CN117421778B - Data processing method and processing equipment thereof - Google Patents
Data processing method and processing equipment thereof Download PDFInfo
- Publication number
- CN117421778B CN117421778B CN202311743856.3A CN202311743856A CN117421778B CN 117421778 B CN117421778 B CN 117421778B CN 202311743856 A CN202311743856 A CN 202311743856A CN 117421778 B CN117421778 B CN 117421778B
- Authority
- CN
- China
- Prior art keywords
- platform
- data information
- user
- response
- account
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 16
- 238000012545 processing Methods 0.000 title claims abstract description 10
- 230000004044 response Effects 0.000 claims abstract description 102
- 238000011084 recovery Methods 0.000 claims abstract description 32
- 238000012795 verification Methods 0.000 claims description 27
- 230000009467 reduction Effects 0.000 claims description 25
- 238000012502 risk assessment Methods 0.000 claims description 11
- 238000000034 method Methods 0.000 claims description 9
- 230000008859 change Effects 0.000 claims description 3
- 230000001105 regulatory effect Effects 0.000 claims description 2
- 238000011282 treatment Methods 0.000 abstract description 5
- 238000012544 monitoring process Methods 0.000 abstract 1
- 238000004891 communication Methods 0.000 description 10
- 230000002159 abnormal effect Effects 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 230000009471 action Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 230000005856 abnormality Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000011272 standard treatment Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention relates to the technical field of data processing, in particular to a data processing method and processing equipment thereof. The platform records the estimated login period; the platform is used for hiding the data information of the account number, judging whether to recover the data information of the account number which is logged in the platform later, continuously monitoring the data information accessed and consulted by the account number in the platform, judging whether to regulate and control the recovery response limit, continuously judging the risk degree of the account number in the platform in combination with the recovery response limit, and judging whether to restore the data information corresponding to the recovery response limit. And combining the estimated login period and the real-time operation of the user in the platform, judging the risk condition of the user account, and executing different protection treatments on account privacy data information according to the risk judging result, so that when the privacy data of the user is protected, the user can be prevented from using a complicated protection mode to improve the convenience of the use of the user in the platform.
Description
Technical Field
The invention relates to the technical field of data processing, in particular to a data processing method and processing equipment thereof.
Background
For the current public service technology platform, a great amount of data information can be generated in the use process of a user, for example, when the public service technology platform is used, certain browsing records, communication, consultation chat information data and the like can be generated in the platform, and at present, although an account number of a user logging in the platform is encrypted, when a non-user himself logs in the platform, privacy data such as the browsing record data, the communication, the consultation chat information and the like generated by the user using the platform are in a direct leakage state, so that the protection degree of the platform on the privacy data of the user is greatly influenced;
with reference to the above, some platforms currently set up a data information encryption manner to encrypt the browsing records generated by the user, and exchange and consult chat information data, but it needs to be considered how the platform determines whether the user logs in for himself, if it cannot be determined, the platform encrypts the data information generated by the user using the platform, which can cause great inconvenience to the user when using the platform later, so how to reasonably and normally protect the data information generated by the user in the platform at present, and meanwhile, the convenience of user use can not be affected is a problem that needs to be solved at present.
Disclosure of Invention
Aiming at the defects existing in the prior art, the invention provides a data processing method and processing equipment thereof, which can effectively solve the problem that the privacy data of a user account cannot be reasonably and normally protected in a platform according to the actual operation of the user in the platform in the prior art.
In order to achieve the above purpose, the invention is realized by the following technical scheme:
the invention provides a data processing method, which comprises the following steps:
s100, providing a subsequent estimated login period by a platform, and recording the estimated login period based on the selection of a user;
s200, after the account exits the platform, hiding the data information of the account by the platform, wherein:
judging whether to recover the data information of the account number in the subsequent login platform according to the estimated login period, and setting a recovery response limit;
s300, enabling the platform to continuously monitor the data information accessed and consulted by the account in the platform based on the recovery response limit, and judging whether to regulate the recovery response limit so as to change the recovery amount of the account data information in the platform, wherein:
and continuously judging the risk degree of the account in the platform in combination with the recovery response limit, and judging whether to restore the data information corresponding to the recovery response limit based on the risk degree so as to form risk protection.
Further, in S100, the platform provides a subsequent estimated login period to be generated according to the login time of the last week or month of the user, and sets a key-in module to enable the user to set the estimated login period by himself.
Further, in S200, the platform checks according to the estimated login period and determines whether to regulate the recovery response limit, wherein:
the recovery response limit comprises a primary response stage, a supplementary response stage and a primary response one-time reduction stage;
and when the estimated login period accords with the estimated login period recorded by the platform, executing a first-order response stage to locally recover the data information hidden by the platform.
Further, in S300, when the platform monitors that the data information accessed by the user is the data information hidden by the platform for account number based on the first-order response phase, a supplementary response phase is executed to fully recover the data information hidden by the platform.
Further, when the data information accessed by the user is monitored to be the data information hidden by the platform for account, a limit time threshold is set, and whether to execute the supplementary response stage is judged based on the limit time threshold.
Further, when the platform monitors that the data information accessed by the user is not the data information hidden by the platform for the account on the basis of the first-order response stage, the platform generates a popup verification instruction to perform security verification on the user and generate a security verification state, wherein the following operations are respectively performed according to the security verification state judgment:
executing a first-order response one-time reduction stage when the security verification state is the security verification failure;
and when the security verification state is that the security verification is successful, the first-order response one-time reduction stage is not executed.
Further, when the primary response one-time reduction stage is executed, the platform combines the primary response one-time reduction stage, and performs regional risk assessment operation on the account to judge the risk degree of the account in the platform, and judges whether to execute the primary response reduction stage to restore the data information based on the risk degree so as to protect the data information.
Further, in S200, the platform checks according to the estimated login period, and when it is determined that the recovery response limit is not regulated, and when it is monitored that the data information accessed by the user is the data information hidden by the platform for the account, it is determined that:
and generating a popup verification instruction, and judging the risk condition of the account number so as to determine whether to execute the step of deleting the hidden data information.
The invention also provides a data processing device comprising:
one or more processors;
a storage means for storing one or more programs;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the steps of the data processing method of any of the preceding claims.
Compared with the prior art, the technical scheme provided by the invention has the following beneficial effects:
by combining the estimated login period and the real-time operation of the user in the platform, the risk condition of the user account is comprehensively judged, and different protection treatments of account privacy data information are executed according to the risk judgment result, so that when the privacy data of the user are protected, the user can be prevented from being used in the platform in a complicated protection mode, and the convenience is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It is evident that the drawings in the following description are only some embodiments of the present invention and that other drawings may be obtained from these drawings without inventive effort for a person of ordinary skill in the art.
FIG. 1 is a schematic diagram of the overall process of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. It will be apparent that the described embodiments are some, but not all, embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The invention is further described below with reference to examples.
Example 1 (see fig. 1): a data processing method comprising the steps of:
s100, providing a subsequent estimated login period by a platform, and determining the estimated login period based on the selection of a user, wherein in the step, after the user logs in the platform currently (such as a public service platform, a human resource service platform and the like are not limited herein), the platform generates popup inquiry information of the subsequent estimated login period, wherein the popup inquiry information provides a plurality of types of subsequent estimated login periods for the user to select the subsequent estimated login period by the user, and simultaneously, after the user selects, the platform records the estimated login period selected by the user;
the estimated login period provided by the platform in the above step is given by way of example, the estimated login period is generated according to the login time of the last week or month of the user, but the method is not limited herein, but is required to be interpreted that when the user selects the estimated login period provided by the platform, the selected estimated login period is the period of the next login of the user to the platform, and popup inquiry information is automatically generated according to the user logging in the platform each time, so that the platform can record the estimated login period selected by the user each time, and is required to be interpreted that the platform limits the user to select only one estimated login period in the selected estimated login period, and a self-limiting input module for self-limiting the estimated login period is also provided in the popup inquiry information, so that the platform can accurately record the estimated login period of the user next time.
S200, after a user exits the platform, the platform hides the data information consulted by the user (hides the data information consulted by the user and hides the data information consulted by the user at the circumference or month), and checks the time of the subsequent login of the user to determine whether the login period is estimated, and it is to be noted that the mode adopted by the user to log in the platform is usually an account key mode, so after the user logs in the platform in this mode, the platform determines whether the login time is estimated, specifically, in the scheme, the platform sets a recovery response limit, wherein the recovery response limit comprises a first-order response stage and a supplementary response stage, and determines whether to execute the recovery response limit according to whether the estimated login period is estimated as above, and the recovery response limit is respectively:
s210, when yes, generating a first-order response stage, giving authority to restore the data information for executing the user consultation by the first-order response stage, wherein the first-order response stage refers to restoring the local data information consulted by the user in the platform, the local data information is determined according to the overall category of the data information consulted by the user in the platform Zhou Du or the month, the authority range of restoring the data information by the local data information is exemplarily given, for example, the overall category of the data information consulted by the user in the platform Zhou Du or the month comprises 2-6 categories of data information, the data information here may be public service item category (such as social security service item, educational service item, medical service item, traffic service item, housing service item, etc. in government affairs service system), item category of information exchange (such as social security service item, educational service item, medical service item, traffic service item, and communication chat information corresponding to housing service item), etc. the authority range of the local data information recovery data information may be given to 1-3 (in order to facilitate the value, the authority range is given to the median of the total data information category here), the data information of each category (social security service item, educational service item, medical service item recovery, refer to recovering the searched data information in the search column of the platform, the corresponding communication information is recovered in the hidden state at the beginning, the communication information refers to the communication and chat information cache data) so as to form the first-order response stage of the platform, meanwhile, the platform forms certain protection for private data information of the user when whether the private data information is logged in by the non-user is uncertain;
and S220, if not, the step S210 is not executed, and the platform judges that the user is suspected to log in the platform, so that the platform keeps the data information of the user consultation hidden in the S200, thereby realizing the protection of the privacy data of the user in the platform, and enabling the platform to generate three-level early warning states (namely, the platform judges that the user logged in an account at the moment has a certain risk degree in advance, namely the user is the non-account original user).
S300, after logging in the platform, the platform continuously monitors the data information accessed and consulted by the account in the platform based on the recovery response limit, and judges whether to regulate the recovery response limit so as to change the recovery amount (hidden data information) of the account data information in the platform, therefore, the following steps are respectively executed according to the step S200 to judge:
s310, after a user logs in the platform, if the platform is in a first-order response stage of the step S210, based on the data information which is initially hidden by the platform and is consulted by the user, the platform segments the data information recovered in the first-order response stage to determine the residual data information which is consulted by the hidden user, so that when the platform monitors that the user accesses in the platform and the consulted data information is the residual data information which is consulted by the hidden user, the platform enables the account number of the user to be in a supplementary response stage, and the supplementary response stage gives permission for recovering the data information which is used for executing the consultation of the user.
It should be noted that, when the platform monitors that the data information of the user accessing and consulting in the platform is the data information of the remaining hidden user consultation, and the platform makes the account number of the user in the supplementary response stage, in the scheme, a time limit threshold is set, for example, the time limit threshold is set on the same day, that is, after the platform is in the first-order response stage, when the data information of the user accessing and consulting in the same day is monitored as the data information of the remaining hidden user consultation, the platform side can determine the supplementary response stage to restore the data information, otherwise, does not determine the supplementary response stage, thereby protecting the user data information in a deep level.
Unlike the step S310 described above, the following steps are:
s320, after the user logs in the platform, the platform is in a first-order response stage of the step S210, and the platform is enabled to divide the data information recovered in the first-order response stage so as to determine the remaining data information for hiding the user consultation, and then:
when the platform monitors that the data information which is accessed and consulted by the user in the platform is not the data information which is consulted by the residual hidden user, the step S310 is not executed;
in addition, the platform is caused to generate the popup verification instruction to perform security verification on the user, and it is to be noted that, for the popup verification instruction: determining remaining hidden user consultation data information based on a first-order response stage, setting the data information corresponding to the first-order response stage as evasion information, randomly extracting non-accessed and non-consultated data information of a user in the platform to form options for accessing and consulting the data information of the last logging platform, and setting the data information to have no typing module, so that the platform monitors the options selected by the user under the popup verification instruction, wherein the options respectively comprise:
s3201, when the user selects the data information which is not accessed and not consulted, the platform judges that the current account has risks (security verification failure), so that a preformed primary response stage is converted into a primary response reduction stage, the authority range of the recovered data information given by the primary response stage is reduced, and a specific reduction value is set, the scheme can be set to 1 class of data information (such as social security service items and corresponding communication chat information thereof, namely, the original recovered social security service items and corresponding communication chat information thereof are hidden again), taking the above S210 as an example, so that the primary response stage recovers the data information of 1-2 classes of local data information consulted by the user in the platform, and it is required to be explained that the primary response stage is not executed when the primary response stage refers to recovering the data information of 1 class of local data information consulted by the user in the platform.
Secondly, for the data information to be reduced and hidden in the first-order response one-time reduction stage, it is necessary to collect the data information in the first-order response stage and perform a sequence according to the latest access time or exchange chat time of the data information, that is, according to the latest time (such as the access time or exchange chat time of the data information, for example, the date of 10 months 5, 10 months 3 and 10 months 6, the latest time sequence from the latest time of 10 months 6, 10 months 5 and 10 months 3) to prioritize the reduced and hidden data information (10 months 6), so as to form protection for the recently accessed or exchanged data information as much as possible.
It should be noted that, when the platform is in the primary reduction stage of the primary response, the platform needs to combine the recovery response limit (including the primary reduction stage of the primary response) to continuously determine the risk degree of the account in the platform, and determine whether to delete the data information corresponding to the recovery response limit based on the risk degree to form risk protection, specifically:
when the platform is in the primary-order response one-time reduction stage, the secondary risk state is synchronously generated, so that the platform executes regional risk assessment operation (risk degree) on the currently logged-in account, and the method for the regional risk assessment operation is as follows:
step one: the platform determines address information corresponding to data information accessed and consulted by a user based on a first-order response stage and a supplementary response stage, if the accessed and consulted data information is a certain enterprise, the platform records regional information corresponding to the enterprise, and it is required to be noted that the regional information in the scheme refers to regional information and calibrated regional information is created based on regions among the determined regional information;
step two: collecting the region information of the current login account of the platform and marking the region information as instant region information;
step three: checking whether the instant region information is in the calibrated region information, when the region corresponding to the instant region information is in the region among the region information, judging that the region risk assessment is normal by the platform, otherwise, judging that the region risk assessment is abnormal, and converting the secondary risk state into the primary risk state.
For the platform to judge that the regional risk assessment is normal and abnormal, because the situation that a user is in a region corresponding to data information is considered to exist after the user accesses and consults the data information through the platform, the situation that the user is not in the region before exists is considered, so that the address information corresponding to the data information accessed and consulted by the user is determined through a first-order response stage and a supplementary response stage, and is checked with the address information currently logged in by the platform to judge whether the immediate regional information logged in by the platform is consistent with the determined calibrated regional information or not, thereby realizing the judgment on the risk condition of an account number, and further realizing the judgment on the risk condition of the account number:
when the primary risk state is generated, the platform pre-judges that the currently logged-in account has risk operation, namely, the primary response one-time reduction stage step is converted into a primary response reduction stage, wherein the primary response reduction stage refers to restoring the data information restored in the primary response stage to be hidden, so that the platform carries out supervision and protection on the private data information of the user, and in the process, the platform synchronously generates early warning information, and the early warning information is the same as the following, and is sent to the terminal to indicate the abnormal state of the current account of the user.
It should be noted that, in the platform, for the first-level risk state, the steps of the middle-and-primary-level response reduction stage are executed in advance, but when the synchronous setting in the platform is in the first-level risk state, the typing module for executing the first-level early warning state step can be set by itself, and when the user is not set, the platform executes the steps of the first-level response reduction stage by default, so as to make reasonable and standard treatment measures on the data information according to the actual condition of the user.
S3202, when the user selects the data information to be absent by using the key-in module, the platform does not execute the step of converting the first-order response stage into the first-order response reduction stage in S330 (successful security verification), so that the first-order response stage is kept unchanged.
S330, after a user logs in the platform, if the platform is not in the initial response stage of the step S210, the platform continuously monitors the access of the user in the platform, and when the data information accessed and consulted by the user is the data information initially hidden by the platform, the popup verification instruction in the step S320 is synchronously generated, so that the option selected by the user is verified, and it is required to be noted that the judgment action made by the platform is different from the judgment actions made by the step S3201 and the step S3202 according to the option given by the popup verification instruction by the user, specifically:
s3301, when a popup verification instruction is generated, when data information which is not accessed and not consulted is selected by a user, the platform creates early warning information, and the early warning information enables the platform to send the early warning information by a mobile phone number bound by the user, so that the early warning information is sent to a terminal corresponding to the mobile phone number of the user, and for the content of the early warning information, the scheme is given in an exemplary way: whether the current platform login operation is the user himself or not is judged according to the reply of the terminal to the early warning information, and then:
when the terminal replies "yes", according to the above situation selected by the user, what needs to be considered here is whether the terminal of the user is in a lost state, the information in the terminal is stolen, and the probability that the reply of the terminal is not the reply of the user, so that:
the access and communication of the data information in the platform are continuously monitored, the platform forms a secondary early warning state, the platform synchronously executes the regional risk assessment operation based on the secondary early warning state, the regional risk assessment operation is the same as the regional risk assessment operation, when the regional risk assessment is abnormal, the secondary early warning state is converted into a primary early warning state (the platform judges the account number to be abnormal according to the condition and the user logs in), and the primary early warning state refers to: the platform deletes the data information consulted by the initial hidden user, wherein the deletion refers to deleting the communication chat record, so that the probability of revealing the private data information is reduced.
It should be noted that, for the current platform, the data information generated by the user during the use of the platform is cached, that is, the cached data is generated, so in this scheme, the cached data is encrypted in advance, so as to realize protection of the cached data, for encryption of the cached data, encryption can be performed by a symmetric encryption algorithm and an asymmetric encryption algorithm, the symmetric encryption algorithm includes a DES encryption algorithm, a 3DES encryption algorithm, and the like, the asymmetric encryption algorithm includes an RSA encryption algorithm, an ECC encryption algorithm, and the like, and for convenience of understanding, the steps of the DES encryption algorithm are exemplarily given as follows:
initial replacement: initial replacement is carried out on the plaintext data, and 64-bit plaintext data are rearranged according to an IP table, so that the original order is disturbed;
key arrangement: generating 16 48-bit sub-keys from the 56-bit key, wherein each sub-key is used in each round of encryption;
16 rounds of iteration: each round of iterations includes the steps of:
A. expansion: expanding the 64-bit data to 128 bits;
B. exclusive or: performing exclusive OR operation on the expanded data and the subkey of the current round;
C.S-box substitution: dividing the data after exclusive or into 8 groups of 6 bits each, and replacing the data by an S-box;
D.P-cassette arrangement: p-box arrangement is performed on the data after S-box replacement, and 128-bit data are rearranged.
Final replacement: the 128 bits of data after 16 iterations are finally permuted and rearranged into 64-bit ciphertext.
The decryption process is a reverse process of the encryption process, the same secret key is used for decrypting the encrypted cache data, the platform can restore the data information by caching the data, so that corresponding data information management and control can be realized based on the current operation in the platform, higher safety protection can be realized on the data information, and the complexity of a user generated when the user is used due to the fact that encryption is executed on the data information under any condition can be avoided.
When the terminal replies no, the platform sends the platform abnormal login again to the terminal, and recommends to modify the reminding information of the login password, so that the platform can remind the abnormality of the user account number, and the user can conveniently carry out corresponding emergency treatment on the platform account number.
Different from the above, when the terminal does not reply in time, the emergency treatment time threshold is set, the emergency treatment time threshold is given for 30 minutes in an exemplary manner, when the terminal is still in a state of not responding to the reply within 30 minutes, the platform is converted into the above-mentioned middle-level early warning state, and the operations corresponding to the above-mentioned first-level early warning state are synchronously executed, so as to realize the protection of the data information.
Finally, the present invention also provides a data processing apparatus, including:
one or more processors;
a storage means for storing one or more programs;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the steps of the data processing method of any of the preceding claims.
The above embodiments are only for illustrating the technical solution of the present invention, and are not limiting; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; these modifications or substitutions do not depart from the essence of the corresponding technical solutions from the protection scope of the technical solutions of the embodiments of the present invention.
Claims (8)
1. A data processing method, comprising the steps of:
s100, providing a subsequent estimated login period by a platform, and recording the estimated login period based on the selection of a user;
s200, after the account exits the platform, hiding the data information of the account by the platform, wherein:
judging whether to recover the data information of the account number in the subsequent login platform according to the estimated login period, and setting a recovery response limit;
s300, enabling the platform to continuously monitor the data information accessed and consulted by the account in the platform based on the recovery response limit, and judging whether to regulate the recovery response limit so as to change the recovery amount of the account data information in the platform, wherein:
continuously judging the risk degree of the account in the platform in combination with the recovery response limit, and judging whether to restore the data information corresponding to the recovery response limit based on the risk degree so as to form risk protection;
the platform checks according to the estimated login period and judges whether to regulate and control the recovery response limit, wherein:
the recovery response limit comprises a primary response stage, a supplementary response stage and a primary response one-time reduction stage;
when the estimated login period accords with the estimated login period recorded by the platform, executing a first-order response stage to locally restore the data information hidden by the platform;
the first-order response stage gives the authority to restore the data information for executing the user consultation, wherein the first-order response stage is used for restoring the local data information consulted by the user in the platform, and the local data information is determined according to the overall category of the data information consulted by the user in the platform Zhou Du or the month;
the supplementary response stage is to recover the data information of the residual hidden user consultation in the platform;
when the user selects the data information which is not accessed and not consulted, the platform judges that the current account has risk, so that a pre-formed primary response stage is converted into a primary response one-time reduction stage, and the authority range given to the primary response stage for recovering the data information is reduced.
2. A data processing method according to claim 1, characterized in that in S100:
the platform provides a subsequent estimated login period to be generated according to the login time of the last week or month of the user, and sets a typing module so that the user can set the estimated login period by himself.
3. A data processing method according to claim 1, characterized in that in S300:
and when the platform monitors that the data information accessed by the user is the data information hidden by the platform on account numbers on the basis of the first-order response stage, executing a supplementary response stage to fully recover the data information hidden by the platform.
4. A data processing method according to claim 3, wherein when it is monitored that the data information accessed by the user is data information hidden by the platform for account:
a limit time threshold is set, based on which it is determined whether to perform the replenishment response phase.
5. The method according to claim 1, wherein when the platform monitors that the data information accessed by the user is not the data information hidden by the platform from the account on the basis of the first-order response phase:
the platform generates a popup verification instruction to perform security verification on the user and generate a security verification state, wherein the following operations are respectively performed according to the security verification state judgment:
executing a first-order response one-time reduction stage when the security verification state is the security verification failure;
and when the security verification state is that the security verification is successful, the first-order response one-time reduction stage is not executed.
6. A data processing method according to claim 5, wherein, when the initial response one-time reduction phase is performed:
the platform combines the first-order response one-time reduction stage, and performs regional risk assessment operation on the account number to judge the risk degree of the account number in the platform, and judges whether to perform the first-order response reduction stage to restore the data information based on the risk degree so as to protect the data information.
7. A data processing method according to claim 1, characterized in that in S200:
the platform checks according to the estimated login period, judges that the recovery response limit is not regulated, and when the data information accessed by the user is monitored to be the data information hidden by the platform for account numbers:
and generating a popup verification instruction, and judging the risk condition of the account number so as to determine whether to execute the step of deleting the hidden data information.
8. A data processing apparatus, comprising:
one or more processors;
a storage means for storing one or more programs;
when executed by the one or more processors, causes the one or more processors to implement the steps of the data processing method of any of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311743856.3A CN117421778B (en) | 2023-12-19 | 2023-12-19 | Data processing method and processing equipment thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311743856.3A CN117421778B (en) | 2023-12-19 | 2023-12-19 | Data processing method and processing equipment thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117421778A CN117421778A (en) | 2024-01-19 |
CN117421778B true CN117421778B (en) | 2024-04-05 |
Family
ID=89525161
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311743856.3A Active CN117421778B (en) | 2023-12-19 | 2023-12-19 | Data processing method and processing equipment thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117421778B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20140038576A (en) * | 2012-09-10 | 2014-03-31 | 엠비욘드 주식회사 | Apparatus for the personal information protection and method for the personal information protection |
CN103902919A (en) * | 2012-12-24 | 2014-07-02 | 北大方正集团有限公司 | Method and device for recovering login information |
CN104125267A (en) * | 2014-06-25 | 2014-10-29 | 小米科技有限责任公司 | Account protection method, device and terminal equipment |
JP2016054430A (en) * | 2014-09-04 | 2016-04-14 | 株式会社富士通ソーシアルサイエンスラボラトリ | Data concealment/restoration device, method and program, data concealment/restoration system, and document creation device |
CN106407837A (en) * | 2016-09-18 | 2017-02-15 | 成都信息工程大学 | A time data encryption processing method having privacy protection capability |
CN110138747A (en) * | 2019-04-23 | 2019-08-16 | 微梦创科网络科技(中国)有限公司 | A kind of method and system for verifying account logging state |
US10891372B1 (en) * | 2017-12-01 | 2021-01-12 | Majid Shahbazi | Systems, methods, and products for user account authentication and protection |
CN114159794A (en) * | 2021-11-30 | 2022-03-11 | 谢娟 | Comprehensive game account data information sharing platform for making friends through data |
-
2023
- 2023-12-19 CN CN202311743856.3A patent/CN117421778B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20140038576A (en) * | 2012-09-10 | 2014-03-31 | 엠비욘드 주식회사 | Apparatus for the personal information protection and method for the personal information protection |
CN103902919A (en) * | 2012-12-24 | 2014-07-02 | 北大方正集团有限公司 | Method and device for recovering login information |
CN104125267A (en) * | 2014-06-25 | 2014-10-29 | 小米科技有限责任公司 | Account protection method, device and terminal equipment |
JP2016054430A (en) * | 2014-09-04 | 2016-04-14 | 株式会社富士通ソーシアルサイエンスラボラトリ | Data concealment/restoration device, method and program, data concealment/restoration system, and document creation device |
CN106407837A (en) * | 2016-09-18 | 2017-02-15 | 成都信息工程大学 | A time data encryption processing method having privacy protection capability |
US10891372B1 (en) * | 2017-12-01 | 2021-01-12 | Majid Shahbazi | Systems, methods, and products for user account authentication and protection |
CN110138747A (en) * | 2019-04-23 | 2019-08-16 | 微梦创科网络科技(中国)有限公司 | A kind of method and system for verifying account logging state |
CN114159794A (en) * | 2021-11-30 | 2022-03-11 | 谢娟 | Comprehensive game account data information sharing platform for making friends through data |
Non-Patent Citations (1)
Title |
---|
一种利用属性加密进行身份认证的隐私保护方案;郑芳;冯丽萍;李平珍;魏建琴;;网络安全技术与应用;20200215(02);第33-36页 * |
Also Published As
Publication number | Publication date |
---|---|
CN117421778A (en) | 2024-01-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102224998B1 (en) | Computer-implemented system and method for protecting sensitive data via data re-encryption | |
US10503133B2 (en) | Real time control of a remote device | |
CN102355350B (en) | A kind of file encrypting method for mobile intelligent terminal and system | |
CA2826837C (en) | System and method for remote reset of password and encrytion key | |
CN103973715B (en) | Cloud computing security system and method | |
JP2006155554A (en) | Database encryption and access control method, and security management device | |
CN109905233A (en) | A kind of device data processing method and system | |
CN116663047A (en) | Fine-granularity safe data sharing method for privacy protection of patient health record | |
CN114520727A (en) | Security chip data protection method and system | |
US11163893B2 (en) | Methods and systems for a redundantly secure data store using independent networks | |
CN117421778B (en) | Data processing method and processing equipment thereof | |
CN117459275A (en) | Data processing method, device and medium based on commercial passwords | |
CN112433871A (en) | Shear plate data protection method and device | |
CN111628864A (en) | Method for carrying out secret key safety recovery by using SIM card | |
KR102542213B1 (en) | Real-time encryption/decryption security system and method for data in network based storage | |
CN113595982B (en) | Data transmission method and device, electronic equipment and storage medium | |
JPH10243470A (en) | Portable telephone security code assignment system and method | |
CN111343421B (en) | Video sharing method and system based on white-box encryption | |
CN113407931A (en) | Password management method and device and input terminal | |
CN117195275B (en) | Data access method, device, electronic equipment and storage medium | |
Bisoyi et al. | Toward securing cyber-physical systems using exact cover set | |
US20240267286A1 (en) | Producing data elements | |
CN101477574A (en) | Encryption and decryption method for data in data base | |
Vinitha et al. | A secured event log storage management system in cloud computing | |
CN114679326A (en) | Method, device and storage medium for forwarding service message |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |