CN109558748A - Data processing method, device, electronic equipment and storage medium - Google Patents
Data processing method, device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN109558748A CN109558748A CN201811407905.5A CN201811407905A CN109558748A CN 109558748 A CN109558748 A CN 109558748A CN 201811407905 A CN201811407905 A CN 201811407905A CN 109558748 A CN109558748 A CN 109558748A
- Authority
- CN
- China
- Prior art keywords
- information
- user data
- desensitization
- sensitive information
- catenary system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment provides a kind of data processing method, device, electronic equipment and storage mediums, are related to block chain technical field.This method comprises: obtaining user data, and whether judge in the user data comprising sensitive information;If it is determined that then carrying out desensitization process to the sensitive information by the intelligent contract disposed on block catenary system comprising sensitive information, desensitization information is generated;The desensitization information is stored to the block catenary system, and returns to the index value of the desensitization information of the block catenary system record;The sensitive information in the user data is replaced by the index value, stores the replaced user data.The sensitive information that the technical solution of the embodiment of the present invention can be avoided user is leaked to be distorted with malice, reduces the security risk of user data.
Description
Technical field
The present invention relates to block chain technical field, in particular to a kind of data processing method, data processing equipment,
Electronic equipment and computer readable storage medium.
Background technique
With the development of internet technology, more and more people carry out various consumption, financing and amusement work by network
Dynamic, how the data using user on network become focus.
Currently, in a kind of technical solution, it is shown referring to Fig.1, several user data collection points are set in operation system
Data acquisition is carried out, according to different business scenarios by the behavioral data of user such as operating time, action type, operating result
Etc. information by database purchase, model and use for subsequent analysis.However, in this technical solution, due in user data
It often include part sensitive information or privacy information, it is difficult to guarantee the safety of user data.
Therefore, how to guarantee that the safety of user data becomes technical problem urgently to be resolved.
It should be noted that information is only used for reinforcing the reason to background of the present invention disclosed in above-mentioned background technology part
Solution, therefore may include the information not constituted to the prior art known to persons of ordinary skill in the art.
Summary of the invention
The embodiment of the present invention be designed to provide a kind of data processing method, data processing equipment, electronic equipment and
Computer readable storage medium, and then overcome the limitation and defect due to the relevant technologies at least to a certain extent and lead to not
The problem of guaranteeing the safety of user data.
According to a first aspect of the embodiments of the present invention, a kind of data processing method is provided, comprising: user data is obtained,
And whether judge in the user data comprising sensitive information;If it is determined that then passing through block catenary system top comprising sensitive information
The intelligent contract of administration carries out desensitization process to the sensitive information, generates desensitization information;The desensitization information is stored to described
Block catenary system, and return to the index value of the desensitization information of the block catenary system record;It is replaced by the index value
The sensitive information in the user data stores the replaced user data.
In some exemplary embodiments of the invention, aforementioned schemes are based on, the intelligence disposed on block catenary system is passed through
Contract carries out desensitization process to the sensitive information, comprising: calls the intelligent contract-defined interface of first disposed on block catenary system, institute
The first intelligent contract-defined interface is stated to be used to carry out desensitization process to the sensitive information;By the described first intelligent contract-defined interface to institute
It states sensitive information and carries out desensitization process.
In some exemplary embodiments of the invention, it is based on aforementioned schemes, the data processing method further include: connecing
When receiving the inquiry request for inquiring the user data, the identification information of the user data is extracted from the inquiry request;
The user data is obtained based on the identification information, obtains the index value for the desensitization information that the user data includes;
The desensitization information is inquired from the block catenary system based on the index value, and it is described to obtain to restore the desensitization information
Sensitive information.
In some exemplary embodiments of the invention, aforementioned schemes are based on, are based on the index value from the block chain
The desensitization information is inquired in system, comprising: call the second intelligent contract-defined interface of the block catenary system, second intelligence
Contract-defined interface from the block catenary system for inquiring the desensitization information;Pass through second intelligence based on the index value
Contract-defined interface inquires the sensitive information from the block catenary system.
In some exemplary embodiments of the invention, aforementioned schemes are based on, it is described to obtain to restore the desensitization information
Sensitive information, comprising: call the third intelligence contract-defined interface of the block catenary system, the third intelligence contract-defined interface for pair
The desensitization information carries out reduction treatment;The sensitivity is restored from the user data by the third intelligence contract-defined interface
Information.
In some exemplary embodiments of the invention, aforementioned schemes are based on, store the replaced user data, packet
It includes: by the replaced user data storage into target database or in target journaling file.
In some exemplary embodiments of the invention, be based on aforementioned schemes, judge in the user data whether include
Sensitive information, comprising: whether judged in the user data according to sensitive information definition rule comprising sensitive information.
According to a second aspect of the embodiments of the present invention, a kind of data processing equipment is provided, comprising: judging unit, for obtaining
User data is taken, and whether is judged in the user data comprising sensitive information;Desensitization process unit, for if it is determined that comprising quick
Feel information, then desensitization process is carried out to the sensitive information by the intelligent contract disposed on block catenary system, generates desensitization letter
Breath;Generation unit being indexed, for storing the desensitization information to the block catenary system, and returning to the block catenary system note
The index value of the desensitization information of record;Storage unit, described in being replaced in the user data by the index value
Sensitive information stores the replaced user data.
According to a third aspect of the embodiments of the present invention, a kind of electronic equipment is provided, comprising: processor;And memory, institute
It states and is stored with computer-readable instruction on memory, realize when the computer-readable instruction is executed by the processor as above-mentioned
Data processing method described in any one of first aspect.
According to a fourth aspect of the embodiments of the present invention, a kind of computer readable storage medium is provided, calculating is stored thereon with
Machine program realizes the data processing as described in any one of above-mentioned first aspect when the computer program is executed by processor
Method.
In the technical solution provided by some embodiments of the present invention, on the one hand, comprising quick in determining user data
When feeling information, desensitization process is carried out to sensitive information by the intelligent contract disposed on block catenary system, by desensitization information storage
Into block catenary system, due to deposit block chain data can not distort, so as to guarantee user sensitive information safety
Property and reliability;On the other hand, the sensitive information in user data is replaced by the index value of the desensitization information of block chained record,
Replaced user data is stored, the sensitive information that can further avoid user is leaked to be distorted with malice, reduces user
The security risk of data;In another aspect, combining due to being able to use heritage storage system with the mode that block catenary system combines
User data is saved, so as to further increase the safety of user data.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not
It can the limitation present invention.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention
Example, and be used to explain the principle of the present invention together with specification.It should be evident that the accompanying drawings in the following description is only the present invention
Some embodiments for those of ordinary skill in the art without creative efforts, can also basis
These attached drawings obtain other attached drawings.In the accompanying drawings:
Fig. 1 shows a kind of flow diagram of the data processing method in technical solution;
Fig. 2 shows the flow diagrams of data processing method according to some embodiments of the invention;
Fig. 3 shows the flow diagram for inquiring data according to some embodiments of the present invention;
Fig. 4 shows the flow diagram of the data processing method of other embodiments according to the present invention;
Fig. 5 shows the schematic diagram of intelligent contract operating process according to some embodiments of the present invention;
Fig. 6 shows the schematic block diagram of the data processing equipment of an exemplary embodiment according to the present invention;
Fig. 7 shows the structural schematic diagram for being suitable for the computer system for the electronic equipment for being used to realize the embodiment of the present invention.
Specific embodiment
Example embodiment is described more fully with reference to the drawings.However, example embodiment can be real in a variety of forms
It applies, and is not understood as limited to embodiment set forth herein;On the contrary, thesing embodiments are provided so that the present invention will be comprehensively and complete
It is whole, and the design of example embodiment is comprehensively communicated to those skilled in the art.Identical appended drawing reference indicates in figure
Same or similar part, thus repetition thereof will be omitted.
In addition, described feature, structure or characteristic can be incorporated in one or more implementations in any suitable manner
In example.In the following description, many details are provided to provide and fully understand to the embodiment of the present invention.However,
It will be appreciated by persons skilled in the art that technical solution of the present invention can be practiced without one or more in specific detail,
Or it can be using other methods, constituent element, device, step etc..In other cases, it is not shown in detail or describes known side
Method, device, realization or operation are to avoid fuzzy each aspect of the present invention.
Block diagram shown in the drawings is only functional entity, not necessarily must be corresponding with physically separate entity.
I.e., it is possible to realize these functional entitys using software form, or realized in one or more hardware modules or integrated circuit
These functional entitys, or these functional entitys are realized in heterogeneous networks and/or processor device and/or microcontroller device.
Flow chart shown in the drawings is merely illustrative, it is not necessary to including all content and operation/step,
It is not required to execute by described sequence.For example, some operation/steps can also decompose, and some operation/steps can close
And or part merge, therefore the sequence actually executed is possible to change according to the actual situation.
Fig. 2 shows the flow diagrams of data processing method according to some embodiments of the invention.The data processing side
Part or all of method is applied to block catenary system.The data processing method includes step S210 to step S240, below it is right
Data processing method in the example embodiment of Fig. 2 is described in detail.
Referring to shown in Fig. 2, in step S210, user data is obtained, and whether is judged in the user data comprising quick
Feel information.
In the exemplary embodiment, user data can be the user data of various businesses system.For example, user data can be with
For the user data of the operation systems such as insurance business system, stock exchange transaction system, financial service system.
In the exemplary embodiment, sensitive information can be defined according to the characteristics of business scenario of operation system, for example, sensitive
Information may include the information such as the name of user, the identification card number of user, phone number, home address, but example of the invention
Sensitive information in embodiment is without being limited thereto, for example, sensitive information can also be the letter such as the health status of user or financial information
Breath.
Further, in the exemplary embodiment, can be judged in user data according to the definition rule of above-mentioned sensitive information
It whether include sensitive information.For example, according to the definition rule of sensitive information judge in user data whether include user identity
Card number or phone number determine in user data if identification card number or phone number comprising user comprising sensitive information.This
Outside, whether can also be judged according to the definition rule combination regular expression of above-mentioned sensitive information in user data comprising sensitive letter
Breath.
In other example embodiments, the intelligence for the sensitive information for identification being deployed on block catenary system can be passed through
Can contract judge in user data whether to write comprising sensitive information, such as by the definition rule of sensitive information and recognition rule
Enter the intelligent contract onto block catenary system, when collecting user data, triggering in intelligence contract identification user data is
No includes sensitive information.
In step S220, if it is determined that then passing through the intelligent contract disposed on block catenary system to institute comprising sensitive information
It states sensitive information and carries out desensitization process, generate desensitization information.
In the exemplary embodiment, it when in determining user data comprising sensitive information, is disposed on calling block catenary system
Intelligent contract-defined interface, that is, sc_encode interface pair of the intelligent contract (smart contract abbreviation sc) for example for data desensitization
Sensitive information carries out desensitization process, generates desensitization information.
In the exemplary embodiment, desensitization process, example are carried out to sensitive information using abstract Encryption Algorithm in intelligent contract
Such as desensitization process can be carried out to sensitive information using SHA-256, MD5, SHA-512, HMAC Encryption Algorithm, generate sensitive letter
The summary info of breath is as desensitization information.It should be noted that can also be using other Encryption Algorithm examples in intelligent contract
Such as RSA, DSA Digital Signature Algorithm carries out desensitization process to sensitive information, this is same within the scope of the present invention.
In step S230, the desensitization information is stored to the block catenary system, and return to the block catenary system
The index value of the desensitization information of record.
In the exemplary embodiment, by calling the i.e. sc_save of storage intelligence contract pre-defined in block catenary system
Desensitization information is stored onto block catenary system, the index value i.e. bc_ of the desensitization information recorded on block catenary system is returned
Index, the index value can be the index that the block of the sensitive information is stored in block catenary system, or store the sensitivity
The address of the block of information.
In step S240, the sensitive information in the user data, storage replacement are replaced by the index value
The user data afterwards.
In the exemplary embodiment, user is replaced with the i.e. bc_index of the index value of the desensitization information recorded on block catenary system
Sensitive information in data, by the replaced user data storage comprising the index value to target database or target journaling
In file.
The data processing method in example embodiment according to fig. 2, on the one hand, include sensitive letter in determining user data
When breath, desensitization process is carried out to sensitive information by the intelligent contract disposed on block catenary system, by desensitization information storage to area
In block catenary system, due to deposit block chain data can not distort, so as to guarantee user sensitive information safety and
Reliability;On the other hand, the sensitive information in user data, storage are replaced by the index value of the desensitization information of block chained record
Replaced user data, the sensitive information that can further avoid user is leaked to be distorted with malice, reduces user data
Security risk;In another aspect, combining preservation with the mode that block catenary system combines due to being able to use heritage storage system
User data, so as to further increase the safety of user data.
Further, in some embodiments, when in determining user data comprising sensitive information, block catenary system is called
Intelligent contract-defined interface, that is, sc_encode the interface of the first of upper deployment, first intelligence interface is for taking off the sensitive information
Quick processing carries out desensitization process to the sensitive information by first intelligence interface.For example, can be on block catenary system in advance
The first intelligent contract for carrying out desensitization process to sensitive information is disposed, which can execute encryption for one section
The code of function when in determining user data comprising sensitive information, calls the first intelligent contract of the first intelligent contract to connect
Mouth carries out desensitization process to the sensitive information.
Fig. 3 shows the flow diagram for inquiring data according to some embodiments of the present invention.
Referring to shown in Fig. 3, in step s310, when receiving the inquiry request for inquiring the user data, from described
The identification information of the user data is extracted in inquiry request.
In the exemplary embodiment, when needing to obtain user data, inquiry is initiated to the server of storage user data and is asked
It asks.When server receives the inquiry request to user data, the mark letter of the user data is extracted from the inquiry request
Cease user name, that is, User ID (IDENTIFICATION, mark) of such as user.
In step s 320, the user data is obtained based on the identification information, obtains the described of the user data
The index value for the information that desensitizes.
In the exemplary embodiment, in the exemplary embodiment, based on the identification information of user from the target data of server end
Corresponding user data is inquired in library, and the index value of corresponding desensitization information is extracted from the user data inquired.
In step S330, the desensitization information is inquired from the block catenary system based on the index value, and restore
The desensitization information is to obtain the sensitive information.
In the exemplary embodiment, the index value based on desensitization information inquires corresponding desensitization information from block catenary system,
For example, corresponding block in the index value inquiry block catenary system based on desensitization information, inquires corresponding desensitization from the block
Information.
In the exemplary embodiment, when information is desensitized in inquiry, the dispose on block catenary system second intelligent contract is called to connect
Mouthful, the second intelligent contract-defined interface from the block catenary system for inquiring corresponding desensitization information;Rope based on desensitization information
Draw value and corresponding desensitization information is inquired from block catenary system by the second intelligent contract-defined interface.For example, can be in block chain
The second intelligence contract i.e. sc_fetch for carrying out data query is disposed in system in advance, which can be one
Code or SQL (Structured Query Language, structured query language) sentence of Duan Zhihang query function, is being looked into
When asking desensitization information, the second intelligent contract-defined interface of the second intelligent contract is called, the index value based on desensitization information is from block
Corresponding desensitization information is inquired in catenary system.
Further, in the exemplary embodiment, desensitization is believed by using reverse decipherment algorithm corresponding with desensitization process
Breath carries out reduction treatment, to obtain sensitive information corresponding with the information that desensitizes.Specifically, being restored to desensitization information
When, the third intelligence contract-defined interface of the block catenary system is called, which is used to carry out the desensitization information
Reduction treatment;Corresponding sensitive information is restored from the user data by the third intelligence contract-defined interface.For example, can be
The third intelligence i.e. sc_decode of contract for carrying out reduction treatment to desensitization information is disposed on block catenary system in advance, this
Three intelligent contracts can be one section of code being restored to desensitization information, the third intelligence contract and for desensitization process
One intelligent contract is corresponding, for example, third is intelligently closed when the first intelligent contract encrypts sensitive data using public-key cryptography
About restored using private cipher key pair corresponding with the disclosure key desensitization information.When being restored to desensitization information, adjust
With the third intelligence contract-defined interface of the third intelligence contract, decryption operation corresponding with the first intelligence contract is based on from the number of users
Corresponding sensitive information is restored in.
Fig. 4 shows the flow diagram of the data processing method of other embodiments according to the present invention.
Referring to shown in Fig. 4, in step S410, sensitive information is determined according to business scenario.Such as business scenario be protect
When dangerous business, sensitive information is the identification card number and telephone number of user.
In the step s 420, user data is obtained.For example, needing user in the user registration module of insurance business system
The information such as name, certificate number, cell-phone number, the pet name, hobby are filled in, after user completes data input and submits, insurance business
System will receive user data below: [2017-8-2013:55:20] #user-registry:doRegistry:
{‘name’:’jack’,’identity’:’1234567xxx’,’mobile’:’1234567890’,’nickname’:’
xxxxxxxx’,’hobby’:’cooking’}。
In step S430, identify in user data whether include sensitive information according to sensitive information definition rule.For example,
Judged according to sensitive information definition rule whether comprising identification card number or cell-phone number in user data, if including identification card number or hand
Machine number then determines in user data comprising sensitive information.Further, in the exemplary embodiment, it is wrapped in identification user data
When containing sensitive information, triggers the data desensitization process for the intelligent contract disposed on block catenary system.
In step S440, desensitization process is carried out to user data according to the intelligent contract disposed on block catenary system.
In the exemplary embodiment, using desensitization module (the abbreviation sc_ of intelligence contract predetermined in block catenary system
Encode) to the sensitive information in user data into desensitization process.For example, to ' name ' in above-mentioned user data: '
Jack ', ' identity ': ' 1234567xxx ', ' mobile ': the part such as ' 1234567890 ' (hereinafter referred to as data) is taken off
Quick processing returns to the corresponding desensitization information abstract_data of the sensitive information i.e.: intelligent and about sc_encode (data)=
=> abstract_data.
In step S450, the information that desensitizes is passed through in the intelligent contract storage to block catenary system disposed in advance.For example,
Desensitization information abstract_data is stored by intelligence predetermined and about sc_save onto block chain node block, is returned
Return the index value bc_index recorded on block chain.
Then, in the exemplary embodiment, the index value bc_index of the sensitive information recorded on block chain is replaced into original
The part of sensitive information in beginning user data, it is final to store by the storage of replaced result into database or journal file
Result it is as follows: [2017-8-2013:55:20] #user-registry:doRegistry:{ %bc_index%, '
nickname’:’xxxxxxxx’,’hobby’:’cooking’}。
In step S460, however, it is determined that do not include sensitive information in user data, then store number of users using usual manner
According to for example, directly by user data storage into database.
In addition, in the exemplary embodiment, when needing to use the user data comprising sensitive information, according to sensitive information
Index value bc_index obtains inquiry by the intelligence disposed in block catenary system and about sc_fetch from block catenary system
Abstract_data, and the sensitive letter of sensitivity reduction is obtained by intelligence and about sc_decode combination private key or reverse decipherment algorithm
Cease data original value.
Intelligent contract is, in the case where certain condition is satisfied, can be automatically triggered execution in block catenary system
Program.It should be noted that intelligence and about sc_encode, intelligence and about sc_save, intelligence and about sc_fetch, intelligence are closed
About sc_decode is the program code for the corresponding function of execution being deployed on block catenary system in advance.Block catenary system top
The intelligent contract of administration is difficult to be tampered, not by the intervention of block chain node in implementation procedure.In an exemplary embodiment of the invention,
Different code logics is executed using intelligent contract in different steps, different code logics can pass through different intelligence
Contract executes, and can also be executed by unified intelligent contract, the present invention is to this without particular determination.
Fig. 5 shows the schematic diagram of intelligent contract operating process according to some embodiments of the present invention.
Referring to Figure 5, in step S510, intelligent contract is compiled on block chain development platform such as JUICE platform,
Such as to above-mentioned intelligence and about sc_encode, intelligence and about sc_save, intelligence and about sc_fetch, intelligence and about sc_
Decode is compiled.
In step S520, corresponding intelligent contract is created in block chain development platform and to the interface of intelligent contract.
In step S530, corresponding intelligent contract is disposed in block chain development platform, for example, by above-mentioned intelligent contract
Sc_encode, intelligence and about sc_save, intelligence and about sc_fetch, intelligence and about sc_decode are deployed to block catenary system
On.
In step S540, the instruction for whether having received and triggering corresponding intelligent contract is monitored, such as receive inquiry and refer to
When enabling, triggering intelligence and about sc_fetch are determined.
In step S550, which is called by corresponding intelligent contract-defined interface, for example, passing through intelligent contract
The interface of sc_fetch calls the intelligence contract.
In step S550, when the intelligence contract is finished, intelligent contract corresponding with above-metioned instruction is removed.Example
Such as, after a transaction is finished, intelligent contract corresponding with the transaction is removed.
In addition, in an exemplary embodiment of the invention, additionally providing a kind of data processing equipment.Referring to shown in Fig. 6, the number
It may include: judging unit 610, desensitization process unit 620, index generation unit 630 and storage unit according to processing unit
640.Wherein: whether judging unit 610 judges in the user data for obtaining user data comprising sensitive information;It is de-
Quick processing unit 620 is used to then pass through the intelligent contract disposed on block catenary system to described quick if it is determined that comprising sensitive information
Feel information and carry out desensitization process, generates desensitization information;Generation unit 630 is indexed to be used for desensitization information storage to the area
Block catenary system, and return to the index value of the desensitization information of the block catenary system record;Storage unit 640 is for passing through institute
It states index value and replaces the sensitive information in the user data, store the replaced user data.
In some exemplary embodiments of the invention, aforementioned schemes are based on, desensitization process unit 620 includes: to call list
Member, for calling the dispose on block catenary system first intelligent contract-defined interface, the described first intelligent contract-defined interface is used for described
Sensitive information carries out desensitization process;Processing unit, for being carried out by the described first intelligent contract-defined interface to the sensitive information
Desensitization process.
In some exemplary embodiments of the invention, it is based on aforementioned schemes, the data processing equipment 600 further include:
Extraction unit, for extracting the use from the inquiry request when receiving the inquiry request for inquiring the user data
The identification information of user data;Acquiring unit is indexed, for obtaining the user data based on the identification information, obtains the use
The index value for the desensitization information that user data includes;Reduction unit is inquired, for being based on the index value from the block chain
The desensitization information is inquired in system, and restores the desensitization information to obtain the sensitive information.
In some exemplary embodiments of the invention, aforementioned schemes are based on, inquiry reduction unit is configured to: calling institute
The second intelligent contract-defined interface of block catenary system is stated, the described second intelligent contract-defined interface from the block catenary system for inquiring
The desensitization information;Described in being inquired from the block catenary system based on the index value by the described second intelligent contract-defined interface
Sensitive information.
In some exemplary embodiments of the invention, aforementioned schemes are based on, inquiry reduction unit is configured to: calling institute
The third intelligence contract-defined interface of block catenary system is stated, the third intelligence contract-defined interface is for restoring the desensitization information
Processing;The sensitive information is restored from the user data by the third intelligence contract-defined interface.
In some exemplary embodiments of the invention, aforementioned schemes are based on, storage unit 640 is configured to: will be replaced
The user data afterwards is stored into target database or in target journaling file.
In some exemplary embodiments of the invention, aforementioned schemes are based on, judging unit 610 is configured to: according to quick
Whether sense information definition rule judges in the user data comprising sensitive information.
Each functional module and above-mentioned data processing side due to the data processing equipment 600 of example embodiments of the present invention
The step of example embodiment of method, is corresponding, therefore details are not described herein.
In an exemplary embodiment of the present invention, a kind of electronic equipment that can be realized the above method is additionally provided.
Below with reference to Fig. 7, it illustrates the computer systems 700 for the electronic equipment for being suitable for being used to realize the embodiment of the present invention
Structural schematic diagram.The computer system 700 of electronic equipment shown in Fig. 7 is only an example, should not be to the embodiment of the present invention
Function and use scope bring any restrictions.
As shown in fig. 7, computer system 700 includes central processing unit (CPU) 701, it can be read-only according to being stored in
Program in memory (ROM) 702 or be loaded into the program in random access storage device (RAM) 703 from storage section 708 and
Execute various movements appropriate and processing.In RAM 703, it is also stored with various programs and data needed for system operatio.CPU
701, ROM 702 and RAM 703 is connected with each other by bus 704.Input/output (I/O) interface 705 is also connected to bus
704。
I/O interface 705 is connected to lower component: the importation 706 including keyboard, mouse etc.;It is penetrated including such as cathode
The output par, c 707 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 708 including hard disk etc.;
And the communications portion 709 of the network interface card including LAN card, modem etc..Communications portion 709 via such as because
The network of spy's net executes communication process.Driver 710 is also connected to I/O interface 705 as needed.Detachable media 711, such as
Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 710, in order to read from thereon
Computer program be mounted into storage section 708 as needed.
Particularly, according to an embodiment of the invention, may be implemented as computer above with reference to the process of flow chart description
Software program.For example, the embodiment of the present invention includes a kind of computer program product comprising be carried on computer-readable medium
On computer program, which includes the program code for method shown in execution flow chart.In such reality
It applies in example, which can be downloaded and installed from network by communications portion 709, and/or from detachable media
711 are mounted.When the computer program is executed by central processing unit (CPU) 701, executes and limited in the system of the application
Above-mentioned function.
It should be noted that computer-readable medium shown in the present invention can be computer-readable signal media or meter
Calculation machine readable storage medium storing program for executing either the two any combination.Computer readable storage medium for example can be --- but not
Be limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above combination.Meter
The more specific example of calculation machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, just of one or more conducting wires
Taking formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type may be programmed read-only storage
Device (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device,
Or above-mentioned any appropriate combination.In the present invention, computer readable storage medium can be it is any include or storage journey
The tangible medium of sequence, the program can be commanded execution system, device or device use or in connection.And at this
In invention, computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal,
Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but unlimited
In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can
Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for
By the use of instruction execution system, device or device or program in connection.Include on computer-readable medium
Program code can transmit with any suitable medium, including but not limited to: wireless, electric wire, optical cable, RF etc. are above-mentioned
Any appropriate combination.
Flow chart and block diagram in attached drawing are illustrated according to the system of various embodiments of the invention, method and computer journey
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
A part of one module, program segment or code of table, a part of above-mentioned module, program segment or code include one or more
Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box
The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical
On can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it wants
It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule
The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction
It closes to realize.
Being described in unit involved in the embodiment of the present invention can be realized by way of software, can also be by hard
The mode of part realizes that described unit also can be set in the processor.Wherein, the title of these units is in certain situation
Under do not constitute restriction to the unit itself.
As on the other hand, present invention also provides a kind of computer-readable medium, which be can be
Included in electronic equipment described in above-described embodiment;It is also possible to individualism, and without in the supplying electronic equipment.
Above-mentioned computer-readable medium carries one or more program, when the electronics is set by one for said one or multiple programs
When standby execution, so that the electronic equipment realizes such as above-mentioned data processing method as described in the examples.
For example, the electronic equipment may be implemented as shown in Figure 1: step S110 obtains user data, and judges institute
It whether states in user data comprising sensitive information;Step S120, if it is determined that then passing through block catenary system top comprising sensitive information
The intelligent contract of administration carries out desensitization process to the sensitive information, generates desensitization information;Step S130 deposits the desensitization information
The block catenary system is stored up, and returns to the index value of the desensitization information of the block catenary system record;Step S140 leads to
It crosses the index value and replaces the sensitive information in the user data, store the replaced user data.
It should be noted that although being referred to several modules for acting the device executed in the above detailed description
Or unit, but this division is not enforceable.In fact, embodiment according to the present invention, above-described two
Or more the feature and function of module or unit can be embodied in a module or unit.Conversely, above-described
One module or the feature and function of unit can be to be embodied by multiple modules or unit with further division.
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented
Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the present invention
The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one
Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating
Equipment (can be personal computer, server, touch control terminal or network equipment etc.) executes embodiment according to the present invention
Method.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to of the invention its
Its embodiment.This application is intended to cover any variations, uses, or adaptations of the invention, these modifications, purposes or
Person's adaptive change follows general principle of the invention and including the undocumented common knowledge in the art of the present invention
Or conventional techniques.The description and examples are only to be considered as illustrative, and true scope and spirit of the invention are by following
Claim is pointed out.
It should be understood that the present invention is not limited to the precise structure already described above and shown in the accompanying drawings, and
And various modifications and changes may be made without departing from the scope thereof.The scope of the present invention is limited only by the attached claims.
Claims (10)
1. a kind of data processing method characterized by comprising
User data is obtained, and whether is judged in the user data comprising sensitive information;
If it is determined that then being desensitized by the intelligent contract disposed on block catenary system to the sensitive information comprising sensitive information
Processing generates desensitization information;
The desensitization information is stored to the block catenary system, and returns to the desensitization information of the block catenary system record
Index value;
The sensitive information in the user data is replaced by the index value, stores the replaced user data.
2. data processing method according to claim 1, which is characterized in that closed by the intelligence disposed on block catenary system
Desensitization process about is carried out to the sensitive information, comprising:
The intelligent contract-defined interface of first disposed on block catenary system is called, the described first intelligent contract-defined interface is used for the sensitivity
Information carries out desensitization process;
Desensitization process is carried out to the sensitive information by the described first intelligent contract-defined interface.
3. data processing method according to claim 1, which is characterized in that the data processing method further include:
When receiving the inquiry request for inquiring the user data, the mark of the user data is extracted from the inquiry request
Know information;
The user data is obtained based on the identification information, obtains the index for the desensitization information that the user data includes
Value;
The desensitization information is inquired from the block catenary system based on the index value, and restores the desensitization information to obtain
The sensitive information.
4. data processing method according to claim 3, which is characterized in that be based on the index value from the block linkwork
The desensitization information is inquired in system, comprising:
The second intelligent contract-defined interface of the block catenary system is called, the described second intelligent contract-defined interface is used for from the block chain
The desensitization information is inquired in system;
The sensitive information is inquired from the block catenary system by the described second intelligent contract-defined interface based on the index value.
5. data processing method according to claim 3, which is characterized in that the reduction desensitization information is described quick to obtain
Feel information, comprising:
The third intelligence contract-defined interface of the block catenary system is called, the third intelligence contract-defined interface is used to believe the desensitization
Breath carries out reduction treatment;
The sensitive information is restored from the user data by the third intelligence contract-defined interface.
6. data processing method according to claim 1, which is characterized in that the replaced user data of storage, packet
It includes:
By the replaced user data storage into target database or in target journaling file.
7. data processing method according to any one of claim 1 to 6, which is characterized in that judge the user data
In whether include sensitive information, comprising:
Whether judged in the user data according to sensitive information definition rule comprising sensitive information.
8. a kind of data processing equipment characterized by comprising
Whether judging unit for obtaining user data, and judges in the user data comprising sensitive information;
Desensitization process unit is used for if it is determined that then passing through the intelligent contract disposed on block catenary system to institute comprising sensitive information
It states sensitive information and carries out desensitization process, generate desensitization information;
Generation unit being indexed, for storing the desensitization information to the block catenary system, and returning to the block catenary system
The index value of the desensitization information of record;
Storage unit stores replaced for replacing the sensitive information in the user data by the index value
The user data.
9. a kind of electronic equipment characterized by comprising
Processor;And
Memory is stored with computer-readable instruction on the memory, and the computer-readable instruction is held by the processor
The data processing method as described in any one of claims 1 to 7 is realized when row.
10. a kind of computer readable storage medium, is stored thereon with computer program, the computer program is executed by processor
Data processing method of the Shi Shixian as described in any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811407905.5A CN109558748B (en) | 2018-11-23 | 2018-11-23 | Data processing method and device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811407905.5A CN109558748B (en) | 2018-11-23 | 2018-11-23 | Data processing method and device, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109558748A true CN109558748A (en) | 2019-04-02 |
CN109558748B CN109558748B (en) | 2020-11-03 |
Family
ID=65867280
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811407905.5A Active CN109558748B (en) | 2018-11-23 | 2018-11-23 | Data processing method and device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109558748B (en) |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110110516A (en) * | 2019-01-04 | 2019-08-09 | 北京车和家信息技术有限公司 | Log recording method, apparatus and system |
CN110119429A (en) * | 2019-04-22 | 2019-08-13 | 矩阵元技术(深圳)有限公司 | Data processing method, device, computer equipment and storage medium |
CN110135175A (en) * | 2019-04-26 | 2019-08-16 | 平安科技(深圳)有限公司 | Information processing, acquisition methods, device, equipment and medium based on block chain |
CN110209744A (en) * | 2019-05-07 | 2019-09-06 | 深圳壹账通智能科技有限公司 | Relevant database and its operating method and device based on alliance's chain |
CN110222052A (en) * | 2019-05-20 | 2019-09-10 | 重庆金融资产交易所有限责任公司 | Block chain data processing method, device, computer equipment and storage medium |
CN110224817A (en) * | 2019-05-29 | 2019-09-10 | 中国人民大学 | A kind of software popularization intelligent service system and method based on block chain technology |
CN110543516A (en) * | 2019-07-26 | 2019-12-06 | 深圳壹账通智能科技有限公司 | Intelligent contract processing method and device, computer equipment and storage medium |
CN110598463A (en) * | 2019-04-19 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Block chain-based information processing method and device and computer-readable storage medium |
CN110781188A (en) * | 2019-10-23 | 2020-02-11 | 泰康保险集团股份有限公司 | Form information processing method and device, electronic equipment and storage medium |
CN111209589A (en) * | 2019-12-31 | 2020-05-29 | 航天信息股份有限公司 | Method and system for dynamic data desensitization based on regional chain |
CN111343142A (en) * | 2020-01-22 | 2020-06-26 | 腾讯科技(深圳)有限公司 | Data processing method and device based on block chain network and storage medium |
CN111355710A (en) * | 2020-02-19 | 2020-06-30 | 腾讯科技(深圳)有限公司 | Data request method and device of network service |
CN111415158A (en) * | 2020-03-31 | 2020-07-14 | 支付宝(杭州)信息技术有限公司 | Wind control method and system based on block chain |
CN112487486A (en) * | 2020-12-18 | 2021-03-12 | 平安普惠企业管理有限公司 | Data acquisition method and device based on block chain and computer equipment |
CN112580107A (en) * | 2021-02-23 | 2021-03-30 | 布比(北京)网络技术有限公司 | Data opening method based on block chain, data acquisition method and corresponding devices |
CN112685759A (en) * | 2020-12-31 | 2021-04-20 | 南京星源动力信息技术有限公司 | Data processing method and system for block chain |
CN113438234A (en) * | 2021-06-24 | 2021-09-24 | 字极(上海)网络科技有限公司 | Network data security protection encryption method |
CN113792342A (en) * | 2021-09-17 | 2021-12-14 | 平安普惠企业管理有限公司 | Desensitization data restoration method and device, computer equipment and storage medium |
CN115688184A (en) * | 2022-12-26 | 2023-02-03 | 平安银行股份有限公司 | Log desensitization method and device, electronic equipment and storage medium |
WO2023142773A1 (en) * | 2022-01-30 | 2023-08-03 | 华为技术有限公司 | Device control method, device, and distributed digital key system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106599322A (en) * | 2017-01-03 | 2017-04-26 | 北京网智天元科技股份有限公司 | Data desensitization method and device |
CN107103087A (en) * | 2017-05-02 | 2017-08-29 | 成都中远信电子科技有限公司 | Block chain big data analysis of market conditions system |
CN107315970A (en) * | 2016-04-26 | 2017-11-03 | 展讯通信(上海)有限公司 | The exchange method and device of a kind of sensitive data |
CN108389046A (en) * | 2018-02-07 | 2018-08-10 | 西安交通大学 | Secret protection method of commerce based on block chain technology in a kind of e-commerce |
-
2018
- 2018-11-23 CN CN201811407905.5A patent/CN109558748B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107315970A (en) * | 2016-04-26 | 2017-11-03 | 展讯通信(上海)有限公司 | The exchange method and device of a kind of sensitive data |
CN106599322A (en) * | 2017-01-03 | 2017-04-26 | 北京网智天元科技股份有限公司 | Data desensitization method and device |
CN107103087A (en) * | 2017-05-02 | 2017-08-29 | 成都中远信电子科技有限公司 | Block chain big data analysis of market conditions system |
CN108389046A (en) * | 2018-02-07 | 2018-08-10 | 西安交通大学 | Secret protection method of commerce based on block chain technology in a kind of e-commerce |
Non-Patent Citations (1)
Title |
---|
陇小渝 等: "区块链技术在我们行业发展中的应用", 《经济研究导刊》 * |
Cited By (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110110516A (en) * | 2019-01-04 | 2019-08-09 | 北京车和家信息技术有限公司 | Log recording method, apparatus and system |
CN110598463A (en) * | 2019-04-19 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Block chain-based information processing method and device and computer-readable storage medium |
KR102459318B1 (en) | 2019-04-19 | 2022-10-27 | 텐센트 테크놀로지(센젠) 컴퍼니 리미티드 | Information processing method and device based on block chain and computer readable storage medium |
US11442912B2 (en) | 2019-04-19 | 2022-09-13 | Tencent Technology (Shenzhen) Company Limited | Blockchain-based information processing method and apparatus and computer-readable storage medium |
CN110598463B (en) * | 2019-04-19 | 2021-05-14 | 腾讯科技(深圳)有限公司 | Block chain-based information processing method and device and computer-readable storage medium |
KR20210038658A (en) * | 2019-04-19 | 2021-04-07 | 텐센트 테크놀로지(센젠) 컴퍼니 리미티드 | Blockchain-based information processing method and device and computer-readable storage medium |
WO2020211660A1 (en) * | 2019-04-19 | 2020-10-22 | 腾讯科技(深圳)有限公司 | Information processing method and device based on blockchain, and computer-readable storage medium |
CN110119429B (en) * | 2019-04-22 | 2021-12-03 | 矩阵元技术(深圳)有限公司 | Data processing method, data processing device, computer equipment and storage medium |
CN110119429A (en) * | 2019-04-22 | 2019-08-13 | 矩阵元技术(深圳)有限公司 | Data processing method, device, computer equipment and storage medium |
WO2020215685A1 (en) * | 2019-04-26 | 2020-10-29 | 平安科技(深圳)有限公司 | Block chain-based information processing and acquisition methods and apparatus, device, and medium |
CN110135175A (en) * | 2019-04-26 | 2019-08-16 | 平安科技(深圳)有限公司 | Information processing, acquisition methods, device, equipment and medium based on block chain |
CN110209744A (en) * | 2019-05-07 | 2019-09-06 | 深圳壹账通智能科技有限公司 | Relevant database and its operating method and device based on alliance's chain |
CN110222052A (en) * | 2019-05-20 | 2019-09-10 | 重庆金融资产交易所有限责任公司 | Block chain data processing method, device, computer equipment and storage medium |
CN110224817A (en) * | 2019-05-29 | 2019-09-10 | 中国人民大学 | A kind of software popularization intelligent service system and method based on block chain technology |
CN110543516A (en) * | 2019-07-26 | 2019-12-06 | 深圳壹账通智能科技有限公司 | Intelligent contract processing method and device, computer equipment and storage medium |
CN110781188A (en) * | 2019-10-23 | 2020-02-11 | 泰康保险集团股份有限公司 | Form information processing method and device, electronic equipment and storage medium |
CN111209589A (en) * | 2019-12-31 | 2020-05-29 | 航天信息股份有限公司 | Method and system for dynamic data desensitization based on regional chain |
CN111343142A (en) * | 2020-01-22 | 2020-06-26 | 腾讯科技(深圳)有限公司 | Data processing method and device based on block chain network and storage medium |
CN111355710A (en) * | 2020-02-19 | 2020-06-30 | 腾讯科技(深圳)有限公司 | Data request method and device of network service |
CN111415158B (en) * | 2020-03-31 | 2022-04-22 | 支付宝(杭州)信息技术有限公司 | Wind control method and system based on block chain |
CN111415158A (en) * | 2020-03-31 | 2020-07-14 | 支付宝(杭州)信息技术有限公司 | Wind control method and system based on block chain |
CN112487486A (en) * | 2020-12-18 | 2021-03-12 | 平安普惠企业管理有限公司 | Data acquisition method and device based on block chain and computer equipment |
CN112685759A (en) * | 2020-12-31 | 2021-04-20 | 南京星源动力信息技术有限公司 | Data processing method and system for block chain |
CN112580107A (en) * | 2021-02-23 | 2021-03-30 | 布比(北京)网络技术有限公司 | Data opening method based on block chain, data acquisition method and corresponding devices |
CN113438234A (en) * | 2021-06-24 | 2021-09-24 | 字极(上海)网络科技有限公司 | Network data security protection encryption method |
CN113792342A (en) * | 2021-09-17 | 2021-12-14 | 平安普惠企业管理有限公司 | Desensitization data restoration method and device, computer equipment and storage medium |
CN113792342B (en) * | 2021-09-17 | 2023-09-08 | 山西数字政府建设运营有限公司 | Desensitization data reduction method, device, computer equipment and storage medium |
WO2023142773A1 (en) * | 2022-01-30 | 2023-08-03 | 华为技术有限公司 | Device control method, device, and distributed digital key system |
CN115688184A (en) * | 2022-12-26 | 2023-02-03 | 平安银行股份有限公司 | Log desensitization method and device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109558748B (en) | 2020-11-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109558748A (en) | Data processing method, device, electronic equipment and storage medium | |
US10963400B2 (en) | Smart contract creation and monitoring for event identification in a blockchain | |
US20240089262A1 (en) | System and method for aggregating client data and cyber data for authentication determinations | |
CN109981619A (en) | Data capture method, device, medium and electronic equipment | |
CN112241506B (en) | User behavior backtracking method, device, equipment and system | |
JP2022504440A (en) | Secondary fraud detection during transaction verification | |
CN110032599B (en) | Data structure reading and updating method and device, and electronic equipment | |
CN109977690A (en) | A kind of data processing method, device and medium | |
KR101588932B1 (en) | Security through metadata orchestrators | |
EP4100864A1 (en) | System and method for conversational middleware platform | |
CN111985703B (en) | User identity state prediction method, device and equipment | |
CN110084007A (en) | Construction method, device and the terminal of risk control model | |
CN111985921B (en) | Verification processing method based on block chain offline payment and digital financial service platform | |
CN110032568B (en) | Data structure reading and updating method and device, and electronic equipment | |
CN108921712A (en) | Data processing method, device, medium and electronic equipment | |
CN114693192A (en) | Wind control decision method and device, computer equipment and storage medium | |
CN109922155A (en) | The method and device of intelligent agent is realized in block chain network | |
CN114598671B (en) | Session message processing method, device, storage medium and electronic equipment | |
WO2022206439A1 (en) | Method and apparatus for providing cross-chain message | |
CN110858242A (en) | Page skipping method and device | |
CN109495468A (en) | Authentication method, device, electronic equipment and storage medium | |
CN110351435A (en) | Blacklist setting method of conversing and device | |
CN116644473A (en) | Data desensitization method and device | |
US20230125814A1 (en) | Credit score management apparatus, credit score management method, and computer readable recording medium | |
CN108874625B (en) | Information processing method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |