CN115567595A - Information processing method, information processing device, computer equipment and storage medium - Google Patents

Information processing method, information processing device, computer equipment and storage medium Download PDF

Info

Publication number
CN115567595A
CN115567595A CN202211164087.7A CN202211164087A CN115567595A CN 115567595 A CN115567595 A CN 115567595A CN 202211164087 A CN202211164087 A CN 202211164087A CN 115567595 A CN115567595 A CN 115567595A
Authority
CN
China
Prior art keywords
information
target
service
auditing
micro
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211164087.7A
Other languages
Chinese (zh)
Inventor
王豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Property and Casualty Insurance Company of China Ltd
Original Assignee
Ping An Property and Casualty Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Property and Casualty Insurance Company of China Ltd filed Critical Ping An Property and Casualty Insurance Company of China Ltd
Priority to CN202211164087.7A priority Critical patent/CN115567595A/en
Publication of CN115567595A publication Critical patent/CN115567595A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 

Abstract

The application relates to the field of operation and maintenance process optimization, solves the problem that the auditing modes are not uniform in the prior art, and can effectively improve the efficiency of information auditing. To an information processing method, apparatus, computer device and storage medium, the method comprising: when initial information to be processed is received, acquiring a pre-configured parameter file; determining whether the initial information needs to be filtered according to the interface parameters, and determining a target service micro service and a target auditing micro service corresponding to the initial information according to the micro service parameters when the initial information needs to be filtered; sending the initial information to a target business micro-service, and calling the target audit micro-service to audit the initial information based on the audit parameters to obtain a first audit result; and when the first audit result has sensitive information, informing the target service micro service to perform desensitization processing on the received initial information. In addition, the present application also relates to a blockchain technique, and the parameter file can be stored in the blockchain.

Description

Information processing method, information processing device, computer equipment and storage medium
Technical Field
The present application relates to the field of operation and maintenance process optimization, and in particular, to an information processing method, an information processing apparatus, a computer device, and a storage medium.
Background
In the development process of the application program in the client, for regulatory reasons, the information platform may audit User Generated Content (UGC), for example, the information platform for finance, medical treatment, etc. needs to audit the User Generated Content. However, if the user-generated contents generated by the client, such as posts, comments, nicknames, avatars and the like, are huge in quantity, it is difficult to perform manually, and thus, the application programs need to access the auditing service of sensitive words and sensitive pictures.
However, in the microservice system, each microservice may involve auditing information, and the auditing content and the auditing mode of each microservice are different inevitably. If the hardware coding is realized by developers, the hardware coding is inconvenient to manage due to different realization modes, so that serious waste exists in resources and efficiency, the efficiency of interface calling is influenced, and the efficiency of information auditing is greatly reduced.
Therefore, how to improve the efficiency of information auditing becomes an urgent problem to be solved.
Disclosure of Invention
The application provides an information processing method, an information processing device, computer equipment and a storage medium, unified auditing of information is achieved according to interface parameters, micro-service parameters and auditing parameters in a parameter file, the problem that auditing modes are not unified in the prior art is solved, and efficiency of information auditing can be effectively improved.
In a first aspect, the present application provides an information processing method, including:
when initial information to be processed is received, acquiring a pre-configured parameter file, wherein the parameter file comprises an interface parameter, a micro-service parameter and an auditing parameter;
determining whether the initial information needs to be filtered according to the interface parameters, and determining a target service micro-service and a target auditing micro-service corresponding to the initial information according to the micro-service parameters when the initial information needs to be filtered;
sending the initial information to the target business micro-service, and calling the target auditing micro-service to audit the initial information based on the auditing parameters to obtain a first auditing result;
and when the first examination result has sensitive information, informing the target service microservice to perform desensitization processing on the received initial information.
In a second aspect, the present application further provides an information processing apparatus, including:
the parameter file acquisition module is used for acquiring a preset parameter file when initial information to be processed is received, wherein the parameter file comprises interface parameters, micro-service parameters and auditing parameters;
the micro-service determining module is used for determining whether the initial information needs to be filtered according to the interface parameters, and determining a target business micro-service and a target auditing micro-service corresponding to the initial information according to the micro-service parameters when the initial information needs to be filtered;
the information auditing module is used for sending the initial information to the target business microservice, calling the target auditing microservice to audit the initial information based on the auditing parameters and obtaining a first auditing result;
and the desensitization processing module is used for informing the target service microservice to desensitize the received initial information when the first auditing result has sensitive information.
In a third aspect, the present application further provides a computer device comprising a memory and a processor;
the memory for storing a computer program;
the processor is configured to execute the computer program and implement the information processing method as described above when executing the computer program.
In a fourth aspect, the present application also provides a computer-readable storage medium storing a computer program which, when executed by a processor, causes the processor to implement the information processing method as described above.
The application discloses an information processing method, an information processing device, computer equipment and a storage medium, wherein when initial information to be processed is received, a pre-configured parameter file is obtained, parameters such as interface parameters, micro-service parameters and auditing parameters can be obtained, and the information can be subsequently and uniformly audited according to the interface parameters, the micro-service parameters and the auditing parameters, so that the problem that auditing modes in the prior art are not uniform is solved; meanwhile, each micro service does not need to be coded respectively, so that the coding efficiency of developers is improved, repeated coding in the system is reduced, and the resources of the system are saved; whether the initial information needs to be filtered or not is determined according to the interface parameters, and when the initial information needs to be filtered, the target business micro-service and the target auditing micro-service corresponding to the initial information are determined according to the micro-service parameters, so that the initial information can be subjected to entry filtering according to the interface parameters, and meanwhile, the business service and the auditing service can be separated, and the decoupling of a business code and an auditing code is realized; the initial information is sent to the target business micro-service, and the target audit micro-service is called according to the audit parameters to audit the initial information, so that the asynchronous audit on the initial information can be realized, the efficiency of an interface is prevented from being influenced, the down of a gateway caused by the time consumption surge of the interface can be avoided, and the stability of a micro-service system is improved; when the first audit result is determined to have the sensitive information, the target service micro service is notified to perform desensitization processing on the received initial information, so that the sensitive information in the initial information can be shielded.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic diagram of a microservice system provided in an embodiment of the present application;
FIG. 2 is a schematic flow chart diagram of an information processing method provided by an embodiment of the present application;
FIG. 3 is a schematic flow diagram of outlet filtration provided by an embodiment of the present application;
fig. 4 is a schematic block diagram of an information processing apparatus provided in an embodiment of the present application;
fig. 5 is a schematic block diagram of a structure of a computer device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The flow diagrams depicted in the figures are merely illustrative and do not necessarily include all of the elements and operations/steps, nor do they necessarily have to be performed in the order depicted. For example, some operations/steps may be decomposed, combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
It is to be understood that the terminology used in the description of the present application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
The embodiment of the application provides an information processing method, an information processing device, computer equipment and a storage medium. The information processing method can be applied to a gateway server applied to a micro-service cluster, and can effectively improve the efficiency of information auditing by implementing unified auditing on information according to the interface parameters, the micro-service parameters and the auditing parameters in the parameter file.
Referring to fig. 1, fig. 1 is a schematic diagram of a microservice system according to an embodiment of the present disclosure. As shown in fig. 1, the microservice cluster may include a gateway filter, a first database, a second database, a business microservice, and an audit microservice. The gateway filter can be deployed on a gateway server, the first database and the second database can be deployed on a database server, and can also be deployed on the gateway server, the business microservice can be deployed on the business server, and the audit microservice can be deployed on the audit server. It should be noted that the microservice system may include a plurality of servers.
The gateway server, the database server, the service server and the auditing server may be independent servers, or may be cloud servers providing basic cloud computing services such as cloud service, cloud database, cloud computing, cloud functions, cloud storage, network service, cloud communication, middleware service, domain name service, security service, content Delivery Network (CDN), big data and artificial intelligence platform, and the like.
For example, the gateway filter may include at least one interface for receiving initial information sent by the user terminal and sending target information of the query to the client terminal. The client is electronic equipment such as a smart phone, a tablet computer, a notebook computer and a desktop computer.
Illustratively, the first database is a temporary database and the second database is a persistent database. For example, the first database may be a Redis database for temporarily storing data; the second database may be a local database in the gateway server.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the features of the embodiments can be combined with each other without conflict.
As shown in fig. 2, the information processing method includes steps S10 to S40.
Step S10, when initial information to be processed is received, a pre-configured parameter file is obtained, wherein the parameter file comprises interface parameters, micro-service parameters and auditing parameters.
Illustratively, when initial information sent by a client is received through an interface in a gateway filter, a pre-configured parameter file is obtained. Where the initial information may be user-generated content generated by an application on the client.
Illustratively, the parameter file may include interface parameters, micro-service parameters, audit parameters, user identification codes, and valid storage time. The interface parameters may include an interface name, an interface address, an interface type, and a filtering identifier, where the filtering identifier is used to determine whether the interface needs to be filtered, and the interface type is used to indicate a processing manner of information, for example, add indicates a newly added interface, update indicates an updated interface, and query indicates an inquiry interface. The micro service parameters may include a micro service name, a micro service required by each service scenario, for determining a service micro service and auditing the micro service. The auditing parameters can comprise a business scene, an auditing mode, an auditing field name, auditing content and the like; the service scene can comprise a user information scene, a user comment scene and the like, and is used for determining an audit mode, wherein userinfo represents the user information scene, and usercommance represents the user comment scene; audit modes may include a synchronous audit mode and an asynchronous audit mode. The user identification code is used for identifying the client and identifying the user. The valid storage time refers to the valid time for storing the data in the first database, and the data in the first database can be deleted after the valid time is exceeded.
In the embodiment of the application, the parameter configuration can be performed in advance according to actual requirements, so that a configured parameter file is obtained. The parameter file is obtained through parameter configuration, information can be audited uniformly subsequently based on the parameter file, the problem that auditing modes are not uniform in the prior art is solved, meanwhile, the auditing strategy can be adjusted only by modifying the parameter file, maintenance is more convenient, a large number of codes are not required to be maintained, and resource waste is reduced.
For example, after obtaining the configured parameter file, the parameter file may be stored in the first database, and may also be stored in the second database. The first database is a temporary database, and the second database is a persistent database. It should be noted that, because the first database has a fast reading speed, the parameter file stored in the first database can be preferentially read when the parameter file needs to be read, so as to improve the reading efficiency.
In this embodiment, to further ensure the privacy and security of the parameter file, the parameter file may be stored in a node of a block chain.
In some embodiments, obtaining the preconfigured parameter file comprises: if the parameter file is not inquired in the first database, inquiring in the second database to obtain the parameter file, and storing the parameter file in the first database.
For example, the first database may be queried for the presence of a parameter file; and if the parameter file is not inquired in the first database, inquiring in the second database to obtain the parameter file. It will be appreciated that since the first database is used to temporarily store data, the parameter files in the first database may be deleted due to timeouts.
For example, after obtaining the parameter file, the parameter file may be stored in the first database. By storing the parameter file in the first database, the parameter file can be directly read from the first database next time, and the efficiency is improved.
When initial information to be processed is received, a pre-configured parameter file is obtained, parameters such as interface parameters, micro service parameters and auditing parameters can be obtained, and information can be subsequently and uniformly audited according to the interface parameters, the micro service parameters and the auditing parameters, so that the problem that auditing modes in the prior art are not uniform is solved; meanwhile, each micro service does not need to be coded respectively, so that the coding efficiency of developers is improved, repeated coding in the system is reduced, and the system resources are saved.
And S20, determining whether the initial information needs to be filtered according to the interface parameters, and determining a target service micro service and a target auditing micro service corresponding to the initial information according to the micro service parameters when the initial information needs to be filtered.
The filtering process is to filter information such as sensitive text and sensitive pictures in the initial information. In the embodiment of the application, when it is determined that the initial information needs to be filtered, an audit microservice may be invoked to audit the initial information to determine whether the initial information has sensitive information, that is, whether desensitization processing needs to be performed on the initial information.
For example, when determining whether the initial information needs to be filtered according to the interface parameter, whether the parameter file has a filtering identifier corresponding to the interface receiving the initial information may be queried based on the interface name and/or the interface address, and whether the initial information needs to be filtered according to a query result.
For example, when the parameter file has a filtering identifier corresponding to the interface receiving the initial information, it may be determined that the initial information needs to be filtered. When the parameter file does not have the filtering identification corresponding to the interface for receiving the initial information, it can be determined that the initial information does not need to be filtered.
In the embodiment of the present application, the interface that needs the filtering process may be marked in advance. For example, a filter identifier may be added to an interface that needs to be filtered in the parameter file, and of course, other manners may also be used to distinguish whether the interface needs to be filtered.
Whether the initial information needs to be filtered or not is determined according to the interface parameters, so that entry filtering of the initial information according to the interface parameters can be achieved.
In some embodiments, when it is determined that the initial information needs to be filtered, a target service microservice and a target audit microservice corresponding to the initial information are determined according to the microservice parameter.
For example, the target business microservice may be determined according to the microservice name and the microservice required by each business scenario. For example, in a user information scenario, the target business microservice may be an account microservice; in a user review scenario, the target business microservice may be a review microservice. It should be noted that, in different service scenarios, the required micro-services are different.
Illustratively, the target audit microservice may be determined based on the microservice name. It should be noted that the target audit microservice may be a general audit microservice in the microservice system, or may be an external third party audit microservice.
By determining the target business microservice and the target auditing microservice corresponding to the initial information according to the microservice parameters, the business service and the auditing service can be separated, and the decoupling of the business code and the auditing code is realized, so that the code is easier to maintain and read, and the robustness of the code is improved.
And S30, sending the initial information to the target business micro-service, and calling the target auditing micro-service to audit the initial information according to the auditing parameters to obtain a first auditing result.
In the embodiment of the present application, how to verify the initial information is described by taking the initial information as user information generated by a user and taking an interface as a newly added content interface addUserInfo as an example.
For example, the initial information may be audited according to an audit mode in the audit parameters. The audit mode may include a synchronous audit mode and an asynchronous audit mode. It should be noted that the asynchronous auditing mode refers to that the initial information is sent to the target service microservice, the target auditing microservice is called to audit the initial information at the same time, and then the initial information received by the target service microservice is updated according to an auditing result. The synchronous auditing mode refers to that the target auditing micro-service is called to audit the initial information, and then the initial information is updated according to the auditing result and is sent to the target business micro-service.
In some embodiments, the initial information may be sent to the target business microservice based on the asynchronous auditing mode, and the target auditing microservice is invoked to audit the initial information according to the auditing parameters, so as to obtain a first auditing result.
Illustratively, the target audit microservice can be called to audit the initial information according to the audit parameters through the asynchronous thread, and a first audit result is obtained. The audit parameters can be used for determining not only the audit mode, but also the audit field name, the audit content, and the like. The target audit microservice can audit the initial information according to the audit field name and the audit content. For example, when the initial information is user information, the nickname, the avatar, and the personalized signature in the initial information may be audited. The specific auditing process is not limited herein.
In other embodiments, the target audit microservice may be invoked to audit the initial information based on the synchronous audit mode to obtain a first audit result.
Illustratively, the first review result may be presence-sensitive information or absence-sensitive information.
By sending the initial information to the target business micro-service and calling the target audit micro-service to audit the initial information according to the audit parameters, asynchronous audit can be performed on the initial information, the efficiency of the interface is prevented from being influenced, meanwhile, the phenomenon that the gateway is down due to time consumption surge of the interface can be avoided, and the stability of the micro-service system is improved.
And step S40, when the first examination result has sensitive information, informing the target service microserver to desensitize the received initial information.
In some embodiments, when the first review result has sensitive information, a desensitization instruction may be sent to the target service microservice to notify the target service microservice to perform desensitization processing on the received initial information.
For example, the target service microserver may perform desensitization processing on the initial information according to desensitization rules. The desensitization rule may be implemented by using a regular expression, for example, whether the first field is fully masked or not, and the second field is a mask symbol, such as a mask and a scrambling code mask, but other fields may also be included, which is not limited herein.
When the first audit result is determined to have the sensitive information, the target service micro service is notified to perform desensitization processing on the received initial information, so that the sensitive information in the initial information can be shielded.
In some embodiments, when it is determined that the initial information includes sensitive information, a hash value of a primary key corresponding to the initial information is calculated, and the corresponding hash value is stored in a preset bitmap file.
It should be noted that each piece of information stored in the database has a corresponding primary key, for example, the primary key of the user information is user _ id, which is a 32-bit uuid. The BitMap file BitMap represents a value or a state corresponding to a certain element through a bit, wherein a key is the corresponding element.
For example, a hash algorithm may be used to calculate a hash value of the primary key corresponding to the initial information, and store the corresponding hash value in a preset bitmap file. The Hash Algorithm (Secure Hash Algorithm) may include, but is not limited to, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, etc., and is not limited thereto. The bitmap file may be stored in the first database, but may of course also be stored in the second database.
It should be noted that, in the embodiment of the present application, the problem of mass storage may be solved by calculating the hash value of the primary key corresponding to the initial information and storing the corresponding hash value in the preset bitmap file.
By calculating the hash value of the main key corresponding to the initial information and storing the corresponding hash value into the preset bitmap file, when the target information is inquired, the hash value corresponding to the target information can be compared with the hash value in the bitmap file, whether the target information has sensitive information can be conveniently and quickly determined, the inquiry efficiency is improved, and the utilization rate of the first database is reduced.
In some embodiments, the information processing method provided in the embodiments of the present application may further include: and storing the initial information into the first database according to the effective storage time.
Illustratively, when the valid storage time is 1 day, the initial information stored in the first database is deleted after more than 1 day. The initial information may be information after desensitization processing or information without desensitization processing.
By storing the initial information into the first database, the initial information can be preferentially read from the first database when the same information is subsequently inquired, so that the inquiry efficiency is improved.
In the embodiment of the present application, the target service microserver may perform desensitization processing on the received initial information, or may not perform desensitization processing on the received initial information. When the target service microserver does not desensitize the received initial information, subsequent exit filtering can be performed, that is, desensitization is performed when the client queries information.
In the examples of the present application, how outlet filtration is performed will be described in detail. Referring to fig. 3, fig. 3 is a schematic flow chart of outlet filtering according to an embodiment of the present application, which may specifically include the following steps S50 to S80.
And S50, when an information query request of the client is received, querying target information corresponding to the information query request in a first database according to the parameter file.
Illustratively, when an information query request of a client is received through a gateway filter, target information corresponding to the information query request is queried in a first database according to a parameter file.
For example, the first database may be queried for the target information corresponding to the information query request according to the user identification code in the parameter file. It should be noted that the information query request may carry a user identification code.
By preferentially inquiring the target information corresponding to the information inquiry request in the first database according to the parameter file, the inquiry efficiency can be improved because the reading speed of the first database is high.
Step S60, if the target information is not inquired, determining the target service micro service corresponding to the information inquiry request according to the micro service parameter, calling the target service micro service inquiry and returning the target information to the client.
It should be noted that, since the first database is a temporary database, the information stored in the first database may be deleted due to a timeout.
In some embodiments, if the target information is not queried in the first database, the target service microservice corresponding to the information query request is determined according to the microservice parameter.
For example, the target service microservice corresponding to the information query request may be determined according to the microservice name and the microservice required by each service scenario. For example, in a user information scenario, the target business microservice may be determined to be an account microservice.
Illustratively, a target business microservice query may be invoked and target information returned to the client. For example, when querying user information, the target business microservice may be directly invoked to obtain the user information, and then return the user information to the client.
In the embodiment of the application, the target information is not queried in the first database, and after the target service micro-service is called for querying and the target information is returned to the client, the target information can be stored in the first database so as to be directly returned from the first database when the same target information is queried next time, so that the query efficiency is improved.
In some embodiments, after invoking the target service microservice query and returning the target information to the client, the method provided in the embodiments of the present application further includes: auditing the target information based on the auditing parameters to obtain a second auditing result; when the target information is determined to have sensitive information according to the second examination result, desensitizing the target content to obtain desensitized target information; and storing the desensitized target information to a first database and storing the desensitized target information to a second database according to the effective storage time, wherein the first database is a temporary database, and the second database is a persistent database.
Illustratively, the target audit microservice can be called to audit the target information according to the audit parameters through the asynchronous thread, and a second audit result is obtained. The target auditing micro service can audit the initial information according to the auditing field name and the auditing content. The specific auditing process is not limited herein.
Illustratively, the second review result may be presence-sensitive information or absence-sensitive information.
In some embodiments, when it is determined that the target information has sensitive information according to the second review result, desensitization processing is performed on the target information to obtain desensitized target information. Illustratively, the desensitization processing may be performed on the target information according to a desensitization rule. The desensitization rule may be implemented by using a regular expression, for example, whether the first field is fully masked or not, and the second field is a mask symbol, such as a self-mask and a scrambling mask, but other fields may also be included, which is not limited herein.
For example, after obtaining the desensitized target information, the desensitized target information may be stored in the first database according to the valid storage time.
For example, when the valid storage time is 2 days, the target information stored in the first database is deleted after more than 2 days.
For another example, when the valid storage time is 7 days, the target information stored in the first database is deleted after 7 days.
When the target information is determined to have sensitive information according to the second examination result, desensitization processing is carried out on the target content, and the target information after desensitization processing is stored in the first database, so that the target information after desensitization processing can be displayed on a client when a user inquires or refreshes next time.
It should be noted that, in the embodiment of the present application, after the target service microservice query is invoked and the target information is returned to the client, desensitization processing is performed on the target information, so that the client can only display information that is not desensitized once, and when the user queries or refreshes again, the information that is returned after desensitization processing is displayed.
And step S70, if the target information is inquired, determining whether the target information needs filtering processing.
In some embodiments, determining whether the target information requires filtering processing may include: determining whether an interface receiving the information inquiry request is a filtering interface or not according to the interface parameters; if the interface is a filtering interface, determining that the target information needs to be filtered; and if the interface is a non-filtering interface, determining that the target information does not need to be filtered.
For example, whether the filtering identifier exists in the interface receiving the information query request can be queried in the parameter file. For example, when the filter identification is present, the interface is determined to be a filter interface. For another example, when no filtering identification exists, the interface is determined to be a non-filtering interface.
By determining whether the interface receiving the information inquiry request is a filtering interface, the filtering processing of the target information at the time of export can be realized.
And S80, when the target information is determined to need filtering processing and sensitive information exists, desensitizing the target information, and returning the desensitized target information to the client.
In the embodiment of the application, after it is determined that the target information needs to be filtered, whether the target information has sensitive information needs to be judged.
In some embodiments, determining whether sensitive information exists in the target information may include: performing hash calculation on the primary key corresponding to the target information to obtain a corresponding target hash value; and if the preset bitmap file is inquired to have a hash value matched with the target hash value, determining that the target information has sensitive information.
For example, a hash algorithm may be adopted to calculate a hash value of the primary key corresponding to the target information, and obtain a target hash value corresponding to the target information; the target hash value is then compared to the hash value in the bitmap file. And when the bitmap file has the hash value matched with the target hash value, determining that the target information has sensitive information. And when the bitmap file does not have a hash value matched with the target hash value, determining that the target information does not have sensitive information.
The corresponding target hash value is obtained by performing hash calculation on the main key corresponding to the target information, and then the efficiency of inquiring the sensitive information is improved when the target hash value inquires whether the target information has the sensitive information.
Illustratively, desensitization processing can be performed on the target information according to a desensitization rule, and the desensitized target information is returned to the client to be displayed by the client. The desensitization rule may be implemented by using a regular expression, for example, whether the first field is fully masked or not, and the second field is a mask symbol, such as a self-mask and a scrambling mask, but other fields may also be included, which is not limited herein.
According to the information processing method provided by the embodiment, when the initial information to be processed is received, the pre-configured parameter file is obtained, so that parameters such as the interface parameter, the micro service parameter and the auditing parameter can be obtained, and the information can be subsequently and uniformly audited according to the interface parameter, the micro service parameter and the auditing parameter, so that the problem that the auditing modes in the prior art are not uniform is solved; meanwhile, each micro service does not need to be coded respectively, so that the coding efficiency of developers is improved, repeated coding in the system is reduced, and the resources of the system are saved; whether the initial information needs to be filtered or not is determined according to the interface parameters, so that entry filtering of the initial information according to the interface parameters can be realized; by determining the target business microservice and the target auditing microservice corresponding to the initial information according to the microservice parameters, the business service and the auditing service can be separated, and the decoupling of the business code and the auditing code is realized, so that the code is easier to maintain and read, and the robustness of the code is improved; the initial information is sent to the target business micro-service, and the target audit micro-service is called according to the audit parameters to audit the initial information, so that the asynchronous audit on the initial information can be realized, the efficiency of an interface is prevented from being influenced, the down of a gateway caused by the time consumption surge of the interface can be avoided, and the stability of a micro-service system is improved; when the first audit result is determined to have sensitive information, the target service micro-service is informed to perform desensitization processing on the received initial information, so that the sensitive information in the initial information can be shielded; by calculating the hash value of the main key corresponding to the initial information and storing the corresponding hash value into the preset bitmap file, when the target information is inquired, the hash value corresponding to the target information can be compared with the hash value in the bitmap file, whether the target information has sensitive information can be conveniently and quickly determined, the inquiry efficiency is improved, and the utilization rate of the first database is reduced.
Referring to fig. 4, fig. 4 is a schematic block diagram of an information processing apparatus 1000 according to an embodiment of the present application, where the information processing apparatus is configured to execute the foregoing information processing method. Wherein, the information processing apparatus may be configured in a gateway server.
As shown in fig. 4, the information processing apparatus 1000 includes: the system comprises a parameter file acquisition module 1001, a micro-service determination module 1002, an information auditing module 1003 and a desensitization processing module 1004.
The parameter file obtaining module 1001 is configured to obtain a pre-configured parameter file when receiving initial information to be processed, where the parameter file includes an interface parameter, a micro-service parameter, and an audit parameter.
A microservice determining module 1002, configured to determine whether the initial information needs to be filtered according to the interface parameter, and determine, when it is determined that the initial information needs to be filtered, a target business microservice and a target audit microservice corresponding to the initial information according to the microservice parameter.
And the information auditing module 1003 is configured to send the initial information to the target service microservice, and call the target auditing microservice to audit the initial information based on the auditing parameter, so as to obtain a first auditing result.
A desensitization processing module 1004, configured to notify the target service microservice to perform desensitization processing on the received initial information when the first audit result is presence-sensitive information.
It should be noted that, as will be clear to those skilled in the art, for convenience and brevity of description, the specific working processes of the apparatus and the modules described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The apparatus described above may be implemented in the form of a computer program which is executable on a computer device as shown in fig. 5.
Referring to fig. 5, fig. 5 is a schematic block diagram of a structure of a computer device according to an embodiment of the present disclosure.
Referring to fig. 5, the computer device includes a processor and a memory connected by a system bus, wherein the memory may include a storage medium and an internal memory. The storage medium may be a nonvolatile storage medium or a volatile storage medium.
The processor is used for providing calculation and control capability and supporting the operation of the whole computer equipment.
The internal memory provides an environment for running a computer program in the storage medium, which, when executed by the processor, causes the processor to execute any one of the information processing methods.
It should be understood that the Processor may be a Central Processing Unit (CPU), and the Processor may be other general purpose processors, digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, etc. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Wherein, in one embodiment, the processor is configured to execute a computer program stored in the memory to implement the steps of:
when initial information to be processed is received, acquiring a pre-configured parameter file, wherein the parameter file comprises an interface parameter, a micro-service parameter and an auditing parameter; determining whether the initial information needs to be filtered according to the interface parameters, and determining a target service micro service and a target auditing micro service corresponding to the initial information according to the micro service parameters when the initial information needs to be filtered; sending the initial information to the target business micro-service, and calling the target audit micro-service to audit the initial information according to the audit parameters to obtain a first audit result; and when the first examination result has sensitive information, informing the target service micro service to perform desensitization processing on the received initial information.
In one embodiment, the processor, when implementing obtaining the preconfigured parameter file, is configured to implement:
if the parameter file is not inquired in the first database, inquiring in a second database to obtain the parameter file, and storing the parameter file in the first database, wherein the first database is a temporary database, and the second database is a persistent database.
In one embodiment, the processor is further configured to:
and when the initial information is determined to have sensitive information, calculating the hash value of the main key corresponding to the initial information, and storing the corresponding hash value into a preset bitmap file.
In one embodiment, the processor is further configured to implement:
when an information query request of a client is received, querying target information corresponding to the information query request in a first database according to the parameter file; if the target information is not inquired, determining a target service microservice corresponding to the information inquiry request according to the microservice parameter, calling the target service microservice inquiry and returning the target information to the client; if the target information is inquired, determining whether the target information needs to be filtered; when the target information is determined to need filtering processing and sensitive information exists, desensitizing the target information, and returning the desensitized target information to the client.
In one embodiment, the parameter file further comprises a valid storage time; after the processor calls the target service microservice query and returns the target information to the client, the processor is further configured to:
auditing the target information based on the auditing parameters to obtain a second auditing result; when the target information is determined to have sensitive information according to the second examination result, desensitizing the target content to obtain desensitized target information; and storing the desensitized target information to the first database and storing the desensitized target information to the second database according to the effective storage time, wherein the first database is a temporary database, and the second database is a persistent database.
In one embodiment, the processor, in carrying out determining whether the target information requires filtering processing, is configured to carry out:
determining whether the interface receiving the information inquiry request is a filtering interface or not according to the interface parameters; if the interface is a filtering interface, determining that the target information needs to be filtered; and if the interface is a non-filtering interface, determining that the target information does not need to be filtered.
In one embodiment, the processor is further configured to implement:
performing hash calculation on the main key corresponding to the target message to obtain a corresponding target hash value; and if the preset bitmap file is inquired to have a hash value matched with the target hash value, determining that the target information has sensitive information.
The embodiment of the application further provides a computer-readable storage medium, wherein a computer program is stored in the computer-readable storage medium, the computer program comprises program instructions, and the processor executes the program instructions to realize any information processing method provided by the embodiment of the application.
For example, the program is loaded by a processor and may perform the following steps:
when initial information to be processed is received, acquiring a pre-configured parameter file, wherein the parameter file comprises an interface parameter, a micro-service parameter and an auditing parameter; determining whether the initial information needs to be filtered according to the interface parameters, and determining a target service micro-service and a target auditing micro-service corresponding to the initial information according to the micro-service parameters when the initial information needs to be filtered; sending the initial information to the target business micro-service, and calling the target audit micro-service to audit the initial information according to the audit parameters to obtain a first audit result; and when the first examination result has sensitive information, informing the target service microservice to perform desensitization processing on the received initial information.
The computer-readable storage medium may be an internal storage unit of the computer device described in the foregoing embodiment, for example, a hard disk or a memory of the computer device. The computer readable storage medium may also be an external storage device of the computer device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital Card (SD Card), a Flash memory Card (Flash Card), and the like provided on the computer device.
Further, the computer-readable storage medium may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created according to the use of the blockchain node, and the like.
The block chain referred by the application is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product service layer, an application service layer, and the like.
While the invention has been described with reference to specific embodiments, the scope of the invention is not limited thereto, and those skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the invention. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. An information processing method characterized by comprising:
when initial information to be processed is received, acquiring a pre-configured parameter file, wherein the parameter file comprises an interface parameter, a micro-service parameter and an auditing parameter;
determining whether the initial information needs to be filtered according to the interface parameters, and determining a target service micro-service and a target auditing micro-service corresponding to the initial information according to the micro-service parameters when the initial information needs to be filtered;
sending the initial information to the target business micro-service, and calling the target audit micro-service to audit the initial information according to the audit parameters to obtain a first audit result;
and when the first examination result has sensitive information, informing the target service micro service to perform desensitization processing on the received initial information.
2. The information processing method according to claim 1, wherein the obtaining a preconfigured parameter file comprises:
if the parameter file is not inquired in the first database, inquiring in a second database to obtain the parameter file, and storing the parameter file in the first database, wherein the first database is a temporary database, and the second database is a persistent database.
3. The information processing method according to claim 1, characterized by further comprising:
and when the initial information is determined to have sensitive information, calculating the hash value of the main key corresponding to the initial information, and storing the corresponding hash value into a preset bitmap file.
4. The information processing method according to claim 1, characterized by further comprising:
when an information query request of a client is received, querying target information corresponding to the information query request in a first database according to the parameter file;
if the target information is not inquired, determining a target service microservice corresponding to the information inquiry request according to the microservice parameter, calling the target service microservice inquiry and returning the target information to the client;
if the target information is inquired, determining whether the target information needs to be filtered;
when the target information is determined to need filtering processing and sensitive information exists, desensitizing the target information, and returning the desensitized target information to the client.
5. The information processing method according to claim 4, wherein the parameter file further includes a valid storage time; after the target service microservice inquiry is called and the target information is returned to the client, the method also comprises the following steps:
auditing the target information based on the auditing parameters to obtain a second auditing result;
when the target information is determined to have sensitive information according to the second examination result, desensitizing the target content to obtain desensitized target information;
and storing the desensitized target information to the first database and storing the desensitized target information to the second database according to the effective storage time, wherein the first database is a temporary database, and the second database is a persistent database.
6. The information processing method according to claim 4, wherein the determining whether the target information requires filtering processing includes:
determining whether the interface receiving the information inquiry request is a filtering interface or not according to the interface parameters;
if the interface is a filtering interface, determining that the target information needs to be filtered;
and if the interface is a non-filtering interface, determining that the target information does not need to be filtered.
7. The information processing method according to claim 4, characterized by further comprising:
performing hash calculation on the main key corresponding to the target message to obtain a corresponding target hash value;
and if the preset bitmap file is inquired to have a hash value matched with the target hash value, determining that the target information has sensitive information.
8. An information processing apparatus characterized by comprising:
the parameter file acquisition module is used for acquiring a pre-configured parameter file when initial information to be processed is received, wherein the parameter file comprises interface parameters, micro-service parameters and auditing parameters;
the micro-service determining module is used for determining whether the initial information needs to be filtered according to the interface parameters, and determining a target service micro-service and a target auditing micro-service corresponding to the initial information according to the micro-service parameters when the initial information needs to be filtered;
the information auditing module is used for sending the initial information to the target business microservice, calling the target auditing microservice to audit the initial information based on the auditing parameters and obtaining a first auditing result;
and the desensitization processing module is used for informing the target service microservice to desensitize the received initial information when the first auditing result has sensitive information.
9. A computer device, wherein the computer device comprises a memory and a processor;
the memory for storing a computer program;
the processor for executing the computer program and realizing the information processing method according to any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, characterized in that a computer program is stored, which, when executed by a processor, causes the processor to implement the information processing method according to any one of claims 1 to 7.
CN202211164087.7A 2022-09-23 2022-09-23 Information processing method, information processing device, computer equipment and storage medium Pending CN115567595A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211164087.7A CN115567595A (en) 2022-09-23 2022-09-23 Information processing method, information processing device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211164087.7A CN115567595A (en) 2022-09-23 2022-09-23 Information processing method, information processing device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115567595A true CN115567595A (en) 2023-01-03

Family

ID=84741764

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211164087.7A Pending CN115567595A (en) 2022-09-23 2022-09-23 Information processing method, information processing device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115567595A (en)

Similar Documents

Publication Publication Date Title
CN109743315B (en) Behavior identification method, behavior identification device, behavior identification equipment and readable storage medium for website
CN111447150A (en) Access request current limiting method, server and storage medium
CN110532799B (en) Data desensitization control method, electronic device and computer readable storage medium
CN110400217B (en) Rule change processing method and device for intelligent contract
CN112632071A (en) Database primary key id generation method, device, equipment and storage medium
CN111277635A (en) Method, equipment, device and computer medium for accessing external node to block chain
CN111817984A (en) Message sending method, device, equipment and storage medium
CN113407997A (en) Data desensitization method and device, computer equipment and storage medium
CN111369354A (en) Data monitoring method and device for block chain application and storage medium
CN112328486A (en) Interface automation test method and device, computer equipment and storage medium
CN115934202A (en) Data management method, system, data service gateway and storage medium
CN113434582B (en) Service data processing method and device, computer equipment and storage medium
CN114398631A (en) Business processing method and device, electronic equipment and storage medium
CN110619204A (en) Invitation code generation method and device, terminal equipment and storage medium
CN112363997B (en) Data version management method, device and storage medium
CN112015563A (en) Message queue switching method and device, electronic equipment and storage medium
CN115567595A (en) Information processing method, information processing device, computer equipment and storage medium
CN114157662B (en) Cloud platform parameter adaptation method, device, terminal equipment and storage medium
CN115208671A (en) Firewall configuration method and device, electronic equipment and storage medium
CN111654398B (en) Configuration updating method and device, computer equipment and readable storage medium
CN114491453A (en) Task authority management method, device, equipment and storage medium
CN113722225A (en) Page testing method and device, computer equipment and storage medium
CN113326540A (en) Calling authority control method, device, server, system and medium of microservice
CN112487497A (en) Method and device for managing off-link files based on intelligent contracts and electronic equipment
CN112291241A (en) Firewall wall opening method, firewall wall opening device and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination