[go: up one dir, main page]

CN117633848B - User information joint processing method, device, equipment and computer readable medium - Google Patents

User information joint processing method, device, equipment and computer readable medium Download PDF

Info

Publication number
CN117633848B
CN117633848B CN202410101506.5A CN202410101506A CN117633848B CN 117633848 B CN117633848 B CN 117633848B CN 202410101506 A CN202410101506 A CN 202410101506A CN 117633848 B CN117633848 B CN 117633848B
Authority
CN
China
Prior art keywords
information
user identity
identity information
encrypted
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410101506.5A
Other languages
Chinese (zh)
Other versions
CN117633848A (en
Inventor
郑植
徐崚峰
吴中彪
王欢
张骏仪
方兴
岳丰
杨海成
刘殿兴
师建兴
黄美艺
罗安扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Citic Corp Of China
Citic Securities Co ltd
Original Assignee
Citic Corp Of China
Citic Securities Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Citic Corp Of China, Citic Securities Co ltd filed Critical Citic Corp Of China
Priority to CN202410101506.5A priority Critical patent/CN117633848B/en
Publication of CN117633848A publication Critical patent/CN117633848A/en
Application granted granted Critical
Publication of CN117633848B publication Critical patent/CN117633848B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the disclosure discloses a user information joint processing method, a device, equipment and a computer readable medium. One embodiment of the method comprises the following steps: according to the user identity information of each encryption standard, performing verification processing on the first verification information to obtain a first verification result; according to the identity information of each encrypted abnormal user, checking the second checking information to obtain a second checking result; responsive to receiving the feedback information, determining corresponding canonical user identity information; according to each encryption updating standard user identity information, checking the third checking information to obtain a third checking result; and according to the encrypted updated abnormal user identity information, performing verification processing on the fourth verification information to obtain a fourth verification result, and sending the fourth verification result to the participating processing sub-node so that the participating processing sub-node performs standardization processing on the user identity information to be standardized. This embodiment improves the security of the user information.

Description

User information joint processing method, device, equipment and computer readable medium
Technical Field
Embodiments of the present disclosure relate to the field of computer technology, and in particular, to a method, an apparatus, a device, and a computer readable medium for user information joint processing.
Background
In the user information joint processing, the data check party (parent company) holds all check rules, and data required for checking is stored only in the data check party, and each data to be checked party (subsidiary company) does not have any data required for checking. The data verifier also has no raw data for each data to be verified. At present, the original data reported by each data checked party is mainly obtained from the plaintext of the data checked party, the original data reported by each data checked party is checked according to the check rule, so that the original data reported by each data checked party is normalized, and the normalized data is sent to each data checked party. Moreover, the data checking party does not have data required for checking the original data reported by the data checked party, and the data checking party needs to manually check and normalize the original data reported by the data checked party.
However, the inventors found that when the information joint processing is performed in the above manner, there are often the following technical problems:
Firstly, the data checking party plain text obtains the original data of each data checked party, so that the original data of each data checked party are all exposed to the data checking party, the data checking party is attacked, the risk of the original data of each data checked party being revealed is higher, and the safety of the data is lower. And because the data checking party also has no original data of each data checked party, the original data of the data checking party and the data checked party are secret, and plaintext data exchange can not be carried out, so that user information joint processing can not be carried out.
Secondly, the data required by the verification of the original data reported by the data checked party does not exist in the data checked party, and the original data reported by the data checked party is required to be subjected to the verification and normalization processing manually, so that the efficiency of the joint processing of the user information is lower.
Third, because the data required for checking is only stored in the data checking party, more redundant data exists in the common storage mode, so that the query efficiency of the data required for checking is lower, and when each data is checked by the checking party by frequently sending the original data, the checking efficiency is lower.
The above information disclosed in this background section is only for enhancement of understanding of the background of the inventive concept and, therefore, may contain information that does not form the prior art that is already known to those of ordinary skill in the art in this country.
Disclosure of Invention
The disclosure is in part intended to introduce concepts in a simplified form that are further described below in the detailed description. The disclosure is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Some embodiments of the present disclosure propose a user information joint processing method, apparatus, electronic device, and computer readable medium to solve one or more of the technical problems mentioned in the background section above.
In a first aspect, some embodiments of the present disclosure provide a method for jointly processing user information, where the method includes: encrypting all standard user identity information contained in a pre-stored standard user information set and all abnormal user identity information contained in a pre-stored abnormal user information mapping relation set to obtain all encrypted standard user identity information and all encrypted abnormal user identity information, and sending the encrypted information to all participating processing sub-nodes so that the participating processing sub-nodes in all participating processing sub-nodes encrypt all user identity information to be normalized; responding to the received first check information sent by the participating processing sub-node in each participating processing sub-node, performing check processing on the first check information according to the user identity information of each encryption standard to obtain a first check result, and sending the first check result to the participating processing sub-node; in response to receiving second check information sent by the participating processing sub-node, performing check processing on the second check information according to the encrypted abnormal user identity information to obtain a second check result, and sending the second check result to the participating processing sub-node; determining standard user information corresponding to user identity information to be standardized in response to receiving feedback information sent by the participating processing child node, wherein the feedback information comprises the user identity information to be standardized; updating the pre-stored standard user information set and the pre-stored abnormal user information mapping relation set according to the user identity information to be normalized and the normalized user information corresponding to the user identity information to be normalized to obtain an updated user information set and an updated abnormal user information mapping relation set; encrypting each piece of updating standard user identity information included in the updating user information set and each piece of updating abnormal user identity information included in the updating abnormal user information mapping relation set to obtain each piece of encrypting updating standard user identity information and each piece of encrypting updating abnormal user identity information; responding to the received third check information sent by the participating processing sub-node, performing check processing on the third check information according to the encryption updating standard user identity information to obtain a third check result, and sending the third check result to the participating processing sub-node; and in response to receiving the fourth check information sent by the participating processing sub-node, performing check processing on the fourth check information according to the encryption updating abnormal user identity information to obtain a fourth check result, and sending the fourth check result to the participating processing sub-node so that the participating processing sub-node performs normalization processing on the user identity information to be normalized.
In a second aspect, some embodiments of the present disclosure provide a user information joint processing apparatus, the apparatus including: the first encryption unit is configured to encrypt each piece of standard user identity information included in the pre-stored standard user information set and each piece of abnormal user identity information included in the pre-stored abnormal user information mapping relation set to obtain each piece of encrypted standard user identity information and each piece of encrypted abnormal user identity information, and send the encrypted information to each participating processing sub-node so that the participating processing sub-node in each participating processing sub-node encrypts each piece of user identity information to be normalized; the first verification unit is configured to respond to the received first verification information sent by the participating processing sub-node in each participating processing sub-node, perform verification processing on the first verification information according to the encryption standard user identity information to obtain a first verification result, and send the first verification result to the participating processing sub-node; a second checking unit configured to perform a checking process on the second checking information according to the encrypted abnormal user identity information in response to receiving the second checking information transmitted from the participating processing sub-node, to obtain a second checking result, and to transmit the second checking result to the participating processing sub-node; the determining unit is configured to determine standard user information corresponding to user identity information to be standardized in response to receiving feedback information sent by the participating processing sub-node, wherein the feedback information comprises the user identity information to be standardized; the updating unit is configured to update the pre-stored standard user information set and the pre-stored abnormal user information mapping relation set according to the user identity information to be normalized and the normalized user information corresponding to the user identity information to be normalized to obtain an updated user information set and an updated abnormal user information mapping relation set; the second encryption unit is configured to encrypt each piece of updated standard user identity information included in the updated user information set and each piece of updated abnormal user identity information included in the updated abnormal user information mapping relation set to obtain each piece of encrypted updated standard user identity information and each piece of encrypted updated abnormal user identity information; the third verification unit is configured to respond to receiving third verification information sent by the participating processing sub-node, perform verification processing on the third verification information according to the encryption updating standard user identity information to obtain a third verification result, and send the third verification result to the participating processing sub-node; and the fourth verification unit is configured to respond to the received fourth verification information sent by the participating processing sub-node, perform verification processing on the fourth verification information according to the encryption updating abnormal user identity information to obtain a fourth verification result, and send the fourth verification result to the participating processing sub-node so that the participating processing sub-node performs normalization processing on the user identity information to be normalized.
In a third aspect, some embodiments of the present disclosure provide an electronic device comprising: one or more processors; a storage device having one or more programs stored thereon, which when executed by one or more processors causes the one or more processors to implement the method described in any of the implementations of the first aspect above.
In a fourth aspect, some embodiments of the present disclosure provide a computer readable medium having a computer program stored thereon, wherein the computer program, when executed by a processor, implements the method described in any of the implementations of the first aspect above.
The above embodiments of the present disclosure have the following advantageous effects: by the user information joint processing method of some embodiments of the present disclosure, the security of the user information is improved. Specifically, the reason why the security of the user information is low is that: the data checking party plain text obtains the original data of each data checked party, so that the original data of each data checked party are all exposed to the data checking party, the data checking party is attacked, the risk of the original data of each data checked party being revealed is higher, and the safety of the data is lower. And because the data checking party also has no original data of each data checked party, the original data of the data checking party and the data checked party are secret, and plaintext data exchange can not be carried out, so that user information joint processing can not be carried out. Based on this, in the user information joint processing method of some embodiments of the present disclosure, first, encryption processing is performed on each standard user identity information included in a pre-stored standard user information set and each abnormal user identity information included in a pre-stored abnormal user information mapping relation set, so as to obtain each encrypted standard user identity information and each encrypted abnormal user identity information, and the encryption information is sent to each participating processing sub-node, so that the participating processing sub-node in each participating processing sub-node performs encryption processing on each user identity information to be normalized, where the pre-stored standard user information in the pre-stored standard user information set includes standard user identity information, and the pre-stored abnormal user information mapping relation in the pre-stored abnormal user information mapping relation set includes abnormal user identity information and normalized user identity information corresponding to the abnormal user identity information. Thus, each piece of encrypted standard user identity information and each piece of encrypted abnormal user identity information can be obtained. And then, in response to receiving the first check information sent by the participating processing sub-node in each participating processing sub-node, performing check processing on the first check information according to the user identity information of each encryption standard to obtain a first check result, and sending the first check result to the participating processing sub-node. Thus, a first verification result can be obtained, and the first verification result can represent whether the encryption standard user identity information corresponding to the first verification information exists in the encryption standard user identity information. And then, in response to receiving second check information sent by the participating processing sub-node, performing check processing on the second check information according to the encrypted abnormal user identity information to obtain a second check result, and sending the second check result to the participating processing sub-node. Thus, a second check result can be obtained, and the second check result can represent whether the encrypted abnormal user identity information corresponding to the second check information exists in the encrypted abnormal user identity information. And then, determining the standard user information corresponding to the user identity information to be standardized in response to receiving the feedback information sent by the participating processing child node, wherein the feedback information comprises the user identity information to be standardized. Thus, the standard user information corresponding to the user identity information to be standard can be obtained. The standard user information may represent standard user identity information or standard user information corresponding to the user identity information to be specified. And then, according to the user identity information to be normalized and the normalized user information corresponding to the user identity information to be normalized, updating the pre-stored standard user information set and the pre-stored abnormal user information mapping relation set to obtain an updated user information set and an updated abnormal user information mapping relation set, wherein the updated user information in the updated user information set comprises updated standard user identity information, and the updated abnormal user information mapping relation in the updated abnormal user information mapping relation set comprises updated abnormal user identity information. Thus, the updated pre-stored standard user information set and the pre-stored abnormal user information mapping relation set can be obtained. And then, carrying out encryption processing on each piece of updating standard user identity information included in the updating user information set and each piece of updating abnormal user identity information included in the updating abnormal user information mapping relation set to obtain each piece of encryption updating standard user identity information and each piece of encryption updating abnormal user identity information. Therefore, the user identity information of each encryption updating standard and the user identity information of each encryption updating abnormal can be obtained and can be used for re-checking the check information sent by the participating processing child nodes. And then, in response to receiving the third verification information sent by the participating processing sub-node, performing verification processing on the third verification information according to the encryption updating standard user identity information to obtain a third verification result, and sending the third verification result to the participating processing sub-node. Therefore, a third checking result can be obtained, and the third checking result can represent whether the encryption updating standard user identity information corresponding to the third checking information exists in the encryption updating standard user identity information. And finally, responding to the received fourth check information sent by the participating processing sub-node, carrying out check processing on the fourth check information according to the encryption updating abnormal user identity information to obtain a fourth check result, and sending the fourth check result to the participating processing sub-node so as to carry out standardization processing on the user identity information to be standardized by the participating processing sub-node. Therefore, a fourth checking result can be obtained, the fourth checking result can represent whether the encryption updating abnormal user identity information corresponding to the fourth checking information exists in the encryption updating abnormal user identity information, and the fourth checking result can be sent to the participating processing sub-node so that the participating processing sub-node can normalize the user identity information to be normalized according to the fourth checking result. And because the realized user information joint processing method can joint the data of all the participants, all the participants send the check information to the data check party (the execution main body of the user information joint processing) for check, and the obtained check result is sent to the participants. And checking the checking information sent by the participant through four times of checking to obtain the standard user identity information corresponding to the checking information sent by the participant. In the whole process of user information joint processing, each participant does not know user data sent by other participants, and the data corrector does not know specific data sent by each participant. Thereby improving the security of the user information. And the problem that user information joint processing cannot be carried out through plaintext data exchange under the condition that the original data of the data checking party and the data checked party are secret is solved.
Drawings
The above and other features, advantages, and aspects of embodiments of the present disclosure will become more apparent by reference to the following detailed description when taken in conjunction with the accompanying drawings. The same or similar reference numbers will be used throughout the drawings to refer to the same or like elements. It should be understood that the figures are schematic and that elements and components are not necessarily drawn to scale.
FIG. 1 is a flow chart of some embodiments of a user information joint processing method according to the present disclosure;
FIG. 2 is a schematic diagram of the architecture of some embodiments of a user information federation processing apparatus according to the present disclosure;
fig. 3 is a schematic structural diagram of an electronic device suitable for use in implementing some embodiments of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete. It should be understood that the drawings and embodiments of the present disclosure are for illustration purposes only and are not intended to limit the scope of the present disclosure.
It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings. Embodiments of the present disclosure and features of embodiments may be combined with each other without conflict.
It should be noted that the terms "first," "second," and the like in this disclosure are merely used to distinguish between different devices, modules, or units and are not used to define an order or interdependence of functions performed by the devices, modules, or units.
It should be noted that references to "one", "a plurality" and "a plurality" in this disclosure are intended to be illustrative rather than limiting, and those of ordinary skill in the art will appreciate that "one or more" is intended to be understood as "one or more" unless the context clearly indicates otherwise.
The names of messages or information interacted between the various devices in the embodiments of the present disclosure are for illustrative purposes only and are not intended to limit the scope of such messages or information.
The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Fig. 1 illustrates a flow 100 of some embodiments of a user information joint processing method according to the present disclosure. The user information joint processing method comprises the following steps:
Step 101, encrypting each piece of standard user identity information included in a pre-stored standard user information set and each piece of abnormal user identity information included in a pre-stored abnormal user information mapping relation set to obtain each piece of encrypted standard user identity information and each piece of encrypted abnormal user identity information, and sending the encrypted information to each participating processing sub-node so that the participating processing sub-node in each participating processing sub-node can encrypt each piece of user identity information to be normalized.
In some embodiments, an executing body (for example, a computing device) of the user information joint processing method may perform encryption processing on each standard user identity information included in a pre-stored standard user information set and each abnormal user identity information included in a pre-stored abnormal user information mapping relation set to obtain each encrypted standard user identity information and each encrypted abnormal user identity information, and send the encrypted information to each participating processing sub-node, so that the participating processing sub-node in each participating processing sub-node performs encryption processing on each user identity information to be normalized. The pre-stored standard user information in the pre-stored standard user information set can represent standard user identity information and user detail information. The user identity information may be a customer name. For example, the customer name may be a company name. The pre-stored standard user information in the pre-stored standard user information set may include standard user identity information and user detail information. The user detail information may be related information of the user corresponding to the user identity information. The user details may include, but are not limited to: user information, domain classification information, and region information are associated. The related user information may be a target company having a value-related relationship with a company corresponding to the user identity information. For example, the value correlation may be investment or holding stock. The target company may be a company corresponding to the subject of execution, a higher-level company of a company corresponding to the subject of execution, or another company having the same higher-level company as the company corresponding to the subject of execution. For example, the domain classification information may be an industry classification of a company corresponding to the user identity information. The region information may be a registration address of a company corresponding to the user identity information. The pre-stored abnormal user information mapping relation in the pre-stored abnormal user information mapping relation set may include abnormal user identity information and standard user identity information corresponding to the abnormal user identity information. The above-mentioned respective participating processing sub-nodes may characterize respective servers participating in the joint processing of user information. In practice, firstly, the executing body may adopt an MD5 encryption algorithm to encrypt each piece of standard user identity information included in the pre-stored standard user information set and each piece of abnormal user identity information included in the pre-stored abnormal user information mapping relation set, so as to obtain each piece of encrypted standard user identity information and each piece of encrypted abnormal user identity information. And then, the encryption information can be sent to each participating processing sub-node in a wired connection or wireless connection mode, so that the participating processing sub-node in each participating processing sub-node carries out encryption processing on the identity information of each user to be normalized. The encryption information may be prompt information of participating in the encryption processing of the identity information of each user to be normalized by the processing sub-node. Each of the above-mentioned respective participating processing sub-nodes comprises respective user identity information to be normalized. The above-mentioned user identity information to be normalized may be user identity information to be determined. The canonical user identity information may be a user name of the naming canonical. It should be noted that, the above standard user identity information is standard user identity information.
Step 102, in response to receiving the first verification information sent by the participating processing sub-node in each participating processing sub-node, performing verification processing on the first verification information according to the user identity information of each encryption standard to obtain a first verification result, and sending the first verification result to the participating processing sub-node.
In some embodiments, the executing body may respond to receiving the first verification information sent by the participating processing sub-node in the participating processing sub-nodes, perform verification processing on the first verification information according to the user identity information of each encryption standard to obtain a first verification result, and send the first verification result to the participating processing sub-node. The first check information may represent check information sent by the participating processing child node for the first time. The verification information can be encrypted user identity information to be normalized. The encrypted user identity information to be normalized may be user identity information to be normalized encrypted by an MD5 encryption algorithm included in the participating processing sub-node. The first verification result may represent a result after the first verification of the verification information. In practice, first, in response to receiving the first verification information sent by the participating processing sub-node in the participating processing sub-nodes, the executing body may perform verification processing on the first verification information according to the user identity information of each encryption standard in various manners to obtain a first verification result. And then, the first check result can be sent to the participating processing child nodes in a wired connection or wireless connection mode.
Optionally, before step 102, the executing body may further send preset first encryption information to the participating processing sub-node, so that the participating processing sub-node performs encryption processing on the identity information of each user to be normalized. The preset first encryption information may be a public key pair generated by an RSA encryption algorithm. The public key pair may include a first public key and a second public key. The first public key and the second public key are integers. The first public key may be a product of a first predetermined prime number and a second predetermined prime number. The first preset prime number and the second preset prime number may be different prime numbers greater than 1000. The second public key may be greater than 1 and less than a predetermined value. The preset value may be a product of a difference between the first preset prime number and 1 and a difference between the second preset prime number and 1. In practice, the executing body may send the preset first encryption information to the participating processing sub-node through a wired connection or a wireless connection.
In some optional implementations of some embodiments, in response to receiving the first check information sent by a participating processing sub-node in the participating processing sub-nodes, the executing body may perform a check process on the first check information according to the user identity information of each encryption standard to obtain a first check result:
And the first step is to encrypt the first check information according to preset second encryption information to obtain encrypted first check information. The preset second encryption information may be a private key generated by an RSA encryption algorithm. The encrypted first verification information may be first verification information encrypted by the private key.
And a second step of transmitting the encrypted first check information to the participating processing sub-node, so that the participating processing sub-node decrypts the encrypted first check information to obtain decrypted first check information. The decrypting the first verification information may be a quotient of the encrypting the first verification information and the first encrypted random number. The first encrypted random number may be obtained by encrypting a first preset random number by the participating processing node through a first public key in the first encryption information. The first preset random number may be a random number randomly generated by the participating processing child node. In practice, the executing body may send the encrypted first verification information to the participating processing child node by using a wired connection or a wireless connection.
And thirdly, encrypting the user identity information of each encryption standard according to the preset second encryption information to obtain the user identity information of each secondary encryption. The secondary encrypted user identity information may be encrypted standard user identity information encrypted by the private key.
And step four, transmitting the secondary encrypted user identity information to the participating processing sub-node so that the participating processing sub-node can determine whether the secondary encrypted user identity information matched with the decrypted first verification information exists in the secondary encrypted user identity information. In practice, the executing body may send the secondary encrypted user identity information to the participating processing child nodes by using a wired connection or a wireless connection. When the decrypted first verification information is equal to at least one piece of the secondary encrypted user identity information, it is indicated that the secondary encrypted user identity information matches the decrypted first verification information.
And fifthly, initializing a preset first check result sequence. The preset first check result sequence may represent a first check result. The initial state of the preset first check result sequence may be null. In practice, the execution body may void the preset first check result sequence, so as to initialize the preset first check result sequence.
A sixth step of executing the following steps in response to receiving the first data request information sent by the participating processing child node:
a first sub-step of generating a first random number sequence. Wherein the first random number sequence may characterize each random number. The first data request information may be an inadvertent transmission request. The above-described inadvertent transmission request may be a request sent through an inadvertent transmission protocol. The number of the first random numbers in the first random number sequence may be the same as the number of the encrypted standard user identity information in each encrypted standard user identity information. In practice, the executing body may generate the first random number sequence by adopting a random number generation algorithm.
And a second sub-step of transmitting the first random number sequence to the participating processing sub-node, so that the participating processing sub-node performs a first random number encryption process on the first random number sequence. The first random number encryption process may be to add the first preset random number to each first random number in the first random number sequence. In practice, the executing body may send the first random number sequence to the participating processing child node by using a wired connection or a wireless connection.
And a third sub-step, in response to receiving the first encrypted random number sequence sent by the participating processing sub-node, performing encryption processing on each piece of user detail information corresponding to each piece of encryption standard user identity information in the pre-stored standard user information set according to the preset second encryption information to obtain an encrypted user detail information sequence. The encrypted user detail information sequence may be each user detail information encrypted by the preset second encryption information. The first encrypted random number sequence may be obtained by adding, to each first random number in the first random number sequence, the first preset random number to the participating processing sub-node.
And a fourth sub-step of encrypting the first encrypted random number sequence according to the preset second encryption information and the first random number sequence to obtain a first twice encrypted random number sequence. The first twice-encrypted random number sequence may be an encrypted first encrypted random number sequence. In practice, first, the executing body may subtract the first random number in the first random number sequence from each first encrypted random number in the first encrypted random number sequence to obtain a first difference sequence. The first difference sequence may be each difference between each first encrypted random number and each first random number corresponding to each first encrypted random number. Then, the first difference sequence may be encrypted according to the second encryption information, to obtain a first twice-encrypted random number sequence.
And a fifth sub-step of combining the encrypted user detail information in the encrypted user detail information sequence with the first twice encrypted random number in the first twice encrypted random number sequence to obtain a first encrypted standard user information sequence. The first encryption standard user information in the first encryption standard user information sequence may be information obtained by combining the encrypted user detail information and the first twice encrypted random number. In practice, for each encrypted user detail information in the encrypted user detail information sequence, the executing body may add the encrypted user detail information to a first twice-encrypted random number having the same sequence number as the encrypted user detail information in the first twice-encrypted random number sequence, to obtain first encrypted standard user information.
And a sixth sub-step of assigning the first encryption standard user information sequence to the preset first check result sequence.
Seventh, determining the obtained preset first check result sequence as a first check result.
Step 103, in response to receiving the second check information sent by the participating processing sub-node, performing check processing on the second check information according to the encrypted abnormal user identity information to obtain a second check result, and sending the second check result to the participating processing sub-node.
In some embodiments, in response to receiving the second verification information sent by the participating processing sub-node, the executing body may perform verification processing on the second verification information according to the encrypted abnormal user identity information to obtain a second verification result, and send the second verification result to the participating processing sub-node. The second verification information may represent verification information sent by the participating processing child node for a second time. The verification information may be the encrypted user identity information to be normalized. The second verification result may represent a result after the second verification of the verification information. It should be noted that, when the second check result is null, it indicates that no canonical user identity information corresponding to the encrypted user identity information to be normalized exists in the pre-stored abnormal user information mapping relation set. In practice, first, in response to receiving the second verification information sent by the participating processing child node, the executing body may perform verification processing on the second verification information according to the encrypted abnormal user identity information in various manners to obtain a second verification result. The second check result may then be sent to the participating processing child nodes by means of a wired connection or a wireless connection.
In some optional implementations of some embodiments, in response to receiving the second verification information sent by the participating processing child nodes, the executing body may perform verification processing on the second verification information according to the encrypted abnormal user identity information to obtain a second verification result by:
and a first step of encrypting the second verification information according to the preset second encryption information to obtain encrypted second verification information. The encrypted second verification information may be second verification information encrypted by the preset second encryption information.
And a second step of transmitting the encrypted second check information to the participating processing sub-node, so that the participating processing sub-node decrypts the encrypted second check information to obtain decrypted second check information. Wherein the decrypted second verification information may be a quotient of the encrypted second verification information and a second encrypted random number. The second encrypted random number may be obtained by encrypting a second preset random number by the participating processing node through a first public key in the first encryption information. The second preset random number may be a random number randomly generated by the participating processing child node. In practice, the executing body may send the encrypted second verification information to the participating processing child node by using a wired connection or a wireless connection.
And thirdly, carrying out encryption processing on the encrypted abnormal user identity information according to the preset second encryption information to obtain the encrypted abnormal user identity information. The second encrypted abnormal user identity information may be encrypted by the second encrypted information.
And step four, transmitting the secondary encrypted abnormal user identity information to the participating processing sub-node so that the participating processing sub-node can determine whether the secondary encrypted abnormal user identity information matched with the decrypted second checking information exists in the secondary encrypted abnormal user identity information. In practice, the executing body may send the information of each secondary encrypted abnormal user identity to the participating processing child node by adopting a wired connection or a wireless connection mode. When the decrypted second verification information is equal to at least one piece of the secondarily encrypted abnormal user identity information, it is indicated that the secondarily encrypted abnormal user identity information matches the decrypted second verification information.
And fifthly, initializing a preset second checking result sequence. Wherein the predetermined second test result sequence may represent a second test result. The initial state of the preset second check result sequence may be null. In practice, the execution body may void the preset second calibration result sequence, so as to initialize the preset second calibration result sequence.
And sixthly, responding to the received second data request information sent by the participating processing child nodes, executing the following steps:
a first sub-step of generating a second random number sequence. Wherein the second random number sequence may characterize the respective random number. The second data request information may be an inadvertent transmission request. The number of second random numbers in the second random number sequence may be the same as the number of encrypted abnormal user identity information in each encrypted abnormal user identity information. In practice, the executing entity may employ a random number generation algorithm to generate the second random number sequence.
And a second sub-step of transmitting the second random number sequence to the participating processing sub-node, so that the participating processing sub-node performs a second random number encryption process on the second random number sequence. The second random number encryption process may be to add the second preset random number to each second random number in the second random number sequence. In practice, the executing entity may send the second random number sequence to the participating processing child node by using a wired connection or a wireless connection.
And a third sub-step, in response to receiving the second encrypted random number sequence sent by the participating processing sub-node, according to the preset second encrypted information, performing encryption processing on each piece of standard user identity information corresponding to each piece of encrypted abnormal user identity information in the pre-stored abnormal user information mapping relation set to obtain an encrypted standard user identity information sequence. The encrypted standard user identity information sequence may be each standard user identity information encrypted by the preset second encryption information. The second encrypted random number sequence may be obtained by adding, to each second random number in the second random number sequence, the second preset random number to the participating processing sub-node.
And a fourth sub-step of encrypting the second encrypted random number sequence according to the preset second encryption information and the second random number sequence to obtain a second encrypted random number sequence. The second encrypted random number sequence may be an encrypted second encrypted random number sequence. In practice, first, the executing entity may subtract the second random number in the second random number sequence from each second encrypted random number in the second encrypted random number sequence to obtain a second difference sequence. The second difference sequence may be each difference between each second encrypted random number and each second random number corresponding to each second encrypted random number. Then, the second difference sequence may be encrypted according to the second encryption information, to obtain a second encrypted random number sequence.
And a fifth sub-step of combining the encrypted standard user identity information in the encrypted standard user identity information sequence with the second encrypted random number in the second encrypted random number sequence to obtain a second encrypted standard user identity information sequence. The second encrypted standard user identity information in the second encrypted standard user identity information sequence may be information obtained by combining the encrypted standard user identity information with a second encrypted random number. In practice, for each encrypted canonical user identity information in the encrypted canonical user identity information sequence, the executing body may add the encrypted canonical user identity information to a second encrypted random number in the second encrypted random number sequence, where the sequence number is the same as the encrypted canonical user identity information, to obtain second encrypted canonical user identity information.
And a sixth sub-step of assigning the second encryption standard user identity information sequence to the preset second checking result sequence.
Seventh, determining the obtained preset second checking result sequence as a second checking result.
And 104, determining the standard user information corresponding to the identity information of the user to be standardized in response to receiving the feedback information sent by the participating processing sub-nodes.
In some embodiments, in response to receiving the feedback information sent by the participating processing sub-nodes, the executing entity may determine canonical user information corresponding to the identity information of the user to be canonical. The feedback information may include user identity information to be normalized. The standard user information may represent standard user identity information or standard user information corresponding to the user identity information to be specified. When receiving the feedback information sent by the participating processing sub-node, it is stated that the standard user identity information corresponding to the user identity information to be standardized does not exist in the encrypted standard user identity information or the encrypted abnormal user identity information. In practice, in response to receiving the feedback information sent by the participating processing sub-nodes, the executing entity may determine the canonical user information corresponding to the identity information of the user to be normalized in various manners.
In some optional implementations of some embodiments, in response to receiving the feedback information sent by the participating processing sub-nodes, the executing entity may determine canonical user information corresponding to the identity information of the user to be canonical by:
The first step is to determine whether the standard user identity information or the abnormal user identity information matched with the user identity information to be normalized exists in the standard user identity information or the abnormal user identity information according to the standard user identity information and the abnormal user identity information. In practice, the executing body may determine, according to the standard user identity information and the abnormal user identity information, whether standard user identity information or abnormal user identity information matched with the user identity information to be normalized exists in the standard user identity information or the abnormal user identity information.
And a second step of determining, in response to determining that the standard user identity information or the abnormal user identity information matching the to-be-normalized user identity information exists in the standard user identity information or the abnormal user identity information, normalized user identity information corresponding to the standard user identity information or the abnormal user identity information matching the to-be-normalized user identity information in the standard user identity information or the abnormal user identity information as normalized user information corresponding to the to-be-normalized user identity information.
In some optional implementations of some embodiments, the executing entity may determine, according to the standard user identity information and the abnormal user identity information, whether standard user identity information or abnormal user identity information matching the user identity information to be normalized exists in the standard user identity information or the abnormal user identity information:
the first step, preprocessing the user identity information to be normalized to obtain preprocessed user identity information to be normalized. Wherein the pretreatment may include, but is not limited to: punctuation marks, unified case and unified full-angle half-angle marks are removed.
And secondly, extracting the characteristics of the preprocessed user identity information to be normalized to obtain a target user identity information characteristic vector. The feature vector of the target user identity information can represent the feature vector of the preprocessed user identity information to be normalized, which is obtained through feature extraction. In practice, the executing body can adopt a feature extraction model to perform feature extraction on the preprocessed user identity information to be normalized to obtain a target user identity information feature vector. The feature extraction model may be a neural network model with user identity information as input and user identity information feature vectors as output. For example, the feature extraction model may be a CNN model, a LIST model, or a BERT model, or may be a model obtained by training a combination of a CNN model, an LSTM model, and a BERT model.
And thirdly, extracting the characteristics of the standard user identity information to obtain first characteristic vectors. The first feature vectors may represent feature vectors obtained by feature extraction of the standard user identity information. In practice, the executing body may use the feature extraction model to perform feature extraction on the standard user identity information to obtain each first feature vector.
And step four, extracting the characteristics of the abnormal user identity information to obtain second characteristic vectors. The second feature vectors may represent feature vectors obtained by feature extraction of the abnormal user identity information. In practice, the executing body may use the feature extraction model to perform feature extraction on the identity information of each abnormal user to obtain each second feature vector.
And fifthly, performing feature matching on the target user identity information feature vector and each first feature vector to obtain each first matching value. Wherein each of the first matching values may represent each degree of matching between each of the first feature vectors and the target user identity information feature vector. In practice, the executing entity may determine, as each first matching value, a cosine value between the target user identity information feature vector and each first feature vector.
And sixthly, performing feature matching on the target user identity information feature vector and each second feature vector to obtain each second matching value. Wherein each of the second matching values may represent each degree of matching between each of the second feature vectors and the target user identity information feature vector. In practice, the executing entity may determine, as each second matching value, a cosine value between the target user identity information feature vector and each second feature vector.
And seventhly, determining that the standard user identity information corresponding to the first matching value meeting the preset matching threshold condition is matched with the user identity information to be normalized in response to determining that the first matching value meeting the preset matching threshold condition exists in the first matching values. The preset matching threshold condition may be that the matching value is greater than a preset threshold. Here, the specific setting of the above-described preset threshold is not limited. The above-mentioned matching value may be the first matching value or the second matching value. In practice, in response to determining that the first matching value greater than the preset threshold exists in the first matching values, determining that standard user identity information corresponding to the first matching value greater than the preset threshold is matched with the user identity information to be normalized.
And eighth, in response to determining that no first matching value satisfying the preset matching threshold condition exists in the first matching values, determining whether a second matching value satisfying the preset matching threshold condition exists in the second matching values. In practice, in response to determining that a second matching value greater than the preset threshold exists in the second matching values, determining that standard user identity information corresponding to abnormal user identity information corresponding to the second matching value greater than the preset threshold is matched with the user identity information to be normalized.
And a ninth step of determining that abnormal user identity information corresponding to the second matching value satisfying the preset matching threshold condition matches the user identity information to be normalized in response to determining that the second matching value satisfying the preset matching threshold condition exists in the second matching values.
The technical solutions described in the first to ninth steps are related to the present disclosure as an invention point of the embodiments of the present disclosure, which solves the second technical problem mentioned in the background art that the efficiency of the user information joint processing is low. Factors that lead to a low efficiency of the user information joint processing tend to be as follows: and the data required by the verification of the original data reported by the data checked party does not exist in the data checked party, and the original data reported by the data checked party is required to be subjected to the verification and normalization processing manually. If the above factors are solved, the effect of improving the efficiency of the joint processing of the user information can be achieved. To achieve this, the present disclosure introduces feature vectors for each abnormal user identity information included in a set of mapping relationships by generating each standard user identity information and pre-stored abnormal user information. And then matching the generated characteristic vectors with the characteristic vectors of the user identity information to be normalized. And finally, determining the standard user identity information corresponding to the user identity information to be standardized according to each matching result. Thus, the manual participation can be reduced while the accuracy of the determined canonical user identity information is ensured. Thereby improving the efficiency of the joint processing of the user information.
Optionally, first, in response to determining that no standard user identity information or no abnormal user identity information matching the to-be-normalized user identity information exists in the standard user identity information or the abnormal user identity information, the executing entity may further send the to-be-normalized user identity information and prompt information for determining the user identity information to a terminal device of a data processing user, so that the data processing user determines standard user information corresponding to the to-be-normalized user identity information. The prompt information for determining the user identity information may be prompt information for prompting the data processing user to confirm standard user information of the user identity information to be normalized. The data processing user can be a professional for carrying out standard management on the user identity information. The terminal device may be, but is not limited to: a mobile phone and a computer. The standard user information may characterize canonical user identity information and user detail information. The standard user information may include standard user identity information and user detail information. In practice, the executing body may adopt a wired connection or a wireless connection manner to send the user identity information to be normalized and the prompt information for determining the user identity information to the terminal device of the data processing user.
It should be noted that the wireless connection may include, but is not limited to, 3G/4G connections, wiFi connections, bluetooth connections, wiMAX connections, zigbee connections, UWB (ultra wideband) connections, and other now known or later developed wireless connection means.
Then, in response to receiving the standard user information sent by the terminal device, the received standard user information is determined as standard user information corresponding to the user identity information to be standardized.
Alternatively, first, for each pre-stored abnormal user information mapping relation included in the pre-stored abnormal user information mapping relation set, the executing body may further execute the following steps:
and determining the standard user identity information included in the pre-stored abnormal user information mapping relation as a standard user identity entity node. The entity node of the standard user identity can represent the entity node corresponding to the standard user identity information.
And secondly, determining the abnormal user identity information included in the pre-stored abnormal user information mapping relation as an abnormal user identity entity node. The entity node with abnormal user identity can represent the entity node corresponding to the abnormal user identity information.
And thirdly, determining the unique relationship as the entity relationship between the standard user identity entity node and the abnormal user identity entity node.
And fourthly, determining the standard user identity entity node, the abnormal user identity entity node and the entity relationship as a user identity relationship triplet. The user identity relationship triplets can represent entity relationships between standard user identity entity nodes and abnormal user identity entity nodes.
And then, constructing a knowledge graph corresponding to the user identity relation according to the obtained user identity relation triples. Therefore, the user can intuitively watch the association relationship between the standard user identity information and the abnormal user identity information.
And finally, storing the knowledge graph. In practice, the executing body may store the knowledge-graph in a database. Therefore, the knowledge graph of the graph structure is stored, the storage of redundant information can be reduced, and the storage space is saved.
The related content of the technical scheme is taken as an invention point of the embodiment of the disclosure, so that the technical problem mentioned in the background art is solved, and the third problem is that the data required for verification is only stored in a data verification party, more redundant data exists in a common storage mode, so that the query efficiency of the data required for verification is lower, and when each data is frequently transmitted by the verification party to be verified, the verification efficiency is lower. Factors that lead to less efficient verification tend to be as follows: because the data required by the verification is only stored in the data verification party, more redundant data exists in a common storage mode, so that the query efficiency of the data required by the verification is lower. If the above factors are solved, the effect of improving the verification efficiency can be achieved. In order to achieve the effect, the method and the device introduce a knowledge graph to store each pre-stored abnormal user information mapping relation in the pre-stored abnormal user information mapping relation set, reduce the storage of redundant data, save storage space and improve query efficiency, so that verification efficiency can be improved.
Optionally, after step 104, the executing body may update and store the knowledge graph according to the to-be-normalized user identity information and the normalized user identity information. In practice, first, the executing entity may determine the to-be-normalized user identity information as an abnormal user identity entity node. The canonical user identity information described above may then be determined as a canonical user identity entity node. The unique relationship may then be determined as a node relationship between the abnormal user identity entity node and the canonical user identity entity node. And finally, adding the determined standard user identity entity node, the abnormal user identity entity node and the unique relation into the knowledge graph to update and store the knowledge graph.
Step 105, updating the pre-stored standard user information set and the pre-stored abnormal user information mapping relation set according to the user identity information to be normalized and the normalized user information corresponding to the user identity information to be normalized, so as to obtain an updated user information set and an updated abnormal user information mapping relation set.
In some embodiments, the executing body may update the pre-stored standard user information set and the pre-stored abnormal user information mapping relation set according to the user identity information to be normalized and the normalized user information corresponding to the user identity information to be normalized, so as to obtain an updated user information set and an updated abnormal user information mapping relation set. Wherein, the updating user information in the updating user information set may include updating standard user identity information. The updating abnormal user information mapping relation in the updating abnormal user information mapping relation set may include updating abnormal user identity information and updating standard user identity information corresponding to the updating abnormal user identity information. In practice, the executing body may update the pre-stored standard user information set and the pre-stored abnormal user information mapping relation set according to the user identity information to be normalized and the normalized user information corresponding to the user identity information to be normalized, so as to obtain an updated user information set and an updated abnormal user information mapping relation set:
In the first step, in response to determining that the standard user information is standard user information, standard user identity information and user detail information included in the standard user information are added to the pre-stored standard user information set, so that the pre-stored standard user information set is updated to obtain an updated user information set.
And a second step of determining the user identity information to be normalized and the standard user identity information as abnormal user information mapping relations in response to determining the normalized user information as standard user identity information, and adding the determined abnormal user information mapping relations to the pre-stored abnormal user information mapping relation set to update the pre-stored abnormal user information mapping relation set to obtain an updated abnormal user information mapping relation set.
And thirdly, in response to determining that the standard user information is standard user identity information, determining the user identity information to be standard and the standard user identity information as abnormal user information mapping relations, and adding the determined abnormal user information mapping relations into the pre-stored abnormal user information mapping relation set so as to update the pre-stored abnormal user information mapping relation set to obtain an updated abnormal user information mapping relation set.
And 106, carrying out encryption processing on each piece of updated standard user identity information included in the updated user information set and each piece of updated abnormal user identity information included in the updated abnormal user information mapping relation set to obtain each piece of encrypted updated standard user identity information and each piece of encrypted updated abnormal user identity information.
In some embodiments, the executing body may encrypt each piece of updated standard user identity information included in the updated user information set and each piece of updated abnormal user identity information included in the updated abnormal user information mapping relation set, to obtain each piece of encrypted updated standard user identity information and each piece of encrypted updated abnormal user identity information. The above-mentioned each encrypted updated standard user identity information may be each encrypted updated standard user identity information. The above-mentioned each encrypted updated abnormal user identity information may be each encrypted updated abnormal user identity information. In practice, the executing body may adopt an MD5 encryption algorithm to encrypt each piece of updated standard user identity information included in the updated user information set and each piece of updated abnormal user identity information included in the updated abnormal user information mapping relation set, so as to obtain each piece of encrypted updated standard user identity information and each piece of encrypted updated abnormal user identity information.
And step 107, in response to receiving the third verification information sent by the participating processing sub-node, performing verification processing on the third verification information according to the encryption updating standard user identity information to obtain a third verification result, and sending the third verification result to the participating processing sub-node.
In some embodiments, in response to receiving the third verification information sent by the participating processing node, the executing body may perform verification processing on the third verification information according to the respective encrypted updated standard user identity information to obtain a third verification result, and send the third verification result to the participating processing node. The third check information may represent check information sent by the participating processing child node for the third time. The third verification result may represent a result obtained after the third verification of the verification information. In practice, the execution body may send the third verification result to the participating processing child node by using a wired connection or a wireless connection. Here, the specific step of performing the verification process on the third verification information to obtain the third verification result according to the encryption updating standard user identity information may refer to the step 102 of performing the verification process on the first verification information to obtain the first verification result according to the encryption updating standard user identity information, which is not described herein.
And step 108, in response to receiving the fourth check information sent by the participating processing sub-node, performing check processing on the fourth check information according to each piece of encrypted updated abnormal user identity information to obtain a fourth check result, and sending the fourth check result to the participating processing sub-node so as to enable the participating processing sub-node to perform standardization processing on the user identity information to be standardized.
In some embodiments, in response to receiving the fourth verification information sent by the participating processing sub-node, the executing body may update the abnormal user identity information according to the respective encryption, perform verification processing on the fourth verification information to obtain a fourth verification result, and send the fourth verification result to the participating processing sub-node, so that the participating processing sub-node performs normalization processing on the user identity information to be normalized. The fourth check information may represent check information sent by the participating processing child node for the fourth time. The fourth verification result may represent a result obtained by performing a fourth verification on the verification information. It should be noted that the fourth verification result necessarily includes the standard user identity information of the fourth verification information. In practice, the execution body may send the third verification result to the participating processing child node by using a wired connection or a wireless connection. Here, the specific step of performing the verification process on the fourth verification information to obtain the fourth verification result according to the encrypted updated abnormal user identity information may refer to the step 103 of performing the verification process on the second verification information to obtain the second verification result according to the encrypted updated abnormal user identity information, which is not described herein.
The above embodiments of the present disclosure have the following advantageous effects: by the user information joint processing method of some embodiments of the present disclosure, the security of the user information is improved. Specifically, the reason why the security of the user information is low is that: the data checking party plain text obtains the original data of each data checked party, so that the original data of each data checked party are all exposed to the data checking party, the data checking party is attacked, the risk of the original data of each data checked party being revealed is higher, and the safety of the data is lower. And because the data checking party also has no original data of each data checked party, the original data of the data checking party and the data checked party are secret, and plaintext data exchange can not be carried out, so that user information joint processing can not be carried out. Based on this, in the user information joint processing method of some embodiments of the present disclosure, first, encryption processing is performed on each standard user identity information included in a pre-stored standard user information set and each abnormal user identity information included in a pre-stored abnormal user information mapping relation set, so as to obtain each encrypted standard user identity information and each encrypted abnormal user identity information, and the encryption information is sent to each participating processing sub-node, so that the participating processing sub-node in each participating processing sub-node performs encryption processing on each user identity information to be normalized, where the pre-stored standard user information in the pre-stored standard user information set includes standard user identity information, and the pre-stored abnormal user information mapping relation in the pre-stored abnormal user information mapping relation set includes abnormal user identity information and normalized user identity information corresponding to the abnormal user identity information. Thus, each piece of encrypted standard user identity information and each piece of encrypted abnormal user identity information can be obtained. And then, in response to receiving the first check information sent by the participating processing sub-node in each participating processing sub-node, performing check processing on the first check information according to the user identity information of each encryption standard to obtain a first check result, and sending the first check result to the participating processing sub-node. Thus, a first verification result can be obtained, and the first verification result can represent whether the encryption standard user identity information corresponding to the first verification information exists in the encryption standard user identity information. And then, in response to receiving second check information sent by the participating processing sub-node, performing check processing on the second check information according to the encrypted abnormal user identity information to obtain a second check result, and sending the second check result to the participating processing sub-node. Thus, a second check result can be obtained, and the second check result can represent whether the encrypted abnormal user identity information corresponding to the second check information exists in the encrypted abnormal user identity information. And then, determining the standard user information corresponding to the user identity information to be standardized in response to receiving the feedback information sent by the participating processing child node, wherein the feedback information comprises the user identity information to be standardized. Thus, the standard user information corresponding to the user identity information to be standard can be obtained. The standard user information may represent standard user identity information or standard user information corresponding to the user identity information to be specified. And then, according to the user identity information to be normalized and the normalized user information corresponding to the user identity information to be normalized, updating the pre-stored standard user information set and the pre-stored abnormal user information mapping relation set to obtain an updated user information set and an updated abnormal user information mapping relation set, wherein the updated user information in the updated user information set comprises updated standard user identity information, and the updated abnormal user information mapping relation in the updated abnormal user information mapping relation set comprises updated abnormal user identity information. Thus, the updated pre-stored standard user information set and the pre-stored abnormal user information mapping relation set can be obtained. And then, carrying out encryption processing on each piece of updating standard user identity information included in the updating user information set and each piece of updating abnormal user identity information included in the updating abnormal user information mapping relation set to obtain each piece of encryption updating standard user identity information and each piece of encryption updating abnormal user identity information. Therefore, the user identity information of each encryption updating standard and the user identity information of each encryption updating abnormal can be obtained and can be used for re-checking the check information sent by the participating processing child nodes. And then, in response to receiving the third verification information sent by the participating processing sub-node, performing verification processing on the third verification information according to the encryption updating standard user identity information to obtain a third verification result, and sending the third verification result to the participating processing sub-node. Therefore, a third checking result can be obtained, and the third checking result can represent whether the encryption updating standard user identity information corresponding to the third checking information exists in the encryption updating standard user identity information. And finally, responding to the received fourth check information sent by the participating processing sub-node, carrying out check processing on the fourth check information according to the encryption updating abnormal user identity information to obtain a fourth check result, and sending the fourth check result to the participating processing sub-node so as to carry out standardization processing on the user identity information to be standardized by the participating processing sub-node. Therefore, a fourth checking result can be obtained, the fourth checking result can represent whether the encryption updating abnormal user identity information corresponding to the fourth checking information exists in the encryption updating abnormal user identity information, and the fourth checking result can be sent to the participating processing sub-node so that the participating processing sub-node can normalize the user identity information to be normalized according to the fourth checking result. And because the realized user information joint processing method can joint the data of all the participants, all the participants send the check information to the data check party (the execution main body of the user information joint processing) for check, and the obtained check result is sent to the participants. And checking the checking information sent by the participant through four times of checking to obtain the standard user identity information corresponding to the checking information sent by the participant. In the whole process of user information joint processing, each participant does not know user data sent by other participants, and the data corrector does not know specific data sent by each participant. Thereby improving the security of the user information. And the problem that user information joint processing cannot be carried out through plaintext data exchange under the condition that the original data of the data checking party and the data checked party are secret is solved.
With further reference to fig. 2, as an implementation of the method shown in the foregoing figures, the present disclosure provides some embodiments of a user information joint processing apparatus, which apparatus embodiments correspond to those method embodiments shown in fig. 1, and the apparatus is particularly applicable to various electronic devices.
As shown in fig. 2, the user information joint processing apparatus 200 of some embodiments includes: a first encryption unit 201, a first verification unit 202, a second verification unit 203, a determination unit 204, an update unit 205, a second encryption unit 206, a third verification unit 207, and a fourth verification unit 208. The first encryption unit 201 is configured to encrypt each piece of standard user identity information included in a pre-stored standard user information set and each piece of abnormal user identity information included in a pre-stored abnormal user information mapping relation set to obtain each piece of encrypted standard user identity information and each piece of encrypted abnormal user identity information, and send the encrypted information to each participating sub-node, so that the participating sub-node in each participating sub-node encrypts each piece of user identity information to be normalized; a first verification unit 202, configured to respond to receiving first verification information sent by a participating processing sub-node in the participating processing sub-nodes, perform verification processing on the first verification information according to the user identity information of each encryption standard to obtain a first verification result, and send the first verification result to the participating processing sub-node; a second verification unit 203 configured to respond to receiving second verification information sent by the participating processing sub-node, perform verification processing on the second verification information according to the encrypted abnormal user identity information to obtain a second verification result, and send the second verification result to the participating processing sub-node; a determining unit 204, configured to determine standard user identity information corresponding to user identity information to be standardized in response to receiving feedback information sent by the participating processing sub-node, where the feedback information includes the user identity information to be standardized; an updating unit 205 configured to update the pre-stored standard user information set and the pre-stored abnormal user information mapping relation set according to the user identity information to be normalized and the normalized user identity information corresponding to the user identity information to be normalized, so as to obtain an updated user information set and an updated abnormal user information mapping relation set; a second encryption unit 206 configured to encrypt each piece of updated standard user identity information included in the updated user information set and each piece of updated abnormal user identity information included in the updated abnormal user information mapping relation set, so as to obtain each piece of encrypted updated standard user identity information and each piece of encrypted updated abnormal user identity information; a third verification unit 207, configured to respond to receiving the third verification information sent by the participating processing sub-node, perform verification processing on the third verification information according to the encryption updating standard user identity information to obtain a third verification result, and send the third verification result to the participating processing sub-node; and a fourth verification unit 208, configured to respond to receiving the fourth verification information sent by the participating processing sub-node, perform verification processing on the fourth verification information according to the encryption updating abnormal user identity information to obtain a fourth verification result, and send the fourth verification result to the participating processing sub-node, so that the participating processing sub-node performs normalization processing on the user identity information to be normalized.
It will be appreciated that the elements described in the user information federation processing apparatus 200 correspond to the various steps in the method described with reference to figure 1. Thus, the operations, features and resulting benefits described above for the method are equally applicable to the apparatus 200 and the units contained therein, and are not described in detail herein.
Referring now to FIG. 3, a schematic diagram of an electronic device (e.g., computing device) 300 suitable for use in implementing some embodiments of the present disclosure is shown. The electronic device shown in fig. 3 is merely an example and should not impose any limitations on the functionality and scope of use of embodiments of the present disclosure.
As shown in fig. 3, the electronic device 300 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 301 that may perform various suitable actions and processes in accordance with a program stored in a Read Only Memory (ROM) 302 or a program loaded from a storage means 308 into a Random Access Memory (RAM) 303. In the RAM 303, various programs and data required for the operation of the electronic apparatus 300 are also stored. The processing device 301, the ROM 302, and the RAM 303 are connected to each other via a bus 304. An input/output (I/O) interface 305 is also connected to bus 304.
In general, the following devices may be connected to the I/O interface 305: input devices 306 including, for example, a touch screen, touchpad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 307 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 308 including, for example, magnetic tape, hard disk, etc.; and communication means 309. The communication means 309 may allow the electronic device 300 to communicate with other devices wirelessly or by wire to exchange data. While fig. 3 shows an electronic device 300 having various means, it is to be understood that not all of the illustrated means are required to be implemented or provided. More or fewer devices may be implemented or provided instead. Each block shown in fig. 3 may represent one device or a plurality of devices as needed.
In particular, according to some embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, some embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flow chart. In such embodiments, the computer program may be downloaded and installed from a network via communications device 309, or from storage device 308, or from ROM 302. The above-described functions defined in the methods of some embodiments of the present disclosure are performed when the computer program is executed by the processing means 301.
It should be noted that, the computer readable medium described in some embodiments of the present disclosure may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In some embodiments of the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In some embodiments of the present disclosure, however, the computer-readable signal medium may comprise a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, fiber optic cables, RF (radio frequency), and the like, or any suitable combination of the foregoing.
In some implementations, the clients, servers may communicate using any currently known or future developed network protocol, such as HTTP (HyperText Transfer Protocol ), and may be interconnected with any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the internet (e.g., the internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed networks.
The computer readable medium may be contained in the electronic device; or may exist alone without being incorporated into the electronic device. The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: encrypting all standard user identity information contained in a pre-stored standard user information set and all abnormal user identity information contained in a pre-stored abnormal user information mapping relation set to obtain all encrypted standard user identity information and all encrypted abnormal user identity information, and sending the encrypted information to all participating processing sub-nodes so that the participating processing sub-nodes in all participating processing sub-nodes encrypt all user identity information to be normalized; responding to the received first check information sent by the participating processing sub-node in each participating processing sub-node, performing check processing on the first check information according to the user identity information of each encryption standard to obtain a first check result, and sending the first check result to the participating processing sub-node; in response to receiving second check information sent by the participating processing sub-node, performing check processing on the second check information according to the encrypted abnormal user identity information to obtain a second check result, and sending the second check result to the participating processing sub-node; determining standard user information corresponding to user identity information to be standardized in response to receiving feedback information sent by the participating processing child node, wherein the feedback information comprises the user identity information to be standardized; updating the pre-stored standard user information set and the pre-stored abnormal user information mapping relation set according to the user identity information to be normalized and the normalized user information corresponding to the user identity information to be normalized to obtain an updated user information set and an updated abnormal user information mapping relation set; encrypting each piece of updating standard user identity information included in the updating user information set and each piece of updating abnormal user identity information included in the updating abnormal user information mapping relation set to obtain each piece of encrypting updating standard user identity information and each piece of encrypting updating abnormal user identity information; responding to the received third check information sent by the participating processing sub-node, performing check processing on the third check information according to the encryption updating standard user identity information to obtain a third check result, and sending the third check result to the participating processing sub-node; and in response to receiving the fourth check information sent by the participating processing sub-node, performing check processing on the fourth check information according to the encryption updating abnormal user identity information to obtain a fourth check result, and sending the fourth check result to the participating processing sub-node so that the participating processing sub-node performs normalization processing on the user identity information to be normalized.
Computer program code for carrying out operations for some embodiments of the present disclosure may be written in one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in some embodiments of the present disclosure may be implemented by means of software, or may be implemented by means of hardware. The described units may also be provided in a processor, for example, described as: a processor includes a first encryption unit, a first verification unit, a second verification unit, a determination unit, an update unit, a second encryption unit, a third verification unit, and a fourth verification unit. The names of the units are not limited to the unit itself in a certain case, for example, the first encryption unit may also be described as "a unit that encrypts each piece of standard user identity information included in a pre-stored standard user information set and each piece of abnormal user identity information included in a pre-stored abnormal user information mapping relation set to obtain each piece of encrypted standard user identity information and each piece of encrypted abnormal user identity information".
The functions described above herein may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: a Field Programmable Gate Array (FPGA), an Application Specific Integrated Circuit (ASIC), an Application Specific Standard Product (ASSP), a system on a chip (SOC), a Complex Programmable Logic Device (CPLD), and the like.
The foregoing description is only of the preferred embodiments of the present disclosure and description of the principles of the technology being employed. It will be appreciated by those skilled in the art that the scope of the invention in the embodiments of the present disclosure is not limited to the specific combination of the above technical features, but encompasses other technical features formed by any combination of the above technical features or their equivalents without departing from the spirit of the invention. Such as the above-described features, are mutually substituted with (but not limited to) the features having similar functions disclosed in the embodiments of the present disclosure.

Claims (9)

1. A user information joint processing method comprises the following steps:
encrypting all standard user identity information contained in a pre-stored standard user information set and all abnormal user identity information contained in a pre-stored abnormal user information mapping relation set to obtain all encrypted standard user identity information and all encrypted abnormal user identity information, and sending the encrypted information to all participating processing sub-nodes so that the participating processing sub-nodes in all participating processing sub-nodes can encrypt all user identity information to be normalized;
Responding to the received first check information sent by the participating processing sub-node in each participating processing sub-node, performing check processing on the first check information according to the user identity information of each encryption standard to obtain a first check result, and sending the first check result to the participating processing sub-node;
in response to receiving second check information sent by the participating processing sub-node, performing check processing on the second check information according to the encrypted abnormal user identity information to obtain a second check result, and sending the second check result to the participating processing sub-node;
determining standard user information corresponding to user identity information to be standardized in response to receiving feedback information sent by the participating processing child node, wherein the feedback information comprises the user identity information to be standardized;
updating the pre-stored standard user information set and the pre-stored abnormal user information mapping relation set according to the user identity information to be normalized and the normalized user information corresponding to the user identity information to be normalized to obtain an updated user information set and an updated abnormal user information mapping relation set;
Encrypting all the updating standard user identity information included in the updating user information set and all the updating abnormal user identity information included in the updating abnormal user information mapping relation set to obtain all the encrypting updating standard user identity information and all the encrypting updating abnormal user identity information;
responding to the received third check information sent by the participating processing sub-node, performing check processing on the third check information according to the encryption updating standard user identity information to obtain a third check result, and sending the third check result to the participating processing sub-node;
and responding to the received fourth check information sent by the participating processing sub-node, checking the fourth check information according to the encryption updating abnormal user identity information to obtain a fourth check result, and sending the fourth check result to the participating processing sub-node so as to enable the participating processing sub-node to normalize the user identity information to be normalized.
2. The method of claim 1, wherein prior to said responding to receiving the first check information sent by a participating processing child of the respective participating processing child nodes, the method further comprises:
And sending preset first encryption information to the participating processing sub-node so that the participating processing sub-node can encrypt the identity information of each user to be normalized.
3. The method of claim 1, wherein the pre-stored standard user information in the set of pre-stored standard user information comprises user detail information; and
and in response to receiving the first verification information sent by the participating processing sub-node in the participating processing sub-nodes, performing verification processing on the first verification information according to the user identity information of each encryption standard to obtain a first verification result, where the verification processing includes:
encrypting the first check information according to preset second encryption information to obtain encrypted first check information;
the encrypted first check information is sent to the participating processing sub-node so that the participating processing sub-node can decrypt the encrypted first check information to obtain decrypted first check information;
according to the preset second encryption information, encrypting the user identity information of each encryption standard to obtain the user identity information of each secondary encryption;
transmitting the secondary encrypted user identity information to the participating processing sub-node, so that the participating processing sub-node determines whether the secondary encrypted user identity information matched with the decrypted first verification information exists in the secondary encrypted user identity information;
Initializing a preset first check result sequence;
in response to receiving the first data request information sent by the participating processing child nodes, performing the steps of:
generating a first random number sequence;
transmitting the first random number sequence to the participating processing sub-node so that the participating processing sub-node can carry out first random number encryption processing on the first random number sequence;
in response to receiving the first encrypted random number sequence sent by the participating processing sub-node, according to the preset second encrypted information, encrypting each piece of user detail information corresponding to each piece of encrypted standard user identity information in the pre-stored standard user information set to obtain an encrypted user detail information sequence;
according to the preset second encryption information and the first random number sequence, encrypting the first encrypted random number sequence to obtain a first twice encrypted random number sequence;
combining the encrypted user detail information in the encrypted user detail information sequence with the first secondary encrypted random number in the first secondary encrypted random number sequence to obtain a first encrypted standard user information sequence;
Assigning the first encryption standard user information sequence to the preset first check result sequence;
and determining the obtained preset first check result sequence as a first check result.
4. A method according to claim 3, wherein the pre-stored abnormal user information mapping relation in the pre-stored abnormal user information mapping relation set comprises abnormal user identity information and normative user identity information corresponding to the abnormal user identity information; and
the response to receiving the second check information sent by the participating processing child node, performing check processing on the second check information according to the identity information of each encrypted abnormal user to obtain a second check result, including:
encrypting the second verification information according to the preset second encryption information to obtain encrypted second verification information;
transmitting the encrypted second check-up information to the participating processing sub-node so that the participating processing sub-node can decrypt the encrypted second check-up information to obtain decrypted second check-up information;
according to the preset second encryption information, carrying out encryption processing on the encrypted abnormal user identity information to obtain the encrypted abnormal user identity information;
Transmitting the secondary encrypted abnormal user identity information to the participating processing sub-node so that the participating processing sub-node can determine whether the secondary encrypted abnormal user identity information matched with the decrypted second verification information exists in the secondary encrypted abnormal user identity information;
initializing a preset second checking result sequence;
in response to receiving the second data request information sent by the participating processing child nodes, performing the steps of:
generating a second random number sequence;
transmitting the second random number sequence to the participating processing sub-node so that the participating processing sub-node can carry out second random number encryption processing on the second random number sequence;
in response to receiving a second encrypted random number sequence sent by the participating processing child node, according to the preset second encrypted information, encrypting each piece of standard user identity information corresponding to each piece of encrypted abnormal user identity information in the pre-stored abnormal user information mapping relation set to obtain an encrypted standard user identity information sequence;
according to the preset second encryption information and the second random number sequence, carrying out encryption processing on the second encryption random number sequence to obtain a second secondary encryption random number sequence;
Combining the encrypted standard user identity information in the encrypted standard user identity information sequence with the second encrypted random number in the second encrypted random number sequence to obtain a second encrypted standard user identity information sequence;
assigning the second encryption standard user identity information sequence to the preset second check result sequence;
and determining the obtained preset second checking result sequence as a second checking result.
5. The method of claim 4, wherein the determining canonical user information corresponding to the user identity information to be canonical in response to receiving feedback information sent by the participating processing child node comprises:
determining whether standard user identity information or abnormal user identity information matched with the user identity information to be normalized exists in the standard user identity information or the abnormal user identity information according to the standard user identity information and the abnormal user identity information;
and in response to determining that standard user identity information or abnormal user identity information matched with the user identity information to be normalized exists in the standard user identity information or the abnormal user identity information, determining standard user identity information or normal user identity information corresponding to the standard user identity information or abnormal user identity information matched with the user identity information to be normalized in the standard user identity information or the abnormal user identity information as normal user information corresponding to the user identity information to be normalized.
6. The method of claim 5, wherein the method further comprises:
in response to determining that no standard user identity information or abnormal user identity information matched with the user identity information to be normalized exists in the standard user identity information or abnormal user identity information, sending the user identity information to be normalized and prompt information for determining the user identity information to a terminal device of a data processing user so as to enable the data processing user to determine standard user information corresponding to the user identity information to be normalized;
and in response to receiving the standard user information sent by the terminal equipment, determining the received standard user information as standard user information corresponding to the user identity information to be standardized.
7. A user information joint processing apparatus comprising:
the first encryption unit is configured to encrypt each piece of standard user identity information contained in a pre-stored standard user information set and each piece of abnormal user identity information contained in a pre-stored abnormal user information mapping relation set to obtain each piece of encrypted standard user identity information and each piece of encrypted abnormal user identity information, and send the encrypted information to each participating processing sub-node so that the participating processing sub-node in each participating processing sub-node can encrypt each piece of user identity information to be normalized;
The first verification unit is configured to respond to receiving first verification information sent by the participating processing sub-nodes in the participating processing sub-nodes, perform verification processing on the first verification information according to the encryption standard user identity information to obtain a first verification result, and send the first verification result to the participating processing sub-nodes;
the second checking unit is configured to respond to receiving second checking information sent by the participating processing sub-node, check the second checking information according to the encrypted abnormal user identity information to obtain a second checking result, and send the second checking result to the participating processing sub-node;
a determining unit configured to determine standard user information corresponding to user identity information to be standardized in response to receiving feedback information sent by the participating processing sub-node, wherein the feedback information includes the user identity information to be standardized;
the updating unit is configured to update the pre-stored standard user information set and the pre-stored abnormal user information mapping relation set according to the user identity information to be normalized and the normalized user information corresponding to the user identity information to be normalized to obtain an updated user information set and an updated abnormal user information mapping relation set;
The second encryption unit is configured to encrypt each piece of updated standard user identity information included in the updated user information set and each piece of updated abnormal user identity information included in the updated abnormal user information mapping relation set to obtain each piece of encrypted updated standard user identity information and each piece of encrypted updated abnormal user identity information;
the third verification unit is configured to respond to receiving third verification information sent by the participating processing sub-node, perform verification processing on the third verification information according to the encryption updating standard user identity information to obtain a third verification result, and send the third verification result to the participating processing sub-node;
and the fourth verification unit is configured to respond to the received fourth verification information sent by the participating processing sub-node, perform verification processing on the fourth verification information according to the encryption updating abnormal user identity information to obtain a fourth verification result, and send the fourth verification result to the participating processing sub-node so as to enable the participating processing sub-node to perform standardization processing on the user identity information to be standardized.
8. An electronic device, comprising:
one or more processors;
a storage means for storing one or more programs;
when executed by the one or more processors, causes the one or more processors to implement the method of any of claims 1-6.
9. A computer readable storage medium having stored thereon a computer program, wherein the computer program when executed by a processor implements the method of any of claims 1-6.
CN202410101506.5A 2024-01-25 2024-01-25 User information joint processing method, device, equipment and computer readable medium Active CN117633848B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410101506.5A CN117633848B (en) 2024-01-25 2024-01-25 User information joint processing method, device, equipment and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410101506.5A CN117633848B (en) 2024-01-25 2024-01-25 User information joint processing method, device, equipment and computer readable medium

Publications (2)

Publication Number Publication Date
CN117633848A CN117633848A (en) 2024-03-01
CN117633848B true CN117633848B (en) 2024-04-12

Family

ID=90035823

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410101506.5A Active CN117633848B (en) 2024-01-25 2024-01-25 User information joint processing method, device, equipment and computer readable medium

Country Status (1)

Country Link
CN (1) CN117633848B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119440861A (en) * 2025-01-10 2025-02-14 中信证券股份有限公司 User data joint reporting system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109191143A (en) * 2018-08-02 2019-01-11 中国联合网络通信集团有限公司 food information processing method, device and system
CN111324666A (en) * 2020-02-14 2020-06-23 腾讯科技(深圳)有限公司 Data processing method and device based on block chain
CN111556007A (en) * 2020-03-03 2020-08-18 支付宝实验室(新加坡)有限公司 Identity verification method, device and equipment based on block chain and storage medium
CN114238882A (en) * 2021-11-09 2022-03-25 上海浦东发展银行股份有限公司 Identity authentication system, method and computer equipment for multi-party security calculation
CN114302396A (en) * 2021-12-14 2022-04-08 中国联合网络通信集团有限公司 Data management method, apparatus, equipment, storage medium and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109711133B (en) * 2018-12-26 2020-05-15 巽腾(广东)科技有限公司 Identity information authentication method and device and server
CN111783049A (en) * 2020-06-30 2020-10-16 北京海益同展信息科技有限公司 A method and system for processing user information based on blockchain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109191143A (en) * 2018-08-02 2019-01-11 中国联合网络通信集团有限公司 food information processing method, device and system
CN111324666A (en) * 2020-02-14 2020-06-23 腾讯科技(深圳)有限公司 Data processing method and device based on block chain
CN111556007A (en) * 2020-03-03 2020-08-18 支付宝实验室(新加坡)有限公司 Identity verification method, device and equipment based on block chain and storage medium
CN114238882A (en) * 2021-11-09 2022-03-25 上海浦东发展银行股份有限公司 Identity authentication system, method and computer equipment for multi-party security calculation
CN114302396A (en) * 2021-12-14 2022-04-08 中国联合网络通信集团有限公司 Data management method, apparatus, equipment, storage medium and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
大数据网络用户隐私信息自适应加密系统设计;邹爱琴;;自动化与仪器仪表;20190525(第05期);第34-37页 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119440861A (en) * 2025-01-10 2025-02-14 中信证券股份有限公司 User data joint reporting system
CN119440861B (en) * 2025-01-10 2025-03-25 中信证券股份有限公司 User Data Joint Reporting System

Also Published As

Publication number Publication date
CN117633848A (en) 2024-03-01

Similar Documents

Publication Publication Date Title
CN109150499B (en) Method and device for dynamically encrypting data, computer equipment and storage medium
CN113240524B (en) Account anomaly detection method and device in federal learning system and electronic equipment
CN112434620B (en) Scene text recognition method, device, equipment and computer readable medium
CN108923925B (en) Data storage method and device applied to block chain
CN111931474B (en) Information table generation method, device, electronic equipment and computer readable medium
CN115965093B (en) Model training method and device, storage medium and electronic equipment
CN117408646B (en) Electronic signature signing method, electronic signature signing device, electronic equipment and computer readable medium
CN117633848B (en) User information joint processing method, device, equipment and computer readable medium
CN110851210A (en) Interface program calling method, device, equipment and storage medium
CN116489621A (en) Vehicle key sharing method, device, equipment and medium
CN112329044A (en) Information acquisition method and device, electronic equipment and computer readable medium
CN115696323B (en) Vehicle key updating method, device and system
CN116361121A (en) Abnormal interface alarm method, device, electronic equipment and computer readable medium
CN115296807A (en) Key generation method, device and equipment for preventing industrial control network viruses
CN113794706B (en) Data processing method, device, electronic device and readable storage medium
CN118171303B (en) Model data storage method, apparatus, electronic device, and computer-readable medium
CN114840739B (en) Information retrieval method, device, electronic equipment and storage medium
CN116775679A (en) Statement query method, statement query device, electronic equipment and computer readable medium
CN113626848A (en) Sample data generation method, apparatus, electronic device, and computer-readable medium
CN119675927B (en) Blockchain-based data acquisition method, device, equipment, and medium
CN111314320B (en) Communication method, terminal, server and system based on HTTP
CN116128415B (en) Power equipment information sending method and device, electronic equipment and computer medium
CN119834981B (en) File encryption transmission method, device, electronic device and computer-readable medium
CN116627664B (en) Service verification method, device, electronic equipment and computer readable medium
CN113206837B (en) Information transmission method and device, electronic equipment and computer readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant