Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
In order to explain the technical means of the present invention, the following description will be given by way of specific examples.
Firstly, the technical scheme of the invention is simply introduced to help readers to fully understand the technical scheme of the invention, in order to avoid the information safety hidden trouble of users caused by exposing the relevant information handled by user business operation to a public network every time, an intermediate server is arranged between user terminal equipment and a third-party server responsible for business processing, and a private network connection between the intermediate server and the third-party server is established, so that the intermediate server and the third-party server can carry out private data transmission, and the data transmission handled by the whole business operation is divided into two processes: 1. and 2, the intermediate server sends the data to a third-party server. Meanwhile, in the embodiment of the invention, the related information of the user business operation transaction is divided into two types of information, namely user information and business information, wherein the user information refers to the general names of personal information required by the user during business transaction, such as user name, mobile phone number, payment account, receiving address and the like, and the business information refers to some information related to business functions, such as commodity information, purchase amount, purchase quantity and the like during commodity purchase. In order to improve the security of relevant information handled by user business operations, the embodiment of the invention stores the user information in a user information base in an intermediate server in advance, generates a unique user identifier for each user, and stores the user identifier of the user and the user information in the intermediate server in a unique association manner, so as to determine the user according to the user identifier and determine the corresponding user information.
On the basis, in order to ensure the security of the relevant information handled by the user service operation, the technical scheme of the invention carries out personalized transmission setting in the two data transmission processes aiming at various characteristics of the user information and the service information, and the detailed description is as follows:
fig. 1 shows a flowchart of an implementation of a user information transmission method according to an embodiment of the present invention, which is detailed as follows:
s101, a user terminal receives service information input by a user, reads a user identifier of the user, acquires function scene information corresponding to the service information, and sends the service information, the user identifier and the function scene information to an intermediate server.
The user identifier is a unique corresponding identifier generated by the user terminal for each user before S101, and a specific generation rule thereof is not limited here, for example, a non-repeating number may be randomly generated for each user as the user identifier thereof, or a physical address code of the user terminal may be used as the user identifier thereof. The function scene information refers to a service function scene operated and used by a user at a user terminal, such as recharging telephone fee, purchasing goods, bank account transfer or credit card repayment and the like. Because the service information required by different service function scenes is different, the third-party server needs to perform corresponding data processing according to the specific service function scene, so that the user terminal needs to determine the service function scene used by the user and send the corresponding function scene information to the intermediate server.
It should be noted that, in the embodiment of the present invention, no limitation is imposed on the communication network between the user terminal and the intermediate server, and the communication network may be specifically selected and set by the user according to the actual situation. In the transmission process 1, the user terminal sends data to the intermediate server, only the service information, the user identifier and the function scene information are transmitted without relating to the user information, and under the condition of lacking the user information, the service information, the user identifier and the function scene information lose practical significance, and even if lawbreakers acquire the information, potential safety hazards cannot be caused to users, so that the transmission process 1 is not limited by a communication network in the embodiment of the invention, and the transmission process can be realized by public network connection transmission or private network connection transmission.
As a second preferred embodiment of the present invention, as shown in fig. 2, when the user terminal performs data transmission with the intermediate server, the method includes:
s201, when the user terminal transmits data with the intermediate server, whether the communication network is a public network is detected.
S202, if the communication network is a public network, encrypting and transmitting the data to be transmitted.
In order to further improve the security of data transmission, in the embodiment of the present invention, when the user terminal is connected to the intermediate server through the public network, the data to be transmitted is securely encrypted and transmitted. The specific method of encryption is not limited herein and can be selected by the skilled person.
And S102, the intermediate server determines the service information to be verified and the corresponding verification rule according to the received function scene information, and verifies the received service information based on the verification rule.
It can be known from the above description that the service information required by different service function scenarios is different, and in order to ensure normal processing of the service function scenarios, it is necessary to set a corresponding check rule for each service function scenario in advance, and check the received service information based on the check rule to determine whether the received service information meets the requirements of the service function scenarios. The verification rule mainly comprises two parts of the type of the required business information and the data format of each kind of business information, for example, the business information required for bank card transfer is as follows: the bank card number of the payee, the name of the payee, the transfer amount and the like, and the corresponding data format can be set as follows: the bank card number of the payee is 16-21 pure numbers, the name format of the payee is not limited, and the transfer amount is more than 0 and less than 10 ten thousand pure numbers.
And S103, if the service information meets the verification rule according to the verification result, the intermediate server searches the user information of the user from the stored user information base by using the user identification, and screens out the required user information from the user information according to the received function scene information and the service information.
And S104, the intermediate server sends the service information and the required user information to a third-party server corresponding to the function scene information through a private network.
When the verification is passed, it is indicated that the service information input by the user meets the requirements of the service function scene, and at this time, the user information required by the service function scene needs to be acquired, so that the complete relevant information of the user service operation can be obtained. As can be seen from the above description, the user information of the user is stored in the user information base of the intermediate server, and therefore, after the service information is verified, the required user information needs to be extracted from the service information, but since a large amount of user information of different users is stored in the intermediate server, in order to accurately find the user information of the current user, in the embodiment of the present invention, the user information base is firstly queried according to the unique user identifier corresponding to the user, all user information corresponding to the current user is determined, and after all user information of the current user is obtained, the user information required by the service function scenario is screened out from the user information base. For example, assuming that the service function scenario is telephone charge recharging, the user information base stores the user information such as the name, the mobile phone number, the payment account, and the receiving address of the user a, and since the telephone charge recharging only needs the mobile phone number and the payment account information of the user, at this time, the stored user information such as the name, the mobile phone number, the payment account, and the receiving address of the user a is found out according to the user identifier of the user a, and the mobile phone number and the payment account information of the user a are screened out. In the actual situation, the user information required by each service function scene is known data in advance, so that a technician only needs to store the relationship in the intermediate server in advance.
After the service information and the user information required by the service function scene are obtained, the intermediate server sends the service information and the user information to a third-party server through a private line network for processing so as to ensure the safety of information transmission.
The embodiment of the invention arranges the intermediate server between the user terminal and the third-party server, meanwhile, a private network connection between the intermediate server and the third-party server is established, and user information required by different service scenes and user identifications uniquely corresponding to different users are associated in advance and stored in the intermediate server, when the user transacts the business operation, the user terminal only needs to send the business information corresponding to the business, the user identification of the user and the function scene information corresponding to the business function scene during the business operation to the intermediate server, then the intermediate server completes the information checking and completing work and sends the information to the third party server through the private network, therefore, in the whole business handling process, the personal user information of the user does not need to be transmitted through a public network, and the user information is unlikely to have security risks such as interception or cracking.
The user information safety factor is high, and the data belongs to the limited data which can be obtained (whether the user information is the known data which is relatively limited for a single user, the concept of the user group or the whole user group). However, for the corresponding service information, because the number of the service types is large and the service types are continuously updated, and the functional requirements of different users for the same service are different, for example, different requirements for public accounts and private accounts exist in the transfer service, the data volume of the service information is very large, and therefore real-time and effective pre-storage cannot be achieved in actual situations, and pre-storage in an intermediate server cannot be achieved. Meanwhile, considering that if the pure service information of the user information is lacked, the practical significance is lost, even if lawless persons acquire the service information, the potential safety hazard to the user cannot be caused, so that the requirement of the service information on the safety coefficient is low, when the user terminal sends data to the intermediate server, the requirement of the service information on the safety coefficient is low because the data does not contain the user information, but when the intermediate server sends the data to the third-party server, the sent data contains the user information, the requirement of the service information on the safety coefficient is increased, at the moment, the data transmission is carried out through a private network, meanwhile, the safety of the service information and the user information is ensured, and the safety of the transmission of the related information handled by the service operation of the user is greatly improved. Therefore, the requirement of the safety factor of the user information and the business information in the actual situation is different greatly, and the requirement of the user information and the business information on the safety factor is changed in different processes, in the embodiment of the invention, according to the characteristics of the safety factor requirement of the user information and the business information, the user information and the business information are processed in a safe grading and time-sharing way, the safety of the two types of information is fully ensured, the safety of the transmission of the relevant information processed by business operation is ensured,
meanwhile, on the basis of ensuring the information security, the embodiment of the invention also reduces the requirements of the user terminal on the terminal equipment and the network in the process of sending data to the intermediate server, thereby greatly reducing the user cost, which is described as follows:
in practical situations, most of the user terminal devices are personal terminal devices such as mobile phones, tablet computers, personal computers and the like, and the used networks are also public networks basically, so that if any change is made in the process of sending data to the intermediate server by the user terminal, the existing terminal devices and networks of the users are influenced greatly, and the user cost is increased, if the user is required to use a private network to realize the process, most of common users cannot meet the requirements, so that the practical feasibility of the technical scheme is greatly reduced, the embodiment of the invention does not depend on the terminal devices and networks of the users during information security processing, so that the conditions of the terminal devices and networks in the process are not limited, and the users can completely continue to use the original terminal devices and networks to complete the process, therefore, the embodiment of the invention has great beneficial effects in practical application.
As a third embodiment of the present invention, as shown in fig. 3, before the user terminal receives the service information input by the user, the method further includes:
s301, the user terminal receives user information input by a user for the first time, acquires a user identifier of the user, and sends the user information and the user identifier to an intermediate server.
S302, the intermediate server stores the received user information and the user identification in the user information base in a correlation mode.
As can be seen from the above description, in the embodiment of the present invention, all user information required by the user service function scenario is stored in the intermediate server in advance, but in an actual situation, if a user is required to provide all user information completely, it is very difficult for the user, so that the feasibility is low, and the efficiency is low. Therefore, in order to realize the collection and storage of all user information required by a user service function scene, the embodiment of the invention does not require a user to provide all user information at one time, but stores the user information in the intermediate server when the user inputs certain user information for the first time, thereby realizing the improvement of the user information in the process of the user service function. For example, when a user uses a certain service function for the first time, some user information required by the service function must be input, and at this time, the embodiment of the present invention stores the user information input by the user in the intermediate server.
As a fourth embodiment of the present invention, as shown in fig. 4, when the intermediate server operates the user information in the user information base, the method includes:
s401, the intermediate server inquires the user information in the user information base based on the user identification, judges whether the user information corresponding to the user identification exists in the user information base, and if so, opens the operation authority of the user information corresponding to the user identification in the user information base.
S402, the intermediate server obtains a user information operation instruction corresponding to the user identifier, judges whether the operation authority of the user information corresponding to the user identifier in the user information base is open or not, and operates the user information corresponding to the user identifier in the user information base according to the user information operation instruction if the operation authority of the user information corresponding to the user identifier in the user information base is open.
Because the user information base of the intermediate server stores user information of a large number of users, the information security of the user information base is very important, in order to ensure the security of the user information base stored in the intermediate server, the embodiment of the invention sets operation authority management for the user information base, if the user information base is required to be inquired, modified or deleted, and the like, the corresponding authority must be obtained firstly, the user identification matching must be carried out firstly when the authority is obtained, and the operation authority of the user information corresponding to the user identification in the user information base can be opened when the matching is successful. Since the user identifier and the generation method thereof are only recorded in the terminal equipment of the user, the information security of the intermediate server can be excellently ensured by carrying out operation authority management on the user information base.
As an embodiment five of the present invention, as shown in fig. 5, on the basis of the embodiment one of the present invention, the method further includes:
s501, if the user information sent to the intermediate server contains a plurality of user information with the same attribute, the user terminal generates a unique information identifier for each user information in the plurality of user information with the same attribute and sends the unique information identifier and the user information to the intermediate server.
In consideration of the fact that the user information of the user may not uniquely correspond to the service function scene in an actual situation, that is, one service function scene may simultaneously correspond to a plurality of user information with the same attribute, at this time, the user information required by the user needs to be recharged and selected, for example, when telephone charge recharging is performed, two payment accounts are set in the user information, and at this time, one required payment account needs to be selected from the user information. In order to realize the selection of the user information with the same attributes, in the embodiment of the invention, unique information identifiers are respectively added to the user information with the same attributes to realize the distinction, and a unique information identifier is added to each payment account for the two payment accounts.
S502, the intermediate server stores a plurality of user information with the same attribute in a user information base in a correlated manner with the corresponding unique information identification.
When the intermediate server stores a plurality of user information with the same attribute, the user information and the corresponding unique information identifier are stored in an associated manner, so that the required user information can be determined only by providing the unique information identifier.
S503, when the user terminal receives the service information, if a user information selection instruction input by the user is received, the unique information identifier corresponding to the user information pointed by the user information instruction is determined, and when the service information, the user identifier and the function scene information are sent to the intermediate server, the determined unique information identifier is sent to the intermediate server together.
When a user needs to use certain user information in a plurality of user information with the same attribute to perform service function processing, the user terminal needs to select and determine the required user information, such as the two payment accounts a and B, first, the user needs to select whether to select the payment account a or the payment account B, and after the user terminal reads the unique information identifier of the selected payment account and sends the unique information identifier, the user identifier and the function scene information to the intermediate server.
When the intermediate server screens out the required user information from the user information according to the received function scene information and the service information, the method comprises the following steps:
s504, corresponding user information is screened from the user information according to the received function scene information and the service information.
And S505, screening the corresponding user information by using the unique information identifier to determine the required user information.
When user information required by a user needs to be selected from user information with multiple same attributes, the embodiment of the invention screens out user information corresponding to a service function scene according to the method of the embodiment one of the invention, and then screens out the user information based on the unique information identifier to obtain the finally required information. For example, when the service function scene is telephone charge recharging, the telephone number and the payment account of the user are needed, but the user information stored by the intermediate server includes user information such as the name, the mobile phone number, the payment account, the receiving address and the like of the user, and the number of the payment accounts is two.
Fig. 6 shows a system interaction diagram of the user information transmission system provided by the embodiment of the present invention, corresponding to the method of the above embodiment, and for convenience of explanation, only the part related to the embodiment of the present invention is shown. The user information transmission system illustrated in fig. 6 may be an execution subject of the user information transmission method provided in the first embodiment.
Referring to fig. 6, the user information transmission system includes: the system comprises a user terminal, an intermediate server and a third-party server.
The user terminal is used for receiving service information input by a user, reading a user identifier of the user, acquiring function scene information corresponding to the service information, and sending the service information, the user identifier and the function scene information to the intermediate server.
The intermediate server is used for determining the service information to be verified and the corresponding verification rule according to the received function scene information, and verifying the received service information based on the verification rule.
And the intermediate server is further used for searching the user information of the user from a stored user information base by using the user identification if the service information meets the verification rule according to the verification result, and screening the required user information from the user information according to the received function scene information and the service information.
The intermediate server is further configured to send the service information and the required user information to the third-party server corresponding to the function scenario information through a private network.
Further, before the user terminal receives the service information input by the user, the method further includes:
the user terminal is further used for receiving the user information input by the user for the first time, acquiring the user identification of the user, and sending the user information and the user identification to the intermediate server.
The intermediate server is also used for storing the received user information and the user identification in the user information base in an associated manner.
Further, the intermediate server is further configured to operate on the user information in the user information base, including:
the intermediate server is further configured to perform user information query in the user information base based on the user identifier, determine whether user information corresponding to the user identifier exists in the user information base, and if so, open the operation permission of the user information corresponding to the user identifier in the user information base.
The intermediate server is further configured to obtain a user information operation instruction corresponding to the user identifier, determine whether an operation authority of the user information corresponding to the user identifier in the user information base is open, and operate the user information corresponding to the user identifier in the user information base according to the user information operation instruction if the operation authority of the user information corresponding to the user identifier in the user information base is open.
Further, the user terminal is further configured to:
and detecting whether the communication network is a public network or not when the data transmission is carried out with the intermediate server.
And if the communication network is a public network, encrypting and transmitting the data to be transmitted.
Further, the user information transmission system further includes:
the user terminal is further configured to generate a unique information identifier for each piece of user information in the plurality of pieces of user information with the same attribute if the user information sent to the intermediate server contains a plurality of pieces of user information with the same attribute, and send the unique information identifier and the user information to the intermediate server.
The intermediate server is further configured to store, in the user information base, the plurality of pieces of user information with the same attribute in association with the corresponding unique information identifiers, respectively.
The user terminal is further used for determining the unique information identifier corresponding to the user information pointed by the user information instruction if a user information selection instruction input by a user is received when the service information is received, and sending the determined unique information identifier to the intermediate server together when the service information, the user identifier and the function scene information are sent to the intermediate server.
And the intermediate server is also used for screening out corresponding user information from the user information according to the received function scene information and the service information.
The intermediate server is further configured to screen the corresponding user information by using the unique information identifier to determine the required user information.
The process of implementing each function by each module in the user information transmission apparatus provided in the embodiment of the present invention may specifically refer to the description of the first embodiment shown in fig. 1 and other related embodiments, and will not be described again here.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
It will also be understood that, although the terms first, second, etc. may be used herein to describe various elements in some embodiments of the invention, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first contact may be termed a second contact, and, similarly, a second contact may be termed a first contact, without departing from the scope of the various described embodiments. The first contact and the second contact are both contacts, but they are not the same contact.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.