service to start a preset application based on the preset service;
and safely processing the privacy information and then displaying the processed privacy information in the preset application, and triggering a matching request for the privacy information displayed in the preset application based on the preset service so as to match the user to be matched.
Optionally, the step of triggering a matching request for the privacy information displayed in the preset application based on the preset service includes:
triggering a query request for the privacy information displayed in the preset application based on the preset service to obtain the name card information of the user to be matched;
after the privacy information in the business card information is safely processed, the business card information is displayed in the preset application, and remark information corresponding to the privacy information is called;
based on the remarking information, replacing the privacy information in the business card information so as to remark the user to be matched in the business card information;
and triggering the matching request for the name card information after remarking based on the preset service.
Optionally, the security processing includes desensitization processing, masking processing or coverage processing, and the step of securely processing the private information and displaying the processed private information in the preset application includes:
according to each transformation position in a preset desensitization rule and a transformation rule corresponding to each transformation position respectively, transforming the privacy information to perform desensitization processing on the privacy information, and displaying the privacy information after the desensitization processing in the preset application;
or performing mask processing on the privacy information according to a preset mask position, and displaying the privacy information subjected to mask processing in the preset application;
or calling a preset map layer, adding the preset map layer to the upper layer of the privacy information, and displaying the privacy information added with the preset map layer in the preset application.
Optionally, after the step of triggering a matching request for the privacy information displayed in the preset application based on the preset service to match the user to be matched, the method further includes:
when feedback information returned based on the matching request is received, adding the user to be matched as a friend;
and deleting the private information, and generating a matching record according to the information number corresponding to the private information.
Further, in order to achieve the above object, the present invention further provides a user matching method based on private information, where the user matching method based on private information is applied to a client, and the user matching method based on private information includes the following steps:
when receiving encrypted private information transmitted by an intranet area based on a private network, calling a decryption mechanism corresponding to the intranet area, decrypting the encrypted private information and generating private information;
and receiving a login request sent by a client, after the login request passes authentication, issuing the privacy information to the client based on an encryption transmission mechanism between the client and the login request so that the client can activate a preset service, and matching a user to be matched corresponding to the privacy information based on the preset service.
Optionally, the step of receiving a login request sent by a client, authenticating the login request, and issuing the privacy information to the client based on an encryption transmission mechanism with the client further includes:
when a login request sent by the client is received, performing identity authentication based on a login account and a login password in the login request;
after the identity authentication is passed, judging whether the request identity information corresponding to the privacy information is matched with the login identity information corresponding to the login request;
and if the request identity information is matched with the login identity information, issuing the privacy information to the client based on an encryption transmission mechanism between the client and the request identity information.
Optionally, the method for matching users based on private information further includes the steps of:
when receiving an information recommendation material, generating the information recommendation material into creative recommendation information;
and issuing the creative recommendation information to the client to push the creative recommendation information to the user to be matched, which is successfully matched, based on the client.
Further, in order to achieve the above object, the present invention further provides a user matching method based on private information, where the user matching method based on private information is applied to an intranet area, and the user matching method based on private information includes the following steps:
when an intranet login request sent based on a private network is received, verifying whether the intranet login request is legal or not;
if the intranet login request is legal, determining authority information corresponding to the intranet login request;
and acquiring a user list corresponding to the authority information, returning the user list to a terminal corresponding to the intranet login request for display, and determining a user to be matched for matching based on the displayed user list.
Further, to achieve the above object, the present invention further provides a private information-based user matching system, where the private information-based user matching system includes a client, a server and an intranet area, and the private information-based user matching system includes a memory, a processor and a private information-based user matching program stored in the memory and executable on the processor, and when executed by the processor, the private information-based user matching program implements the steps of the private information-based user matching method as described above.
Further, to achieve the above object, the present invention also provides a readable storage medium, on which a user matching program based on privacy information is stored, and when being executed by a processor, the user matching program based on privacy information implements the steps of the user matching method based on privacy information as described above.
The user matching method based on the privacy information, the system and the readable storage medium are applied to the client. Compared with the prior art that the user information is directly exposed to the service end of the service personnel, the invention sets the intranet area for storing the user information and the server in communication connection with the intranet area, and the customer service end can access the server. When the requirement for matching the users to be matched exists, the private information of the users to be matched is obtained by the intranet area, and the private information is issued to the client through the server; the client initiates a login request, and after the server passes the authentication of the login request, the client receives the privacy information and activates the preset service; starting a preset application through a preset service, and displaying privacy information after safety processing in the preset application; and further triggering a matching request for the privacy information displayed in the preset application through a preset service so as to match the users to be matched. Therefore, the safety of the private information storage is ensured by setting the intranet area to store the private information; moreover, the intranet area and the server are communicated through a special network, so that the security of private information transmission is ensured; meanwhile, the privacy information is displayed after being safely processed in the preset application, so that the privacy information is prevented from being directly exposed and displayed. The defect that user information is leaked due to the fact that the user information is directly exposed to the service end of a service worker in the prior art is overcome. The safety of the user information in the user matching process is improved from multiple aspects.
Drawings
FIG. 1 is a schematic structural diagram of a system hardware operating environment according to an embodiment of the system for matching users based on private information;
FIG. 2 is a flowchart illustrating a first embodiment of a method for matching users based on private information according to the present invention;
FIG. 3 is a flowchart illustrating a second embodiment of a method for matching users based on private information according to the present invention;
fig. 4 is a flowchart illustrating a third embodiment of the method for matching users based on private information according to the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The invention provides a user matching system based on private information, which comprises a client, a server and an intranet area, and referring to fig. 1, fig. 1 is a schematic structural diagram of a system hardware operating environment related to an embodiment of the user matching system based on private information.
As shown in fig. 1, the system for matching users based on private information may include: a processor 1001, such as a CPU, a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a memory device separate from the processor 1001 described above.
Those skilled in the art will appreciate that the hardware architecture of the private information based user matching system shown in fig. 1 does not constitute a limitation of the private information based user matching system, and may include more or fewer components than those shown, or some components in combination, or a different arrangement of components.
As shown in fig. 1, a memory 1005, which is a readable storage medium, may include therein an operating system, a network communication module, a user interface module, and a user matching program based on private information. The operating system is a program for managing and controlling the user matching system and the software resources based on the privacy information, and supports the operation of the network communication module, the user interface module, the user matching program based on the privacy information and other programs or software; the network communication module is used to manage and control the network interface 1004; the user interface module is used to manage and control the user interface 1003.
In the hardware structure of the user matching system based on the private information shown in fig. 1, the network interface 1004 is mainly used for connecting to a background server and performing data communication with the background server; the user interface 1003 is mainly used for connecting a client (user side) and performing data communication with the client; the processor 1001 may call the user matching program based on the private information stored in the memory 1005 and perform the following operations:
initiating a login request, and receiving privacy information of a user to be matched issued by an intranet area based on a server after the server in communication connection with a client passes the authentication of the login request;
activating a preset service to start a preset application based on the preset service;
and safely processing the privacy information and then displaying the processed privacy information in the preset application, and triggering a matching request for the privacy information displayed in the preset application based on the preset service so as to match the user to be matched.
Further, the step of triggering a matching request for the privacy information displayed in the preset application based on the preset service includes:
triggering a query request for the privacy information displayed in the preset application based on the preset service to obtain the name card information of the user to be matched;
after the privacy information in the business card information is safely processed, the business card information is displayed in the preset application, and remark information corresponding to the privacy information is called;
based on the remarking information, replacing the privacy information in the business card information so as to remark the user to be matched in the business card information;
and triggering the matching request for the name card information after remarking based on the preset service.
Further, the security processing includes desensitization processing, mask processing or overlay processing, and the step of securely processing the private information and displaying the processed private information in the preset application includes:
according to each transformation position in a preset desensitization rule and a transformation rule corresponding to each transformation position respectively, transforming the privacy information to perform desensitization processing on the privacy information, and displaying the privacy information after the desensitization processing in the preset application;
or performing mask processing on the privacy information according to a preset mask position, and displaying the privacy information subjected to mask processing in the preset application;
or calling a preset map layer, adding the preset map layer to the upper layer of the privacy information, and displaying the privacy information added with the preset map layer in the preset application.
Further, after the step of triggering a matching request for the private information displayed in the preset application based on the preset service to match the user to be matched, the processor 1001 may call a private information-based user matching program stored in the memory 1005, and perform the following operations:
when feedback information returned based on the matching request is received, adding the user to be matched as a friend;
and deleting the private information, and generating a matching record according to the information number corresponding to the private information.
Further, the processor 1001 may call the user matching program based on the private information stored in the memory 1005, and perform the following operations:
when receiving encrypted private information transmitted by an intranet area based on a private network, calling a decryption mechanism corresponding to the intranet area, decrypting the encrypted private information and generating private information;
and receiving a login request sent by a client, after the login request passes authentication, issuing the privacy information to the client based on an encryption transmission mechanism between the client and the login request so that the client can activate a preset service, and matching a user to be matched corresponding to the privacy information based on the preset service.
Further, the step of receiving a login request sent by a client, authenticating the login request, and issuing the privacy information to the client based on an encryption transmission mechanism with the client further includes:
when a login request sent by the client is received, performing identity authentication based on a login account and a login password in the login request;
after the identity authentication is passed, judging whether the request identity information corresponding to the privacy information is matched with the login identity information corresponding to the login request;
and if the request identity information is matched with the login identity information, issuing the privacy information to the client based on an encryption transmission mechanism between the client and the request identity information.
Further, the processor 1001 may call the user matching program based on the private information stored in the memory 1005, and perform the following operations:
when receiving an information recommendation material, generating the information recommendation material into creative recommendation information;
and issuing the creative recommendation information to the client to push the creative recommendation information to the user to be matched, which is successfully matched, based on the client.
Further, the processor 1001 may call the user matching program based on the private information stored in the memory 1005, and perform the following operations:
when an intranet login request sent based on a private network is received, verifying whether the intranet login request is legal or not;
if the intranet login request is legal, determining authority information corresponding to the intranet login request;
and acquiring a user list corresponding to the authority information, returning the user list to a terminal corresponding to the intranet login request for display, and determining a user to be matched for matching based on the displayed user list.
The specific implementation of the user matching system based on the private information is basically the same as that of each embodiment of the user matching method based on the private information, and is not described herein again.
The invention also provides a user matching method based on the privacy information.
Referring to fig. 2, fig. 2 is a schematic flowchart of a first embodiment of a user matching method based on privacy information according to the present invention.
While a logical order is shown in the flow chart, in some cases, the steps shown or described may be performed in a different order than presented herein. Specifically, the user matching method based on the privacy information in this embodiment is applied to the client, and includes:
step S10, initiating a login request, and receiving the privacy information of the user to be matched issued by the intranet area based on the server after the server in communication connection with the client passes the authentication of the login request;
the user matching method based on the privacy information is applied to the client, the client is in communication connection with the server, the server serves as an intermediate area and is in butt joint with an intranet area of an enterprise through a special network, data stored in the intranet area are forwarded to the client through the server, so that an external terminal is prevented from directly accessing the intranet area, and the safety of the data stored in the intranet area is ensured. Moreover, the intranet area is only accessed by internal employees through an internal terminal of the enterprise and an internal Network login VPN (Virtual Private Network), so that the security of data stored in the intranet area is ensured from the viewpoint of prohibiting public access.
It should be noted that, in the intranet area of this embodiment, the client information of the current client, the historical client, or the potential client of the enterprise is stored, and each type of client may be an individual or an enterprise legal person, and the stored client information at least includes a name/name, an age/year of completion, a personal phone/legal phone, and the like.
Further, the internal network area can be displayed on a display interface of the enterprise terminal in a front-end page mode, when the staff in the enterprise have access requirements on the internal network area, the front-end page is triggered, and the personal user name and the personal password of the staff are input to log in the internal network area. And then checking the customer information stored in the internal network area, and selecting the customer information from the customer information to be used as a representation of the user to be matched with the matching requirement for matching. The client information available for viewing is non-sensitive information of the client, such as a desensitized company name or a desensitized personal name.
Furthermore, the internal area searches for the private information corresponding to the selected customer information, where the private information is private information such as a telephone number, a mailbox number, and a micro signal. And then sending the searched privacy information to a server through a private network, and sending the privacy information to the client by the server. The server issues the privacy information to the client, and the client logs in as a precondition. And starting the client by an employee inside the enterprise, and initiating a login request after inputting a login account and a login password. After receiving the login request initiated by the client, the server authenticates the login request and determines whether the login user is a reliable identity or has an operation authority. And after the login request is authenticated and the login person is a reliable identity or has an operation authority, the server issues the privacy information to the client. After receiving the privacy information searched by the intranet area and issued by the server, the client encrypts the privacy information and stores the encrypted privacy information in the memory, and the encryption can be symmetric encryption or asymmetric encryption, which is not limited.
Step S20, activating a preset service to start a preset application based on the preset service;
furthermore, a preset application is pre-installed in the client, the user to be matched is searched for through the preset application according to the privacy information matching, the user to be matched is requested to be added as a friend, and after the user to be matched adds the request through the friend, service pushing is carried out on the user to be matched through the preset application. Meanwhile, a preset service for starting a preset application is preset in the client, the preset service may be a service provided in the client, such as a barrier-free service of an Android system, and may also be realized by simulating a user operation through a control program developed by a developer. And, the preset application is preferably a public application, not a personal application, such as enterprise WeChat, to ensure the security of the private data issued to the client. After receiving the privacy information, the client activates the preset server, and the activated preset service starts the preset application so as to search the user to be matched for user matching through the preset application.
And step S30, the privacy information is displayed in the preset application after being processed safely, a matching request is triggered based on the privacy information displayed in the preset application, and matching of the user to be matched is completed when feedback information returned based on the matching request is received.
Further, the preset application comprises a display frame used for displaying the privacy information, the stored privacy data is decrypted and then added to the display frame for displaying, and the matching request is triggered through the display frame. And for the safety of the private data display, the private information is subjected to safety processing, and the privacy information after the safety processing is displayed in the preset application. The purpose of the security processing is to avoid the private data from being directly exposed and displayed, and the processing mode can be any one of masking processing, covering processing through an image layer or desensitization processing. It should be noted that the content displayed after the security processing is not the private data itself, but the information carried in the matching request triggered by the display frame is still the private data itself, so as to accurately match and search the user to be matched, and initiate a friend addition request. Specifically, the step of securely processing the private information and displaying the processed private information in the preset application includes:
step S31, according to each transformation position in a preset desensitization rule and the transformation rule corresponding to each transformation position, transforming the privacy information to perform desensitization processing on the privacy information, and displaying the privacy information after desensitization processing in the preset application;
or step S32, performing mask processing on the private information according to a preset mask position, and displaying the private information after the mask processing in the preset application;
or step S33, calling a preset layer, adding the preset layer to an upper layer of the privacy information, and displaying the privacy information added with the preset layer in the preset application.
Furthermore, when the security processing is implemented in a desensitization processing mode, a preset desensitization rule is preset, wherein the preset desensitization rule comprises a plurality of desensitization transformation positions and transformation rules respectively corresponding to the plurality of transformation positions; the elements positioned at various changing positions in the privacy information are transformed according to respective transformation rules, so that the privacy data are transformed into other data, and desensitization processing of the privacy information is realized. The transformation position represents the position of an element needing to be transformed in the privacy information, and the transformation rule is a mode of transforming the element; if the element of the first seven bits in the privacy information is the conversion position and the element of the conversion rule is accumulated in the base number 1 from the first bit, then the element of each conversion position is 1561111 for the telephone number 15811112222 as the privacy information, and the conversion rule is to add 1 to the first bit 1, 2 to the second bit 5, 3 to the third bit 6 and 4 to the fourth bit 1 until the seventh bit element is accumulated. After that, the privacy information after desensitization processing is displayed in a display frame of a preset application so as to avoid the disclosure of the privacy information.
Further, when the security processing is implemented in a mask processing manner, a preset mask position is preset, the preset mask position is set according to requirements, and mask processing on the private information is implemented by masking an element located in the preset mask position in the private information. The preset mask position indicates a position where an element in the privacy information that needs to be masked is located, if the preset mask position is an element of the last eight bits in the privacy information, for the phone number 15811112222 serving as the privacy information, the elements at the preset mask position are 11112222 respectively, the eight-bit element is masked, and masking may be performed by adding a preset identifier, such as an "+" number, to the eight-bit element. And then, displaying the privacy information after mask processing in a display frame of a preset application to avoid the leakage of the privacy information.
Further, when the security process is implemented as an overlay process, a preset layer for overlaying the private information is preset, and the preset layer exists in a specific color value, so that it is difficult to display the overlaid content. Before the privacy information is added to the display frame to be displayed, the preset map layer is called, the preset map layer is added to the upper layer of the privacy information, and then the privacy information added with the preset map layer is displayed in the display frame of the preset application, so that the privacy information is prevented from being leaked. The adding of the preset map layer to the upper layer of the privacy information may be adding of a display frame for displaying the privacy information in the preset application. The private information is added to the display frame before being displayed by the display frame, the preset layer is added to the display frame, the private information is added to the lower layer of the preset layer in the display frame, and the private information is prevented from being directly exposed and displayed through the covering of the preset layer on the upper layer.
Further, user operation is simulated through a preset service, a matching request is triggered for the privacy information displayed in the preset application, matching is conducted on the user to be matched through the matching request, and the user to be matched is requested to be added as a friend. Specifically, the step of triggering a matching request for the private information displayed in the preset application based on the preset service includes:
step S34, triggering a query request for the privacy information displayed in the preset application based on the preset service, and obtaining the name card information of the user to be matched;
step S35, after the privacy information in the business card information is processed safely, the business card information is displayed in the preset application, and remark information corresponding to the privacy information is called;
step S36, based on the remark information, replacing the privacy information in the business card information to remark the user to be matched in the business card information;
step S37, triggering the matching request for the remarked business card information based on the preset service.
Further, when a matching request is triggered by a preset service for the private information displayed in the preset application, the user to be matched is searched through the private information, so as to determine whether the private information can be correctly searched for the user to be matched. Specifically, the preset application is provided with a virtual key in addition to a display frame for displaying the private information, after the private information is displayed in the preset application, the virtual key is triggered through an accessible service as a preset service, and a query request containing the private information is triggered by the virtual key. And sending the query request to a server for providing service for the preset application, and querying the privacy information through the server to obtain the business card information of the user to be matched and display the business card information in the preset application. The name card information at least comprises the name, friend authority, telephone number and the like of the user to be matched.
Furthermore, if the phone number is used as the privacy information of the user to be matched and is directly displayed in the preset application, the privacy information is leaked. Therefore, the security processing is performed on the private information contained in the business card information, and the security processing mode is the same as the security processing mode of the private information added to the preset application, that is, the security processing mode includes desensitization processing, mask processing and overlay processing, and the specific implementation is not described again.
Furthermore, after the privacy information in the business card information is safely processed, the business card information is displayed in the preset application, and the privacy information in the displayed business card information is not real information, so that the safety of the privacy information is ensured. In addition, the intranet area issues the searched privacy information of the user to be matched to the client through the server, and simultaneously issues the user information of the user to be matched to the client through the server, wherein the user information includes but is not limited to names or names, addresses or addresses and the like. And after the business card information is displayed in the preset application, calling the user information form as remark information corresponding to the privacy information. And then the called remark information replaces the privacy information which is safely processed in the business card information, so that the remark of the user to be matched in the business card information is convenient for distinguishing other users while the privacy information is prevented from being leaked.
It should be noted that the name card information represents the user found from the privacy information, and the name card information is displayed, so that the enterprise staff having the user matching requirement can check the matching request to be initiated and add the matching request as a friend of the user to be matched. The preset application comprises a virtual key used for triggering the matching request, after the private information in the business card information is replaced and the remark of the business card information is completed, the virtual key is triggered through the preset service to initiate the matching request, and the user to be matched is requested to be added as a friend.
Furthermore, after the step of triggering a matching request for the privacy information displayed in the preset application based on the preset service to match the user to be matched, the method further includes:
step a1, when feedback information returned based on the matching request is received, adding the user to be matched as a friend;
and a1, deleting the privacy information, and generating a matching record according to the information number corresponding to the privacy information.
Further, after the user to be matched receives the matching request through the terminal, feedback information is returned according to the matching request. The feedback information may be a pass request or a reject request. Whether the feedback information is the requested feedback information or the requested feedback information is rejected, the client finishes matching the users to be matched once receiving the feedback information. For the feedback information passing the request, representing that the matching of the users to be matched is successful, namely successfully adding the users to be matched as friends; and for the feedback information of the rejection request, representing that the matching of the users to be matched fails, namely that the users to be matched are not added as friends.
Furthermore, after feedback information returned by the user to be matched to the matching request is received, the privacy information stored in the memory is deleted, so that the privacy information is prevented from being maliciously acquired and leaked. In addition, after receiving the privacy information sent by the intranet area, the server numbers the privacy information, and records the number of the privacy information issued by the intranet area through the number. Meanwhile, the service issues the number aiming at the privacy information as an information number corresponding to the privacy information to the client together with the privacy information. Before deleting the private information in the memory, the client reads the information number corresponding to the private information and generates the information number as a matching record. The matching records at least comprise the issuing time and the deleting time of the privacy information, the time for receiving the feedback information and completing matching and the like, so that the matching condition of the user to be matched can be traced through the matching records, and the information tracing is facilitated.
The user matching method based on the privacy information is applied to the client. Compared with the prior art that the user information is directly exposed to the service end of the service personnel, the invention sets the intranet area for storing the user information and the server in communication connection with the intranet area, and the customer service end can access the server. When the requirement for matching the users to be matched exists, the private information of the users to be matched is obtained by the intranet area, and the private information is issued to the client through the server; the client initiates a login request, and after the server passes the authentication of the login request, the client receives the privacy information and activates the preset service; starting a preset application through a preset service, and displaying privacy information after safety processing in the preset application; and further triggering a matching request for the privacy information displayed in the preset application through a preset service so as to match the users to be matched. Therefore, the safety of the private information storage is ensured by setting the intranet area to store the private information; moreover, the intranet area and the server are communicated through a special network, so that the security of private information transmission is ensured; meanwhile, the privacy information is displayed after being safely processed in the preset application, so that the privacy information is prevented from being directly exposed and displayed. The defect that user information is leaked due to the fact that the user information is directly exposed to the service end of a service worker in the prior art is overcome. The safety of the user information in the user matching process is improved from multiple aspects.
Further, referring to fig. 3, fig. 3 is a flowchart illustrating a second embodiment of the method for matching users based on privacy information according to the present invention. Specifically, the user matching method based on the private information in this embodiment is applied to a server, and includes:
step S40, when receiving the encrypted private information transmitted by the intranet area based on the private network, calling a decryption mechanism corresponding to the intranet area, decrypting the encrypted private information and generating private information;
the privacy information-based user matching method in the implementation is applied to a server in communication connection with a client, and the server is in butt joint with an intranet area of an enterprise through a special network so as to forward data stored in the intranet area to the client through the server, so that an external terminal is prevented from directly accessing the intranet area, and the security of the data stored in the intranet area is ensured. Besides the communication connection between the server and the internal area through the private network, the communication data are transmitted in an encrypted mode. And the encryption mechanism between the two is preset, the transmitted data can be encrypted through an encryption algorithm, and the data can also be transmitted in an encrypted transmission mode. And encrypting the encryption algorithm, namely encrypting the privacy information by the encryption algorithm before the intranet area transmits the searched privacy information to obtain the encrypted privacy information, and transmitting the encrypted privacy information to the server through a special network. For the encrypted transmission mode, the encrypted transmission mode is transmitted through a secure network, such as https (Hyper Text Transfer protocol secure token Layer); or message queues such as rockmq transports; and transmitting the privacy information transmitted by the encrypted transmission mode to the server as encrypted privacy information. Wherein, http includes encryption/authentication layer, provide authentication and encryption communication method, in order to guarantee the security of the transmitted private information; the encryption characteristic of the message queue can ensure that the transmitted data is not stolen by external monitoring, and the security of the transmitted private information is ensured by the characteristic of not being monitored by the external monitoring.
Further, when the server receives the encrypted privacy information which is encrypted by the intranet area based on the preset encryption mechanism and transmitted through the private network, the inverse operation of the preset encryption mechanism between the intranet area and the private network is called to serve as a decryption mechanism corresponding to the intranet area, and the encrypted privacy information is decrypted through the decryption mechanism to obtain the privacy information. It should be noted that, for the encrypted privacy information obtained by encrypting through the encryption algorithm, the decryption mechanism is the inverse operation of the encryption algorithm; for the encrypted private information transmitted in the encrypted transmission mode, the decryption mechanism is a decryption mode corresponding to https encryption communication or the encryption characteristic of the message queue. Moreover, the encrypted privacy information can be generated by double encryption of an encryption algorithm and an encryption transmission mode so as to ensure the safe transmission of the privacy information. At this time, the corresponding decryption mechanism includes an inverse operation of the encryption algorithm and a decryption method corresponding to the encryption transmission method, so as to decrypt the encrypted private information into the private information.
Step S50, receiving a login request sent by a client, after the login request passes authentication, issuing the privacy information to the client based on an encryption transmission mechanism between the client and the client so that the client can activate a preset service, and matching a user to be matched corresponding to the privacy information based on the preset service.
Furthermore, the server issues the private information to the client, and in order to ensure the security of private information transmission, a login authentication mechanism is arranged between the server and the client, a login request is initiated by the client, and the server receives the login request for authentication to determine whether the login user is a reliable identity or has an operation right. And after the login request is authenticated and the login person is a reliable identity or has an operation authority, the server issues the privacy information to the client.
Furthermore, an encryption transmission mechanism is preset between the server and the client, and after the server generates the privacy information, the server issues the privacy information to the client through the encryption transmission mechanism between the server and the client. The encryption transmission mechanism is preferably https transmission, so that the privacy information is prevented from being monitored in the process of being issued to the client, and the security of privacy information transmission is ensured. In addition, the privacy information can be encrypted through a preset algorithm, and the encrypted privacy information is transmitted to the client through https, so that the security of the privacy information is ensured from the two aspects of information encryption and transmission encryption. The privacy information is issued to the client, so that the client starts the preset application by means of the preset service after receiving the privacy information, adds the privacy information into the preset application for safe processing and displaying, triggers the matching request, requests to add the user to be matched with the privacy information as a friend, and completes the matching of the user to be matched.
Furthermore, the step of receiving a login request sent by a client, and after the login request is authenticated, issuing the privacy information to the client based on an encryption transmission mechanism between the client and the login request comprises the following steps:
step b1, when receiving the login request sent by the client, performing identity authentication based on the login account and the login password in the login request;
b2, after the identity authentication is passed, judging whether the request identity information corresponding to the privacy information is matched with the login identity information corresponding to the login request;
and b3, if the request identity information is matched with the login identity information, issuing the privacy information to the client based on an encryption transmission mechanism between the client and the request identity information.
Furthermore, after the enterprise employee inputs a login account and a login password on a display interface of the client, a login request is triggered. After receiving the login request, the server performs identity authentication based on the login account and the login password, verifies whether the login account is matched with the login password, and verifies whether a login user corresponding to the login account is an enterprise employee. If the login account is matched with the login password and the login user is an enterprise employee, judging that the identity authentication is passed; otherwise, the authentication is judged to fail, and the login of the login account is refused. And for the login request passing the identity authentication, completing the login of the login account, and judging whether the request identity information corresponding to the privacy information is matched with the login identity information corresponding to the login request. The request identity information corresponding to the privacy information is the identity information of enterprise staff who log in to a front-end page of the intranet area, and the login identity information corresponding to the login request is the identity information of a login user who logs in to the server. If the request identity information is matched with the login identity information, the enterprise staff requesting to acquire the privacy information of the user to be matched from the intranet area is indicated, namely the user currently logging in the server, so that the privacy information can be issued to the client according to an encryption transmission mechanism between the service and the client, and the requirement of the enterprise staff on acquiring the privacy information is met. The server is used as an intermediate area for forwarding, so that the client is prevented from being directly in communication connection with the intranet area, and the safety of data stored in the intranet area is ensured.
It should be noted that, the server of this embodiment may provide various service functions, such as generating information recommendation material as an advertisement creative product and popularizing the advertisement creative product to the client, in addition to forwarding the private information of the intranet area to the client as the intermediate area. Specifically, the user matching method based on the private information further includes:
step c1, when receiving the information recommendation material, generating the information recommendation material into creative recommendation information;
and c2, issuing the creative recommendation information to the client to push the creative recommendation information to the user to be matched with the matching success based on the client.
Further, when the advertisement promotion demand exists, information recommendation materials used for generating creative recommendation information are uploaded to a server. And when receiving the information recommendation material, the server generates the information recommendation material into creative recommendation information according to a preset advertisement creative template. The information recommendation materials carry type identifications representing types of creative recommendation information required to be generated, an advertisement creative template is determined according to the type identifications, the information recommendation materials are added into the determined advertisement creative template, and the creative recommendation information meeting the type requirements is generated. And then, the creative recommendation information is issued to the client so as to be convenient for pushing the creative recommendation information to the user to be matched with successful matching through the client. And the integrated process of automatically matching users and generating creative recommendation information popularization is realized.
In this embodiment, the server is set as an intermediate area to forward the private data of the intranet area to the client, so as to avoid direct communication transmission between the client and the intranet area, and ensure the security of the data stored in the intranet area. Meanwhile, an encryption mechanism is arranged between the server and the intranet area and between the server and the client, so that the security of private data transmission is ensured, and the security of private data is ensured from multiple dimensions.
Further, referring to fig. 4, fig. 4 is a flowchart illustrating a third embodiment of the method for matching users based on privacy information according to the present invention. Specifically, the user matching method based on the privacy information in this embodiment is applied to an intranet area, and includes:
step S60, when receiving the intranet login request sent based on the private network, verifying whether the intranet login request is legal;
step S70, if the intranet login request is legal, determining authority information corresponding to the intranet login request;
step S80, obtaining a user list corresponding to the authority information, returning the user list to a terminal corresponding to the intranet login request for display, and determining a user to be matched for matching based on the displayed user list.
The user matching method based on the privacy information in the embodiment is applied to an intranet area network in an enterprise. And the internal staff of the enterprise logs in the VPN to access the internal network area through the internal network of the enterprise in the front-end page of the internal network area displayed by the internal terminal of the enterprise. The internal network of the enterprise is used as a private network, and the access to the internal network area initiated by the internal staff of the enterprise on the front end page through the private network is used as an internal network login request. Once the intranet area receives the intranet login request, whether the intranet login request is legal or not is verified. The legality comprises the matching between the login request account and the password and whether the user corresponding to the account is an enterprise employee. And if the account is matched with the password and the user corresponding to the account is an enterprise employee, the intranet login request is legal. And if the account is not matched with the password and/or the user corresponding to the account is not an enterprise employee, judging that the intranet login request is illegal. And refusing to log in for the illegal intranet login request, and determining the authority information corresponding to the intranet login request by logging in for the legal intranet login request. And the authority information corresponding to the intranet login request represents the internal employees of the enterprise initiating access to the intranet area and the access authority of the intranet area.
Further, a user list corresponding to the authority information is obtained, and the user list is a list matched with the internal enterprise employee supporting the access initiation. And if the authority information indicates that the users in a certain region have matching authority, searching the users in the region from the intranet region to form a user list. And returning the obtained user list to a terminal corresponding to the intranet login request for display, wherein the intranet region only supports the access of terminals inside the enterprise, and the terminal corresponding to the intranet login request is a terminal initiating the intranet login request inside the enterprise. Through displaying the user list, the internal staff of the enterprise initiating the access selects the user needing to be matched from the user list as the user to be matched; and then the private information of the user to be matched is obtained by the intranet area, the private information is issued to the client through the server, and the client triggers a matching request to request the user to be matched to be a friend. Therefore, the private information of the user to be matched is issued through the data flow direction from the intranet terminal to the intranet area, from the intranet area to the server and from the server to the client, the client is prevented from being connected with the intranet area, and the security of the stored private information in the intranet area is ensured.
The embodiment sets the intranet zone to store the privacy information of the internal clients of the enterprise, only the internal staff of the enterprise can access the intranet zone through the internal terminal of the enterprise and the internal network of the enterprise, and the security of the stored privacy information is ensured. Meanwhile, for the staff with the access authority, the user list in the authority is obtained according to the range represented by the authority information for displaying, so that the staff can select the user to be matched. The employee can only select and match the user name list with the selection authority, and the security of the privacy information is further ensured.
In addition, the embodiment of the invention also provides a readable storage medium.
The readable storage medium stores a user matching program based on the private information, and the user matching program based on the private information realizes the steps of the user matching method based on the private information when being executed by the processor.
The readable storage medium of the present invention may be a computer readable storage medium, and the specific implementation manner of the readable storage medium of the present invention is substantially the same as that of each embodiment of the user matching method based on the private information, and will not be described herein again.
The present invention is described in connection with the accompanying drawings, but the present invention is not limited to the above embodiments, which are only illustrative and not restrictive, and those skilled in the art can make various changes without departing from the spirit and scope of the invention as defined by the appended claims, and all changes that come within the meaning and range of equivalency of the specification and drawings that are obvious from the description and the attached claims are intended to be embraced therein.

Claims (10)

1. A user matching method based on private information is characterized in that the user matching method based on private information is applied to a client, and comprises the following steps:
initiating a login request, and receiving privacy information of a user to be matched issued by an intranet area based on a server after the server in communication connection with a client passes the authentication of the login request;
activating a preset service to start a preset application based on the preset service;
and safely processing the privacy information and then displaying the processed privacy information in the preset application, and triggering a matching request for the privacy information displayed in the preset application based on the preset service so as to match the user to be matched.
2. The private information-based user matching method according to claim 1, wherein the step of triggering a matching request for the private information displayed in the preset application based on the preset service includes:
triggering a query request for the privacy information displayed in the preset application based on the preset service to obtain the name card information of the user to be matched;
after the privacy information in the business card information is safely processed, the business card information is displayed in the preset application, and remark information corresponding to the privacy information is called;
based on the remarking information, replacing the privacy information in the business card information so as to remark the user to be matched in the business card information;
and triggering the matching request for the name card information after remarking based on the preset service.
3. The private information-based user matching method according to claim 1, wherein the security process includes a desensitization process, a masking process, or an overlay process, and the step of securely processing the private information and displaying the processed private information in the preset application includes:
according to each transformation position in a preset desensitization rule and a transformation rule corresponding to each transformation position respectively, transforming the privacy information to perform desensitization processing on the privacy information, and displaying the privacy information after the desensitization processing in the preset application;
or performing mask processing on the privacy information according to a preset mask position, and displaying the privacy information subjected to mask processing in the preset application;
or calling a preset map layer, adding the preset map layer to the upper layer of the privacy information, and displaying the privacy information added with the preset map layer in the preset application.
4. The private information based user matching method according to any one of claims 1 to 3, wherein after the step of triggering a matching request for the private information displayed in the preset application based on the preset service to match the user to be matched, the method further comprises:
when feedback information returned based on the matching request is received, adding the user to be matched as a friend;
and deleting the private information, and generating a matching record according to the information number corresponding to the private information.
5. A user matching method based on private information is characterized in that the user matching method based on private information is applied to a server, and comprises the following steps:
when receiving encrypted private information transmitted by an intranet area based on a private network, calling a decryption mechanism corresponding to the intranet area, decrypting the encrypted private information and generating private information;
and receiving a login request sent by a client, after the login request passes authentication, issuing the privacy information to the client based on an encryption transmission mechanism between the client and the login request so that the client can activate a preset service, and matching a user to be matched corresponding to the privacy information based on the preset service.
6. The method for matching users based on private information as claimed in claim 5, wherein the step of receiving the login request sent by the client, authenticating the login request, and issuing the private information to the client based on the encrypted transmission mechanism with the client further comprises:
when a login request sent by the client is received, performing identity authentication based on a login account and a login password in the login request;
after the identity authentication is passed, judging whether the request identity information corresponding to the privacy information is matched with the login identity information corresponding to the login request;
and if the request identity information is matched with the login identity information, issuing the privacy information to the client based on an encryption transmission mechanism between the client and the request identity information.
7. The private information based user matching method according to claim 5 or 6, wherein the private information based user matching method further comprises the steps of:
when receiving an information recommendation material, generating the information recommendation material into creative recommendation information;
and issuing the creative recommendation information to the client to push the creative recommendation information to the user to be matched, which is successfully matched, based on the client.
8. A user matching method based on privacy information is characterized in that the user matching method based on privacy information is applied to an intranet area, and comprises the following steps:
when an intranet login request sent based on a private network is received, verifying whether the intranet login request is legal or not;
if the intranet login request is legal, determining authority information corresponding to the intranet login request;
and acquiring a user list corresponding to the authority information, returning the user list to a terminal corresponding to the intranet login request for display, and determining a user to be matched for matching based on the displayed user list.
9. A private information based user matching system, characterized in that the private information based user matching system comprises a client, a server and an intranet area, the private information based user matching system further comprises a memory, a processor and a private information based user matching program stored on the memory and operable on the processor, the private information based user matching program when executed by the processor implements the steps of the private information based user matching method according to any one of claims 1 to 4 or any one of claims 5 to 7 or claim 8.
10. A readable storage medium, characterized in that the readable storage medium has stored thereon a privacy information based user matching program, which when executed by a processor implements the steps of the privacy information based user matching method according to any one of claims 1 to 4 or any one of claims 5 to 7 or claim 8.
CN202010624212.2A 2020-06-30 2020-06-30 User matching method and system based on privacy information and readable storage medium Pending CN111767576A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010624212.2A CN111767576A (en) 2020-06-30 2020-06-30 User matching method and system based on privacy information and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010624212.2A CN111767576A (en) 2020-06-30 2020-06-30 User matching method and system based on privacy information and readable storage medium

Publications (1)

Publication Number Publication Date
CN111767576A true CN111767576A (en) 2020-10-13

Family

ID=72723285

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010624212.2A Pending CN111767576A (en) 2020-06-30 2020-06-30 User matching method and system based on privacy information and readable storage medium

Country Status (1)

Country Link
CN (1) CN111767576A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112287414A (en) * 2020-10-30 2021-01-29 平安信托有限责任公司 Access control method, device, computer equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112287414A (en) * 2020-10-30 2021-01-29 平安信托有限责任公司 Access control method, device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
US8266443B2 (en) Systems and methods for secure and authentic electronic collaboration
CN107302539B (en) Electronic identity registration and authentication login method and system
US9698992B2 (en) Method for signing electronic documents with an analog-digital signature with additional verification
US7571473B1 (en) Identity management system and method
US7428750B1 (en) Managing multiple user identities in authentication environments
US10193844B1 (en) Secure cloud-based messaging and storage
US8316233B2 (en) Systems and methods for accessing secure and certified electronic messages
US10834067B2 (en) Method of access by a telecommunications terminal to a database hosted by a service platform that is accessible via a telecommunications network
KR20140042905A (en) Identity authentication and management device and method thereof
US20060026692A1 (en) Network resource access authentication apparatus and method
CN111541546B (en) Multi-platform login method, device, equipment and readable medium
CN110020526A (en) The measures and procedures for the examination and approval, device and storage medium based on block chain authentication
CN112073289B (en) Instant messaging control method and device
KR20200037127A (en) Systems and methods for providing user accounts for users to operate computing devices
CN113326488A (en) Personal information protection system and method
AU2018101656A4 (en) A System and Method for Facilitating the Delivery of Secure Hyperlinked Content via Mobile Messaging
JP4551367B2 (en) Service system and service system control method
CN114444131A (en) Document auditing method and computer storage medium
CN111767576A (en) User matching method and system based on privacy information and readable storage medium
US11777927B1 (en) Monitoring system for providing a secure communication channel between a client computer and a hosting computer server
CN116915493A (en) Secure login method, device, system, computer equipment and storage medium
US20140237567A1 (en) Authentication method
CN106453273B (en) A kind of information insurance management system and method based on cloud
EP3198398B1 (en) Access to software applications
CN115543646A (en) Contact processing method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination