CN112437052B - Method, apparatus, electronic device, and computer-readable medium for processing information - Google Patents

Method, apparatus, electronic device, and computer-readable medium for processing information Download PDF

Info

Publication number
CN112437052B
CN112437052B CN202011246848.4A CN202011246848A CN112437052B CN 112437052 B CN112437052 B CN 112437052B CN 202011246848 A CN202011246848 A CN 202011246848A CN 112437052 B CN112437052 B CN 112437052B
Authority
CN
China
Prior art keywords
information
token
processed
preset
processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011246848.4A
Other languages
Chinese (zh)
Other versions
CN112437052A (en
Inventor
杨鑫阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Douyin Vision Co Ltd
Douyin Vision Beijing Co Ltd
Original Assignee
Beijing ByteDance Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing ByteDance Network Technology Co Ltd filed Critical Beijing ByteDance Network Technology Co Ltd
Priority to CN202011246848.4A priority Critical patent/CN112437052B/en
Publication of CN112437052A publication Critical patent/CN112437052A/en
Application granted granted Critical
Publication of CN112437052B publication Critical patent/CN112437052B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/10Mapping addresses of different types
    • H04L61/103Mapping addresses of different types across network layers, e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]

Abstract

Embodiments of the present disclosure disclose methods, apparatuses, electronic devices, and computer-readable media for processing information. One embodiment of the method comprises: receiving information to be processed and analyzing a target address in the information to be processed; responding to that the target address of the information to be processed belongs to a preset address set, and carrying out information detection on the information to be processed; responding to the preset keywords in the information to be processed, and generating and storing an information token corresponding to the information to be processed; sending the information token to an information processing system corresponding to the information to be processed in a designated information transmission mode; and in response to receiving feedback information which is sent by the information processing system and corresponds to the information token, performing information processing on the information to be processed based on the feedback information. The implementation method avoids directly transmitting the preset keywords in the information to be processed in the network, and improves the safety of information processing.

Description

Method, apparatus, electronic device, and computer-readable medium for processing information
Technical Field
Embodiments of the present disclosure relate to the field of computer technologies, and in particular, to a method, an apparatus, an electronic device, and a computer-readable medium for processing information.
Background
With the development of technology, many services can be handled through the network. A user can establish data communication between the electronic equipment and the equipment such as the service server through the network, and service handling is completed after multiple network information interactions. Therefore, the efficiency of handling the service by the user is greatly improved.
In the process of transacting business through the network, a user needs to provide sensitive information such as names, works, card numbers and the like. The sensitive information may be leaked in multiple links of the network, and the security of network service is reduced.
Disclosure of Invention
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Some embodiments of the present disclosure propose a method, an apparatus, an electronic device, and a computer-readable medium for processing information to solve the technical problems mentioned in the background section above.
In a first aspect, some embodiments of the present disclosure provide a method for processing information, the method comprising: receiving information to be processed, and analyzing a target address in the information to be processed; responding to the fact that the target address of the information to be processed belongs to a preset address set, and carrying out information detection on the information to be processed; responding to the information to be processed to the existence of a preset keyword, and generating and storing an information token corresponding to the information to be processed, wherein the information token does not contain the preset keyword; sending the information token to an information processing system corresponding to the information to be processed in a designated information transmission mode, wherein each module in the information processing system is configured in a specific network segment; and in response to receiving feedback information which is sent by the information processing system and corresponds to the information token, performing information processing on the information to be processed based on the feedback information.
In a second aspect, some embodiments of the present disclosure provide a method for processing information, the method comprising: responding to the received information token, and performing data processing on the information token; responding to a data processing request corresponding to the information token, and sending feedback information corresponding to the information token, wherein the data processing request is used for indicating to perform data processing on to-be-processed information corresponding to the information token, and the feedback information comprises a device identifier of current equipment and the information token; and receiving target information corresponding to the feedback information.
In a third aspect, some embodiments of the present disclosure provide an apparatus for processing information, the apparatus comprising: the target address analysis unit is configured to receive information to be processed and analyze a target address in the information to be processed; the information detection unit is used for responding to the fact that the target address of the information to be processed belongs to a preset address set and is configured to detect the information of the information to be processed; an information token generating unit, configured to generate and store an information token corresponding to the information to be processed in response to a preset keyword existing in the information to be processed, wherein the information token does not include the preset keyword; an information sending unit configured to send the information token to an information processing system corresponding to the information to be processed in a specified information transmission manner, wherein each module in the information processing system is configured in a specific network segment; and the information processing unit is used for responding to the feedback information which is sent by the information processing system and corresponds to the information token and is configured to perform information processing on the information to be processed based on the feedback information.
In a fourth aspect, some embodiments of the present disclosure provide an apparatus for processing information, the apparatus comprising: an information token receiving unit configured to perform data processing on the information token in response to receiving the information token; a feedback information sending unit, configured to send feedback information corresponding to the information token in response to detecting a data processing request corresponding to the information token, where the data processing request is used to instruct data processing on to-be-processed information corresponding to the information token, and the feedback information includes a device identifier of a current device and the information token; and a target information receiving unit configured to receive target information corresponding to the feedback information.
In a fifth aspect, some embodiments of the present disclosure provide an electronic device, comprising: one or more processors; a memory having one or more programs stored thereon, which when executed by the one or more processors, cause the one or more processors to perform the method for processing information of the first aspect or the method for processing information of the second aspect.
In a sixth aspect, some embodiments of the present disclosure provide a computer readable medium, on which a computer program is stored, wherein the program, when executed by a processor, implements the method for processing information of the first aspect or the method for processing information of the second aspect.
One of the above various embodiments of the present disclosure has the following beneficial effects: firstly, receiving information to be processed, and analyzing a target address in the information to be processed. When the target address of the information to be processed belongs to a preset address set, performing information detection on the information to be processed; when the preset keywords exist in the information to be processed, the information token corresponding to the information to be processed is generated and stored, so that desensitization processing of the information to be processed is realized; and then, the information token is sent to the information processing system corresponding to the information to be processed in a designated information transmission mode, so that the preset keywords in the information to be processed are prevented from being directly transmitted in a network, and the safety of information processing is improved. And finally, after receiving feedback information which is sent by the information processing system and corresponds to the information token, performing information processing on the information to be processed based on the feedback information. Therefore, the selective processing of the preset keywords in the information to be processed is realized, and the information safety is improved.
Drawings
The above and other features, advantages, and aspects of embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. Throughout the drawings, the same or similar reference numbers refer to the same or similar elements. It should be understood that the drawings are schematic and that elements and components are not necessarily drawn to scale.
FIG. 1 is a schematic illustration of an application scenario of a method for processing information of some embodiments of the present disclosure;
FIG. 2 is a flow diagram of some embodiments of a method for processing information according to the present disclosure;
FIG. 3 is a flow diagram of further embodiments of methods for processing information according to the present disclosure;
FIG. 4 is a flow diagram of still further embodiments of methods for processing information according to the present disclosure;
FIG. 5 is a schematic diagram of another application scenario of a method for processing information according to the present disclosure;
FIG. 6 is a schematic block diagram of some embodiments of an apparatus for processing information according to the present disclosure;
FIG. 7 is another schematic block diagram of some embodiments of an apparatus for processing information according to the present disclosure;
FIG. 8 is a schematic structural diagram of an electronic device suitable for use in implementing some embodiments of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete. It should be understood that the drawings and embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings. The embodiments and features of the embodiments in the present disclosure may be combined with each other without conflict.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence relationship of the functions performed by the devices, modules or units.
It is noted that references to "a", "an", and "the" modifications in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will recognize that "one or more" may be used unless the context clearly dictates otherwise.
The names of messages or information exchanged between devices in the embodiments of the present disclosure are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Fig. 1 is a schematic diagram of one application scenario of a method for processing information of some embodiments of the present disclosure.
In the application scenario of fig. 1, the electronic device 101 receives the to-be-processed information 102 "bank card number: 65245152215233 ", the destination address is first parsed from the information to be processed 102. Where the destination address is used to identify the network address of the information handling system 105. When the destination address belongs to the preset address set, the electronic device 101 processes the information to be processed 102 "bank card number: 65245152215233 "and found that there is a predetermined keyword 103" 65245152215233 ". To ensure that the predetermined keyword is not revealed, the electronic device 101 may generate a bank card number corresponding to the to-be-processed information 102: 65245152215233 ", information token 104" aqwoierukdfkgdbmvlk ". The information token 104 "aqwoierukdfkgdbmvlk" is then sent to the information processing system 105. The information processing apparatus 106 in the information processing system 105 can send feedback information 107 "requesting original information" to the electronic apparatus 101 as needed: aqwoierukdfkgdbmvlk ". The electronic device 101 treats the processing information 102 "bank card number: 65245152215233' for data processing. For example, the information to be processed 102 "bank card number: 65245152215233 "to the information processing apparatus 106 or the like. Therefore, the preset keywords are prevented from being directly exposed in the network in the whole data processing process, and the information safety of processing information through the network is improved.
The electronic device 101 may be hardware or software. When the electronic device 101 is hardware, it may be implemented as a distributed cluster formed by a plurality of servers or terminal devices, or may be implemented as a single server or a single terminal device. When the electronic device 101 is embodied as software, it may be installed in the hardware devices listed above. It may be implemented, for example, as multiple software or software modules to provide distributed services, or as a single software or software module. And is not particularly limited herein.
It should be understood that the number of electronic devices 101 in fig. 1 is merely illustrative. There may be any number of electronic devices 101, as desired for implementation.
With continued reference to fig. 2, fig. 2 illustrates a flow 200 of some embodiments of a method for processing information according to the present disclosure. The method for processing information comprises the following steps:
step 201, receiving information to be processed, and resolving a target address in the information to be processed.
In some embodiments, an execution subject of the method for processing information (e.g., the electronic device 101 shown in fig. 1) may receive information to be processed through a wired connection or a wireless connection. It should be noted that the wireless connection means may include, but is not limited to, a 3G/4G connection, a WiFi connection, a bluetooth connection, a WiMAX connection, a Zigbee connection, a uwb (ultra wideband) connection, and other wireless connection means now known or developed in the future.
The information to be processed may be various information (for example, user name, date of birth, home address, bank card number, etc.) sent by the user to the execution subject through the terminal device. Typically, the information to be processed needs to be sent to a specified address. The execution body may parse the target address from the information to be processed. In practice, the information to be processed may be sent to the proxy layer, and the proxy layer may analyze the information to be processed and determine a target address corresponding to the information to be processed.
Step 202, responding to that the target address of the information to be processed belongs to a preset address set, and performing information detection on the information to be processed.
When the target address belongs to the preset address set, the information to be processed needs to be called or processed by an external information processing system. In order to avoid leakage of user information, the execution subject may perform information detection on the information to be processed. For example, the execution subject may match the information to be processed through a preset keyword table, and then determine whether a preset keyword exists in the information to be processed.
Step 203, responding to the preset keyword existing in the information to be processed, and generating and storing an information token corresponding to the information to be processed.
There are two general types of results of information detection on information to be processed, one is that there is no preset keyword, and the other is that there is a preset keyword. When the information to be processed does not have the preset keyword, the execution main body can directly send the information to be processed to an information processing system for processing the information to be processed. When the preset keyword exists in the information to be processed, the execution main body can generate the information token corresponding to the information to be processed in various ways. The information token is information after desensitization of the information to be processed. That is, the information token does not include the predetermined keyword. The executing agent may then save the information to be processed and the information token locally for subsequent data processing. Therefore, the preset keywords are prevented from being directly transmitted in the network, and the safety of information processing is improved.
And step 204, sending the information token to an information processing system corresponding to the information to be processed in a designated information transmission mode.
After the information token is obtained, the execution main body can send the information token to the information processing system corresponding to the information to be processed in a designated information transmission mode. Here, the information processing system may be considered as a system which is at risk of revealing information, and may be, for example, various public networks, or a private network which is not high in security.
Step 205, in response to receiving the feedback information corresponding to the information token sent by the information processing system, performing information processing on the information to be processed based on the feedback information.
In the process of processing the information token, the information processing system may need to acquire the to-be-processed information corresponding to the information token to perform data processing. For example, the information to be processed may be the above-mentioned "bank card number: 65245152215233 ", the information handling system may be a bank server. When the user is processed, the user can normally process the service only by acquiring the name, the bank card number, the bank card password and other data of the user. At this time, the information processing system may transmit feedback information corresponding to the information token to the execution main body. And after receiving the feedback information, the execution main body processes the feedback information and the information to be processed according to the requirement. That is, the information to be processed is processed only when the keyword is actually required to be preset. Therefore, the preset keywords in the information to be processed are prevented from being directly transmitted in the network, and the safety of information processing is improved.
Some embodiments of the present disclosure disclose a method for processing information, which includes performing information detection on information to be processed when a target address of the information to be processed belongs to a preset address set; when the information to be processed is detected to have the preset keywords, the information token corresponding to the information to be processed is generated, and desensitization processing of the information to be processed is realized; and then, the information token is sent to the information processing system for data processing in a designated information transmission mode, so that preset keywords in the information to be processed are prevented from being directly transmitted in a network, and the safety of information processing is improved. And finally, after receiving the feedback information corresponding to the information token, performing information processing on the information to be processed based on the feedback information. Therefore, the selective processing of the preset keywords in the information to be processed is realized, and the information safety is improved.
With continued reference to fig. 3, fig. 3 illustrates a flow 300 of some embodiments of a method for processing information according to the present disclosure. The method for processing information comprises the following steps:
step 301, receiving information to be processed, and analyzing a target address in the information to be processed.
The content of step 301 is the same as that of step 201, and is not described in detail here.
Step 302, responding to that the target address of the information to be processed belongs to a preset address set, and performing information detection on the information to be processed.
The content of step 302 is the same as that of step 202, and is not described in detail here.
In some optional implementation manners of some embodiments, the detecting information of the information to be processed may include:
the first step, the information to be processed is divided into at least one information unit.
For information detection of the information to be processed, the executing entity may first divide the information to be processed into at least one information unit. The information to be processed may include characters, numbers, symbols, and the like, and correspondingly, the information unit may include at least one of the following: entries, symbols, numbers, etc.
And secondly, inquiring whether each information unit in the at least one information unit belongs to a preset keyword library.
Different information units contain different information contents. The execution subject acquires a preset keyword library. The keyword library contains preset keywords, and the keywords themselves or information related to the keywords are not related to personal privacy of the user. The execution subject can screen the information units through a preset keyword library to determine whether the risk of information leakage exists.
And thirdly, in response to the existence of the target information unit belonging to the keyword library, marking the target information unit as a preset keyword.
When the target information unit exists in the information type set, the information to be processed can be considered to have the risk of information leakage. The execution subject may mark the target information unit as a preset keyword. Wherein, the keyword library comprises at least one of the following items: card number information, user name information and password information.
Step 303, in response to the existence of the preset keyword in the information to be processed, marking information other than the preset keyword in the information to be processed as safety information.
In order to distinguish information, the execution subject may mark information other than the preset keyword in the information to be processed as safe information. For example, the preset keyword and the security information may be encrypted at the same time, or only the preset keyword may be encrypted without encrypting the security information.
And 304, generating a first information token corresponding to the preset keyword and a second information token corresponding to the safety information.
In some embodiments, the execution subject may generate a first information token corresponding to the preset keyword and a second information token corresponding to the security information. The token types of the first information token and the second information token may be the same or different. For example, the information to be processed "bank card number: 65245152215233, the preset keyword may be "65245152215233", and the security information is "bank card number: ".
And 305, sending the information token to an information processing system corresponding to the information to be processed in a hypertext transfer protocol mode.
In order to realize information isolation at a network level, the execution subject can perform information interaction with the information processing system through a specified information transmission mode. The information transmission mode may include a hypertext transfer protocol mode. The information transmission method may be a method of encrypting information, or the like, according to actual needs.
Step 306, in response to receiving the feedback information corresponding to the information token sent by the information processing system, performing information processing on the information to be processed based on the feedback information.
The content of step 306 is the same as that of step 204, and is not described in detail here.
In some optional implementation manners of some embodiments, the feedback information may include a device identifier and the information token, where the device identifier may be used to characterize a device in the information processing system that performs data processing on the information token, and the performing information processing on the information to be processed based on the feedback information may include: and responding to the record of the equipment identifier in a preset white list, marking the information to be processed corresponding to the information token as first target information, and sending the first target information to the equipment.
The information processing system may include a plurality of information processing apparatuses, and the plurality of information processing apparatuses may independently perform data processing. When a certain information processing apparatus needs to acquire original information to be processed, feedback information may be sent to the execution main body. The feedback information may include, among other things, a device identification and an information token of the information processing device. The device identification is used to characterize which device the information processing device is. For example, the device identification may be the number of the information processing device in the network, or the hardware number of the information processing device, or the like. The execution subject may pre-construct a white list, which includes device identifiers that can directly process the information to be processed. Namely, the information processing device corresponding to the device identifier in the white list has high security, and the risk of information leakage is low. After the execution main body obtains the feedback information, the device identifier in the feedback information may be matched with the device identifier in the white list. When the device identifier in the feedback information appears in the white list, it may be considered that the matching is successful, and at this time, the execution main body may mark the to-be-processed information corresponding to the information token included in the feedback information as first target information, and send the first target information to the corresponding information processing device. Therefore, information leakage is further prevented, and the safety of the information processing process is improved.
In some optional implementation manners of some embodiments, the performing, based on the feedback information, information processing on the to-be-processed information may include: and in response to the fact that the equipment identifier is not recorded in the white list, converting the information to be processed into second target information, and sending the second target information to the equipment.
When the device identifier in the feedback information does not appear in the white list, it may be considered that the security of the information processing device that transmits the feedback information is not high enough, and there is a risk of information leakage. However, the information processing device needs the information to be processed corresponding to the information token to perform normal information processing. At this time, the execution main body may convert the information to be processed into second target information, and transmit the second target information to the information processing apparatus. The second target information may not be completely the same as the information to be processed, for example, the second target information may be information obtained by modifying the information to be processed, so as to achieve the purpose of preventing information leakage.
In some optional implementation manners of some embodiments, the converting the to-be-processed information into the second target information may include the following steps:
The first step is to convert the first information token included in the information token into the preset keyword, and to convert the second information token included in the information token into the security information.
The information token contained in the feedback information corresponds to the information to be processed and comprises a first information token and a second information token. The execution main body can reversely decode the first information token in a mode of generating the first information token to obtain a preset keyword corresponding to the first information token. Similarly, the execution agent may convert the second information token included in the information token into the security information.
And secondly, performing mask processing on the preset keywords to obtain mask information.
The current information processing device is not in the white list, which indicates that the security of the information processing device is not high enough. In order to ensure that the information processing device can normally process information, the execution subject may perform mask processing on the preset keyword to obtain mask information. For example, the preset keyword is the bank card number "65245152215233", the execution subject may replace part of the information in the bank card number with a black box, and the obtained mask information may be "6524 ■ ■ ■ ■ ■ ■ ■ 233", where "■ ■ ■ ■ ■ ■ ■" replaces "5152215". If the mask information is illegally acquired, the corresponding information of "■ ■ ■ ■ ■ ■ ■" cannot be known. The information processing apparatus may query the registered user in the server according to the first field "6524" and the last field "233" in the mask information "6524 ■ ■ ■ ■ ■ ■ ■ 233" and acquire information corresponding to "■ ■ ■ ■ ■ ■ ■". Wherein the server is typically highly secure. Therefore, the information processing equipment can inquire the original information to be processed, and the safety in the information transmission process can be improved.
And thirdly, forming second target information by the mask information and the safety information.
The execution subject may constitute the mask information and the security information into second target information, and the second target information may be transmitted to the information processing apparatus.
In some optional implementations of some embodiments, the feedback information includes a preset component identifier, where the preset component identifier is used to mark a security component or a preset component, the security component does not perform data processing on the information to be processed, and the preset component performs data processing on the information to be processed; and, the processing the information to be processed based on the feedback information includes: responding to the preset component identification as a safety component, and sending the information to be processed to the safety component; otherwise, the information token is sent to the preset component.
The execution subject may determine the security of the corresponding component according to the preset component identifier. And if the preset component identification is a safety component, the safety of the safety component is indicated. At this time, the execution body may directly send the information to be processed to the security component. If the preset component is identified as the preset component, the safety of the preset component is not high. At this time, the execution main body may send the information token corresponding to the information to be processed to the preset component.
With further reference to FIG. 4, a flow 400 of further embodiments of a method for processing information is illustrated. The flow 400 of the method for processing information comprises the steps of:
step 401, in response to receiving the information token, performing data processing on the information token.
In some embodiments, an execution subject of the method for processing information (e.g., the information processing device 106 shown in fig. 1) may receive the information token from the electronic device 101 described above in fig. 1 via a wired connection or a wireless connection. It should be noted that the above-mentioned wireless connection means may include, but is not limited to, 3G/4G connection, WiFi connection, bluetooth connection, WiMAX connection, Zigbee connection, uwb (ultra wideband) connection, and other now known or later developed wireless connection means.
In practice, the information to be processed in fig. 1 is not generally subjected to data processing at each information processing apparatus 106 of the information processing system 105. Thus, the executing agent may perform data processing on the information token after receiving the information token. The data processing here usually can perform corresponding data processing on the information token without acquiring the original information to be processed corresponding to the information token. For example, after the execution agent obtains the information token, the execution agent fills the information token into the specified data table. In the process, the execution main body can complete the table filling operation without acquiring the original information to be processed corresponding to the information token.
Step 402, in response to detecting the data processing request corresponding to the information token, sending feedback information corresponding to the information token.
In performing the processing of the information token by the subject, a data processing request corresponding to the information token may be detected. The data processing request may be used to instruct to perform data processing on the to-be-processed information corresponding to the information token. The feedback information includes the device identifier of the current device and the information token. In this way, the electronic device 101 in fig. 1 may obtain the identity of the execution subject through the feedback information, and send the data corresponding to the information token to the execution subject.
Step 403, receiving the target information corresponding to the feedback information.
After acquiring the feedback information, the electronic device 101 in fig. 1 may perform related data processing according to the feedback information, and return corresponding target information. The target information may be the information to be processed in fig. 2, or may be information obtained by performing data processing on the information to be processed by the execution main body in fig. 2.
As can be seen, only when the original to-be-processed information corresponding to the information token is required to perform data processing, the execution main body sends the feedback information to the electronic device 101 described above in fig. 1, so that information leakage of the original to-be-processed information corresponding to the information token is prevented, and information security of the to-be-processed information in the network is greatly improved.
In some optional implementation manners of some embodiments, the sending feedback information corresponding to the information token may include: and sending feedback information by a set information transmission mode, wherein the information transmission mode comprises a hypertext transfer protocol mode.
In order to implement information isolation at a network level, the execution subject may perform information interaction with the electronic device 101 of fig. 1 through a specified information transmission manner. The information transmission mode may include a hypertext transfer protocol mode. When sending the feedback information, the feedback information first enters the proxy layer described above. The proxy layer may query the target address of the feedback information, and when the execution subject is in the white list, the proxy layer sends the feedback information to the electronic device 101 in a hypertext transfer protocol manner. The electronic device 101 can realize the secure interaction of information between the designated device in the information processing system and the electronic device 101 only by allocating a white list to the designated device in the information processing system. Therefore, the safety of information interaction is greatly improved.
Fig. 5 is a schematic diagram of another application scenario of a method for processing information of some embodiments of the present disclosure.
In the application scenario of fig. 5, when a user purchases over the internet, the to-be-processed information 5011 "bank card number: 65245152215233 ", to the electronic device 501. The electronic device 501 receives the to-be-processed information 5011 "bank card number: 65245152215233 'to detect the information 5011' bank card number: 65245152215233 there is a preset keyword "65245152215233". To prevent the preset keywords from being revealed, the electronic device 501 is the to-be-processed information 5011 "bank card number: 65245152215233 ", a preset keyword" 65245152215233 "generates an event token (an information token) as the pending information 5011" bank card number: 65245152215233 "security information" bank card number: "create Trade token (an information token), combine to get information token 5012" Trade token + instruction token ". The electronic device 501 then sends the information token 5012 "Trade token + instruction token" to the network transaction system 503 via the hypertext transfer protocol 502. The network transaction system 503 includes a plurality of systems such as a transaction system, a payment system, a verification system, and an order generation system. The information token 5012 "Trade token + instrument token" can perform normal data processing in the transaction system and the payment system. However, when the system is verified, the information token 5012 "Trade token + instruction token" cannot be used to perform the money deduction operation directly, and the money deduction operation and the like can be performed only by acquiring the bank card number corresponding to the information token 5012 "Trade token + instruction token". At this time, the authentication system may transmit feedback information "source data of token" to the electronic device 501 through the hypertext transfer protocol 502. The "source data for the token" may include, among other things, the device identification of the verification system and the information token 5012 "Trade token + instrument token". The electronic device 501 confirms the verification system of the network transaction system 503 requesting to acquire the bank card number through the device identification included in the feedback information "source data of token", and the verification system of the network transaction system 503 is not in the white list. That is, the verification system has a certain risk of information leakage. For this purpose, the electronic device 501 processes the information 5011 "bank card number: 65245152215233 'and a preset keyword' 65245152215233 'is masked, and the security information' bank card number: "then directly send to the verification system without making mask code, obtain the target information" bank card number: 6524 ■ ■ ■ ■ ■ ■ ■ 233 ". After that, the electronic device 501 transmits the target information "bank card number: 6524 ■ ■ ■ ■ ■ ■ ■ 233 "to the authentication system in the network transaction system 503. The verification system obtains target information' bank card number: 6524 ■ ■ ■ ■ ■ ■ ■ 233 ", the card number record of the bank can be inquired via the first 4 digits 6524 and the last 3 digits 233 of the bank card number, to determine the corresponding user, and execute the deduction operation, and finally generate the order via the order generating system. Therefore, the whole process of the user online shopping is completed. The verification system can inquire the card number record of the bank on equipment for locally storing the card number record without an external network, so that the information is prevented from being leaked.
As can be seen, in the present application, after an information token is generated for a preset keyword, the information token is sent to a network device (for example, the network transaction system 503 mentioned above) instead of the preset keyword. Only when the network device needs the preset keyword to complete the data processing, the preset keyword (or the mask information corresponding to the preset keyword) is sent to the network device. Therefore, information leakage is avoided as much as possible, and the safety of the information in the network is greatly improved.
With further reference to fig. 6, as an implementation of the methods illustrated in the above figures, the present disclosure provides some embodiments of an apparatus for processing information, which correspond to those method embodiments illustrated in fig. 2, which may be particularly applicable in various electronic devices.
As shown in fig. 6, an apparatus 600 for processing information of some embodiments includes: a destination address resolving unit 601, an information detecting unit 602, an information token generating unit 603, an information transmitting unit 604, and an information processing unit 605. The target address analyzing unit 601 is configured to receive information to be processed and analyze a target address in the information to be processed; an information detection unit 602, configured to perform information detection on the information to be processed in response to that the target address of the information to be processed belongs to a preset address set; an information token generating unit 603 configured to generate and store an information token corresponding to the to-be-processed information in response to a preset keyword existing in the to-be-processed information, where the information token does not include the preset keyword; an information sending unit 604, configured to send the information token to an information processing system corresponding to the information to be processed in a specified information transmission manner, where each module in the information processing system is configured in a specific network segment; the information processing unit 605, in response to receiving the feedback information corresponding to the information token sent by the information processing system, is configured to perform information processing on the information to be processed based on the feedback information.
In an optional implementation manner of some embodiments, the information detecting unit 602 may include: an information dividing subunit (not shown), an information type querying subunit (not shown), and a preset keyword tagging subunit (not shown). Wherein the information dividing molecular unit is configured to divide the information to be processed into at least one information unit, and the information unit comprises at least one of the following items: entries, symbols, numbers; the information type inquiry subunit is configured to inquire whether each information unit in the at least one information unit belongs to a preset keyword library or not; a preset keyword tagging subunit, responsive to the existence of a target information unit belonging to the keyword library, configured to tag the target information unit as a preset keyword, the keyword library including at least one of: card number information, user name information and password information.
In an optional implementation manner of some embodiments, the information token generation unit 603 may include: a security information token subunit (not shown in the figure) and a token generation subunit (not shown in the figure). The safety information marking subunit is configured to mark information except for preset keywords in the information to be processed as safety information; and the token generating subunit is configured to generate a first information token corresponding to the preset keyword and a second information token corresponding to the security information.
In an optional implementation manner of some embodiments, the information sending unit 604 may include: and the information sending subunit (not shown in the figure) is configured to send the information token to the information processing system corresponding to the information to be processed by means of a hypertext transfer protocol.
In an optional implementation manner of some embodiments, the feedback information includes an apparatus identifier and the information token, where the apparatus identifier is used to characterize an apparatus in the information processing system, which performs data processing on the information token; and, the information processing unit 605 may include: and the first information processing subunit (not shown in the figure), in response to the device identifier being recorded in a preset white list, is configured to mark the to-be-processed information corresponding to the information token as first target information, and send the first target information to the device.
In an optional implementation manner of some embodiments, the information processing unit 605 may include: and a second information processing subunit (not shown in the figure), in response to the device identifier not being recorded in the white list, configured to convert the information to be processed into second target information, and send the second target information to the device.
In an optional implementation manner of some embodiments, the second information processing subunit may include: an information conversion module (not shown in the figure), a mask processing module (not shown in the figure), and a second target information generation module (not shown in the figure). The information conversion module is configured to convert the first information token contained in the information token into the preset keyword, and convert the second information token contained in the information token into the security information; the mask processing module is configured to perform mask processing on the preset keyword to obtain mask information; and the second target information generating module is configured to combine the mask information and the security information into second target information.
In an optional implementation manner of some embodiments, the feedback information includes a preset component identifier, where the preset component identifier is used to mark a security component or a preset component, the security component does not perform data processing on the information to be processed, and the preset component performs data processing on the information to be processed; and, the information processing unit 605 may include: a third information processing subunit (not shown in the figure), in response to the preset component being identified as a security component, configured to send the information to be processed to the security component; otherwise, the information token is sent to the preset component.
It will be understood that the units described in the apparatus 600 correspond to the various steps in the method described with reference to fig. 2. Thus, the operations, features and advantages described above for the method are also applicable to the apparatus 600 and the units included therein, and are not described herein again.
With further reference to fig. 7, as an implementation of the methods illustrated in the above figures, the present disclosure provides some embodiments of an apparatus for processing information, which correspond to those method embodiments illustrated in fig. 4, and which may be applied in particular in various electronic devices.
As shown in fig. 7, an apparatus 700 for processing information of some embodiments includes: an information token receiving unit 701, a feedback information transmitting unit 702, and a target information receiving unit 703. The information token receiving unit 701, in response to receiving the information token, is configured to perform data processing on the information token; a feedback information sending unit 702, configured to send, in response to detecting a data processing request corresponding to the information token, feedback information corresponding to the information token, where the data processing request is used to instruct data processing on to-be-processed information corresponding to the information token, and the feedback information includes a device identifier of a current device and the information token; a target information receiving unit 703 configured to receive target information corresponding to the feedback information.
In an optional implementation manner of some embodiments, the feedback information sending unit 702 may include: and a feedback information sending subunit (not shown in the figure) configured to send the feedback information by a set information transmission mode, wherein the information transmission mode comprises a hypertext transfer protocol mode.
It will be understood that the units described in the apparatus 700 correspond to the various steps in the method described with reference to fig. 4. Thus, the operations, features and advantages described above with respect to the method are also applicable to the apparatus 700 and the units included therein, and are not described herein again.
As shown in fig. 8, electronic device 800 may include a processing means (e.g., central processing unit, graphics processor, etc.) 801 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)802 or a program loaded from a storage means 808 into a Random Access Memory (RAM) 803. In the RAM803, various programs and data necessary for the operation of the electronic apparatus 800 are also stored. The processing device 801, the ROM 802, and the RAM803 are connected to each other by a bus 804. An input/output (I/O) interface 805 is also connected to bus 804.
Generally, the following devices may be connected to the I/O interface 805: input devices 806 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; output devices 807 including, for example, a Liquid Crystal Display (LCD), speakers, vibrators, and the like; storage 808 including, for example, magnetic tape, hard disk, etc.; and a communication device 809. The communication means 809 may allow the electronic device 800 to communicate wirelessly or by wire with other devices to exchange data. While fig. 8 illustrates an electronic device 800 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may be alternatively implemented or provided. Each block shown in fig. 8 may represent one device or may represent multiple devices as desired.
In particular, according to some embodiments of the present disclosure, the processes described above with reference to the flow diagrams may be implemented as computer software programs. For example, some embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer-readable medium, the computer program comprising program code for performing the method illustrated by the flow chart. In some such embodiments, the computer program may be downloaded and installed from a network through communications device 809, or installed from storage device 808, or installed from ROM 802. The computer program, when executed by the processing apparatus 801, performs the above-described functions defined in the methods of some embodiments of the present disclosure.
It should be noted that the computer readable medium described above in some embodiments of the present disclosure may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In some embodiments of the disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In some embodiments of the present disclosure, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network Protocol, such as HTTP (HyperText Transfer Protocol), and may be interconnected with any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer readable medium may be embodied in the electronic device; or may be separate and not incorporated into the electronic device. The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: receiving information to be processed, and analyzing a target address in the information to be processed; responding to the fact that the target address of the information to be processed belongs to a preset address set, and carrying out information detection on the information to be processed; responding to the information to be processed to the existence of a preset keyword, and generating and storing an information token corresponding to the information to be processed, wherein the information token does not contain the preset keyword; sending the information token to an information processing system corresponding to the information to be processed in a designated information transmission mode, wherein each module in the information processing system is configured in a specific network segment; and in response to receiving feedback information which is sent by the information processing system and corresponds to the information token, performing information processing on the information to be processed based on the feedback information.
Computer program code for carrying out operations for embodiments of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in some embodiments of the present disclosure may be implemented by software or hardware. The described units may also be provided in a processor, which may be described as: a processor includes a target address resolving unit, an information detecting unit, an information token generating unit, an information transmitting unit, and an information processing unit. Here, the names of these units do not constitute a limitation to the unit itself in some cases, and for example, an information processing unit may also be described as "a unit for processing information".
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), system on a chip (SOCs), Complex Programmable Logic Devices (CPLDs), and the like.
In accordance with one or more embodiments of the present disclosure, there is provided a method for processing information, comprising: receiving information to be processed, and analyzing a target address in the information to be processed; responding to the fact that the target address of the information to be processed belongs to a preset address set, and carrying out information detection on the information to be processed; responding to the information to be processed to the existence of a preset keyword, and generating and storing an information token corresponding to the information to be processed, wherein the information token does not contain the preset keyword; sending the information token to an information processing system corresponding to the information to be processed in a designated information transmission mode, wherein each module in the information processing system is configured in a specific network segment; and in response to receiving feedback information which is sent by the information processing system and corresponds to the information token, performing information processing on the information to be processed based on the feedback information.
According to one or more embodiments of the present disclosure, the detecting the information of the to-be-processed information includes: dividing the information to be processed into at least one information unit, wherein the information unit comprises at least one of the following items: entries, symbols, numbers; inquiring whether each information unit in the at least one information unit belongs to a preset keyword library or not; in response to the existence of a target information unit belonging to the keyword library, marking the target information unit as a preset keyword, wherein the keyword library comprises at least one of the following items: card number information, user name information and password information.
According to one or more embodiments of the present disclosure, the generating and storing an information token corresponding to the to-be-processed information includes: marking information except the preset keywords in the information to be processed as safety information; and generating a first information token corresponding to the preset keyword and a second information token corresponding to the safety information.
According to one or more embodiments of the present disclosure, the sending the information token to the information processing system corresponding to the information to be processed by a specified information transmission method includes: and sending the information token to an information processing system corresponding to the information to be processed in a hypertext transfer protocol mode.
According to one or more embodiments of the present disclosure, the feedback information includes an apparatus identifier and the information token, where the apparatus identifier is used to characterize an apparatus in the information processing system that performs data processing on the information token; and, the processing the information to be processed based on the feedback information includes: and responding to the record of the equipment identifier in a preset white list, marking the information to be processed corresponding to the information token as first target information, and sending the first target information to the equipment.
According to one or more embodiments of the present disclosure, the performing information processing on the to-be-processed information based on the feedback information includes: and in response to the fact that the equipment identifier is not recorded in the white list, converting the information to be processed into second target information, and sending the second target information to the equipment.
According to one or more embodiments of the present disclosure, the converting the to-be-processed information into the second target information includes: converting the first information token contained in the information token into the preset keyword, and converting the second information token contained in the information token into the security information; performing mask processing on the preset keywords to obtain mask information; and forming second target information by the mask information and the safety information.
According to one or more embodiments of the present disclosure, the feedback information includes a preset component identifier, the preset component identifier is used for marking a security component or a preset component, the security component does not perform data processing on the information to be processed, and the preset component performs data processing on the information to be processed; and, the processing the information to be processed based on the feedback information includes: responding to the preset component identification as a safety component, and sending the information to be processed to the safety component; otherwise, the information token is sent to the preset component
In accordance with one or more embodiments of the present disclosure, there is provided a method for processing information, comprising: responding to the received information token, and performing data processing on the information token; responding to a data processing request corresponding to the information token, and sending feedback information corresponding to the information token, wherein the data processing request is used for indicating to perform data processing on to-be-processed information corresponding to the information token, and the feedback information comprises a device identifier of current equipment and the information token; and receiving target information corresponding to the feedback information.
According to one or more embodiments of the present disclosure, the sending feedback information corresponding to the information token includes: and sending the feedback information by a set information transmission mode, wherein the information transmission mode comprises a hypertext transmission protocol mode.
According to one or more embodiments of the present disclosure, there is provided an apparatus for processing information, including: the target address analysis unit is configured to receive information to be processed and analyze a target address in the information to be processed; the information detection unit is used for responding that the target address of the information to be processed belongs to a preset address set and is configured to detect the information to be processed; an information token generating unit, configured to generate and store an information token corresponding to the information to be processed in response to a preset keyword existing in the information to be processed, wherein the information token does not include the preset keyword; the information sending unit is configured to send the information token to an information processing system corresponding to the information to be processed in a designated information transmission mode, wherein each module in the information processing system is configured in a specific network segment; and the information processing unit is used for responding to the feedback information which is sent by the information processing system and corresponds to the information token and is configured to perform information processing on the information to be processed based on the feedback information.
According to one or more embodiments of the present disclosure, the information detecting unit includes:
an information dividing subunit configured to divide the information to be processed into at least one information unit, where the information unit includes at least one of: vocabulary entry, symbol, number; the information type inquiry subunit is configured to inquire whether each information unit in the at least one information unit belongs to a preset keyword library or not; a preset keyword tagging subunit, responsive to the existence of a target information unit belonging to the keyword library, configured to tag the target information unit as a preset keyword, the keyword library including at least one of: card number information, user name information and password information.
According to one or more embodiments of the present disclosure, the information token generation unit includes: a safety information marking subunit, configured to mark information other than the preset keyword in the information to be processed as safety information; and a token generation subunit configured to generate a first information token corresponding to the preset keyword and a second information token corresponding to the security information.
According to one or more embodiments of the present disclosure, the information transmitting unit includes: and the information sending subunit is configured to send the information token to an information processing system corresponding to the information to be processed in a hypertext transfer protocol mode.
According to one or more embodiments of the present disclosure, the feedback information includes an apparatus identifier and the information token, where the apparatus identifier is used to characterize an apparatus in the information processing system that performs data processing on the information token; and, the information processing unit includes: and the first information processing subunit, in response to the recording of the device identifier in a preset white list, is configured to mark the to-be-processed information corresponding to the information token as first target information, and send the first target information to the device.
According to one or more embodiments of the present disclosure, the information processing unit includes: and the second information processing subunit is used for responding to the condition that the equipment identifier is not recorded in the white list, converting the information to be processed into second target information and sending the second target information to the equipment.
According to one or more embodiments of the present disclosure, the second information processing subunit includes: an information conversion module configured to convert the first information token included in the information token into the preset keyword, and convert the second information token included in the information token into the security information; the mask processing module is configured to perform mask processing on the preset keywords to obtain mask information; and the second target information generating module is configured to combine the mask information and the security information into second target information.
According to one or more embodiments of the present disclosure, the feedback information includes a preset component identifier, the preset component identifier is used for marking a security component or a preset component, the security component does not perform data processing on the information to be processed, and the preset component performs data processing on the information to be processed; and, the information processing unit includes: a fourth information processing subunit, configured to, in response to the preset component identifier being a security component, send the to-be-processed information to the security component; otherwise, the information token is sent to the preset component
According to one or more embodiments of the present disclosure, there is provided an apparatus for processing information, including: an information token receiving unit configured to perform data processing on the information token in response to receiving the information token; a feedback information sending unit, configured to send feedback information corresponding to the information token in response to detecting a data processing request corresponding to the information token, where the data processing request is used to instruct data processing on to-be-processed information corresponding to the information token, and the feedback information includes a device identifier of a current device and the information token; and a target information receiving unit configured to receive target information corresponding to the feedback information.
According to one or more embodiments of the present disclosure, the feedback information transmitting unit includes: and the feedback information sending subunit is configured to send the feedback information through a set information transmission mode, wherein the information transmission mode comprises a hypertext transfer protocol mode.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention in the embodiments of the present disclosure is not limited to the specific combination of the above-mentioned features, but also encompasses other embodiments in which any combination of the above-mentioned features or their equivalents is made without departing from the inventive concept as defined above. For example, the above features and (but not limited to) technical features with similar functions disclosed in the embodiments of the present disclosure are mutually replaced to form the technical solution.

Claims (11)

1. A method for processing information, comprising:
receiving information to be processed and analyzing a target address in the information to be processed;
responding to that the target address of the information to be processed belongs to a preset address set, and performing information detection on the information to be processed;
Responding to the existence of a preset keyword in the information to be processed, marking information except the preset keyword in the information to be processed as safety information, generating a first information token corresponding to the preset keyword and a second information token corresponding to the safety information, and storing the first information token and the second information token, wherein the first information token and the second information token do not contain the preset keyword;
sending the first information token and the second information token to an information processing system corresponding to the information to be processed in a designated information transmission mode, wherein each module in the information processing system is configured in a network segment with information leakage risk;
responding to receiving feedback information sent by the information processing system and corresponding to the first information token and the second information token, wherein the feedback information comprises a device identifier, the first information token and the second information token, the device identifier is used for representing a device in the information processing system for performing data processing on the first information token and the second information token, and responding to the fact that the device identifier is not recorded in a preset white list, converting the first information token into the preset keyword, and converting the second information token into the safety information; performing mask processing on the preset keywords to obtain mask information; and forming second target information by the mask information and the safety information, and sending the second target information to the equipment.
2. The method of claim 1, wherein the information detecting the information to be processed comprises:
dividing the information to be processed into at least one information unit, wherein the information unit comprises at least one of the following items: vocabulary entry, symbol, number;
inquiring whether each information unit in the at least one information unit belongs to a preset keyword library or not;
in response to the existence of a target information unit belonging to the keyword library, marking the target information unit as a preset keyword, wherein the keyword library comprises at least one of the following items: card number information, user name information and password information.
3. The method of claim 1, wherein the sending the first information token and the second information token to an information processing system corresponding to the information to be processed by a specified information transmission manner comprises:
and sending the first information token and the second information token to an information processing system corresponding to the information to be processed in a hypertext transfer protocol mode.
4. The method of claim 1, further comprising:
and responding to the record of the equipment identifier in a preset white list, marking the information to be processed corresponding to the first information token and the second information token as first target information, and sending the first target information to the equipment.
5. The method of claim 1, wherein the feedback information comprises a preset component identification, the preset component identification used to mark a security component or a preset component; and
the method further comprises the following steps:
and responding to the preset component identification as a safety component, and sending the information to be processed to the safety component.
6. The method of claim 1, wherein the method further comprises:
in response to receiving a first information token and a second information token, performing data processing on the first information token and the second information token;
responding to a data processing request corresponding to the first information token and the second information token, and sending feedback information corresponding to the first information token and the second information token, wherein the data processing request is used for indicating to perform data processing on information to be processed corresponding to the first information token and the second information token, and the feedback information comprises a device identifier of current equipment and the first information token and the second information token;
and receiving target information corresponding to the feedback information.
7. The method of claim 6, wherein the sending feedback information corresponding to the first and second information tokens comprises:
And sending feedback information through a set information transmission mode, wherein the information transmission mode comprises a hypertext transfer protocol mode.
8. An apparatus for processing information, comprising:
the target address analysis unit is configured to receive information to be processed and analyze a target address in the information to be processed;
the information detection unit is used for responding to that the target address of the information to be processed belongs to a preset address set and is configured to detect the information to be processed;
the information token generating unit is used for responding to the existence of a preset keyword in the information to be processed, marking the information except the preset keyword in the information to be processed as safety information, generating a first information token corresponding to the preset keyword and a second information token corresponding to the safety information, and storing the first information token and the second information token, wherein the first information token and the second information token do not contain the preset keyword;
the information sending unit is configured to send the first information token and the second information token to an information processing system corresponding to the information to be processed in a designated information transmission mode, wherein each module in the information processing system is configured in a network segment with information leakage risk;
An information processing unit, configured to, in response to receiving feedback information corresponding to the first information token and the second information token sent by the information processing system, convert the first information token into the preset keyword and convert the second information token into the security information in response to the device identifier not being recorded in a preset white list, where the feedback information includes a device identifier, the first information token and the second information token, and the device identifier is used to characterize a device in the information processing system that performs data processing on the first information token and the second information token; carrying out mask processing on the preset keyword to obtain mask information; and forming second target information by the mask information and the safety information, and sending the second target information to the equipment.
9. The apparatus of claim 8, comprising:
an information token receiving unit configured to perform data processing on a first information token and a second information token in response to receiving the first information token and the second information token;
a feedback information sending unit, configured to send feedback information corresponding to the first information token and the second information token in response to detecting a data processing request corresponding to the first information token and the second information token, where the data processing request is used to instruct data processing on to-be-processed information corresponding to the first information token and the second information token, and the feedback information includes a device identifier of a current device and the first information token and the second information token;
A target information receiving unit configured to receive target information corresponding to the feedback information.
10. An electronic device, comprising:
one or more processors;
a storage device having one or more programs stored thereon,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1 to 5 or the method of any one of claims 6 to 7.
11. A computer readable medium having a computer program stored thereon, wherein the program when executed by a processor implements the method of any of claims 1 to 5 or the method of any of claims 6 to 7.
CN202011246848.4A 2020-11-10 2020-11-10 Method, apparatus, electronic device, and computer-readable medium for processing information Active CN112437052B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011246848.4A CN112437052B (en) 2020-11-10 2020-11-10 Method, apparatus, electronic device, and computer-readable medium for processing information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011246848.4A CN112437052B (en) 2020-11-10 2020-11-10 Method, apparatus, electronic device, and computer-readable medium for processing information

Publications (2)

Publication Number Publication Date
CN112437052A CN112437052A (en) 2021-03-02
CN112437052B true CN112437052B (en) 2022-06-28

Family

ID=74700754

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011246848.4A Active CN112437052B (en) 2020-11-10 2020-11-10 Method, apparatus, electronic device, and computer-readable medium for processing information

Country Status (1)

Country Link
CN (1) CN112437052B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105141623A (en) * 2015-09-16 2015-12-09 宇龙计算机通信科技(深圳)有限公司 Control method of electronic account, control system and mobile terminal
CN110503455A (en) * 2019-07-10 2019-11-26 平安普惠企业管理有限公司 Product promotion method and relevant device based on information security
CN110662184A (en) * 2019-08-15 2020-01-07 中国平安财产保险股份有限公司 Information pushing method and device, computer equipment and storage medium
EP3691215A1 (en) * 2017-10-23 2020-08-05 Huawei Technologies Co., Ltd. Access token management method, terminal and server

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3204904A1 (en) * 2014-10-06 2017-08-16 Emo Oil Ltd Apparatus, system and method of inhibiting fraudulent payment card transactions
GB2570825A (en) * 2016-11-07 2019-08-07 Walmart Apollo Llc Reducing cybersecurity risks when purchasing products over a network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105141623A (en) * 2015-09-16 2015-12-09 宇龙计算机通信科技(深圳)有限公司 Control method of electronic account, control system and mobile terminal
EP3691215A1 (en) * 2017-10-23 2020-08-05 Huawei Technologies Co., Ltd. Access token management method, terminal and server
CN110503455A (en) * 2019-07-10 2019-11-26 平安普惠企业管理有限公司 Product promotion method and relevant device based on information security
CN110662184A (en) * 2019-08-15 2020-01-07 中国平安财产保险股份有限公司 Information pushing method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN112437052A (en) 2021-03-02

Similar Documents

Publication Publication Date Title
US10581818B2 (en) Differential client-side encryption of information originating from a client
CN112333198B (en) Secure cross-domain login method, system and server
CN111062024B (en) Application login method and device
CN107248984B (en) Data exchange system, method and device
CN111199037B (en) Login method, system and device
CN108923925B (en) Data storage method and device applied to block chain
WO2023241060A1 (en) Data access method and apparatus
CN111259409A (en) Information encryption method and device, electronic equipment and storage medium
CN114826733B (en) File transmission method, device, system, equipment, medium and program product
CN114584381A (en) Security authentication method and device based on gateway, electronic equipment and storage medium
CN110545542A (en) Main control key downloading method and device based on asymmetric encryption algorithm and computer equipment
CN112329044A (en) Information acquisition method and device, electronic equipment and computer readable medium
CN115529130B (en) Data processing method, terminal, server, system, device, medium and product
CN112437052B (en) Method, apparatus, electronic device, and computer-readable medium for processing information
CN114499893B (en) Bidding file encryption and evidence storage method and system based on block chain
CN114186994A (en) Method, terminal and system for using digital currency wallet application
CN113761566A (en) Data processing method and device
CN110659476A (en) Method and apparatus for resetting password
CN114785560B (en) Information processing method, device, equipment and medium
CN113783835B (en) Password sharing method, device, equipment and storage medium
CN112559825B (en) Service processing method, device, computing equipment and medium
CN110781523B (en) Method and apparatus for processing information
CN113301058B (en) Information encryption transmission method and device, electronic equipment and computer readable medium
CN114428973A (en) De-identified information transmission method, device, equipment and computer readable medium
CN116720201A (en) Method, device and computer medium for encrypting and analyzing data at supply end

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Patentee after: Tiktok vision (Beijing) Co.,Ltd.

Address before: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Patentee before: BEIJING BYTEDANCE NETWORK TECHNOLOGY Co.,Ltd.

Address after: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Patentee after: Douyin Vision Co.,Ltd.

Address before: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Patentee before: Tiktok vision (Beijing) Co.,Ltd.