WO2014180206A1 - 数据访问的处理方法、装置及计算及可读存储介质 - Google Patents

数据访问的处理方法、装置及计算及可读存储介质 Download PDF

Info

Publication number
WO2014180206A1
WO2014180206A1 PCT/CN2014/074834 CN2014074834W WO2014180206A1 WO 2014180206 A1 WO2014180206 A1 WO 2014180206A1 CN 2014074834 W CN2014074834 W CN 2014074834W WO 2014180206 A1 WO2014180206 A1 WO 2014180206A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
data
processing
audit
request
Prior art date
Application number
PCT/CN2014/074834
Other languages
English (en)
French (fr)
Inventor
梁昌宇
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2014180206A1 publication Critical patent/WO2014180206A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Definitions

  • the present invention relates to the field of telecommunications, and more particularly to a data access processing method and apparatus, and a computing and readable storage medium.
  • the call center system which is an important means of communication with customers, plays a very important role in current business competition.
  • the call center has become a complete integrated information service system that is integrated with the enterprise. It is an indispensable part of modern enterprise operations and a powerful tool for competition among enterprises.
  • Personal privacy is a secret of a citizen's personal life that is unwilling to be disclosed or known to others, such as an individual's private life, diary, photo album, living habits, communication secrets, physical defects, etc.
  • information technology With the development of information technology, the dissemination of information such as privacy has become more and more convenient. At the same time, privacy has become more and more harmful to individuals, and individuals are paying more and more attention to the protection of privacy.
  • Personal privacy covers a wide range, and the personal privacy associated with the call center system includes name, address, telephone number, work unit, position, and so on. These personal privacy information is important to the call center system, and the call center system can provide customers with more information based on this information. Efficient, high-quality services, however, the privacy of these personal privacy information, if not properly protected, will also have a negative impact on business operations.
  • the embodiments of the present invention provide a data access processing method, a device, and a computing and readable storage medium, which are used to solve the problem that the call center system lacks effective protection of personal information and other problems in the prior art.
  • the data access processing method is applied to the call center system, including:
  • An auditing step is: reviewing, according to the access request, whether the access request has access permission for accessing data, and forming an audit result;
  • the processing step is: processing the access request according to the audit result.
  • the processing step comprises:
  • the processing method further includes: a configuring step, the configuring step is: configuring the access right to be configured for the access data.
  • the configuring step includes: classifying all access data according to the first classification criterion, and setting corresponding access rights for the classified all the access data.
  • the configuring step further includes: classifying the access user according to the second classification criterion, and according to the type of the accessed user The access authority is set for the access user.
  • a data access processing apparatus is provided and used The following technical solutions:
  • a data access processing device applied to a call center system, includes:
  • the auditing module is configured to: according to the access request, review whether the access request has access permission for accessing data, and obtain an audit result;
  • the processing module is configured as a processing step, and the processing step is: processing the access request according to the audit result.
  • the processing module includes:
  • the legal access processing sub-module is configured to perform legal access processing on the access request when the audit result has access rights
  • the illegal access processing submodule is configured to perform an illegal access processing on the access request when the audit result is that the access permission is absent.
  • the processing device further includes:
  • a configuration module configured to configure access rights for the access data.
  • the configuration module includes:
  • the first classification sub-module is configured to classify all access data according to the first classification standard, and set corresponding access rights for the all-access data after the classification.
  • the configuration module further includes:
  • a second classification submodule configured to classify the access user according to the second classification criterion, and set the access authority for the access user according to the type of the access user.
  • the present invention also provides a computer storage medium having stored therein computer executable instructions for performing the method of any one of claims 1 to 5.
  • the customer privacy information of the call center system is classified, and then the access group is classified, and different access rights are set to the access group, and the access control is performed according to whether the customer has the access permission of the access data specified to be accessed.
  • the access control is performed according to whether the customer has the access permission of the access data specified to be accessed.
  • FIG. 1 is a flowchart of a method for processing data access according to an embodiment of the present invention
  • Figure 2 is a block diagram showing the overall structure of the data access processing method according to the embodiment of the present invention
  • Figure 3 is a block diagram showing the structure of the data access processing device according to the embodiment of the present invention.
  • Embodiment 1 is a diagrammatic representation of Embodiment 1:
  • FIG. 1 is a flowchart of a method for processing data access according to an embodiment of the present invention.
  • the data access processing method includes:
  • S101 an auditing step, the auditing step is: reviewing, according to the access request, whether the access request has access permission for accessing data, and forming an audit result;
  • S103 a processing step, the processing step is: processing the access request according to the audit result.
  • the access request in step S101 may generally include two aspects of access rights and access data, which are provided by the accessing user to the system side.
  • the access data is the data that the access operator wants to acquire and is required to be kept secret. Therefore, the corresponding access rights are set for different access users, and only the access data corresponding to the access rights can be obtained from the system side.
  • the system side checks whether the access right corresponding to the access request matches the access data according to the setting of the access right, that is, whether the access user has the right to access the data and is audited.
  • step S103 the system side performs corresponding processing on the access request according to the audit result obtained by the audit access request, that is, when the audit result is that the access user passes the authority verification (that is, when the access right of the access data is available)
  • the corresponding processing is that the access user continues to access the corresponding access data; in the audit result, the access user does not pass the permission verification, indicating that the access user does not have the right to access the data, and the corresponding processing is to deny the access user to continue accessing. Behavior, and return the results of the above processing to the visiting user.
  • the system side checks whether the access authority corresponding to the access request matches the access data according to the setting of the access authority, obtains an audit result, and accesses the access request according to the audit result. Corresponding processing is performed to make strict access control to the access data, which effectively protects the data information.
  • the processing step includes: performing legal access processing on the access request when the audit result is an access right; and performing an illegal access processing on the access request when the audit result is no access right .
  • Access rights here are access rights to access data that has access to the user's specified access.
  • the access request is legally accessed, that is, the access user finally obtains the information of the access data;
  • the request that is, when there is no access right corresponding to the access data, the access request is illegally processed, that is, the access user finally obtains the processing information of the illegal access.
  • the call center system obtains an access request, wherein the access user is an operator, and the access data is specified privacy information, that is, an operation of the call center system.
  • the access user When accessing the specified private information, the user needs to first verify the validity of the access. That is, the operator must review the access rights of the private information through the auditing step to confirm whether the access is legal and valid, and only authorized according to the system configuration.
  • Access will pass the audit, confirm that the operator's access is legal and valid, will give the visit Allowed judgment, otherwise, will not pass the audit, confirm that the operator's access is illegal and invalid, will give a judgment of the rejection of the access; for the access request given by the audit to allow judgment, that is, the access rights match the access data
  • the access request is legally accessed, that is, the specified private information that the operator requests to access is returned; if the access request that gives the rejection judgment that fails the audit, that is, the access right does not match the access data, then the access request is The access request is treated as an illegal access, that is, the operator is ultimately denied access to the private information.
  • the processing method further includes: a configuration step, where the configuring step is: configuring access rights of the access data.
  • each strategy has three elements: one is the scope of access users involved in this policy, the other is the accessed data information involved in this policy, and the third is whether the system should allow or deny access to the user involved in this policy. The data was accessed.
  • the access user is a normal operator or a privileged operator
  • the access data is specified privacy data, such as the customer's phone number and ID number.
  • the policy configuration can determine the following two rules: The employee cannot access the customer's telephone number and ID number. Second, the privileged operator can access the customer's telephone number and ID number.
  • the policy configuration clearly sets the access rights, that is, which access users have access to which access. Data, effectively protecting private data information.
  • the configuring step includes: classifying all access data according to the first classification criterion, and setting corresponding access rights for the classified all the access data.
  • the first classification standard makes each access data belong to one of the types, so that the access data can be The type is set to access access data, so it will greatly improve management efficiency and reduce management complexity.
  • the first classification standard needs to be determined according to actual needs. The definitions that are too strict and too loose are not suitable.
  • the access data can be divided into two types: private information and non-private information, so that which customer information in the call center system belongs to the private information can be defined, for example: The customer's phone number and ID number belong to the customer's private information, so that access to the access data can be set for the type of customer information.
  • the configuring step further includes: classifying the access user according to the second classification criterion, and according to the type of the accessed user The access authority is set for the access user.
  • the classification definition is performed for all access users, so as to further set the access rights
  • the second classification criterion is such that each access user must belong to one of the types, so that the access user can be targeted.
  • the type of access is set for access users, which will greatly improve management efficiency and reduce management complexity.
  • the access users can be divided into two types: a normal operator and a privileged operator.
  • Each access user must belong to one of the types, and the call is based on the size of the call center.
  • the number of access users in the central system is as few as ten, as many as several thousand or even tens of thousands. It is very complicated and inefficient to directly manage whether an operator can access specified private information.
  • the operators in the call center system are divided into different types, and the different types of operators can access the specified private information to manage, which effectively solves the problems of low management efficiency and high management complexity.
  • a call center system by categorizing the access data and the access user, further defining which access data types the access user types have access to, and defining the access data types, completes the above information and policies. Once defined, the call center system already has system setup for customer privacy protection.
  • FIG. 2 is a diagram showing the overall structure of a software access processing method according to an embodiment of the present invention.
  • the overall structure of the software includes: PID: English full name "Pr ivacy Information Def ini ion", privacy information definition module.
  • the function of the module is to define which customer information in the call center system belongs to customer privacy information;
  • APD English full name "Acces s Pol icy Def ini ion”, access control policy definition module. The function of this module is to configure which privacy information the operator has access to.
  • PAC English full name "Pr ivacy Acces s Control”
  • privacy information access control module When the operator accesses the specified private information, it must be audited by the privacy information access control module to confirm that the access is legal and valid. Only authorized access based on system configuration will be allowed.
  • the privacy information access control module determines whether to allow or deny access to the private information according to the policies defined in the access control policy definition module.
  • the architecture of a data processing method is generally described by a software overall structure diagram.
  • the private information is defined by using the PID, and the operator type is defined by using the 0TD.
  • Use APD to define which private information the operator has access to.
  • the call center system already has the system setting work for customer privacy protection; when an operator wants to access the customer's private information, it needs to first perform the access legality verification, PAC according to Information and policies that have been previously defined will ultimately give permission to allow or deny access.
  • PAC access legality verification
  • Information and policies that have been previously defined will ultimately give permission to allow or deny access.
  • the working process of the software architecture is as follows: 1. Classify access data according to the first taxonomy
  • the operator type is defined using 0TD, which determines that the call center system contains a total of two types of operators: general operators and privileged operators;
  • APD Use APD to define which private information the operator has access to. The following two rules are determined: First, the ordinary operator cannot access the customer's telephone number and ID number; second, the privileged operator can access the customer's telephone number and ID number;
  • the operation needs to first perform the access validity verification.
  • the PAC finds that the ordinary operator cannot access the customer's telephone number and ID number according to the previously defined information and policies. Therefore, the access operation will be rejected by the system.
  • the access data is classified, the access user is classified, and the access user is set with different access rights, and the matching relationship between the customer privacy information and the access authority is constructed, according to the matching relationship.
  • Customer privacy information is strictly controlled to effectively protect customer privacy, improve customer service levels, and enhance customer satisfaction.
  • FIG. 3 is a schematic structural diagram of a data access processing apparatus according to an embodiment of the present invention.
  • the processing device for data access includes:
  • the auditing module 20 is configured to: according to the access request, review whether the access has access rights to access data, and obtain an audit result;
  • the processing module 22 is configured to process the access request according to the audit result.
  • the specific structure of the auditing module 22 may include a receiving interface and a processor; the receiving interface may be a wired or wireless communication interface; for example, the wired interface may be a communication interface such as an RJ45, a coaxial cable, or a fiber access interface; The interface may include a receiving antenna or the like.
  • the receiving interface may also be a data receiving interface or a data transmission bus, such as a serial port, disposed inside the device on the processor.
  • the auditing module may separately include the processor.
  • the receiving interface is configured to receive the access request; the processor is connected to the receiving interface; and extracting access data and access rights of the specified access carried in the access request; if the access right is the access
  • the access permission of the data indicates that the access request has access permission for accessing data, otherwise there is no access right corresponding to the accessed data.
  • the specific structure of the processing module 22 may be similar to the processor; the processor processes the access request according to the audit result; the specific processing access request includes responding to the access request, returning the access data according to the access request, or denying the access request, accessing Users cannot get access data.
  • a processor corresponding to the audit module 20 and/or the processing module 22 may be a central processor
  • CPU central processing unit
  • microprocessor MCU microcontroller
  • DSP digital signal processor
  • the auditing module 20 and the processing module 22 may respectively correspond to different processors, or may be integrated corresponding to the same processor; when corresponding to the same processor, the processor may use different threads or time divisions.
  • the code implements the functions of the audit module 20 and the processing module 22.
  • the processing module 22 includes:
  • the legal access processing sub-module is configured to perform legal access processing on the access request when the audit result has access rights
  • the illegal access processing submodule is configured to perform an illegal access processing on the access request when the audit result is that the access permission is absent.
  • the processing device further includes:
  • the configuration module is configured to configure a matching relationship between the access authority and the access data.
  • the configuration module 20 includes:
  • the first classification sub-module is configured to classify all access data according to the first classification standard, and set corresponding access rights for the all-access data after the classification.
  • the configuration module further includes:
  • a second classification submodule configured to classify the access user according to the second classification criterion, and set the access authority for the access user according to the type of the access user.
  • the invention classifies the customer privacy information of the call center system, classifies the visiting groups, and sets different access rights for the visiting group, constructs a matching relationship between the customer privacy information and the access authority, and pairs the customer according to the matching relationship.
  • Privacy letter strict access control to protect customer privacy, improve customer service levels, and enhance customer satisfaction.
  • the embodiment provides hardware support for the data access processing method of the embodiment, which can be used to implement the technical solution described in any one of the embodiments, improve the controllability of data access, and improve customer information. Security, increased user satisfaction.
  • Embodiment 3 is a diagrammatic representation of Embodiment 3
  • the computer storage medium is stored in the computer storage medium, and the computer executable instruction is used to execute the technical solution described in any one of the first embodiment.
  • the computing storage medium described in this embodiment is preferably a non-transitory storage medium, such as a U disk, an optical disk, and a magnetic disk, and the like, which can store information permanently.
  • the device embodiments described above are only schematic. For example, the division of the unit is only a logical function division. In actual implementation, there may be another division manner, such as: multiple units or components may be combined, or Can be integrated into another system, or some features can be ignored, or not executed.
  • the coupling, or direct coupling, or communication connection of the components shown or discussed may be indirect coupling or communication connection through some interfaces, devices or units, and may be electrical, mechanical or other forms. of.
  • the units described above as separate components may or may not be physically separated, and the components displayed as the units may or may not be physical units, that is, may be located in one place or distributed to multiple network units; Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing module, or each unit may be separately used as one unit, or two or more units may be integrated into one unit; the above integration
  • the unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
  • the foregoing storage medium includes: a mobile storage device, a read-only memory (ROM), a random access memory (RAM), a magnetic disk or an optical disk, and the like.
  • ROM read-only memory
  • RAM random access memory
  • magnetic disk or an optical disk and the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

本发明公开数据访问的处理方法与装置,应用于呼叫中心系统,用于对客户隐私信息进行保护。该数据访问的处理方法包括:审核步骤,所述审核步骤为:根据访问请求,审核所述访问请求是否有访问数据的访问权限,并获得审核结果;处理步骤,所述处理步骤为:根据所述审核结果处理所述访问请求。采用本发明的技术方案,可以对客户隐私信息进行了严格的访问控制,以保护客户隐私。本发明还同时公开了一种计算机存储介质。

Description

数据访问的处理方法、 装置及计算及可读存储介质 技术领域 本发明涉及电信领域, 更具体的涉及一种数据访问的处理方法、 装置 及计算及可读存储介质。
背景技术
当前的商业竟争越来越激烈, 对商家的市场、 研发、 客户服务水平的 要求也越来越高。 作为和客户重要联系手段的呼叫中心系统, 在当前的商 业竟争中, 扮演着非常重要的角色。 呼叫中心已经成为与企业连为一体的 一个完整的综合信息服务系统, 是现代企业运营不可或缺的一部分, 同时 也成为企业间竟争的有力工具。
随着业务需求、 IT技术的发展, 呼叫中心系统的架构越来越复杂, 功 能也越来越强大。 但是也给呼叫中心系统提出了越来越高的要求。 一些长 时间以来已经被大家接受的做法也不得不改变, 以适应用户和业务发展的 需要。 客户隐私保护的缺失, 就是这样一个需要现有的呼叫中心系统进行 改变的因素。
个人隐私是公民个人生活中不愿为他人公开或知悉的秘密, 如个人的 私生活、 日记、 照相薄、 生活习惯、 通信秘密、 身体缺陷等。 随着信息技 术的发展, 隐私等信息的传播变得越来越方便同时, 隐私传播给个人带来 的危害也越来越大, 个人也越来越注重隐私的保护。
个人隐私包含的范围比较广, 和呼叫中心系统相关的个人隐私包含了 姓名、 住址、 电话号码、 工作单位、 职务等。 这些个人隐私信息对于呼叫 中心系统而言是重要的, 呼叫中心系统可以根据这些信息对客户提供更加 高效、 优质的服务, 但是, 这些个人隐私信息如果不加以妥善的保护而导 致了隐私的泄漏, 也会给企业运营带来负面影响。
因此, 现有技术中, 呼叫中心系统存在个人信息缺乏有效的保护的问 题, 而对于该问题目前尚未提出有效的解决方案。 发明内容
本发明实施例提供一种数据访问的处理方法、 装置及计算及可读存储 介质, 用于解决现有技术中, 呼叫中心系统存在个人信息缺乏有效的保护 的问题及其他问题。
为实现上述目的, 根据本发明的一个方面, 提供一种数据访问的处理 方法, 并釆用以下技术方案:
数据访问的处理方法, 应用于呼叫中心系统, 包括:
审核步骤, 所述审核步骤为: 根据访问请求, 审核所述访问请求是否 有访问数据的访问权限, 并形成审核结果;
处理步骤, 所述处理步骤为: 根据所述审核结果处理所述访问请求。 优选地, 所述处理步骤包括:
在所述审核结果为有访问权限时, 对所述访问请求作合法访问处理; 在所述审核结果为无访问权限时, 对所述访问请求作非法访问处理。 优选地, 在所述审核步骤之前, 所述处理方法还包括: 配置步骤, 所 述配置步骤为: 配置为所述访问数据配置所述访问权限。
优选地, 所述配置步骤包括: 根据第一分类标准对全部访问数据进行 分类, 并为分类后的所述全部访问数据设置对应的所述访问权限。
优选地, 在所述为分类后的所述全部访问数据设置对应的所述访问权 限之前, 所述配置步骤还包括: 根据第二分类标准对访问用户进行分类, 并根据所述访问用户的类型为所述访问用户设置所述访问权限。
根据本发明的另外一个方面, 提供一种数据访问的处理装置, 并釆用 如下技术方案:
数据访问的处理装置, 应用于呼叫中心系统, 包括:
审核模块, 配置为根据访问请求, 审核所述访问请求是否有访问数据 的访问权限, 并得一审核结果;
处理模块, 配置为处理步骤, 所述处理步骤为: 根据所述审核结果对 所述访问请求 #丈相应处理。
优选地, 所述处理模块包括:
合法访问处理子模块, 配置为在所述审核结果为有访问权限时, 对所 述访问请求作合法访问处理;
非法访问处理子模块, 配置为在所述审核结果为无所述访问权限时, 对所述访问请求作非法访问处理。
优选地, 所述的处理装置还包括:
配置模块, 配置为为所述访问数据配置访问权限。
优选地, 所述配置模块包括:
第一分类子模块, 配置为根据第一分类标准对全部访问数据进行分类, 并为分类后的所述全部访问数据设置对应的所述访问权限。
优选地, 所述配置模块还包括:
第二分类子模块, 配置为根据第二分类标准对访问用户进行分类, 并 根据所述访问用户的类型为所述访问用户设置所述访问权限。
本发明还提供一种计算机存储介质, 所述计算机存储介质中存储有计 算机可执行指令, 所述计算机可执行指令用于执行权利要求 1至 5任一项 所述的方法。
本发明实施例通过将呼叫中心系统的客户隐私信息进行分类, 然后对 访问群体进行分类, 并给访问群体设定不同的访问权限, 根据客户是否有 指定访问的访问数据的访问权限来进行访问控制, 以保护客户隐私, 提升 客户服务水平, 增强客户满意度。 附图说明 附图用来提供对本发明的进一步理解, 构成本申请的一部分, 本发明 的示意性实施例及其说明用于解释本发明, 并不构成对本发明的不当限定。 在附图中:
图 1表示本发明实施例所述的数据访问的处理方法流程图;
图 2表示本发明实施例所述的数据访问的处理方法软件总体结构图; 图 3表示本发明实施例所述的数据访问的处理装置的结构示意图。 具体实施方式 以下结合附图对本发明的实施例进行详细说明, 但是本发明可以由权 利要求限定和覆盖的多种不同方式实施。
实施例一:
图 1表示本发明实施例所述的数据访问的处理方法流程图。
参见图 1所示, 数据访问的处理方法包括:
S101 : 审核步骤, 所述审核步骤为: 根据访问请求, 审核所述访问请 求是否有访问数据的访问权限, 并形成审核结果;
S103 : 处理步骤, 所述处理步骤为: 根据所述审核结果处理所述访问 请求。
具体的, 步骤 S101中的访问请求通常可包括访问权限及访问数据两方 面信息, 由访问用户向系统方提供。 访问数据为访问操作方希望获取而又 被要求保密的数据, 因此针对不同的访问用户设置了相应的访问权限, 只 有访问与访问权限相对应的访问数据才能从系统方获得通过权限验证。 在 权限验证时, 系统方根据访问权限的设定, 审核访问请求所对应的访问权 限与访问数据是否匹配, 即访问用户是否有权访问该数据, 并得到了审核 结果; 在步骤 S103中, 系统方根据审核访问请求得到的审核结果对访问请 求做出相应的处理, 即, 在审核结果为该访问用户通过了权限验证时 (即 有该访问数据的访问权限时), 相应的处理是该访问用户继续访问相应的访 问数据; 在审核结果为该访问用户没有通过权限验证, 表明该访问用户不 具备访问该数据的权限, 相应的处理是拒绝该访问用户继续访问行为, 并 将上述处理的结果返回给访问用户。
在本实施例的上述技术方案中, 通过提出访问请求, 系统方根据访问 权限的设定, 审核访问请求所对应的访问权限与访问数据是否匹配, 得到 一审核结果, 并根据审核结果对访问请求做出相应的处理, 使得对访问数 据进行了严格的访问控制, 有效保护了数据信息。
优选地, 所述处理步骤包括: 在所述审核结果为有访问权限时, 对所 述访问请求作合法访问处理; 在所述审核结果为无访问权限时, 对所述访 问请求作非法访问处理。 此处的有访问权限为有访问用户指定访问的访问 数据的访问权限。
针对该实施例, 即对于通过审核的访问请求, 即有访问对应访问数据 的访问权限时, 则对该访问请求作合法访问处理, 即访问用户最终获得访 问数据的信息; 对于未通过审核的访问请求, 即无访问对应访问数据的访 问权限时, 则对该访问请求作非法访问处理, 即访问用户最终获得非法访 问的处理信息。
在本实施例的上述技术方案中, 以呼叫中心系统为例, 呼叫中心系统 得到一访问请求, 其中访问用户为某个操作员, 访问数据为指定的隐私信 息, 即呼叫中心系统的某个操作员对指定的隐私信息进行访问时, 需要首 先进行访问合法性验证, 即必须通过审核步骤对该操作员对隐私信息的访 问权限进行审核, 以确认访问是否合法有效, 只有根据系统配置已授权的 访问, 才会通过审核, 确认该操作员的访问是合法有效的, 将对访问给出 允许的判断, 否则, 不会通过审核, 确认该操作员的访问是非法无效的, 将对访问给出拒绝的判断; 对于通过审核的给出允许判断的访问请求, 即 访问权限与访问数据匹配时, 则对该访问请求作合法访问处理, 即最终返 回操作员请求访问的指定隐私信息; 对于未通过审核的给出拒绝判断的访 问请求, 即访问权限与访问数据不匹配时, 则对该访问请求作非法访问处 理, 即最终拒绝该操作员对隐私信息的访问。
优选地, 在所述审核步骤之前, 所述处理方法还包括: 配置步骤, 所 述配置步骤为: 配置所述访问数据的访问权限。
更具体而言, 即对哪些访问用户有权访问哪些访问数据进行策略配置。 具体的说, 每一条策略有三个要素: 一是本条策略涉及的访问用户范围, 二是本条策略涉及的被访问数据信息, 三是系统应该允许还是拒绝本条策 略涉及的访问用户访问本条策略涉及的被访问数据。
以上述呼叫中心系统为例, 访问用户为普通操作员或特权操作员, 访 问数据为指定的隐私数据, 如客户的电话号码及身份证号码, 策略配置可 以确定如下两个规则: 一是普通操作员不能对客户的电话号码、 身份证号 码进行访问; 二是特权操作员能对客户的电话号码、 身份证号码进行访问, 策略配置明确设定了访问权限, 即哪些访问用户有权访问哪些访问数据, 有效保护了隐私数据信息。
优选地, 所述配置步骤包括: 根据第一分类标准对全部访问数据进行 分类, 并为分类后的所述全部访问数据设置对应的所述访问权限。
针对该实施例, 更具体而言, 即对全部访问数据进行分类定义, 以便 进一步对访问权限进行设定, 第一分类标准使得每一个访问数据都必须属 于其中的一个类型, 从而可以针对访问数据的类型为访问数据设置访问权 限, 因此将极大的提高管理效率, 降低管理复杂度, 第一分类标准需要根 据实际需要进行确定, 过于严格和过于宽松的定义都是不合适的。 以上述呼叫中心系统为例, 根据第一分类标准可将访问数据划分为隐 私信息及非隐私信息两种类型, 从而可以对呼叫中心系统中的哪些客户信 息属于隐私信息进行界定, 例如: 可以确定客户的电话号码、 身份证号码 属于客户隐私信息, 以便可以针对客户信息的类型对访问数据设置访问权 限。
优选地, 在所述为分类后的所述全部访问数据设置对应的所述访问权 限之前, 所述配置步骤还包括: 根据第二分类标准对访问用户进行分类, 并根据所述访问用户的类型为所述访问用户设置所述访问权限。
针对该实施例, 更具体而言, 即对全部访问用户进行分类定义, 以便 进一步对访问权限进行设定, 第二分类标准使得每一个访问用户都必须属 于其中的一个类型, 从而可以针对访问用户的类型为访问用户设置访问权 限, 因此将极大的提高管理效率, 降低管理复杂度。
以上述呼叫中心系统为例, 根据第二分类标准可将访问用户划分为普 通操作员和特权操作员两种类型, 每一个访问用户都必须属于其中的一个 类型, 根据呼叫中心的规模大小, 呼叫中心系统中的访问用户即操作员少 则数十个, 多则几千甚至上万个, 直接对某一个操作员能否访问指定的隐 私信息进行管理, 将是非常复杂和低效的, 将呼叫中心系统中的操作员划 分为不同的类型, 再对不同类型的操作员能否访问指定的隐私信息进行管 理, 有效地解决了管理效率低及管理复杂度高的问题。
本实施例通过上述技术方案, 对于一个呼叫中心系统, 通过对访问数 据及访问用户进行分类设定, 进一步对哪些访问用户类型有权访问哪些访 问数据类型进行策略界定, 完成了上述信息、 策略的定义后, 呼叫中心系 统就已经具备了客户隐私保护的系统设定工作。
图 2表示本发明实施例所述的数据访问的处理方法软件总体结构图。 参见图 2所示, 软件总体结构图包括: PID: 英文全称为 "Pr ivacy Informat ion Def ini t ion", 隐私信息定 义模块。 该模块的作用为对呼叫中心系统中的哪些客户信息属于客户隐私 信息进行界定;
0TD: 英文全称为 "Operator Type Def ini t ion" , 操作员类型定义模 块。 该模块的作用为将呼叫中心系统中的操作员划分为不同的类型, 每一 个操作员都必须属于其中的一个类型;
APD: 英文全称为 "Acces s Pol icy Def ini t ion" , 访问控制策略定义 模块。 该模块的作用为对哪些操作员有权访问哪些隐私信息进行策略配置;
PAC: 英文全称为 "Pr ivacy Acces s Control " , 隐私信息访问控制模 块。 操作员对指定的隐私信息进行访问时, 必须由隐私信息访问控制模块 来进行审核, 以确认访问的合法有效。 只有根据系统配置已授权的访问, 才会被允许。 隐私信息访问控制模块根据访问控制策略定义模块中定义的 策略, 来决定允许还是拒绝对隐私信息的访问。
在本实施例的上述技术方案, 通过软件总体结构图对一个数据处理方 法的架构进行了总体的描述, 对于一个呼叫中心系统, 使用 PID对隐私信 息进行界定, 使用 0TD对操作员类型进行界定, 使用 APD对哪些操作员有 权访问哪些隐私信息进行界定。 完成了上述信息、 策略的定义后, 呼叫中 心系统就已经具备了客户隐私保护的系统设定工作; 当某个操作员要对客 户隐私信息进行访问时, 需要首先进行访问合法性验证, PAC根据之前已经 定义好的信息、 策略, 将最终对访问给出允许或者拒绝的判断。 从上面的 描述中, 可以知道, 与传统的呼叫中心系统相比, 该软件的优点就是针对 客户隐私信息进行了严格的访问控制, 以保护客户隐私, 提升客户服务水 平, 增强客户满意度。
针对上述呼叫中心系统, 访问用户对访问数据的访问请求处理方法, 以一个具体的客户隐私信息访问为例, 软件架构的工作过程如下: 1. 根据第一分类标准对访问数据进行分类
通过 PID对隐私信息进行界定, 确定客户的电话号码、 身份证号码属 于客户隐私信息;
2. 根据第二分类标准对访问用户进行分类
使用 0TD对操作员类型进行界定, 确定呼叫中心系统中一共包含 2类 操作员: 普通操作员和特权操作员;
3. 配置访问权限与访问数据的匹配关系
使用 APD对哪些操作员有权访问哪些隐私信息进行界定。 确定如下两 个规则: 一是普通操作员不能对客户的电话号码、 身份证号码进行访问; 二是特权操作员能对客户的电话号码、 身份证号码进行访问;
4. 普通操作员的非法请求访问数据
属于普通操作员的操作员 A试图访问客户的电话号码。 该操作需要首 先进行访问合法性验证, PAC根据之前已经定义好的信息、 策略, 发现普通 操作员不能对客户的电话号码、 身份证号码进行访问,于是, 本次访问操作 将被系统拒绝;
5. 特权操作员的合法请求访问数据
属于特权操作员的操作员 B试图访问客户的电话号码。 该操作需要首 先进行访问合法性验证, PAC根据之前已经定义好的信息、 策略, 发现特权 操作员能对客户的电话号码、 身份证号码进行访问,于是, 本次访问操作将 被系统允许。
本实施例通过上述技术方案, 通过将访问数据进行分类, 然后对访问 用户进行分类, 并给访问用户设定不同的访问权限, 构建客户隐私信息与 访问权限之间的匹配关系, 根据匹配关系对客户隐私信息进行了严格的访 问控制, 有效保护客户隐私, 提升客户服务水平, 增强客户满意度。
实施例二: 图 3表示本发明实施例所述的数据访问的处理装置的结构示意图。 参见图 3所示, 数据访问的处理装置包括:
审核模块 20, 配置为根据访问请求, 审核所述访问是否有访问数据的 访问权限, 并获得审核结果;
处理模块 22, 配置为根据所述审核结果处理所述访问请求。
所述审核模块 22的具体结构可包括接收接口及处理器; 所述接收接口 可为有线或无线的通信接口; 如有线接口可为 RJ45、 同轴电缆或光纤接入 接口等通信接口; 无线通信接口可包括接收天线等。 所述接收接口还可为 设置在所述处理器上的设备内部的数据接收接口或数据传输总线等, 如串 口 。 在具体的实现过程中, 所述访问请求若已经预先存储到了所述处理器 的緩存等存储介质中时, 则所述审核模块可单独包括所述处理器。
所述接收接口, 配置为接收所述访问请求; 所述处理器与所述接收接 口相连; 提取所述访问请求中携带的指定访问的访问数据及访问权限; 若 所述访问权限为所述访问数据的访问权限, 则表明所述访问请求有访问数 据的访问权限, 否则无访问数据对应的访问权限。
所述处理模块 22的具体结构同样的可对应于处理器; 所述处理器依据 审核结果处理访问请求; 具体的处理访问请求包括响应访问请求 , 依据访 问请求返回访问数据, 或拒绝访问请求, 访问用户则无法获取访问数据。
对应于所述审核模块 20和 /或处理模块 22的处理器, 可为中央处理器
CPU,微处理器 MCU、 单片机、 数字信号处理器 DSP及各种类型的可编程 逻辑阵列等具有处理功能的电子元器件。
所述审核模块 20与所述处理模块 22可单独对应不同的处理器, 也可 集成对应于同样的处理器; 当对应于同样的处理器时, 所述处理器可以釆 用不同线程或时分复用的方法处理审核模块 20和处理模块 22的相应的功
6匕
fj匕。 码来实现所述审核模块 20与所述处理模块 22的功能。
优选地, 所述处理模块 22包括:
合法访问处理子模块, 配置为在所述审核结果为有访问权限时, 对所 述访问请求作合法访问处理;
非法访问处理子模块, 配置为在所述审核结果为无所述访问权限时, 对所述访问请求作非法访问处理。
优选地, 所述的处理装置还包括:
配置模块, 配置为配置所述访问权限与所述访问数据的匹配关系。 优选地, 所述配置模块 20包括:
第一分类子模块, 配置为根据第一分类标准对全部访问数据进行分类, 并为分类后的所述全部访问数据设置对应的所述访问权限。
优选地, 所述配置模块还包括:
第二分类子模块, 配置为根据第二分类标准对访问用户进行分类, 并 根据所述访问用户的类型为所述访问用户设置所述访问权限。
本发明通过将呼叫中心系统的客户隐私信息进行分类, 然后对访问群体 进行分类, 并给访问群体设定不同的访问权限, 构建客户隐私信息与访问 权限之间的匹配关系, 根据匹配关系对客户隐私信 , 进行了严格的访问控 制, 以保护客户隐私, 提升客户服务水平, 增强客户满意度。
综合上述, 本实施例为实施例一种所述的数据访问的处理方法提供了硬 件支撑, 可用于实现实施例一任一所述的技术方案, 提高了数据访问的控 制性, 提高了客户的信息安全, 增强了用户的满意度。
实施例三:
本实施例一种计算机存储介质, 所述计算机存储介质中存储有计算机可 执行指令, 所述计算机可执行指令用于执行实施例一任一技术方案所述的 方法。 本实施例中所述的计算存储介质优选为非瞬间存储介质, 如 U盘、 光盘及磁碟等各种可永久性存储信息的存储介质。 在本申请所提供的几个实施例中, 应该理解到, 所揭露的设备和方 法, 可以通过其它的方式实现。 以上所描述的设备实施例仅仅是示意性 的, 例如, 所述单元的划分, 仅仅为一种逻辑功能划分, 实际实现时可 以有另外的划分方式, 如: 多个单元或组件可以结合, 或可以集成到另 一个系统, 或一些特征可以忽略, 或不执行。 另外, 所显示或讨论的各 组成部分相互之间的耦合、 或直接耦合、 或通信连接可以是通过一些接 口, 设备或单元的间接耦合或通信连接, 可以是电性的、 机械的或其它 形式的。
上述作为分离部件说明的单元可以是、或也可以不是物理上分开的, 作为单元显示的部件可以是、 或也可以不是物理单元, 即可以位于一个 地方, 也可以分布到多个网络单元上; 可以根据实际的需要选择其中的 部分或全部单元来实现本实施例方案的目的。
另外, 在本发明各实施例中的各功能单元可以全部集成在一个处理 模块中, 也可以是各单元分别单独作为一个单元, 也可以两个或两个以 上单元集成在一个单元中;上述集成的单元既可以釆用硬件的形式实现, 也可以釆用硬件加软件功能单元的形式实现。
本领域普通技术人员可以理解: 实现上述方法实施例的全部或部分 步骤可以通过程序指令相关的硬件来完成, 前述的程序可以存储于一计 算机可读取存储介质中, 该程序在执行时, 执行包括上述方法实施例的 步骤; 而前述的存储介质包括: 移动存储设备、 只读存储器 (ROM, Read-Only Memory )、随机存取存者器( RAM, Random Access Memory )、 磁碟或者光盘等各种可以存储程序代码的介质。
以上所述, 仅为本发明的具体实施方式, 但本发明的保护范围并不 局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内, 可轻易想到变化或替换, 都应涵盖在本发明的保护范围之内。 因此, 本 发明的保护范围应以所述权利要求的保护范围为准。

Claims

权利要求书
1、 一种数据访问的处理方法, 应用于呼叫中心系统, 包括: 审核步骤, 所述审核步骤为: 根据访问请求, 审核所述访问请求是否 有访问数据的访问权限, 并获得审核结果;
处理步骤, 所述处理步骤为: 根据所述审核结果处理所述访问请求。
2、 如权利要求 1所述的处理方法, 其中, 所述处理步骤包括: 在所述审核结果为有访问权限时, 对所述访问请求作合法访问处理; 在所述审核结果为无访问权限时, 对所述访问请求作非法访问处理。
3、 如权利要求 1所述的处理方法, 其中, 在所述审核步骤之前, 所述 处理方法还包括:
配置步骤, 所述配置步骤为: 为所述访问数据配置所述访问权限。
4、 如权利要求 3所述的处理方法, 其中, 所述配置步骤包括: 根据第一分类标准对全部访问数据进行分类, 并为分类后的所述全部 访问数据设置对应的所述访问权限。
5、 如权利要求 4所述的处理方法, 其中, 在所述为分类后的所述全部 访问数据设置对应的所述访问权限之前, 所述配置步骤还包括:
根据第二分类标准对访问用户进行分类, 并根据所述访问用户的类型 为所述访问用户设置所述访问权限。
6、 一种数据访问的处理装置, 应用于呼叫中心系统, 包括: 审核模块, 配置为根据访问请求, 审核所述访问请求是否访问数据的 访问权限, 并获得审核结果;
处理模块, 配置为根据所述审核结果处理所述访问请求。
7、 如权利要求 6所述的处理装置, 其中, 所述处理模块包括: 合法访问处理子模块, 配置为在所述审核结果为有访问权限时, 对所 述访问请求作合法访问处理;
非法访问处理子模块, 配置为在所述审核结果为无访问权限时, 对所 述访问请求作非法访问处理。
8、 如权利要求 6所述的处理装置, 其中, 还包括:
配置模块, 配置为所述访问数据配置所述访问权限。
9、 如权利要求 8所述的处理装置, 其中, 所述配置模块包括: 第一分类子模块, 用于根据第一分类标准对全部访问数据进行分类, 并为分类后的所述全部访问数据设置对应的所述访问权限。
10、 如权利要求 9所述的处理装置, 其中, 所述配置模块还包括: 第二分类子模块, 用于根据第二分类标准对访问用户进行分类, 并根 据所述访问用户的类型为所述访问用户设置所述访问权限。
11、 一种计算机存储介质, 所述计算机存储介质中存储有计算机可执 行指令, 所述计算机可执行指令用于执行权利要求 1至 5任一项所述的方 法。
PCT/CN2014/074834 2013-10-18 2014-04-04 数据访问的处理方法、装置及计算及可读存储介质 WO2014180206A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310493784.1 2013-10-18
CN201310493784.1A CN104573539A (zh) 2013-10-18 2013-10-18 数据访问的处理方法与装置

Publications (1)

Publication Number Publication Date
WO2014180206A1 true WO2014180206A1 (zh) 2014-11-13

Family

ID=51866686

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/074834 WO2014180206A1 (zh) 2013-10-18 2014-04-04 数据访问的处理方法、装置及计算及可读存储介质

Country Status (2)

Country Link
CN (1) CN104573539A (zh)
WO (1) WO2014180206A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109635587A (zh) * 2018-12-17 2019-04-16 杭州安恒信息技术股份有限公司 实现数据自动分类分级保护的方法和装置
CN112948824A (zh) * 2021-03-31 2021-06-11 支付宝(杭州)信息技术有限公司 一种基于隐私保护的程序通信方法、装置及设备

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1426218A (zh) * 2003-01-30 2003-06-25 北京青牛软件技术有限责任公司 大容量呼叫中心系统
CN1725689A (zh) * 2004-07-22 2006-01-25 中兴通讯股份有限公司 电信网络呼叫中心系统及其实现方法
CN103188208A (zh) * 2011-12-27 2013-07-03 腾讯科技(北京)有限公司 网页访问的权限控制方法、系统和呼叫中心

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1626218A (zh) * 2004-08-12 2005-06-15 汪金江 仙人掌肤康霜

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1426218A (zh) * 2003-01-30 2003-06-25 北京青牛软件技术有限责任公司 大容量呼叫中心系统
CN1725689A (zh) * 2004-07-22 2006-01-25 中兴通讯股份有限公司 电信网络呼叫中心系统及其实现方法
CN103188208A (zh) * 2011-12-27 2013-07-03 腾讯科技(北京)有限公司 网页访问的权限控制方法、系统和呼叫中心

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109635587A (zh) * 2018-12-17 2019-04-16 杭州安恒信息技术股份有限公司 实现数据自动分类分级保护的方法和装置
CN112948824A (zh) * 2021-03-31 2021-06-11 支付宝(杭州)信息技术有限公司 一种基于隐私保护的程序通信方法、装置及设备
CN112948824B (zh) * 2021-03-31 2022-04-26 支付宝(杭州)信息技术有限公司 一种基于隐私保护的程序通信方法、装置及设备

Also Published As

Publication number Publication date
CN104573539A (zh) 2015-04-29

Similar Documents

Publication Publication Date Title
CN108306887B (zh) 基于区块链的物联网安全与数据隐私保护系统
US10944574B2 (en) Method for providing virtual asset service based on decentralized identifier and virtual asset service providing server using them
US9166966B2 (en) Apparatus and method for handling transaction tokens
US8572686B2 (en) Method and apparatus for object transaction session validation
WO2019052496A1 (zh) 云存储的帐号鉴权方法和服务器
CN110266764B (zh) 基于网关的内部服务调用方法、装置及终端设备
JP2020531981A (ja) ブロックチェーンを介してバイオメトリクス・データおよび不可逆関数を使用する本人確認のためのコンピュータ実装方法、コンピュータ・プログラムおよびシステム
WO2014081698A2 (en) Delegate authorization in cloud-based storage system
WO2020156135A1 (zh) 一种访问控制策略的处理方法、装置及计算机可读存储介质
US20130047200A1 (en) Apparatus and Method for Performing Data Tokenization
CN107622203A (zh) 敏感信息的保护方法、装置、存储介质及电子设备
JP2023534263A (ja) データアクセス方法、装置、記憶媒体及び電子装置
US20130046987A1 (en) Apparatus and Method for Performing End-to-End Encryption
WO2014184671A2 (en) Systems and methods for efficient network security adjustment
US8572690B2 (en) Apparatus and method for performing session validation to access confidential resources
CN112364336A (zh) 数据库的统一权限管理方法、装置、设备和计算机可读存储介质
US20130047203A1 (en) Method and Apparatus for Third Party Session Validation
ES2266513T3 (es) Metodo y aparato para rastrear el estado de recursos en un sistema para dirigir el uso de los recursos.
CN112187800B (zh) 具备匿名访问能力的基于属性访问控制方法
US8572724B2 (en) Method and apparatus for network session validation
WO2014180206A1 (zh) 数据访问的处理方法、装置及计算及可读存储介质
WO2021127977A1 (zh) 一种密钥管理方法及装置、终端、存储介质
US20080104695A1 (en) Device and Method for Controlling Access, Core with Components Comprising Same and Use Thereof
TWI622944B (zh) Multi-permission identity identification and access policy management system
US8572688B2 (en) Method and apparatus for session validation to access third party resources

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14794792

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14794792

Country of ref document: EP

Kind code of ref document: A1