CN115967522A - Data processing method, device, equipment and storage medium - Google Patents

Data processing method, device, equipment and storage medium Download PDF

Info

Publication number
CN115967522A
CN115967522A CN202211173723.2A CN202211173723A CN115967522A CN 115967522 A CN115967522 A CN 115967522A CN 202211173723 A CN202211173723 A CN 202211173723A CN 115967522 A CN115967522 A CN 115967522A
Authority
CN
China
Prior art keywords
encrypted
data
identity data
servers
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211173723.2A
Other languages
Chinese (zh)
Inventor
林喆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
CCB Finetech Co Ltd
Original Assignee
China Construction Bank Corp
CCB Finetech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp, CCB Finetech Co Ltd filed Critical China Construction Bank Corp
Priority to CN202211173723.2A priority Critical patent/CN115967522A/en
Publication of CN115967522A publication Critical patent/CN115967522A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The application discloses a data processing method, a data processing device, data processing equipment and a storage medium, and relates to the technical field of communication. The method is applied to a first server, and comprises the following steps: acquiring at least one encrypted identity data of each second server in a plurality of second servers and service index data related to each encrypted identity data, wherein the plurality of second servers adopt the same encryption mode; matching the encrypted identity data of the plurality of second servers to determine target encrypted identity data, wherein the target encrypted identity data is shared by at least two second servers; and fusing the related service index data of the target encrypted identity data in at least two second servers to obtain fused service index data. The method can directly fuse the business data of different companies according to the encrypted identity data in the same encryption mode.

Description

Data processing method, device, equipment and storage medium
Technical Field
The present application belongs to the field of communications technologies, and in particular, to a data processing method, apparatus, device, and storage medium.
Background
In the big data era, data fusion has become an important way for mining data value and promoting business model innovation. Therefore, for a group company having a plurality of business line subsidiaries, it is highly desirable to implement data fusion of the group company. However, the existing group company cannot directly fuse the user data of the parent company and the user data of each subsidiary company.
Disclosure of Invention
The embodiment of the application provides a data processing method, a data processing device, data processing equipment and a storage medium, which can be used for directly fusing business data of different companies according to encrypted identity data in the same encryption mode.
In a first aspect, an embodiment of the present application provides a data processing method, which is applied to a first server, and the method includes:
acquiring at least one encrypted identity data of each second server in a plurality of second servers and service index data related to each encrypted identity data, wherein the plurality of second servers are second servers of a plurality of companies, each encrypted identity data is obtained by encrypting user identity data in the acquired service data by the second server, the plurality of second servers adopt the same encryption mode, and the service data comprises the user identity data and the service index data;
matching the encrypted identity data of the plurality of second servers to determine target encrypted identity data, wherein the target encrypted identity data is shared by at least two second servers;
and fusing the related service index data of the target encrypted identity data in at least two second servers to obtain fused service index data.
In one possible implementation, the encrypted identity data includes an encrypted certificate type identifier, an encrypted certificate number identifier, and an encrypted name identifier,
the matching the encrypted identity data of the plurality of second servers to determine the target encrypted identity data includes:
matching the encrypted certificate type identification, the encrypted certificate number identification and the encrypted name identification in the encrypted identity data of the plurality of second servers;
and determining the encrypted identity data with the encrypted certificate type identification, the encrypted certificate serial number identification and the encrypted name identification consistent as target encrypted identity data.
In a possible implementation manner, after the matching the encrypted certificate type identifier, the encrypted certificate number identifier, and the encrypted name identifier in the encrypted identity data of a plurality of the second servers, the method further includes:
determining the encrypted identity data with part of consistent identification in the encrypted certificate type identification, the encrypted certificate serial number identification and the encrypted name identification as abnormal encrypted identity data;
sending an abnormal checking request to a second server corresponding to the abnormal encryption identity data, wherein the abnormal checking request is used for indicating the second server corresponding to the abnormal encryption identity data to check the abnormal encryption identity data and obtain corrected encryption identity data, and sending the corrected encryption identity data to the first server;
receiving the modified encrypted identity data sent by the second server corresponding to the abnormal encrypted identity data;
the matching of the encrypted certificate type identifier, the encrypted certificate serial number identifier and the encrypted name identifier in the encrypted identity data of the plurality of second servers includes:
and matching the encrypted identification data of the plurality of second servers with the encrypted certificate type identification, the encrypted certificate serial number identification and the encrypted name identification in the corrected encrypted identification data.
In a possible implementation manner, after the fusing service index data associated with the target encrypted identity data in at least two of the second servers to obtain fused service index data, the method further includes:
receiving a target request sent by a target second server, wherein the target request comprises a target index;
determining at least one target fusion service index data by using the target index and indexes corresponding to the fusion service index data obtained by fusion, wherein the indexes corresponding to the target fusion service index data comprise the target index;
and sending the at least one target fusion service index data to the target second server.
In a possible implementation manner, the encryption manner adopted by the plurality of second servers is an irreversible encryption manner.
In a second aspect, an embodiment of the present application provides a data processing apparatus, applied to a first server, the apparatus including:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring at least one encrypted identity data of each second server in a plurality of second servers and service index data related to each encrypted identity data, the plurality of second servers are second servers of a plurality of companies, each encrypted identity data is obtained by encrypting user identity data in the acquired service data by the second server, the plurality of second servers adopt the same encryption mode, and the service data comprises the user identity data and the service index data;
a first determining module, configured to match encrypted identity data of the plurality of second servers, and determine target encrypted identity data, where the target encrypted identity data is encrypted identity data that is common to at least two of the second servers;
and the fusion module is used for fusing the service index data associated with the target encrypted identity data in at least two second servers to obtain fused service index data.
In one possible implementation, the encrypted identity data includes an encrypted certificate type identifier, an encrypted certificate number identifier, and an encrypted name identifier,
the first determining module includes:
a matching unit, configured to match the encrypted certificate type identifier, the encrypted certificate serial number identifier, and the encrypted name identifier in the encrypted identity data of the plurality of second servers;
and the first determining unit is used for determining the encrypted identity data with the encrypted certificate type identification, the encrypted certificate serial number identification and the encrypted name identification consistent as target encrypted identity data.
In a possible implementation manner, the first determining module further includes:
the second determining unit is used for determining the encrypted identity data with part of consistent identification in the encrypted certificate type identification, the encrypted certificate serial number identification and the encrypted name identification as abnormal encrypted identity data;
a sending unit, configured to send an exception checking request to a second server corresponding to the exception encrypted identity data, where the exception checking request is used to instruct the second server corresponding to the exception encrypted identity data to check the exception encrypted identity data and obtain modified encrypted identity data, and send the modified encrypted identity data to the first server;
a receiving unit, configured to receive the modified encrypted identity data sent by the second server corresponding to the abnormal encrypted identity data;
the matching unit is further configured to match the encrypted certificate type identifier, the encrypted certificate serial number identifier, and the encrypted name identifier in the encrypted identification data and the corrected encrypted identification data of the plurality of second servers.
In a possible implementation manner, the apparatus further includes:
the receiving module is used for receiving a target request sent by a target second server, wherein the target request comprises a target index;
the second determining module is used for determining at least one target fusion service index data by using the target index and indexes corresponding to the fusion service index data obtained by fusion, wherein the indexes corresponding to the target fusion service index data comprise the target index;
and the sending module is used for sending the at least one target fusion service index data to the target second server.
In a possible implementation manner, the encryption manner adopted by the plurality of second servers is an irreversible encryption manner.
In a third aspect, an embodiment of the present application provides an electronic device, including: a processor and a memory storing computer program instructions; the processor, when executing the computer program instructions, implements a data processing method as described in any of the above.
In a fourth aspect, the present application provides a computer-readable storage medium, on which computer program instructions are stored, and when executed by a processor, the computer program instructions implement the data processing method described in any one of the above.
In a fifth aspect, the present application provides a computer program product, and when executed by a processor of an electronic device, the instructions of the computer program product cause the electronic device to execute the data processing method described in any one of the above items.
The data processing method, the data processing device, the data processing equipment and the data processing storage medium are applied to a first server, encrypted identity data which are in the same encryption mode and are adopted by second servers of a plurality of companies are matched, target encrypted identity data (namely encrypted identity data which are shared by at least two second servers) are determined, and associated service index data of the target encrypted identity data in the at least two second servers are fused to obtain fused service index data. Therefore, the embodiment can directly fuse the service data of different companies according to the encrypted identity data in the same encryption mode, thereby realizing the data fusion of the group companies.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required to be used in the embodiments of the present application will be briefly described below, and for those skilled in the art, other drawings may be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flowchart of a data processing method provided in an embodiment of the present application;
FIG. 2 is a schematic diagram of an application framework of a parent company and a subsidiary company in a group company according to an embodiment of the present application;
FIG. 3 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device provided in an embodiment of the present application.
Detailed Description
Features of various aspects and exemplary embodiments of the present application will be described in detail below, and in order to make objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail below with reference to the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described herein are intended to be illustrative only and are not intended to be limiting. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present application by illustrating examples thereof.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising 8230; \8230;" comprises 8230; "does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises the element.
According to the technical scheme, the data acquisition, storage, use, processing and the like meet relevant regulations of national laws and regulations.
Under the big data era, data fusion becomes an important way for mining data value and promoting business model innovation. Therefore, for a group company having a plurality of business line subsidiaries, it is highly desirable to implement data fusion of the group company. However, in a scenario of data fusion inside a group company, the data processing subject and the boundary are not very distinct, and particularly in the financial industry, fusion of service data cannot be achieved through user information, so that the cost for obtaining user service data among the group companies cannot be effectively reduced, and development of new service models for each of the group companies cannot be promoted.
The existing group companies can not directly fuse user data of all companies in the group.
In order to solve the problem of the prior art, embodiments of the present application provide a data processing method, apparatus, device, and storage medium. First, a data processing method provided in an embodiment of the present application is described below.
Fig. 1 shows a schematic flow chart of a data processing method according to an embodiment of the present application. As shown in fig. 1, a data processing method, applied to a first server, may include the following steps S101 to S103.
S101, at least one encrypted identity data of each second server in the plurality of second servers and service index data related to each encrypted identity data are obtained.
S102, matching the encrypted identity data of the plurality of second servers, and determining target encrypted identity data.
S103, fusing the related service index data of the target encrypted identity data in at least two second servers to obtain fused service index data.
The data processing method of the embodiment of the application is applied to a first server, and is used for matching encrypted identity data which are used by second servers of a plurality of companies and have the same encryption mode, determining target encrypted identity data (namely, encrypted identity data which are shared by at least two second servers), and fusing service index data which are associated with the target encrypted identity data in at least two second servers to obtain fused service index data. Therefore, the embodiment can directly fuse the service data of different companies according to the encrypted identity data in the same encryption mode, thereby realizing the data fusion of the group companies.
In S101, the first server is a server for performing data processing in a corporate company. The corporate company includes a parent company and at least one subsidiary company. The business scope between the parent company and at least one subsidiary company is different.
The plurality of second servers are second servers of a plurality of companies. The plurality of companies may be at least two companies in the group of companies, may be one parent company and one subsidiary company, or may be a plurality of subsidiary companies.
For example, as shown in fig. 2, in the application framework of a parent-subsidiary company in a group company, from a management perspective, a set of business capabilities managed by the same entity may be referred to as a domain, and the domain division is performed according to business entities by taking a business as a center, according to the principle of aggregation of business, extraction of sharing and isolation influence. According to the independent service range of the parent company and the subsidiary company, a parent company domain and a subsidiary company domain can be formed to bear the respective independent capacity, and the corresponding execution main body is the corresponding second server. On the premise of not interfering with the independence of internal services of the independent legal companies, a group domain is set, the overall planning, coordination and sharing capabilities are borne, and the execution main body is a first server. In this embodiment, the data fusion operation between multiple companies in the group is performed in the group domain, that is, the application is performed on the first server.
The encrypted identity data and the service index data of a plurality of companies in the group are collected into a database of a first server corresponding to the group domain, so that data fusion is realized on the group domain.
And the encrypted identity data is obtained by encrypting the user identity data in the acquired service data by the second server.
The plurality of second servers adopt the same encryption mode. The same encryption mode can ensure that the encrypted identity data of the same user is consistent among companies in the group.
In some embodiments, the encryption method adopted by the plurality of second servers is an irreversible encryption method. Illustratively, the irreversible encryption manner may be specifically an MD5 encryption algorithm, or an SHA1 encryption algorithm, and of course, may also be other irreversible encryption manners, which are not specifically limited in this application. In this embodiment, the irreversible encryption manner prevents the encrypted identification data of the user from being decrypted, thereby ensuring the security of the user identification data.
The service data includes user identity data and service index data. The user identity data can be the user certificate type, the user certificate number, the user name and the like which relate to the user identity information. The business index data is also multidimensional due to different business ranges of different companies, and can be indexes of careers, academic calendars, ages, incomes, purchased financial products and the like of the users.
In S102, the target encrypted identity data is encrypted identity data common to the at least two second servers.
The encrypted identity data comprises an encrypted certificate type identifier, an encrypted certificate number identifier and an encrypted name identifier. The encrypted certificate type identification uniquely corresponds to the user certificate type, the user certificate number also uniquely corresponds to the encrypted certificate number identification in the same way, and the user name uniquely corresponds to the encrypted name identification.
In some embodiments, the step S102 may specifically include:
matching the encrypted certificate type identification, the encrypted certificate number identification and the encrypted name identification in the encrypted identity data of the plurality of second servers;
and determining the encrypted identity data with the encrypted certificate type identification, the encrypted certificate serial number identification and the encrypted name identification consistent as target encrypted identity data.
In this embodiment, by encrypting the certificate type identifier, the encrypted certificate number identifier, and the encrypted name identifier, the encrypted identification data in each second server can be quickly and accurately matched with the common target encrypted identification data.
In some embodiments, in order to reduce the influence of the encrypted identification data failing to accurately identify the target encrypted identification data in the abnormal condition, after the matching of the encrypted certificate type identifier, the encrypted certificate number identifier and the encrypted name identifier in the encrypted identification data of the plurality of second servers, the method may further include:
determining the encrypted identity data with consistent partial identification in the encrypted certificate type identification, the encrypted certificate serial number identification and the encrypted name identification as abnormal encrypted identity data;
sending an abnormal checking request to a second server corresponding to the abnormal encrypted identity data;
receiving corrected encrypted identity data sent by a second server corresponding to the abnormal encrypted identity data;
matching the encrypted certificate type identification, the encrypted certificate number identification and the encrypted name identification in the encrypted identity data of the plurality of second servers, comprising:
and matching the encrypted identity data of the plurality of second servers with the encrypted certificate type identification, the encrypted certificate number identification and the encrypted name identification in the corrected encrypted identity data.
The determining of the encrypted identity data with the consistent part of the encrypted certificate type identifier, the encrypted certificate serial number identifier and the encrypted name identifier as the abnormal encrypted identity data specifically may include:
determining the encrypted identity data with consistent encrypted certificate type identification, consistent encrypted certificate serial number identification and inconsistent encrypted name identification as abnormal encrypted identity data;
determining the encrypted identity data with inconsistent encrypted certificate type identification, consistent encrypted certificate number identification and inconsistent encrypted name identification as abnormal encrypted identity data;
and determining the encrypted identity data with inconsistent encrypted certificate type identification, consistent encrypted certificate number identification and consistent encrypted name identification as abnormal encrypted identity data.
The abnormal checking request is used for indicating the second server corresponding to the abnormal encrypted identity data to check the abnormal encrypted identity data and obtain the corrected encrypted identity data, and sending the corrected encrypted identity data to the first server. The modified encrypted identification data is data modified by the second server corresponding to the abnormal encrypted identification data after checking the abnormal encrypted identification data according to the abnormal checking request.
In this embodiment, the abnormal encrypted identity data is identified, the corresponding second server is sent to check, and the encrypted identity data and the corrected encrypted identity data are matched again, so that the influence that the encrypted identity data cannot accurately identify the target encrypted identity data under the abnormal condition is reduced.
After the matching of the encrypted certificate type identifier, the encrypted certificate number identifier, and the encrypted name identifier in the encrypted identification data of the plurality of second servers, the method may further include:
determining encrypted identity data with inconsistent encrypted certificate type identification, encrypted certificate serial number identification and encrypted name identification as non-common encrypted identity data;
determining encrypted identity data with consistent encrypted certificate type identification, inconsistent encrypted certificate serial number identification and consistent encrypted name identification as non-common encrypted identity data;
determining the encrypted identity data with consistent encrypted certificate type identification, inconsistent encrypted certificate number identification and inconsistent encrypted name identification as non-common encrypted identity data;
and determining the encrypted identity data with inconsistent encrypted certificate type identification, inconsistent encrypted certificate serial number identification and consistent encrypted name identification as the non-common encrypted identity data.
The above-mentioned non-common encrypted identity data is not used for data fusion.
In S103, the service index data associated with the target encrypted identification data in the at least two second servers may be, for example, data of index 1 and index 2 associated with the target encrypted identification data in company a, and data of index 3, index 4 and index 5 associated with the target encrypted identification data in company B. The service index data associated with the target encrypted identity data in the at least two second servers are fused to obtain fused service index data, which may be data of the target encrypted identity data and associated indexes 1, 2, 3, 4 and 5.
In some embodiments, in order to implement data mining on the converged service index data by the group company, after step S103, the method may further include:
receiving a target request sent by a target second server, wherein the target request comprises a target index;
determining at least one target fusion service index data by using the target index and indexes corresponding to the fusion service index data obtained by fusion, wherein the indexes corresponding to the target fusion service index data comprise target indexes;
and sending the at least one target fusion service index data to a target second server.
The target second server is a second server that sends a target request including a target index.
Illustratively, the target request may be a request that the target index is professional index and the data of the professional index is a teacher.
The target index and the index corresponding to each fusion business index data obtained by fusion are determined to be at least one target fusion business index data, and the index corresponding to each fusion business index data obtained by fusion can be a professional index, and the data of the professional index is teacher data and is determined to be the target fusion business index data.
The target second server uses at least one target fusion service index data, which can be used to help the target second server perform operations such as data mining and effect evaluation on the at least one target fusion service index data.
Illustratively, the first server processes a statistical report (i.e., target fusion business index data) suitable for business decision, and pushes the statistical report to the target second server for display, so that a company corresponding to the first server and a company corresponding to the target second server can view the statistical report, and data barriers are eliminated through the statistical report data, thereby cooperatively providing data support for parent and child companies.
In this embodiment, the target fusion service index data is determined and sent to the target second server according to the target index and the index corresponding to each fusion service index data obtained through fusion, and the target second server is helped to perform operations such as data mining and effect evaluation on at least one target fusion service index data, so that a parent-subsidiary company cooperation mechanism and a shared business opportunity are supported, a development client group is realized, and the cost is reduced.
Based on the data processing method provided by the above embodiment, correspondingly, the application also provides a specific implementation manner of the data processing device. Please see the examples below.
Referring to fig. 3, a data processing apparatus 300 according to an embodiment of the present application is applied to a first server, and the apparatus 300 may include:
the acquiring module 301 is configured to acquire at least one encrypted identity data of each second server in the multiple second servers and service index data associated with each encrypted identity data, where the multiple second servers are second servers of multiple companies, each encrypted identity data is obtained by encrypting user identity data in the acquired service data by the second server, the multiple second servers adopt the same encryption mode, and the service data includes the user identity data and the service index data;
a first determining module 302, configured to match the encrypted identity data of the multiple second servers, and determine target encrypted identity data, where the target encrypted identity data is shared by at least two second servers;
the fusion module 303 is configured to fuse service index data associated with the target encrypted identity data in the at least two second servers to obtain fused service index data.
The data processing device of the embodiment of the application is applied to a first server, and is used for matching encrypted identity data in the same encryption mode adopted by second servers of multiple companies, determining target encrypted identity data (namely, encrypted identity data shared by at least two second servers), and fusing service index data associated with the target encrypted identity data in the at least two second servers to obtain fused service index data. Therefore, the embodiment can directly fuse the service data of different companies according to the encrypted identity data in the same encryption mode, thereby realizing the data fusion of the group companies.
In some embodiments, the encrypted identification data includes an encrypted certificate type identifier, an encrypted certificate number identifier, and an encrypted name identifier.
The first determining module 302 may specifically include:
the matching unit is used for matching the encrypted certificate type identification, the encrypted certificate serial number identification and the encrypted name identification in the encrypted identity data of the plurality of second servers;
and the first determining unit is used for determining the encrypted identity data with the consistent encrypted certificate type identification, encrypted certificate number identification and encrypted name identification as the target encrypted identity data.
In this embodiment, by encrypting the certificate type identifier, the encrypted certificate serial number identifier, and the encrypted name identifier, the encrypted identification data in each second server can be quickly and accurately matched as the common target encrypted identification data.
In some embodiments, in order to reduce the effect that the encrypted identification data cannot accurately identify the target encrypted identification data under the abnormal condition, the first determining module 302 may further include:
the second determining unit is used for determining the encrypted identity data with consistent part of identifiers in the encrypted certificate type identifier, the encrypted certificate serial number identifier and the encrypted name identifier as abnormal encrypted identity data;
a sending unit, configured to send an abnormal checking request to a second server corresponding to the abnormally encrypted identity data, where the abnormal checking request is used to instruct the second server corresponding to the abnormally encrypted identity data to check the abnormally encrypted identity data and obtain modified encrypted identity data, and send the modified encrypted identity data to the first server;
the receiving unit is used for receiving the modified encrypted identity data which is sent by the second server and corresponds to the abnormal encrypted identity data;
the matching unit is further configured to match encrypted identification data of the plurality of second servers with encrypted certificate type identifiers, encrypted certificate serial number identifiers, and encrypted name identifiers in the corrected encrypted identification data.
In this embodiment, the abnormal encrypted identity data is identified, the corresponding second server is sent to check, and the encrypted identity data and the corrected encrypted identity data are matched again, so that the influence that the encrypted identity data cannot accurately identify the target encrypted identity data under the abnormal condition is reduced.
In some embodiments, in order to implement data mining on the converged service index data by the group company, the apparatus 300 may further include:
the receiving module is used for receiving a target request sent by a target second server, and the target request comprises a target index;
the second determining module is used for determining at least one target fusion service index data by using the target index and indexes corresponding to the fusion service index data obtained by fusion, wherein the indexes corresponding to the target fusion service index data comprise target indexes;
and the sending module is used for sending the at least one target fusion service index data to the target second server.
In this embodiment, the target fusion business index data is determined and sent to the target second server according to the target index and the index corresponding to each fusion business index data obtained through fusion, and the target second server is assisted in performing operations such as data mining and effect evaluation on at least one target fusion business index data, so that a parent-subsidiary company cooperation mechanism and a shared business opportunity are supported, a client group is developed, and the cost is reduced.
In some embodiments, the encryption method adopted by the plurality of second servers is an irreversible encryption method.
In this embodiment, the irreversible encryption manner prevents the encrypted identification data of the user from being decrypted, thereby ensuring the security of the user identification data.
Fig. 4 shows a hardware structure diagram of an electronic device according to an embodiment of the present application.
The electronic device may comprise a processor 401 and a memory 402 in which computer program instructions are stored.
Specifically, the processor 401 may include a Central Processing Unit (CPU), or an Application Specific Integrated Circuit (ASIC), or may be configured to implement one or more Integrated circuits of the embodiments of the present Application.
Memory 402 may include mass storage for data or instructions. By way of example, and not limitation, memory 402 may include a Hard Disk Drive (HDD), floppy Disk Drive, flash memory, optical Disk, magneto-optical Disk, magnetic tape, or Universal Serial Bus (USB) Drive or a combination of two or more of these. Memory 402 may include removable or non-removable (or fixed) media, where appropriate. The memory 402 may be internal or external to the integrated gateway disaster recovery device, where appropriate. In a particular embodiment, the memory 402 is non-volatile solid-state memory.
In particular embodiments, memory 402 may include Read Only Memory (ROM), random Access Memory (RAM), magnetic disk storage media devices, optical storage media devices, flash memory devices, electrical, optical, or other physical/tangible memory storage devices. Thus, in general, the memory includes one or more tangible (non-transitory) computer-readable storage media (e.g., memory devices) encoded with software comprising computer-executable instructions and when the software is executed (e.g., by one or more processors), it is operable to perform operations described with reference to the methods according to an aspect of the present disclosure.
The processor 401 reads and executes the computer program instructions stored in the memory 402 to implement any of the data processing methods in the above embodiments.
In one example, the electronic device may also include a communication interface 403 and a bus 410. As shown in fig. 4, the processor 401, the memory 402, and the communication interface 403 are connected via a bus 410 to complete communication therebetween.
The communication interface 403 is mainly used for implementing communication between modules, apparatuses, units and/or devices in the embodiments of the present application.
Bus 410 includes hardware, software, or both coupling components of the electronic device to one another. By way of example, and not limitation, a bus may include an Accelerated Graphics Port (AGP) or other graphics bus, an Enhanced Industrial Standard Architecture (EISA) bus, a Front Side Bus (FSB), a Hyper Transport (HT) interconnect, an Industrial Standard Architecture (ISA) bus, an infiniband interconnect, a Low Pin Count (LPC) bus, a memory bus, a Micro Channel Architecture (MCA) bus, a Peripheral Component Interconnect (PCI) bus, a PCI-Express (PCI-X) bus, a Serial Advanced Technology Attachment (SATA) bus, a video electronics standards association local (VLB) bus, or other suitable bus or a combination of two or more of these. Bus 410 may include one or more buses, where appropriate. Although specific buses are described and shown in the embodiments of the application, any suitable buses or interconnects are contemplated by the application.
The electronic device may execute the data processing method in the embodiment of the present application, so as to implement the data processing method and apparatus described in conjunction with fig. 1 and fig. 3.
In addition, in combination with the data processing method in the foregoing embodiments, the embodiments of the present application may provide a computer-readable storage medium to implement. The computer readable storage medium having stored thereon computer program instructions; the computer program instructions, when executed by a processor, implement any of the data processing methods in the above embodiments.
In combination with the data processing method in the foregoing embodiments, the embodiments of the present application may also provide a computer program product to implement. The instructions in the computer program product, when executed by a processor of an electronic device, cause the electronic device to perform any of the data processing methods in the above embodiments when executed.
It is to be understood that the present application is not limited to the particular arrangements and instrumentalities described above and shown in the attached drawings. A detailed description of known methods is omitted herein for the sake of brevity. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present application are not limited to the specific steps described and illustrated, and those skilled in the art can make various changes, modifications, and additions or change the order between the steps after comprehending the spirit of the present application.
The functional blocks shown in the above-described structural block diagrams may be implemented as hardware, software, firmware, or a combination thereof. When implemented in hardware, it may be, for example, an electronic circuit, an Application Specific Integrated Circuit (ASIC), suitable firmware, plug-in, function card, or the like. When implemented in software, the elements of the present application are the programs or code segments used to perform the required tasks. The program or code segments may be stored in a machine-readable medium or transmitted by a data signal carried in a carrier wave over a transmission medium or a communication link. A "machine-readable medium" may include any medium that can store or transfer information. Examples of a machine-readable medium include an electronic circuit, a semiconductor memory device, a ROM, a flash memory, an Erasable ROM (EROM), a floppy disk, a CD-ROM, an optical disk, a hard disk, an optical fiber medium, a Radio Frequency (RF) link, and so forth. The code segments may be downloaded via computer networks such as the internet, intranet, etc.
It should also be noted that the exemplary embodiments mentioned in this application describe some methods or systems based on a series of steps or devices. However, the present application is not limited to the order of the above steps, that is, the steps may be performed in the order mentioned in the embodiments, may be performed in an order different from the order in the embodiments, or may be performed at the same time.
Aspects of the present disclosure are described above with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the disclosure. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, implement the functions/acts specified in the flowchart and/or block diagram block or blocks. Such a processor may be, but is not limited to, a general purpose processor, a special purpose processor, an application specific processor, or a field programmable logic circuit. It will also be understood that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware for performing the specified functions or acts, or combinations of special purpose hardware and computer instructions.
As described above, only the specific embodiments of the present application are provided, and it can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system, the module and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. It should be understood that the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the present application, and these modifications or substitutions should be covered within the scope of the present application.

Claims (10)

1. A data processing method is applied to a first server, and is characterized by comprising the following steps:
acquiring at least one encrypted identity data of each second server in a plurality of second servers and service index data related to each encrypted identity data, wherein the plurality of second servers are second servers of a plurality of companies, each encrypted identity data is obtained by encrypting user identity data in the acquired service data by the second server, the plurality of second servers adopt the same encryption mode, and the service data comprises the user identity data and the service index data;
matching the encrypted identity data of the plurality of second servers to determine target encrypted identity data, wherein the target encrypted identity data is shared by at least two second servers;
and fusing the related service index data of the target encrypted identity data in at least two second servers to obtain fused service index data.
2. The method of claim 1, wherein the encrypted identity data comprises an encrypted certificate type identifier, an encrypted certificate number identifier, and an encrypted name identifier,
the matching the encrypted identity data of the plurality of second servers to determine the target encrypted identity data includes:
matching the encrypted certificate type identification, the encrypted certificate serial number identification and the encrypted name identification in the encrypted identity data of the plurality of second servers;
and determining the encrypted identity data with the encrypted certificate type identification, the encrypted certificate serial number identification and the encrypted name identification consistent as target encrypted identity data.
3. The method according to claim 2, further comprising, after said matching said encrypted certificate type identification, said encrypted certificate number identification, and said encrypted name identification in encrypted identity data of a plurality of said second servers:
determining the encrypted identity data with part of consistent identification in the encrypted certificate type identification, the encrypted certificate serial number identification and the encrypted name identification as abnormal encrypted identity data;
sending an abnormal checking request to a second server corresponding to the abnormal encrypted identity data, wherein the abnormal checking request is used for indicating the second server corresponding to the abnormal encrypted identity data to check the abnormal encrypted identity data and obtain corrected encrypted identity data, and sending the corrected encrypted identity data to the first server;
receiving the modified encrypted identity data sent by the second server corresponding to the abnormal encrypted identity data;
the matching of the encrypted certificate type identifier, the encrypted certificate number identifier and the encrypted name identifier in the encrypted identification data of the plurality of second servers includes:
and matching the encrypted identification data of the plurality of second servers with the encrypted certificate type identification, the encrypted certificate serial number identification and the encrypted name identification in the corrected encrypted identification data.
4. The method according to claim 1, wherein after the fusing the service indicator data associated with the target encrypted identity data in at least two of the second servers to obtain fused service indicator data, further comprising:
receiving a target request sent by a target second server, wherein the target request comprises a target index;
determining at least one target fusion service index data by using the target index and indexes corresponding to the fusion service index data obtained by fusion, wherein the indexes corresponding to the target fusion service index data comprise the target index;
and sending the at least one target fusion service index data to the target second server.
5. The method according to claim 1, wherein the encryption scheme employed by the plurality of second servers is an irreversible encryption scheme.
6. A data processing apparatus applied to a first server, the apparatus comprising:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring at least one encrypted identity data of each second server in a plurality of second servers and service index data related to each encrypted identity data, the plurality of second servers are second servers of a plurality of companies, each encrypted identity data is obtained by encrypting user identity data in the acquired service data by the second server, the plurality of second servers adopt the same encryption mode, and the service data comprises the user identity data and the service index data;
a first determining module, configured to match encrypted identity data of the plurality of second servers, and determine target encrypted identity data, where the target encrypted identity data is encrypted identity data that is common to at least two of the second servers;
and the fusion module is used for fusing the service index data associated with the target encrypted identity data in at least two second servers to obtain fused service index data.
7. The apparatus of claim 6, wherein the encrypted identity data comprises an encrypted certificate type identifier, an encrypted certificate number identifier, and an encrypted name identifier,
the first determining module includes:
the matching unit is used for matching the encrypted certificate type identification, the encrypted certificate serial number identification and the encrypted name identification in the encrypted identity data of the plurality of second servers;
a first determining unit, configured to determine, as target encrypted identity data, encrypted identity data in which the encrypted certificate type identifier, the encrypted certificate number identifier, and the encrypted name identifier are consistent.
8. An electronic device, characterized in that the device comprises: a processor and a memory storing computer program instructions; the processor, when executing the computer program instructions, implements a data processing method as claimed in any one of claims 1-5.
9. A computer-readable storage medium, having stored thereon computer program instructions, which, when executed by a processor, implement a data processing method according to any one of claims 1 to 5.
10. A computer program product, characterized in that instructions in the computer program product, when executed by a processor of an electronic device, cause the electronic device to perform the data processing method according to any of claims 1-5.
CN202211173723.2A 2022-09-26 2022-09-26 Data processing method, device, equipment and storage medium Pending CN115967522A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211173723.2A CN115967522A (en) 2022-09-26 2022-09-26 Data processing method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211173723.2A CN115967522A (en) 2022-09-26 2022-09-26 Data processing method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115967522A true CN115967522A (en) 2023-04-14

Family

ID=87359122

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211173723.2A Pending CN115967522A (en) 2022-09-26 2022-09-26 Data processing method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115967522A (en)

Similar Documents

Publication Publication Date Title
CN113569267B (en) Privacy safety data set intersection method, device, equipment and storage medium
CN107133233B (en) Processing method and device for configuration data query
CN111339151A (en) Online examination method, device, equipment and computer storage medium
CN113098823B (en) Weak password detection method, device, equipment and medium
CN115967522A (en) Data processing method, device, equipment and storage medium
CN115913625A (en) Information processing method, device, equipment, medium and product
CN116069751A (en) Information processing method, apparatus, device and computer readable storage medium
CN115829572A (en) Cross-chain data interaction method, device, equipment, medium and product
CN115965451A (en) Data checking method, device, electronic equipment, medium and program product
CN114372072A (en) Data storage method, device, equipment, computer storage medium and program product
CN114691742A (en) Information processing method, device, equipment and medium
CN115438037A (en) Data processing method, device, system and storage medium thereof
CN116245525A (en) Transaction data processing method, device and equipment of blockchain and storage medium
CN114168564A (en) Data processing method, device, equipment and computer storage medium
CN115982730A (en) Data acquisition method, device, equipment and computer storage medium
CN114363319B (en) Supervision file processing method, device, medium and electronic equipment
CN116028257A (en) Abnormal data detection method, device, electronic equipment and computer storage medium
CN114676459A (en) Resource access processing method, device, equipment, medium and product
CN116738383A (en) Resource information acquisition method, device, equipment and computer storage medium
CN114661993A (en) Information query method, device, equipment and computer readable storage medium
CN118132655A (en) Information synchronization method, apparatus, device, storage medium, and program product
CN114792268A (en) Bill pushing method, device, equipment, product and readable storage medium
CN117273642A (en) User information management method, device, equipment, medium and product
CN114676290A (en) Abnormal group identification method and device, equipment, readable storage medium and product thereof
CN115222361A (en) Business process flow transfer method, device, equipment and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination