CN116842537A - Marketing box data transmission method and system - Google Patents

Marketing box data transmission method and system Download PDF

Info

Publication number
CN116842537A
CN116842537A CN202310556084.6A CN202310556084A CN116842537A CN 116842537 A CN116842537 A CN 116842537A CN 202310556084 A CN202310556084 A CN 202310556084A CN 116842537 A CN116842537 A CN 116842537A
Authority
CN
China
Prior art keywords
data
service
sensitive
marketing
business
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310556084.6A
Other languages
Chinese (zh)
Inventor
裘耀俊
刘家朝
温挺捷
刘中水
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Youxun Cloud Computing Co ltd
Original Assignee
Shenzhen Youxun Cloud Computing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Youxun Cloud Computing Co ltd filed Critical Shenzhen Youxun Cloud Computing Co ltd
Priority to CN202310556084.6A priority Critical patent/CN116842537A/en
Publication of CN116842537A publication Critical patent/CN116842537A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/30Creation or generation of source code
    • G06F8/36Software reuse

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application relates to the technical field of data transmission, in particular to a marketing box data transmission method and a marketing box data transmission system, wherein the method comprises the following steps: receiving a service inquiry instruction and acquiring a service inquiry code; transmitting the service inquiry code to an in-line system through a marketing box for data interaction to obtain service data; inputting the service data into a preset data conversion model to perform non-sensitive data conversion to obtain non-sensitive service data; encrypting and decrypting the non-sensitive business data, and returning the non-sensitive business data to the marketing box; and outputting the standard data format of the non-sensitive business data in the marketing box based on a format output algorithm corresponding to the business query code. The application can process the data in the lines of different banks in a unified data format and transmission mode through the marketing box, and can realize the butt joint and the external transmission of the data in the lines, so that the business marketing of the banks is deeper and more efficiently executed.

Description

Marketing box data transmission method and system
Technical Field
The application relates to the technical field of data transmission, in particular to a marketing box data transmission method and system.
Background
At present, in order to develop business marketing activities, some banking enterprises can choose to cooperate with a marketing platform of a marketer (a third party) to achieve better marketing effects, and when in cooperation, the marketing platform needs to be in butt joint with data in a bank, but because the data format and the data transmission mode of each bank are not uniform, the marketing platform needs to develop data formats and transmission modes corresponding to different banks to realize the butt joint and the external transmission of the data, so that the marketer needs to develop codes for butting different data formats and data transmission modes based on different banks independently, and the input cost of the marketer is greatly increased; correspondingly, if the docking and the external transmission of the internal data are not realized, the business marketing of the bank cannot be performed deeply and efficiently.
Disclosure of Invention
In order to solve or partially solve the problems in the related art, the application provides a marketing box data transmission method and system, which can process in-line data of different banks through a marketing box in a unified data format and transmission mode so as to output the data to a marketing platform, reduce code development of the marketing platform for independently butting different banks, reduce input cost, and realize butting and outgoing of the in-line data at the same time, so that business marketing of the banks is deeper and more efficiently executed.
In a first aspect, an embodiment of the present application provides a marketing box data transmission method, which adopts the following technical scheme:
a marketing box data transfer method, comprising: receiving a service inquiry instruction and acquiring a service inquiry code; the business inquiry code is transmitted to an in-line system by the business sales box to perform data interaction, so that business data are obtained; inputting the service data into a preset data conversion model to perform non-sensitive data conversion to obtain non-sensitive service data; encrypting and decrypting the non-sensitive business data, and returning the non-sensitive business data to the marketing box; and outputting the standard data format of the non-sensitive business data in the marketing box based on a format output algorithm corresponding to the business query code.
By adopting the technical scheme, the service query code can be acquired by receiving the service query instruction, so that the service query code is transmitted to an in-line system in an operation and marketing box for data interaction to obtain service data, the service data is input into a preset data conversion model for non-sensitive data conversion, the non-sensitive service data can be obtained to protect the data privacy of a user, the non-sensitive service data is encrypted and decrypted to ensure the safety of the data, and the data is returned to a marketing box after being processed, and the non-sensitive service data in the marketing box is output in a standard data format based on a format output algorithm corresponding to the service query code, so that the processing of unified data format and transmission mode can be realized for the in-line data of different banks through the marketing box and the processing of the marketing platform is output to the marketing platform, the code development of the different banks is independently docked, the input cost is reduced, the docking and the external transmission of the business marketing of the banks can be realized more deeply and more efficiently, and the influence of the development work of a new interface on the marketing platform can be avoided by stripping the development work of the docked marketing box end.
Optionally, before the receiving the service query instruction and obtaining the service query code, the method further includes: receiving a sensitivity calibration instruction for data in the in-line system and a correlation instruction for establishing non-sensitive data for a service calibrated as sensitive data; the step of inputting the service data into a preset data conversion model to perform non-sensitive data conversion to obtain non-sensitive service data comprises the following steps: judging whether the service data is marked as the sensitive data or not; if yes, converting the service data into associated non-sensitive data; if not, the conversion processing is not performed.
By adopting the technical scheme, the data sensitivity calibration is carried out on the data in the in-line system in advance, and the association instruction of the non-sensitive data is established for the service of the sensitive data, so that the judgment of whether the data is the sensitive data can be carried out firstly when the data is acquired, and when the data is judged to be the sensitive data, the non-sensitive data conversion is carried out through the preset data conversion model, so that the external transmission of the sensitive data is avoided, the leakage of the sensitive data is caused, and the safety of the data is ensured.
Optionally, the encrypting and decrypting the non-sensitive service data returns to the marketing box, including: encrypting and signing the non-sensitive business data when the non-sensitive business data is transmitted to the marketing box from the in-line system; and when the marketing box receives the non-sensitive business data, the non-sensitive business data is correspondingly decrypted and checked and stored in the marketing box.
By adopting the technical scheme, encryption and signature adding processing are performed when the non-sensitive business data are transmitted to the marketing box from the in-line system, and when the marketing box receives the non-sensitive business data, the non-sensitive business data are correspondingly decrypted and checked and stored in the marketing box after being subjected to signature checking processing, so that the transmitted data can be prevented from being tampered, and the accuracy of the data can be ensured.
Optionally, the receiving a service query instruction, obtaining a service query code, further includes: performing time stamp calibration on the service inquiry instruction; and outputting the standard data format of the non-sensitive business data in the marketing box based on the format output algorithm corresponding to the business query code, wherein the method further comprises the following steps: performing a time stamp mechanism process on the non-sensitive business data acquired in the marketing box, wherein the time stamp mechanism process comprises: if the difference between the time of the acquired non-sensitive service data and the time stamp calibrated by the service inquiry instruction exceeds the preset request time, intercepting the non-sensitive service data and returning an error code.
By adopting the technical scheme, the service inquiry instruction is subjected to time stamp calibration in advance, and then the time stamp mechanism processing is carried out when the marketing box acquires the non-sensitive service data, so that the time difference between the service inquiry instruction and the non-sensitive service data is calculated to judge whether the request time is exceeded, and whether the request possibly belongs to the intercepted packet capturing request is judged, so that the interception operation is triggered when the request time is exceeded, and the safety of the data is further ensured.
Optionally, before the receiving the service query instruction and obtaining the service query code, the method further includes: acquiring the times of receiving the service inquiry instruction by the user account in a certain time period; if the times exceeds the current limiting times, current limiting treatment is carried out on the account; the receiving the service inquiry command, obtaining the service inquiry code, and further comprises: and carrying out preset legal rule analysis on the service inquiry instruction, adding the account number into a blacklist if the illegal operation times are exceeded, and acquiring a service inquiry code if the illegal operation times are not exceeded.
By adopting the technical scheme, the number of times of the service inquiry command received by the user account in a certain time period is obtained in advance, so that whether the request number exceeds the current limiting number of times can be judged, current limiting treatment can be timely carried out when the request number of times exceeds the current limiting number of times, the phenomenon that the same user frequently calls interfaces in a short time to occupy too many resources to cause abnormal phenomena of a platform system is avoided, in addition, whether the user operation is illegal operation can be judged by carrying out preset legal rule analysis on the service inquiry command, and if the user operation is illegal operation for a plurality of times, the user operation can be added into a blacklist to limit the use of the user, and the phenomenon that the normal operation of the platform is influenced by illegal behaviors is avoided.
Optionally, after the outputting the standard data format of the non-sensitive business data in the marketing box based on the format output algorithm corresponding to the business query code, the method further includes: receiving a service destroying instruction and acquiring a destroying service code; and destroying the corresponding data based on the destroying service code.
By adopting the technical scheme, the destroying service codes are acquired by receiving the service destroying instruction, and the business selling box transmits the destroying service codes to the in-line system for destroying the corresponding data, so that management of management personnel on the data can be facilitated, and the flexibility of data operation is improved.
Optionally, after the outputting the standard data format of the non-sensitive service data in the marketing box based on the format output algorithm corresponding to the service query code, the method further includes: storing a log file of a process from receiving the service inquiry instruction to outputting the non-sensitive service in a standard data format to obtain historical data corresponding to a user account; receiving a service tracing instruction and acquiring a service tracing code; and carrying out tracing on the historical data based on the tracing code to acquire data.
By adopting the technical scheme, the historical data can be formed by storing the log file in the process of outputting the standard data format from the service query command to the non-sensitive service, so that when the service traceability command is received, the traceability of the data is realized by tracing and acquiring the data from the historical data based on the traceability code, and the user can conveniently check the historical operation process and analyze the abnormal data.
In a second aspect, an embodiment of the present application provides a marketing box data transmission system, which adopts the following technical scheme:
a marketing box data transfer system, comprising: the code acquisition module is used for receiving the service inquiry instruction and acquiring a service inquiry code; the interaction module is used for transmitting the service inquiry codes to an in-line system through a marketing box to perform data interaction so as to obtain service data; the conversion module is used for inputting the service data into a preset data conversion model to perform non-sensitive data conversion to obtain non-sensitive service data; the security processing module is used for encrypting and decrypting the non-sensitive business data and returning the non-sensitive business data to the marketing box; and the format output module is used for outputting the standard data format of the non-sensitive business data in the marketing box based on a format output algorithm corresponding to the business query code.
By adopting the technical scheme, the service query instruction can be received through the code acquisition module to acquire the service query code, the service query code is transmitted to the in-line system through the interaction module in the business sale box to perform data interaction, service data is obtained, the service data is input into the preset data conversion model through the conversion module to perform non-sensitive data conversion, the non-sensitive service data can be obtained, so that the data privacy of a user is protected, the non-sensitive service data is encrypted and decrypted through the security processing module, the data security can be ensured, the data is returned to the marketing box after being processed, the standard data format output is performed on the non-sensitive service data in the marketing box through the format output module based on the format output algorithm corresponding to the service query code, the processing of unified data format and transmission mode can be realized for the in-line data of different banks through the marketing box, the code development of the different banks is independently docked through the marketing platform, the input cost is reduced, and meanwhile, the docking and the service of the in-line data can be performed more deeply and more efficiently.
Optionally, a marketing box data transmission system further includes: the receiving module is used for receiving a sensitivity calibration instruction for the data in the in-line system and a correlation instruction for establishing non-sensitive data for the service calibrated as the sensitive data; wherein, the conversion module includes: the judging unit is used for judging whether the service data is marked as the sensitive data or not; if yes, converting the service data into associated non-sensitive data; if not, the conversion processing is not performed.
By adopting the technical scheme, the receiving module is used for carrying out data sensitivity calibration on the data in the in-line system in advance, and the receiving module is used for calibrating a service of the sensitive data to establish an associated instruction of the non-sensitive data, so that when the data is acquired, the judging unit is used for judging whether the data is the sensitive data, and when the data is judged to be the sensitive data, the non-sensitive data is converted through the preset data conversion model, so that the leakage of the sensitive data caused by the external transmission of the sensitive data is avoided, and the safety of the data is ensured.
Optionally, the code obtaining module further includes: the calibration unit is used for performing time stamp calibration on the service inquiry instruction; the system further comprises: the mechanism processing module is used for performing timestamp mechanism processing on the non-sensitive business data acquired in the marketing box, and the timestamp mechanism processing comprises the following steps: if the difference between the time of the acquired non-sensitive service data and the time stamp calibrated by the service inquiry instruction exceeds the preset request time, intercepting the non-sensitive service data and returning an error code.
By adopting the technical scheme, the mechanism processing module is used for carrying out timestamp calibration on the service inquiry instruction in advance, and then carrying out timestamp mechanism processing when the marketing box acquires the non-sensitive service data so as to calculate the time difference between the service inquiry instruction and the non-sensitive service data, so as to judge whether the request time is exceeded or not, judge whether the request is likely to belong to the intercepted packet capturing request or not, trigger the intercepting operation when the request time is exceeded, and further ensure the safety of the data.
In summary, the present application includes at least one of the following beneficial technical effects:
1. the business query code can be obtained by receiving the business query instruction, so that the business query code is transmitted to an in-line system in an operation and marketing box to perform data interaction, business data is obtained, the business data is input into a preset data conversion model to perform non-sensitive data conversion, the non-sensitive business data can be obtained to protect the data privacy of a user, the non-sensitive business data is encrypted and decrypted, the safety of the data can be ensured, the processed data is returned to a marketing box, the non-sensitive business data in the marketing box is output in a standard data format based on a format output algorithm corresponding to the business query code, the processing of unified data format and transmission mode can be realized for outputting to a marketing platform, the code development of different banks is independently docked by the marketing platform, the input cost is reduced, the docking and the outsourcing of the current internal data can be realized, the marketing of the banks is performed more deeply and more efficiently, and the influence of the development work of a new interface on the marketing platform on the marketing business can be avoided by stripping the development work of the docking to the marketing box end.
2. By carrying out data sensitivity calibration on data in an in-line system in advance and establishing an association instruction of non-sensitive data for a service of sensitive data, whether the data is the sensitive data or not can be judged firstly when the data is acquired, so that when the data is judged to be the sensitive data, the non-sensitive data is converted through a preset data conversion model, the external transmission of the sensitive data is avoided, the leakage of the sensitive data is caused, and the safety of the data is ensured.
3. The encryption and signing processing are carried out when the non-sensitive business data are transmitted to the marketing box from the in-line system, and when the marketing box receives the non-sensitive business data, the corresponding decryption and signing verification processing are carried out on the non-sensitive business data and then the non-sensitive business data are stored in the marketing box, so that the transmitted data can be ensured not to be tampered, and the accuracy of the data is ensured.
4. The method comprises the steps of carrying out time stamp calibration on a service inquiry instruction in advance, carrying out time stamp mechanism processing when non-sensitive service data are acquired by a marketing box, calculating the time difference between the service inquiry instruction and the non-sensitive service data, judging whether the request time is exceeded, judging whether the request time possibly belongs to a request for intercepting a packet or not, triggering interception operation when the request time is exceeded, and further ensuring the safety of the data.
Drawings
Fig. 1 is a schematic diagram of an application scenario of a marketing box data transmission method according to an embodiment of the present application;
FIG. 2 is a flow chart of a method for transmitting marketing box data according to an embodiment of the present application;
FIG. 3 is a flow chart of a method for transmitting marketing box data according to another embodiment of the present application;
FIG. 4 is a flow chart of a marketing box data transmission method according to another embodiment of the present application;
fig. 5 is a schematic structural diagram of a marketing box data transmission system according to an embodiment of the present application.
Detailed Description
The terminology used in the following embodiments of the application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," "the," and "the" are intended to include the plural forms as well, unless the context clearly indicates to the contrary. It should also be understood that the term "and/or" as used in this disclosure refers to and encompasses any or all possible combinations of one or more of the listed items.
The terms "first," "second," "third," and the like, are used below for descriptive purposes only and are not to be construed as implying or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first", "a second", or a third "may explicitly or implicitly include one or more such feature, and in the description of embodiments of the application, unless otherwise indicated, the meaning of" a plurality "is two or more.
In the related technology, as the data format and the data transmission mode of each bank are not uniform, the marketing platform is required to develop the data formats and the transmission modes corresponding to different banks so as to realize the docking and outsourcing of the data, and the marketer is required to independently develop codes for docking different data formats and data transmission modes based on different banks, so that the input cost of the marketer is greatly increased; correspondingly, if the docking and the external transmission of the internal data are not realized, the business marketing of the bank cannot be performed deeply and efficiently.
Therefore, in order to solve or partially solve the problems in the related art, the application provides a marketing box data transmission method and system, which can process the intra-bank data of different banks through a marketing box in a unified data format and transmission mode so as to output the data to a marketing platform, reduce the code development of the marketing platform for independently butting different banks, reduce the input cost, and simultaneously realize the butting and the outward transmission of the intra-bank data, so that the business marketing of the banks is deeper and more efficiently executed.
The following describes the technical scheme of the embodiment of the present application in detail with reference to the accompanying drawings.
Referring to fig. 1, a schematic diagram of a scenario applied to a data transmission method of a marketing box relates to a process of data interaction between a bank marketing platform, the marketing box and a plurality of in-line systems of banks (A, B, C … N), the bank marketing platform is used for interfacing with in-line system data of the banks via the marketing box, the marketing box obtains corresponding data from the in-line system of a designated bank based on a request instruction of the bank marketing platform, and unifies data formats and data transmission modes to transmit the data to the bank marketing platform, so as to realize interfacing and exporting of the in-line data, thereby enabling business marketing of the banks to be performed more deeply and more efficiently.
Referring to fig. 2, a marketing box data transmission method includes the steps of:
s10, receiving a service inquiry command, and acquiring a service inquiry code;
the query code can be understood that the corresponding codes are preset for the corresponding services, for example, a user enters into the corresponding service activity through an advertisement or an activity center in a marketing platform of a bank, and when the query service identifier is clicked, the platform receives the service identifier instruction, searches for and obtains the corresponding codes, so that the service query instruction can be executed later.
S20, the business inquiry code is transmitted to an in-line system by the business sales box to perform data interaction, so that business data are obtained;
the marketing box can be understood as a data processing medium of a bank marketing platform and a bank, and is used for transmitting a request of the marketing platform to an in-line system of the bank, and the in-line system transmits the requested data to the marketing box to perform unified processing of a data format and a transmission mode after receiving the request, and transmits the request data to the marketing platform after the processing is completed.
S30, inputting the service data into a preset data conversion model to perform non-sensitive data conversion to obtain non-sensitive service data;
the preset data conversion model may be understood as a preset data conversion algorithm to convert sensitive data into non-sensitive data. Sensitive data can be understood as private data, common names, identification numbers, addresses, telephones, bank account numbers, mailboxes, passwords and the like, and non-sensitive data corresponding to sensitive data can be understood as well-known data.
In this embodiment, in order to avoid leakage of a specific fund amount in sensitive data, for example, a user account, acquired data needs to be converted into non-sensitive data through a preset data conversion model, the preset data conversion model can divide different fund amounts into a/B/C grades, the grades are transmitted in a fund grade form, that is, non-sensitive service data, a marketer can acquire the fund grade of the user on a platform, so that after knowing the grade, the marketer can push a deep marketing activity based on the fund grade of the user, and meanwhile, leakage of detailed information of the user can be avoided.
S40, encrypting and decrypting the non-sensitive business data, and returning the non-sensitive business data to the marketing box;
in the process of transmitting the non-sensitive business data to the marketing box in the in-line system, encryption and decryption processing can be performed in the in-line system, so that abnormal situations such as tampering of the data during transmission can be avoided, and the accuracy of the data is influenced. In this embodiment, the encryption and decryption process may be performed by a cryptographic algorithm.
S50, outputting the standard data format of the non-sensitive business data in the marketing box based on a format output algorithm corresponding to the business query codes.
When the service query code is the service query code, the format of the data is converted based on a conventional data model algorithm corresponding to a preset format output algorithm, for example, the output standard data format is [ task code: 1, a step of; number of completion: 2; the latest completion time: "2023-04-26 09:12:34").
When the service query is encoded as a client corresponding to the invitation, the format of the data may be converted based on a data model corresponding to a preset MGM (member get member, client introduction client) mode, for example, the output standard data format is [ inviter client number: 123, a step of; invitee client number: 246. Invitee name: zhang Xiaogong; invited person phone number: 12345678911; whether the invitation was successful: if the data format is sensitive data, the corresponding words of "Zhang Xiaogong" are converted to "red" and "12345678911" are converted to "123" 911 "respectively.
In this embodiment, the format output algorithm and the output data format are not limited, and may be set according to actual requirements, as long as the marketing box transmits the data transmitted by different banks to the marketing platform in a unified format and a transmission mode.
In another embodiment, referring to fig. 3, before step S10, further includes:
s01, receiving a sensitivity calibration instruction for data in an in-line system and establishing a correlation instruction for non-sensitive data for a service calibrated as sensitive data;
in the in-line system, for example, the name, sex, payment mode opened, page logged and browsed, loan condition, financial product purchased and the like of the user are marked as non-sensitive data, the balance of the financial property, VIP level in the line and the like are marked as sensitive data, and the corresponding sensitive data such as the balance of the financial property can be provided with the non-sensitive data (amount level) to correlate the financial property and the amount level.
Wherein, the corresponding step S30 includes:
judging whether the service data is marked as sensitive data or not; if yes, converting the service data into associated non-sensitive data; if not, the conversion processing is not performed.
Referring to fig. 3, step S40 includes:
s41, encrypting and signing the non-sensitive business data when the non-sensitive business data are transmitted to a marketing box from an in-line system;
the encryption and signing processing are carried out when the data are transmitted to the marketing box, so that the influence of external factors on the accuracy of the data caused by packet grabbing and tampering can be avoided.
The encryption process may be to encrypt key fields, such as user passwords directly through md5, or to add an encryption layer (SSL layer) between http and tcp using https protocol. Wherein, in order to ensure the request security, all requests can be encrypted by a national encryption algorithm.
The signing process may refer to a process of performing computation such as a hash algorithm on data and then performing digital signature by using a private key to ensure that the data is not tampered with during transmission. To ensure that the requests are secure, all requests may be signed by a cryptographic algorithm.
S42, when the marketing box receives the non-sensitive business data, the non-sensitive business data is correspondingly decrypted and checked and stored in the marketing box;
the data encrypted and signed in step S41 needs to be decrypted and signed when transmitted to the marketing box, and the decryption and signature verification are performed by using the national encryption algorithm.
In another embodiment, step S10 further includes:
s02, performing time stamp calibration on the service inquiry instruction;
the time stamp calibration can be understood as calibrating the time of receiving the service inquiry command so as to facilitate the subsequent inquiry request time.
Correspondingly, in step S50, the method further includes:
s43, performing time stamp mechanism processing on the non-sensitive business data acquired from the marketing box;
wherein the timestamp mechanism processing may include: if the difference between the time of the acquired non-sensitive service data and the time stamp calibrated by the service inquiry instruction exceeds the preset request time, intercepting the non-sensitive service data and returning an error code.
When the time stamp of the service inquiry instruction is different from the time of the non-sensitive service data acquired in the marketing box by more than 3 minutes, the service inquiry instruction can be judged to belong to the intercepted packet capturing request, and the judgment can be triggered to directly intercept the request so as to avoid inaccuracy of the data.
In another embodiment, before step S10, the method further includes:
s03, acquiring the times of receiving service inquiry instructions by a user account in a certain time period;
s04, if the number of times exceeds the current limiting number of times, current limiting treatment is carried out on the account;
the current limiting times, that is, the time threshold value, can be preset, the setting in the steps S03-S04 can be understood as a current limiting mechanism, when the marketing box interface is frequently called for data query in a short time by the same user, the corresponding account id is required to be subjected to current limiting treatment, so that the phenomenon that the platform system is abnormal due to the fact that the interface is frequently called in a short time by the same user and too many resources are occupied is avoided, and the corresponding current limiting times comprise a token bucket algorithm and a bucket leakage algorithm. In this embodiment, since the token bucket algorithm and the leaky bucket algorithm are related technologies in the prior art, detailed descriptions thereof are omitted.
Correspondingly, step S10 further includes:
s11, carrying out preset legal rule analysis on the service inquiry instruction, adding the account number into a blacklist if the illegal operation times are exceeded, and acquiring the service inquiry code if the illegal operation times are not exceeded.
In step S11, a validity check is performed on the data to verify whether the data is valid, and the data is processed only when the data is valid. The illegal operation times can be set according to actual conditions, and when the account is added into the blacklist, all requests can directly return error codes.
In another embodiment, referring to fig. 4, after step S50, further includes:
s60, storing a log file in the process of outputting a standard data format from receiving a service inquiry instruction to a non-sensitive service to obtain historical data corresponding to a user account;
the log files can be packed and compressed and then stored in the history directory, so that the log files are prevented from occupying too much storage space, and subsequent searching and tracing are facilitated.
S70, receiving a service tracing instruction to acquire a service tracing code;
the service tracing codes can be correspondingly searched in the history catalogue, so that the searching efficiency is improved.
S80, tracing back and acquiring data from the historical data based on the tracing back coding.
The data can be obtained by tracing, so that a user can conveniently check the history operation process, and the analysis of the abnormal data is realized.
In another embodiment, after step S50, further includes:
s90, receiving a service destroying instruction and acquiring a destroying service code;
and S100, destroying the corresponding data based on the destroying service codes.
The service destruction instruction and the destruction data received in the steps S90-S100 are both in the marketing platform, and the management personnel initiates the instruction, so that the whole life of the data can be managed through the steps S90-S100 and the steps S10-S50, and the management personnel can conveniently operate and manage the data.
Referring to fig. 4, a marketing box data transfer system is disclosed for another embodiment of the application, comprising: the system comprises a code acquisition module 21, an interaction module 22, a conversion module 23, a security processing module 24 and a format output module 25.
The code acquisition module 21 is configured to receive a service query instruction and acquire a service query code; the interaction module 22 is used for transmitting the service inquiry code to the in-line system for data interaction by operating the sales box to obtain service data; the conversion module 23 is configured to input service data into a preset data conversion model to perform non-sensitive data conversion, so as to obtain non-sensitive service data; the security processing module 24 performs encryption and decryption processing on the non-sensitive business data and returns the non-sensitive business data to the marketing box; the format output module 25 is configured to perform standard data format output on the non-sensitive service data in the marketing box based on a format output algorithm corresponding to the service query code.
In another embodiment, a marketing box data transfer system, further comprising: a receiving module 26, configured to receive a sensitivity calibration instruction for data in the in-line system, and an association instruction for establishing non-sensitive data for a service calibrated as sensitive data;
wherein the conversion module 23 comprises: a judging unit 231 for judging whether the service data is calibrated as sensitive data; if yes, converting the service data into associated non-sensitive data; if not, the conversion processing is not performed.
In another embodiment, the code acquisition module 21 further comprises: the calibration unit 211 is configured to perform time stamp calibration on the service query instruction.
Wherein, a marketing box data transmission system still includes: the mechanism processing module 27 is configured to perform a timestamp mechanism processing on the non-sensitive service data acquired in the marketing box, where the timestamp mechanism processing includes: if the difference between the time of the acquired non-sensitive service data and the time stamp calibrated by the service inquiry instruction exceeds the preset request time, intercepting the non-sensitive service data and returning an error code.
It should be noted that, in the marketing box data transmission system disclosed in this embodiment, a marketing box data transmission method is implemented, as in the above embodiment, and therefore, a detailed description thereof will not be given here. Alternatively, each module in the present embodiment and the other operations or functions described above are respectively for realizing the method in the foregoing embodiment.
Another embodiment of the present application provides a computer-readable storage medium. The computer readable storage medium is, for example, a nonvolatile memory, which is, for example: magnetic media (e.g., hard disk, floppy disk, and magnetic strips), optical media (e.g., CDROM disks and DVDs), magneto-optical media (e.g., optical disks), and hardware systems specially constructed for storing and performing computer-executable instructions (e.g., read-only memory (ROM), random Access Memory (RAM), flash memory, etc.). Computer-readable storage medium 40 has stored thereon computer-executable instructions. The computer-readable storage medium may be executable by one or more processors or processing systems to implement the image editing method in the foregoing first embodiment.
In addition, it should be understood that the foregoing embodiments are merely exemplary illustrations of the present application, and the technical solutions of the embodiments may be arbitrarily combined and matched without conflict in technical features, contradiction in structure, and departure from the purpose of the present application.
In the several embodiments provided by the present application, it should be understood that the disclosed systems and methods may be implemented in other ways. For example, the system embodiments described above are merely illustrative, e.g., the partitioning of elements is merely a logical functional partitioning, and there may be additional partitioning in actual implementation, e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted, or not implemented. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interface, system or unit indirect coupling or communication connection, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit/module in the embodiments of the present application may be integrated in one processing unit/module, or each unit/module may exist alone physically, or two or more units/modules may be integrated in one unit/module. The integrated units/modules may be implemented in hardware or in hardware plus software functional units/modules.
The integrated units/modules implemented in the form of software functional units/modules described above may be stored in a computer readable storage medium. The software functional units described above are stored in a storage medium and include instructions for causing one or more processors of a computer device (which may be a personal computer, a server, or a network device, etc.) to perform some steps of the methods of the various embodiments of the application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, or other various media capable of storing program codes.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and are not limiting; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application.

Claims (10)

1. A method of marketing box data transfer, comprising:
receiving a service inquiry instruction and acquiring a service inquiry code;
the business inquiry code is transmitted to an in-line system by the business sales box to perform data interaction, so that business data are obtained;
inputting the service data into a preset data conversion model to perform non-sensitive data conversion to obtain non-sensitive service data;
encrypting and decrypting the non-sensitive business data, and returning the non-sensitive business data to the marketing box;
and outputting the standard data format of the non-sensitive business data in the marketing box based on a format output algorithm corresponding to the business query code.
2. The marketing box data transmission method of claim 1, further comprising, prior to said receiving the service query command, obtaining the service query code:
receiving a sensitivity calibration instruction for data in the in-line system and a correlation instruction for establishing non-sensitive data for a service calibrated as sensitive data;
the step of inputting the service data into a preset data conversion model to perform non-sensitive data conversion to obtain non-sensitive service data comprises the following steps:
judging whether the service data is marked as the sensitive data or not; if yes, converting the service data into associated non-sensitive data; if not, the conversion processing is not performed.
3. The marketing box data transmission method according to claim 1, wherein the encrypting and decrypting the non-sensitive business data, returning to the marketing box, comprises:
encrypting and signing the non-sensitive business data when the non-sensitive business data is transmitted to the marketing box from the in-line system;
and when the marketing box receives the non-sensitive business data, the non-sensitive business data is correspondingly decrypted and checked and stored in the marketing box.
4. The marketing box data transmission method of claim 1, wherein the receiving a service query command, obtaining a service query code, further comprises:
performing time stamp calibration on the service inquiry instruction;
wherein, before the outputting the standard data format of the non-sensitive business data in the marketing box based on the format output algorithm corresponding to the business query code, the method further comprises:
performing a time stamp mechanism process on the non-sensitive business data acquired in the marketing box, wherein the time stamp mechanism process comprises: if the difference between the time of the acquired non-sensitive service data and the time stamp calibrated by the service inquiry instruction exceeds the preset request time, intercepting the non-sensitive service data and returning an error code.
5. The marketing box data transmission method of claim 1, further comprising, prior to said receiving the service query command, obtaining a service query code:
acquiring the times of receiving the service inquiry instruction by the user account in a certain time period;
if the times exceeds the current limiting times, current limiting treatment is carried out on the account;
the receiving the service inquiry command, obtaining the service inquiry code, and further comprises:
and carrying out preset legal rule analysis on the service inquiry instruction, adding the account number into a blacklist if the illegal operation times are exceeded, and acquiring a service inquiry code if the illegal operation times are not exceeded.
6. The marketing box data transmission method of claim 1, further comprising, after the outputting the non-sensitive business data in the marketing box in a standard data format based on the format output algorithm corresponding to the business query code:
receiving a service destroying instruction and acquiring a destroying service code;
and destroying the corresponding data based on the destroying service code.
7. The marketing box data transmission method of claim 1, wherein after the outputting the non-sensitive business data in the marketing box in the standard data format based on the format output algorithm corresponding to the business query code, further comprising:
storing a log file of a process from receiving the service inquiry instruction to outputting the non-sensitive service in a standard data format to obtain historical data corresponding to a user account;
receiving a service tracing instruction and acquiring a service tracing code;
and carrying out tracing on the historical data based on the tracing code to acquire data.
8. A marketing box data transfer system, comprising:
the code acquisition module is used for receiving the service inquiry instruction and acquiring a service inquiry code;
the interaction module is used for transmitting the service inquiry codes to an in-line system through a marketing box to perform data interaction so as to obtain service data;
the conversion module is used for inputting the service data into a preset data conversion model to perform non-sensitive data conversion to obtain non-sensitive service data;
the security processing module is used for encrypting and decrypting the non-sensitive business data and returning the non-sensitive business data to the marketing box;
and the format output module is used for outputting the standard data format of the non-sensitive business data in the marketing box based on a format output algorithm corresponding to the business query code.
9. The marketing box data transfer system of claim 8, further comprising:
the receiving module is used for receiving a sensitivity calibration instruction for the data in the in-line system and a correlation instruction for establishing non-sensitive data for the service calibrated as the sensitive data;
wherein, the conversion module includes:
the judging unit is used for judging whether the service data is marked as the sensitive data or not; if yes, converting the service data into associated non-sensitive data; if not, the conversion processing is not performed.
10. The marketing box data transfer system of claim 9, wherein the code acquisition module further comprises:
the calibration unit is used for performing time stamp calibration on the service inquiry instruction;
the system further comprises:
the mechanism processing module is used for performing timestamp mechanism processing on the non-sensitive business data acquired in the marketing box, and the timestamp mechanism processing comprises the following steps: if the difference between the time of the acquired non-sensitive service data and the time stamp calibrated by the service inquiry instruction exceeds the preset request time, intercepting the non-sensitive service data and returning an error code.
CN202310556084.6A 2023-05-16 2023-05-16 Marketing box data transmission method and system Pending CN116842537A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310556084.6A CN116842537A (en) 2023-05-16 2023-05-16 Marketing box data transmission method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310556084.6A CN116842537A (en) 2023-05-16 2023-05-16 Marketing box data transmission method and system

Publications (1)

Publication Number Publication Date
CN116842537A true CN116842537A (en) 2023-10-03

Family

ID=88162428

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310556084.6A Pending CN116842537A (en) 2023-05-16 2023-05-16 Marketing box data transmission method and system

Country Status (1)

Country Link
CN (1) CN116842537A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130013491A1 (en) * 2011-04-19 2013-01-10 Early Warning Sevices, LLC System and method for detecting and mitigating duplicate transaction fraud
CN107545031A (en) * 2017-07-17 2018-01-05 招商银行股份有限公司 Account comprehensive inquiry service, system and computer-readable recording medium
CN110502916A (en) * 2018-05-16 2019-11-26 苏宁易购集团股份有限公司 A kind of sensitive data processing method and system based on block chain
US20200186344A1 (en) * 2018-12-04 2020-06-11 Journey.ai Controlling transmission of information through a zero-knowledge data management network
CN111371702A (en) * 2020-02-28 2020-07-03 中国平安人寿保险股份有限公司 Data forwarding method and device, electronic equipment and storage medium
CN112306801A (en) * 2020-10-28 2021-02-02 联通(广东)产业互联网有限公司 Monitoring data processing method, system and medium based on heterogeneous data source
CN115982765A (en) * 2022-12-28 2023-04-18 中移信息技术有限公司 Data desensitization method, device, equipment and computer readable storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130013491A1 (en) * 2011-04-19 2013-01-10 Early Warning Sevices, LLC System and method for detecting and mitigating duplicate transaction fraud
CN107545031A (en) * 2017-07-17 2018-01-05 招商银行股份有限公司 Account comprehensive inquiry service, system and computer-readable recording medium
CN110502916A (en) * 2018-05-16 2019-11-26 苏宁易购集团股份有限公司 A kind of sensitive data processing method and system based on block chain
US20200186344A1 (en) * 2018-12-04 2020-06-11 Journey.ai Controlling transmission of information through a zero-knowledge data management network
CN111371702A (en) * 2020-02-28 2020-07-03 中国平安人寿保险股份有限公司 Data forwarding method and device, electronic equipment and storage medium
CN112306801A (en) * 2020-10-28 2021-02-02 联通(广东)产业互联网有限公司 Monitoring data processing method, system and medium based on heterogeneous data source
CN115982765A (en) * 2022-12-28 2023-04-18 中移信息技术有限公司 Data desensitization method, device, equipment and computer readable storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SHARAD MEHROTRA等: "Panda: Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data", pages 1 - 14, Retrieved from the Internet <URL:《网页在线公开:https://dl.acm.org/doi/abs/10.1145/3397521》> *
马亚蕾等: "基于区块链的通信网络节点位置隐私加密控制模型设计", 《计算机测量与控制》, vol. 31, no. 4, 11 May 2023 (2023-05-11), pages 246 - 251 *

Similar Documents

Publication Publication Date Title
CN109413087B (en) Data sharing method and device, digital gateway and computer readable storage medium
US20100049966A1 (en) Secret information delivery system and secret information delivery method
KR102119449B1 (en) Aggregation open api platform system, method for prividing financial services using the same and computer program for the same
US20080263645A1 (en) Privacy identifier remediation
CN109347625B (en) Password operation method, work key creation method, password service platform and equipment
CN110633963A (en) Electronic bill processing method, electronic bill processing device, computer-readable storage medium and equipment
CN110648241B (en) Method and device for processing claims based on micro-service architecture
CN113435888A (en) Account data processing method, device, equipment and storage medium
CN111639952A (en) Returned goods checking method, returned goods checking system, returned goods checking server and returned goods checking terminal based on block chain
CN110442654A (en) Promise breaking information query method, device, computer equipment and storage medium
US20220029982A1 (en) Automatically obtaining a signed digital certificate from a trusted certificate authority
CN111523142B (en) Data processing method, device, electronic equipment and medium
CN115514470B (en) Storage method and system for community correction data security
KR102633664B1 (en) Method and apparatus for authenticating address of virtual asset
KR20190027207A (en) System and method for verifying integrity of personal information
CN116702195A (en) Transaction privacy protection method, device and storage medium based on blockchain
CN116842537A (en) Marketing box data transmission method and system
CN112039921B (en) Verification method for parking access, parking user terminal and node server
KR102357595B1 (en) Blockchain-based authentication system and method for preventing interception hacking attacks
CN113360575A (en) Method, device, equipment and storage medium for supervising transaction data in alliance chain
CN117499159B (en) Block chain-based data transaction method and device and electronic equipment
CN111695958A (en) Information safety management system of automobile leasing platform
CN112685786B (en) Financial data encryption and decryption method, system, equipment and storage medium
CN110750808B (en) Bill processing method and device and storage medium device
CN115580394B (en) Privacy data desensitization transmission method and system in property digital system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination