CN115186290A - Data processing method and device, electronic equipment and storage medium - Google Patents

Data processing method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN115186290A
CN115186290A CN202210698292.5A CN202210698292A CN115186290A CN 115186290 A CN115186290 A CN 115186290A CN 202210698292 A CN202210698292 A CN 202210698292A CN 115186290 A CN115186290 A CN 115186290A
Authority
CN
China
Prior art keywords
character string
identification code
user information
target identification
generating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210698292.5A
Other languages
Chinese (zh)
Inventor
徐锐
王健
马单
孙鹏
刘通
吴保青
钟志杰
孙建
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202210698292.5A priority Critical patent/CN115186290A/en
Publication of CN115186290A publication Critical patent/CN115186290A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/12Use of codes for handling textual entities
    • G06F40/151Transformation

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Medical Informatics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Artificial Intelligence (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention provides a data processing method and device, electronic equipment and a storage medium; the method comprises the following steps: when a generation request including first user information for generating an identification code is received, a first character string having a correspondence relationship with the first user information may be generated first; then desensitizing the first character string to generate a second character string; and compacting the second character string to generate and return a first target identification code corresponding to the first user information. By the embodiment of the invention, the generated identification code for marking the user can not leak the information of the user and can be easily remembered by the user.

Description

Data processing method and device, electronic equipment and storage medium
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a data processing method and apparatus, an electronic device, and a storage medium.
Background
In order to distinguish different users, the service side can mark the users with unique identifications.
When marking, the marking can be performed by using information designated by a user as a unique identifier; for example: user information such as user name, mobile phone number, mailbox and the like. The service side can also automatically generate character strings for marking.
When the information specified by the user is used as the unique identifier for marking, the user information can be leaked, and if the character string generated by the service side is used for marking, the generated character string is too long, so that the user can not remember the information easily; therefore, there is a need for a method that can generate a user unique identification that is both secure and easily remembered by the user.
Disclosure of Invention
In view of the above problems, it is proposed to provide a data processing method and apparatus, an electronic device and a storage medium that overcome or at least partially solve the above problems, including:
a method for processing data, the method comprising:
receiving a generation request for generating an identification code; the generation request comprises first user information;
generating a first character string corresponding to the first user information;
desensitizing the first character string to generate a second character string;
and compacting the second character string, and generating and returning a first target identification code corresponding to the first user information.
Optionally, the desensitizing the first character string includes:
processing the first character string by adopting a preset desensitization algorithm;
wherein the preset desensitization algorithm comprises at least one of: a roll-over desensitization algorithm, an exclusive-or desensitization algorithm, a hashed desensitization algorithm.
Optionally, the second character string is a first system character string; the compacting the second character string includes:
converting the second character string into a second binary character string;
wherein the second level is higher than the first level.
Optionally, the method further comprises:
receiving an acquisition request for acquiring user information; the acquisition request comprises a second target identification code;
the second target identification code is expanded to generate a third character string;
performing anti-desensitization treatment on the third character string to generate a fourth character string;
and determining and returning second user information corresponding to the fourth character string.
Optionally, the expanding the second target identification code is performed by using a second target identification code as a second binary character string, and the expanding the second target identification code includes:
and converting the second target identification code into a first system character string.
An embodiment of the present invention further provides a data processing apparatus, where the apparatus includes:
a receiving module, configured to receive a generation request for generating an identification code; the generation request comprises first user information;
the first generating module is used for generating a first character string which has a corresponding relation with the first user information;
the second generation module is used for carrying out desensitization processing on the first character string to generate a second character string;
and the third generating module is used for compacting the second character string and generating and returning a first target identification code corresponding to the first user information.
Optionally, the second generating module includes:
the desensitization processing sub-module is used for processing the first character string by adopting a preset desensitization algorithm; wherein the preset desensitization algorithm comprises at least one of: a rolling desensitization algorithm, an exclusive-or desensitization algorithm, a hashed desensitization algorithm.
Optionally, the second character string is a first system character string; a third generation module comprising:
the first system conversion submodule is used for converting the second character string into a second system character string; wherein the second level is higher than the first level.
Optionally, the apparatus further comprises:
the identification module is used for receiving an acquisition request for acquiring user information; the acquisition request comprises a second target identification code; the second target identification code is expanded to generate a third character string; performing anti-desensitization treatment on the third character string to generate a fourth character string; and determining and returning second user information corresponding to the fourth character string.
Optionally, the second target identification code is a second binary character string, and the identification module includes:
and the second system conversion submodule is used for converting the second target identification code into a first system character string.
An embodiment of the present invention further provides an electronic device, which includes a processor, a memory, and a computer program stored on the memory and capable of running on the processor, and when the computer program is executed by the processor, the electronic device implements the data processing method according to any one of the above.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements the data processing method according to any one of the above.
The embodiment of the invention has the following advantages:
in the embodiment of the invention, when a generation request including first user information for generating an identification code is received, a first character string corresponding to the first user information can be generated firstly; then desensitizing the first character string to generate a second character string; and compacting the second character string to generate and return a first target identification code corresponding to the first user information. By the embodiment of the invention, the generated identification code for marking the user can not leak the information of the user and can be easily remembered by the user.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings needed to be used in the description of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
FIG. 1 is a flow chart of the steps of a method of processing data in accordance with an embodiment of the present invention;
FIG. 2 is a flow chart of steps of another method of processing data in accordance with an embodiment of the present invention;
FIG. 3 is a schematic flow chart diagram of a generation process of an embodiment of the present invention;
FIG. 4 is a flow chart of steps of a method of processing data according to an embodiment of the present invention;
FIG. 5 is a schematic flow chart diagram of an identification process of an embodiment of the present invention;
fig. 6 is a block diagram of a data processing apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention more comprehensible, the present invention is described in detail with reference to the accompanying drawings and the detailed description thereof. It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, a flowchart illustrating steps of a data processing method according to an embodiment of the present invention may include the following steps:
step 101, receiving a generation request for generating an identification code; the generation request includes first user information.
Wherein the first user information may include at least one of: mobile phone number, user name, mailbox.
When an identification code for uniquely identifying a user needs to be generated, a generation request for generating the identification code can be sent to a service side; the generation request may include first user information, for example: the mobile phone number of the user, the user defined user name of the user, the mailbox of the user and the like.
Specifically, the user may execute a user operation at the user side to generate a generation request including the first user information at the user side; then, another user operation may be performed to send the generation request to the service side.
And 102, generating a first character string which has a corresponding relation with the first user information.
After receiving the generation request, the service side may extract first user information from the generation request; then, generating a first character string which has a unique corresponding relation with the first user information; the first character string may include various characters, such as: letters, numbers, symbols, etc., as embodiments of the present invention are not limited in this respect.
In practical application, in order to adapt to the number of users which may be increased continuously, a longer first character string can be generated; the specific length may be set according to an actual usage scenario, which is not limited in the embodiment of the present invention.
After the first character string having the unique corresponding relationship with the first user information is generated, the corresponding relationship between the first user information and the first character string may be saved at the service side, so that the first user information corresponding to the first character string may be acquired based on the corresponding relationship.
And 103, desensitizing the first character string to generate a second character string.
In practical applications, the first character string is generated based on the first user information, which may further include the user information; in order to avoid leakage of user information, desensitization processing may be performed on the first character string to generate a second character string not containing the first user information.
And 104, compacting the second character string, and generating and returning a first target identification code corresponding to the first user information.
The first target identification code and the first user information have a unique corresponding relationship, and the first target identification code can be used for marking a user corresponding to the first user information.
Although the obtained second character string does not contain user information, the length of the obtained second character string may be too long for uniqueness, and further, the user needs to invest more memory cost.
Therefore, in order to reduce the cost for the user to memorize, the embodiment of the invention can perform the compacting process on the second character string after obtaining the second character string, so as to reduce the length of the character string, thereby obtaining the safe and compact first target identification code.
After the service side generates the first target identification code, the corresponding relation between the first target identification code and the first user information can be stored; meanwhile, the first target identification code can be sent back to the user side, so that the user side can obtain the first target identification code by sending the first target identification code to the service side when the user side needs to obtain the first user information.
It should be noted that, in the present invention, the first target identification code may be generated by the service side, or may be generated by a device deployed at the user side; for the sake of brief description, the above embodiment is mainly described from the perspective of generating the first target identifier by the service side, and the process of generating the first target identifier by other sides is similar to the above embodiment and is not described herein again.
In the embodiment of the invention, when a generation request including first user information for generating an identification code is received, a first character string corresponding to the first user information can be generated firstly; then desensitizing the first character string to generate a second character string; and compacting the second character string to generate and return a first target identification code corresponding to the first user information. By the embodiment of the invention, the generated identification code for marking the user can not leak the information of the user and can be easily remembered by the user.
Referring to fig. 2, a flow chart illustrating steps of another data processing method according to an embodiment of the present invention may include the following steps:
step 201, receiving a generation request for generating an identification code.
In practical application, when a user side needs to perform uniqueness marking on a user, the user side can generate a generation request based on first user information; then, the user side may send the generation request to the service side.
If the first target identification code is generated by a device deployed at the user side, the generation request may be sent to the device, which is not limited in this embodiment of the present invention.
As an example, the identification code may be used by the merchant to mark the customer, or may be used by the user to log in to a platform, an application program, and the like, which is not limited in this embodiment of the present invention.
Step 202, generating a first character string having a corresponding relation with the first user information.
In practical applications, a generator may be deployed in the service side for generating a corresponding identification code according to a generation request.
After receiving the generation request, a generator in the service side may extract first user information from the generation request; then, a first character string having a unique correspondence with the first user information is generated.
In practical application, in order to adapt to the number of users which may be increased continuously, the generator can generate a longer first character string; the specific length may be set according to an actual usage scenario, which is not limited in the embodiment of the present invention.
After generating the first character string having a unique correspondence with the first user information, the correspondence between the first user information and the first character string may be saved in the generator, so that the first user information corresponding to the first character string may be subsequently obtained based on the correspondence.
And 203, processing the first character string by adopting a preset desensitization algorithm to generate a second character string.
As an example, the preset desensitization algorithm may include at least one of: a rolling desensitization algorithm, an exclusive-or desensitization algorithm, a hashed desensitization algorithm.
The reversed desensitization algorithm may refer to an algorithm for desensitization by means of reversal.
The desensitization algorithm of exclusive or may refer to an algorithm that performs desensitization based on the mathematical operator [ ].
A hashed desensitization algorithm may refer to a manner in which the positions of characters in a string are scattered and rearranged to perform desensitization.
In practical applications, in order to avoid leakage of the user information, a preset desensitization algorithm may be adopted to perform desensitization processing on the first character string to generate a second character string that does not include the first user information.
It should be noted that the service side may perform desensitization processing or perform inverse desensitization processing of the desensitization processing, that is, inverse desensitization processing, to restore the second character string to the first character string, which is not limited in this embodiment of the present invention.
In practical application, which desensitization algorithm is specifically selected can be set according to the use scene and the characteristics of an application platform; the preset desensitization algorithm can be a reversible algorithm or an irreversible algorithm; whether reversible or irreversible algorithms are used, the service side always has the capability of bidirectional conversion.
And step 204, the second character string is a first system character string, the second character string is converted into a second system character string, and a first target identification code corresponding to the first user information is generated and returned.
Wherein the second level is higher than the first level, for example: the first system is decimal, and the second system is hexadecimal, which is not limited in the embodiments of the present invention.
In practical applications, after the second character string is generated, the second character string may be subjected to binary conversion, so as to obtain a character string with a smaller number of bits.
Specifically, the first binary second character string may be converted into the second binary first target identification code according to a binary conversion rule; for example, the first decimal system, the second hexadecimal system, and the second character string 100000000; the second character string may be converted into the first target identification code 5f5e100 according to a conversion rule of decimal and hexadecimal.
Of course, in order to obtain a more compact identification code, a better second binary may be set, for example, the first binary is decimal, and the second binary is sixty-four, which is not limited by the embodiment of the present invention.
FIG. 3 is a schematic flow chart of a generation process:
s11: a generation request is sent.
Wherein, the initiator can select user information specified by the user, such as: a mobile phone number, a user name, a mailbox, and the like generate a generation request, and the generation request is sent to a generator deployed in the service side.
S12: a service-side unique GI (Global Identifier) is generated for the user information included in the generation request.
The generator may generate a GI (i.e., a first character string) having a unique correspondence relationship with the first user information based on the first user information included in the generation request.
S13: desensitize GI, generate DGI (Decompressed Global Identifier).
Where the generator may desensitize the GI to obtain the DGI (i.e., the second string).
S14: the DGI is compacted to generate a CDGI (Compact Decompressed Global Identifier).
Wherein, the generator can compact the DGI to obtain the CDGI (i.e. the first target identification code).
S15: and returning to the CDGI.
The generator may return the CDGI to the initiator after generating the CDGI.
In the embodiment of the invention, when a generation request including first user information for generating an identification code is received, a first character string corresponding to the first user information can be generated firstly; then, processing the first character string by adopting a preset desensitization algorithm to generate a second character string; and then converting the second character string of the first system into a character string of a higher second system to generate and return a first target identification code corresponding to the first user information. By the embodiment of the invention, the generated identification code for marking the user can not leak the information of the user and can be easily remembered by the user.
In practical application, when the user information needs to be used, the initiator can send an acquisition request for acquiring the user information to the service side; the acquisition request may include a second target identification code; based on the decoding of the second target identification code, corresponding second user information may be obtained.
Specifically, referring to fig. 4, a flowchart illustrating steps of another data processing method according to an embodiment of the present invention is shown, where the method includes the following steps:
step 401, receiving an acquisition request for acquiring user information; the acquisition request includes the second object identification code.
When the user side needs to use the user information of a user, an acquisition request for acquiring the user information can be generated on the basis of a second target identification code corresponding to the user; the obtaining request may include a second target identification code corresponding to the user.
After generating the obtaining request, the user side may send the obtaining request to the service side, so as to obtain corresponding user information based on the obtaining request including the second target identification code.
And step 402, expanding the second target identification code to generate a third character string.
Among them, the expansion processing may be the reverse of the compaction processing.
After receiving the second target identification code, the service side may perform display processing on the second target identification code to generate a third character.
As an example, the second target identification code may be a binary character string, and when performing the expansion processing on the second target identification code, the method may be implemented by:
and converting the second target identification code into a first-system character string.
In practical applications, after the second target identification code is obtained, the second target identification code in the second system may be subjected to system conversion to obtain the third character string in the first system.
And 403, performing anti-desensitization treatment on the third character string to generate a fourth character string.
After the third character string of the first system is obtained, the third character string may be subjected to inverse desensitization processing, that is, inverse desensitization processing is performed on the third character string to obtain a fourth character string.
Wherein, the fourth character string and the third character string can be in desensitization relation; namely, after desensitization treatment is carried out on the fourth character string, a third character string can be obtained; after the third character string is subjected to anti-desensitization treatment, a fourth character string can be obtained.
And step 404, determining and returning second user information corresponding to the fourth character string.
After the fourth character string is obtained, second user information corresponding to the fourth character string may be determined based on a correspondence between the stored user information and the character string.
After determining the second user information, the service side may return the second user information to the initiator; so that the initiator can use the received second user information.
FIG. 5 is a schematic flow chart of an identification process:
s21: the initiator initiates an acquisition request to the generator using the CDGI.
The initiator may send an acquisition request to the generator based on the CDGI (i.e., the second target identification code) to acquire the user information.
S22: and carrying out expansion processing on the CDGI to obtain DGI.
The generator on the service side may perform exposure processing on the CDGI to generate a DGI (i.e., a third string) after receiving the acquisition request.
S23: the CDGI is subjected to desensitization treatment to obtain GI.
After obtaining the CDGI of the first scale, the generator may perform inverse desensitization processing on the CDGI, that is, perform inverse desensitization processing on the CDGI to obtain the GI (i.e., the fourth string).
S24: and returning the user information.
After the GI is obtained, second user information corresponding to the GI may be determined based on a correspondence between the stored user information and the character string, and returned to the originator.
In the embodiment of the invention, when an acquisition request including a second target identification code for acquiring user information is received, the second target identification code can be expanded to generate a third character string; then carrying out anti-desensitization treatment on the third character string to generate a fourth character string; and determining and returning second user information corresponding to the fourth character string. By the embodiment of the invention, the user information can be acquired based on the safe and compact identification code, so that the cost required for remembering the identification code is reduced, and the user information cannot be leaked.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the illustrated order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments of the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
Referring to fig. 6, a schematic structural diagram of a data processing apparatus according to an embodiment of the present invention is shown, which may include the following modules:
a receiving module 601, configured to receive a generation request for generating an identification code; generating a request including first user information;
a first generating module 602, configured to generate a first character string having a correspondence relationship with first user information;
a second generating module 603, configured to perform desensitization processing on the first character string to generate a second character string;
a third generating module 604, configured to perform compaction processing on the second character string, and generate and return a first target identification code corresponding to the first user information.
In an optional embodiment of the present invention, the second generating module 603 includes:
the desensitization processing submodule is used for processing the first character string by adopting a preset desensitization algorithm; wherein the preset desensitization algorithm comprises at least one of: a rolling desensitization algorithm, an exclusive-or desensitization algorithm, a hashed desensitization algorithm.
In an optional embodiment of the present invention, the second character string is a first binary character string; a third generating module 604 comprising:
the first system conversion submodule is used for converting the second character string into a second system character string; wherein the second level is higher than the first level.
In an optional embodiment of the invention, the apparatus further comprises:
the identification module is used for receiving an acquisition request for acquiring user information; the acquisition request comprises a second target identification code; the second target identification code is expanded to generate a third character string; performing anti-desensitization treatment on the third character string to generate a fourth character string; and determining and returning second user information corresponding to the fourth character string.
In an optional embodiment of the present invention, the second target identification code is a second binary character string, and the identification module includes:
and the second system conversion submodule is used for converting the second target identification code into the character string of the first system.
In the embodiment of the invention, when a generation request including first user information for generating an identification code is received, a first character string corresponding to the first user information can be generated firstly; then desensitizing the first character string to generate a second character string; and compacting the second character string to generate and return a first target identification code corresponding to the first user information. By the embodiment of the invention, the generated identification code for marking the user can not leak the information of the user and can be easily remembered by the user.
An embodiment of the present invention further provides an electronic device, which may include a processor, a memory, and a computer program stored in the memory and capable of running on the processor, where the computer program, when executed by the processor, implements the data processing method described in any one of the above.
The embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the method for processing data as described in any one of the above is implemented.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all changes and modifications that fall within the true scope of the embodiments of the present invention.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, method, article, or terminal apparatus that comprises the element.
The foregoing detailed description has provided a data processing method and apparatus, an electronic device, and a storage medium, and the principles and embodiments of the present invention have been described herein using specific examples, which are merely provided to help understand the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A method of processing data, the method comprising:
receiving a generation request for generating an identification code; the generation request comprises first user information;
generating a first character string corresponding to the first user information;
desensitizing the first character string to generate a second character string;
and compacting the second character string, and generating and returning a first target identification code corresponding to the first user information.
2. The method of claim 1, wherein desensitizing the first string comprises:
processing the first character string by adopting a preset desensitization algorithm;
wherein the preset desensitization algorithm comprises at least one of: a rolling desensitization algorithm, an exclusive-or desensitization algorithm, a hashed desensitization algorithm.
3. The method of claim 1, wherein the second string is a first-order string; the compacting the second character string includes:
converting the second character string into a second binary character string;
wherein the second level is higher than the first level.
4. The method according to any one of claims 1-3, further comprising:
receiving an acquisition request for acquiring user information; the acquisition request comprises a second target identification code;
the second target identification code is expanded to generate a third character string;
performing anti-desensitization treatment on the third character string to generate a fourth character string;
and determining and returning second user information corresponding to the fourth character string.
5. The method of claim 4, wherein the second target identification code is a binary character string, and the expanding the second target identification code comprises:
and converting the second target identification code into a first system character string.
6. An apparatus for processing data, the apparatus comprising:
a receiving module, configured to receive a generation request for generating an identification code; the generation request comprises first user information;
the first generating module is used for generating a first character string which has a corresponding relation with the first user information;
the second generation module is used for carrying out desensitization treatment on the first character string to generate a second character string;
and the third generating module is used for compacting the second character string and generating and returning a first target identification code corresponding to the first user information.
7. The apparatus of claim 6, wherein the second generating module comprises:
the desensitization processing sub-module is used for processing the first character string by adopting a preset desensitization algorithm; wherein the preset desensitization algorithm comprises at least one of: a rolling desensitization algorithm, an exclusive-or desensitization algorithm, a hashed desensitization algorithm.
8. The apparatus of claim 6, wherein the second string is a first-order string; a third generation module comprising:
the first system conversion submodule is used for converting the second character string into a second system character string; wherein the second level is higher than the first level.
9. An electronic device, comprising a processor, a memory and a computer program stored on the memory and capable of running on the processor, the computer program, when executed by the processor, implementing a method of processing data according to any one of claims 1 to 5.
10. A computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, implements a method of processing data according to any one of claims 1 to 5.
CN202210698292.5A 2022-06-20 2022-06-20 Data processing method and device, electronic equipment and storage medium Pending CN115186290A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210698292.5A CN115186290A (en) 2022-06-20 2022-06-20 Data processing method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210698292.5A CN115186290A (en) 2022-06-20 2022-06-20 Data processing method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115186290A true CN115186290A (en) 2022-10-14

Family

ID=83514047

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210698292.5A Pending CN115186290A (en) 2022-06-20 2022-06-20 Data processing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115186290A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115688184A (en) * 2022-12-26 2023-02-03 平安银行股份有限公司 Log desensitization method and device, electronic equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115688184A (en) * 2022-12-26 2023-02-03 平安银行股份有限公司 Log desensitization method and device, electronic equipment and storage medium
CN115688184B (en) * 2022-12-26 2023-03-31 平安银行股份有限公司 Log desensitization method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US20060143190A1 (en) Handling of digital silence in audio fingerprinting
CN104980278B (en) The method and apparatus for verifying the availability of biometric image
CN104919754A (en) Tampering detection device, tampering detection method, and program
US9172530B2 (en) Apparatus and method for generating secret key for ID-based encryption system and recording medium having program recorded thereon for causing computer to execute the method
CN110489466B (en) Method and device for generating invitation code, terminal equipment and storage medium
CN115186290A (en) Data processing method and device, electronic equipment and storage medium
CN110147410B (en) Data verification method, system, device and equipment in block chain type account book
CN113438134B (en) Request message processing method, device, server and medium
CN114285575B (en) Image encryption and decryption method and device, storage medium and electronic device
CN110362568B (en) Compression method, device and equipment for block chain type account book
CN111209577B (en) Method and device for adding watermark data, storage medium and electronic equipment
CN112668016A (en) Model training method and device and electronic equipment
US9900146B2 (en) Encrypted text matching system, method, and computer readable medium
CN107301017B (en) Data storage method and device
CN112084523A (en) Text encryption method and device, terminal equipment and storage medium
CN116961925B (en) Signature method, signature system, electronic equipment and storage medium
CN110941745A (en) Electronic contract management method and device, storage medium and electronic equipment
CN103124438B (en) A kind of generation method of random access guiding and device
CN111259449A (en) Processing method of private data, cleaner and cloud storage system
CN114979996B (en) Business card generation method and device based on SIM card and electronic equipment
CN112989365B (en) Data processing method, device, equipment and storage medium
CN110694269B (en) Script file loading method and device, electronic equipment and storage medium
JPWO2015008605A1 (en) Calculation device, calculation method, and program
CN116318738B (en) Signature method, signature system, electronic equipment and storage medium
CN115827785B (en) Data storage method, device, equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination