CN110995669A - Information processing method, apparatus, electronic device, and computer-readable storage medium - Google Patents
Information processing method, apparatus, electronic device, and computer-readable storage medium Download PDFInfo
- Publication number
- CN110995669A CN110995669A CN201911136539.9A CN201911136539A CN110995669A CN 110995669 A CN110995669 A CN 110995669A CN 201911136539 A CN201911136539 A CN 201911136539A CN 110995669 A CN110995669 A CN 110995669A
- Authority
- CN
- China
- Prior art keywords
- information
- key
- operation result
- encrypted
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
Abstract
本公开实施例公开了一种信息处理方法、装置、电子设备及计算机可读存储介质,所述信息处理方法包括:获取待处理信息;使用第一密钥对于所述待处理信息进行加密,并将得到的第一加密信息发送给服务器,使其对于所述第一加密信息进行预设运算得到信息运算结果;响应于接收到所述服务器发送的加密信息运算结果,使用第二密钥对于所述加密信息运算结果进行解密,得到所述信息运算结果,其中,所述加密信息运算结果由所述服务器使用所述第一密钥对于所述信息运算结果进行加密得到。该技术方案能够在保障用户信息安全的前提下,根据用户的信息为其提供丰富完善的服务的方法,进而消除了信息安全隐患,避免出现用户信息泄露的情况。
Embodiments of the present disclosure disclose an information processing method, an apparatus, an electronic device, and a computer-readable storage medium. The information processing method includes: acquiring information to be processed; encrypting the information to be processed using a first key, and Send the obtained first encrypted information to the server, so that it performs a preset operation on the first encrypted information to obtain an information operation result; in response to receiving the encrypted information operation result sent by the server, use the second key for all encryption information. The encrypted information operation result is decrypted to obtain the information operation result, wherein the encrypted information operation result is obtained by encrypting the information operation result by the server using the first key. The technical solution can provide users with rich and complete services based on their information on the premise of ensuring user information security, thereby eliminating information security risks and avoiding user information leakage.
Description
技术领域technical field
本公开涉及数据处理技术领域,具体涉及一种信息处理方法、装置、电子设备及计算机可读存储介质。The present disclosure relates to the technical field of data processing, and in particular, to an information processing method, an apparatus, an electronic device, and a computer-readable storage medium.
背景技术Background technique
随着互联网技术的发展,越来越多的商家或者服务提供商通过互联网平台与用户进行信息传输和互动,比如现有技术中通常通过读取用户的通讯录、读取用户的历史操作记录、读取用户的历史行为记录等数据以为用户提供更丰富更完善的服务,但上述信息的传输不可避免地会带来信息安全隐患,导致用户信息的泄露。因此亟需一种在能够保障用户信息安全的前提下,还能够根据用户的信息为其提供丰富完善的服务的方法。With the development of Internet technology, more and more merchants or service providers conduct information transmission and interaction with users through Internet platforms. Read the user's historical behavior records and other data to provide users with richer and more complete services, but the transmission of the above information will inevitably bring information security risks and lead to the leakage of user information. Therefore, there is an urgent need for a method that can provide users with rich and comprehensive services based on their information on the premise of ensuring the security of user information.
发明内容SUMMARY OF THE INVENTION
本公开实施例提供一种信息处理方法、装置、电子设备及计算机可读存储介质。Embodiments of the present disclosure provide an information processing method, an apparatus, an electronic device, and a computer-readable storage medium.
第一方面,本公开实施例中提供了一种信息处理方法。In a first aspect, an information processing method is provided in the embodiments of the present disclosure.
具体的,所述信息处理方法,包括:Specifically, the information processing method includes:
获取待处理信息;Obtain pending information;
使用第一密钥对于所述待处理信息进行加密,并将得到的第一加密信息发送给服务器,使其对于所述第一加密信息进行预设运算得到信息运算结果;Encrypting the information to be processed using the first key, and sending the obtained first encrypted information to the server, so that it performs a preset operation on the first encrypted information to obtain an information operation result;
响应于接收到所述服务器发送的加密信息运算结果,使用第二密钥对于所述加密信息运算结果进行解密,得到所述信息运算结果,其中,所述加密信息运算结果由所述服务器使用所述第一密钥对于所述信息运算结果进行加密得到。In response to receiving the encrypted information operation result sent by the server, use the second key to decrypt the encrypted information operation result to obtain the information operation result, wherein the encrypted information operation result is used by the server. The first key is obtained by encrypting the information operation result.
结合第一方面,本公开在第一方面的第一种实现方式中,所述第一密钥与所述第二密钥相对应,且配对使用。In combination with the first aspect, in a first implementation manner of the first aspect of the present disclosure, the first key corresponds to the second key and is used in pair.
结合第一方面和第一方面的第一种实现方式,本发明实施例在第一方面的第二种实现方式中,还包括:In combination with the first aspect and the first implementation manner of the first aspect, in the second implementation manner of the first aspect, the embodiment of the present invention further includes:
根据所述信息运算结果执行第一预设操作。A first preset operation is performed according to the information operation result.
第二方面,本公开实施例中提供了一种信息处理方法。In a second aspect, the embodiments of the present disclosure provide an information processing method.
具体的,所述信息处理方法,包括:Specifically, the information processing method includes:
获取待运算信息,并使用第一密钥对于所述待运算信息进行加密,得到第二加密信息;Obtain the information to be calculated, and use the first key to encrypt the information to be calculated to obtain the second encrypted information;
响应于接收到客户端发送的第一加密信息,对于所述第一加密信息和第二加密信息进行预设运算得到信息运算结果;In response to receiving the first encrypted information sent by the client, performing a preset operation on the first encrypted information and the second encrypted information to obtain an information operation result;
使用所述第一密钥对于所述信息运算结果进行加密得到加密信息运算结果,并将其发送给所述客户端。Encrypting the information operation result using the first key to obtain an encrypted information operation result, and sending it to the client.
结合第二方面,本公开在第二方面的第一种实现方式中,所述第一密钥与所述第二密钥相对应,且配对使用。In combination with the second aspect, in a first implementation manner of the second aspect of the present disclosure, the first key corresponds to the second key and is used in pair.
结合第二方面和第二方面的第一种实现方式,本发明实施例在第二方面的第二种实现方式中,还包括:In combination with the second aspect and the first implementation manner of the second aspect, in the second implementation manner of the second aspect, the embodiment of the present invention further includes:
响应于接收到第一预设操作反馈信息,执行第二预设操作。In response to receiving the first preset operation feedback information, the second preset operation is performed.
第三方面,本公开实施例中提供了一种信息处理方法。In a third aspect, an embodiment of the present disclosure provides an information processing method.
具体的,所述信息处理方法,包括:Specifically, the information processing method includes:
客户端获取待处理信息,使用第一密钥对于待处理信息进行加密,并将得到的第一加密信息发送给服务器;The client obtains the information to be processed, encrypts the information to be processed using the first key, and sends the obtained first encrypted information to the server;
服务器获取待运算信息,使用所述第一密钥对于所述待运算信息进行加密,得到第二加密信息;The server obtains the information to be calculated, and uses the first key to encrypt the information to be calculated to obtain second encrypted information;
服务器对于所述第一加密信息和第二加密信息进行预设运算得到信息运算结果,使用所述第一密钥对于所述信息运算结果进行加密得到加密信息运算结果,并将其发送给所述客户端;The server performs a preset operation on the first encrypted information and the second encrypted information to obtain an information operation result, encrypts the information operation result with the first key to obtain an encrypted information operation result, and sends it to the client;
客户端使用第二密钥对于服务器发送的加密信息运算结果进行解密,得到所述信息运算结果。The client uses the second key to decrypt the encrypted information operation result sent by the server to obtain the information operation result.
结合第三方面,本公开在第三方面的第一种实现方式中,所述第一密钥与所述第二密钥相对应,且配对使用。With reference to the third aspect, in a first implementation manner of the third aspect of the present disclosure, the first key corresponds to the second key and is used in pair.
结合第三方面和第三方面的第一种实现方式,本发明实施例在第三方面的第二种实现方式中,所述预设运算为比较运算。In combination with the third aspect and the first implementation manner of the third aspect, in the second implementation manner of the third aspect of the embodiment of the present invention, the preset operation is a comparison operation.
结合第三方面、第三方面的第一种实现方式和第三方面的第二种实现方式,本发明实施例在第三方面的第三种实现方式中,还包括:With reference to the third aspect, the first implementation manner of the third aspect, and the second implementation manner of the third aspect, in the third implementation manner of the third aspect, the embodiment of the present invention further includes:
所述客户端根据所述信息运算结果执行第一预设操作,所述服务器响应于接收到第一预设操作反馈信息,执行第二预设操作。The client performs a first preset operation according to the information operation result, and the server performs a second preset operation in response to receiving feedback information of the first preset operation.
结合第三方面、第三方面的第一种实现方式、第三方面的第二种实现方式和第三方面的第三种实现方式,本发明实施例在第三方面的第四种实现方式中,所述第一预设操作为以下操作中的一种或多种:推送操作、邀请操作、激励操作;所述第二预设操作为以下操作中的一种或多种:推送操作、激励操作。With reference to the third aspect, the first implementation manner of the third aspect, the second implementation manner of the third aspect, and the third implementation manner of the third aspect, the embodiment of the present invention is in the fourth implementation manner of the third aspect , the first preset operation is one or more of the following operations: a push operation, an invitation operation, and an incentive operation; the second preset operation is one or more of the following operations: a push operation, an incentive operation operate.
第四方面,本公开实施例中提供了一种信息处理装置。In a fourth aspect, an embodiment of the present disclosure provides an information processing apparatus.
具体的,所述信息处理装置,包括:Specifically, the information processing device includes:
获取模块,被配置为获取待处理信息;The acquisition module is configured to acquire pending information;
第一加密模块,被配置为使用第一密钥对于所述待处理信息进行加密,并将得到的第一加密信息发送给服务器,使其对于所述第一加密信息进行预设运算得到信息运算结果;The first encryption module is configured to use the first key to encrypt the to-be-processed information, and send the obtained first encrypted information to the server, so that it performs a preset operation on the first encrypted information to obtain an information operation result;
解密模块,被配置为响应于接收到所述服务器发送的加密信息运算结果,使用第二密钥对于所述加密信息运算结果进行解密,得到所述信息运算结果,其中,所述加密信息运算结果由所述服务器使用所述第一密钥对于所述信息运算结果进行加密得到。The decryption module is configured to, in response to receiving the encrypted information operation result sent by the server, use the second key to decrypt the encrypted information operation result to obtain the information operation result, wherein the encrypted information operation result It is obtained by encrypting the information operation result by the server using the first key.
结合第四方面,本公开在第四方面的第一种实现方式中,所述第一密钥与所述第二密钥相对应,且配对使用。With reference to the fourth aspect, in a first implementation manner of the fourth aspect of the present disclosure, the first key corresponds to the second key and is used in pair.
结合第四方面和第四方面的第一种实现方式,本发明实施例在第四方面的第二种实现方式中,还包括:In combination with the fourth aspect and the first implementation manner of the fourth aspect, in the second implementation manner of the fourth aspect, the embodiment of the present invention further includes:
第一执行模块,被配置为根据所述信息运算结果执行第一预设操作。The first execution module is configured to execute a first preset operation according to the information operation result.
第五方面,本公开实施例中提供了一种信息处理装置。In a fifth aspect, an embodiment of the present disclosure provides an information processing apparatus.
具体的,所述信息处理装置,包括:Specifically, the information processing device includes:
第二加密模块,被配置为获取待运算信息,并使用第一密钥对于所述待运算信息进行加密,得到第二加密信息;The second encryption module is configured to obtain the information to be calculated, and use the first key to encrypt the information to be calculated to obtain the second encrypted information;
运算模块,被配置为响应于接收到客户端发送的第一加密信息,对于所述第一加密信息和第二加密信息进行预设运算得到信息运算结果;an operation module, configured to perform a preset operation on the first encrypted information and the second encrypted information to obtain an information operation result in response to receiving the first encrypted information sent by the client;
第三加密模块,被配置为使用所述第一密钥对于所述信息运算结果进行加密得到加密信息运算结果,并将其发送给所述客户端。The third encryption module is configured to encrypt the information operation result by using the first key to obtain the encrypted information operation result, and send it to the client.
结合第五方面,本公开在第五方面的第一种实现方式中,所述第一密钥与所述第二密钥相对应,且配对使用。With reference to the fifth aspect, in a first implementation manner of the fifth aspect of the present disclosure, the first key corresponds to the second key and is used in pair.
结合第五方面和第五方面的第一种实现方式,本发明实施例在第五方面的第二种实现方式中,还包括:In combination with the fifth aspect and the first implementation manner of the fifth aspect, in the second implementation manner of the fifth aspect, the embodiment of the present invention further includes:
第二执行模块,被配置为响应于接收到第一预设操作反馈信息,执行第二预设操作。The second execution module is configured to execute the second preset operation in response to receiving the feedback information of the first preset operation.
第六方面,本公开实施例中提供了一种信息处理装置。In a sixth aspect, an embodiment of the present disclosure provides an information processing apparatus.
具体的,所述信息处理装置,包括:Specifically, the information processing device includes:
客户端,被配置为获取待处理信息,使用第一密钥对于待处理信息进行加密,并将得到的第一加密信息发送给服务器,使用第二密钥对于服务器发送的加密信息运算结果进行解密,得到所述信息运算结果;The client is configured to obtain the information to be processed, use the first key to encrypt the information to be processed, send the obtained first encrypted information to the server, and use the second key to decrypt the encrypted information operation result sent by the server , obtain the information operation result;
服务器,被配置为获取待运算信息,使用所述第一密钥对于所述待运算信息进行加密,得到第二加密信息,对于所述第一加密信息和第二加密信息进行预设运算得到信息运算结果,使用所述第一密钥对于所述信息运算结果进行加密得到加密信息运算结果,并将其发送给所述客户端。The server is configured to obtain the information to be calculated, use the first key to encrypt the information to be calculated to obtain second encrypted information, and perform a preset operation on the first encrypted information and the second encrypted information to obtain information For the operation result, encrypt the information operation result by using the first key to obtain the encrypted information operation result, and send it to the client.
结合第六方面,本公开在第六方面的第一种实现方式中,所述第一密钥与所述第二密钥相对应,且配对使用。With reference to the sixth aspect, in a first implementation manner of the sixth aspect of the present disclosure, the first key corresponds to the second key and is used in pair.
结合第六方面和第六方面的第一种实现方式,本发明实施例在第六方面的第二种实现方式中,所述预设运算为比较运算。In combination with the sixth aspect and the first implementation manner of the sixth aspect, in the second implementation manner of the sixth aspect of the embodiment of the present invention, the preset operation is a comparison operation.
结合第六方面、第六方面的第一种实现方式和第六方面的第二种实现方式,本发明实施例在第六方面的第三种实现方式中,所述客户端还被配置为根据所述信息运算结果执行第一预设操作,所述服务器还被配置为响应于接收到第一预设操作反馈信息,执行第二预设操作。With reference to the sixth aspect, the first implementation manner of the sixth aspect, and the second implementation manner of the sixth aspect, in a third implementation manner of the sixth aspect of the embodiments of the present invention, the client is further configured to The information operation result performs a first preset operation, and the server is further configured to perform a second preset operation in response to receiving feedback information of the first preset operation.
结合第六方面、第六方面的第一种实现方式、第六方面的第二种实现方式和第六方面的第三种实现方式,本发明实施例在第六方面的第四种实现方式中,所述第一预设操作为以下操作中的一种或多种:推送操作、邀请操作、激励操作;所述第二预设操作为以下操作中的一种或多种:推送操作、激励操作。With reference to the sixth aspect, the first implementation manner of the sixth aspect, the second implementation manner of the sixth aspect, and the third implementation manner of the sixth aspect, the embodiment of the present invention is in the fourth implementation manner of the sixth aspect , the first preset operation is one or more of the following operations: a push operation, an invitation operation, and an incentive operation; the second preset operation is one or more of the following operations: a push operation, an incentive operation operate.
第七方面,本公开实施例提供了一种电子设备,包括存储器和处理器,其中,所述存储器用于存储一条或多条计算机指令,其中,所述一条或多条计算机指令被所述处理器执行以实现上述信息处理方法的方法步骤。In a seventh aspect, embodiments of the present disclosure provide an electronic device, including a memory and a processor, wherein the memory is used to store one or more computer instructions, wherein the one or more computer instructions are processed by the The processor executes the method steps to implement the above-mentioned information processing method.
第八方面,本公开实施例提供了一种计算机可读存储介质,用于存储信息处理装置所用的计算机指令,其包含用于执行上述信息处理方法为信息处理装置所涉及的计算机指令。In an eighth aspect, an embodiment of the present disclosure provides a computer-readable storage medium for storing computer instructions used by an information processing apparatus, including computer instructions for executing the above information processing method for an information processing apparatus.
本公开实施例提供的技术方案可以包括以下有益效果:The technical solutions provided by the embodiments of the present disclosure may include the following beneficial effects:
上述技术方案通过对于用户信息的加密处理和加密传输,以及对于加密结果的加密运算,来实现在未知用户信息的情况下能够执行预设运算的效果。该技术方案能够在保障用户信息安全的前提下,根据用户的信息为其提供丰富完善的服务的方法,进而消除了信息安全隐患,避免出现用户信息泄露的情况。The above technical solution achieves the effect of being able to perform a preset operation when the user information is unknown through the encryption processing and encrypted transmission of the user information, and the encryption operation of the encryption result. The technical solution can provide users with rich and complete services based on their information on the premise of ensuring user information security, thereby eliminating information security risks and avoiding user information leakage.
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。It is to be understood that the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the present disclosure.
附图说明Description of drawings
结合附图,通过以下非限制性实施方式的详细描述,本公开的其它特征、目的和优点将变得更加明显。在附图中:Other features, objects and advantages of the present disclosure will become more apparent from the following detailed description of non-limiting embodiments, taken in conjunction with the accompanying drawings. In the attached image:
图1-图6示出根据本公开不同实施方式的信息处理方法的流程图;1-6 show flowcharts of information processing methods according to different embodiments of the present disclosure;
图7示出根据本公开一实施方式的信息处理整体流程图;FIG. 7 shows an overall flowchart of information processing according to an embodiment of the present disclosure;
图8-图12示出根据本公开不同实施方式的信息处理装置的结构框图;8-12 show structural block diagrams of information processing apparatuses according to different embodiments of the present disclosure;
图13示出根据本公开一实施方式的电子设备的结构框图;13 shows a structural block diagram of an electronic device according to an embodiment of the present disclosure;
图14是适于用来实现根据本公开一实施方式的信息处理方法的计算机系统的结构示意图。FIG. 14 is a schematic structural diagram of a computer system suitable for implementing an information processing method according to an embodiment of the present disclosure.
具体实施方式Detailed ways
下文中,将参考附图详细描述本公开的示例性实施方式,以使本领域技术人员可容易地实现它们。此外,为了清楚起见,在附图中省略了与描述示例性实施方式无关的部分。Hereinafter, exemplary embodiments of the present disclosure will be described in detail with reference to the accompanying drawings so that those skilled in the art can easily implement them. Also, for the sake of clarity, parts unrelated to describing the exemplary embodiments are omitted from the drawings.
在本公开中,应理解,诸如“包括”或“具有”等的术语旨在指示本说明书中所公开的特征、数字、步骤、行为、部件、部分或其组合的存在,并且不欲排除一个或多个其他特征、数字、步骤、行为、部件、部分或其组合存在或被添加的可能性。In the present disclosure, it should be understood that terms such as "comprising" or "having" are intended to indicate the presence of features, numbers, steps, acts, components, parts, or combinations thereof disclosed in this specification, and are not intended to exclude a or multiple other features, numbers, steps, acts, components, parts, or combinations thereof may exist or be added.
另外还需要说明的是,在不冲突的情况下,本公开中的实施例及实施例中的特征可以相互组合。下面将参考附图并结合实施例来详细说明本公开。In addition, it should be noted that the embodiments of the present disclosure and the features of the embodiments may be combined with each other under the condition of no conflict. The present disclosure will be described in detail below with reference to the accompanying drawings and in conjunction with embodiments.
本公开实施例提供的技术方案通过对于用户信息的加密处理和加密传输,以及对于加密结果的加密运算,来实现在未知用户信息的情况下能够执行预设运算的效果。该技术方案能够在保障用户信息安全的前提下,根据用户的信息为其提供丰富完善的服务的方法,进而消除了信息安全隐患,避免出现用户信息泄露的情况。The technical solutions provided by the embodiments of the present disclosure achieve the effect of being able to perform a preset operation when the user information is unknown by encrypting the user information and encrypting the transmission, and encrypting the result of the encryption operation. The technical solution can provide users with rich and complete services based on their information on the premise of ensuring user information security, thereby eliminating information security risks and avoiding user information leakage.
图1示出根据本公开一实施方式的信息处理方法的流程图,适用于客户端,如图1所示,所述信息处理方法包括以下步骤S101-S103:FIG. 1 shows a flowchart of an information processing method according to an embodiment of the present disclosure, which is suitable for a client. As shown in FIG. 1 , the information processing method includes the following steps S101-S103:
在步骤S101中,获取待处理信息;In step S101, obtain information to be processed;
在步骤S102中,使用第一密钥对于所述待处理信息进行加密,并将得到的第一加密信息发送给服务器,使其对于所述第一加密信息进行预设运算得到信息运算结果;In step S102, the information to be processed is encrypted using the first key, and the obtained first encrypted information is sent to the server, so that the first encrypted information is subjected to a preset operation to obtain an information operation result;
在步骤S103中,响应于接收到所述服务器发送的加密信息运算结果,使用第二密钥对于所述加密信息运算结果进行解密,得到所述信息运算结果,其中,所述加密信息运算结果由所述服务器使用所述第一密钥对于所述信息运算结果进行加密得到。In step S103, in response to receiving the encrypted information operation result sent by the server, use the second key to decrypt the encrypted information operation result to obtain the information operation result, wherein the encrypted information operation result is represented by The server encrypts the information operation result by using the first key to obtain the result.
上文提及,随着互联网技术的发展,越来越多的商家或者服务提供商通过互联网平台与用户进行信息传输和互动,比如现有技术中通常通过读取用户的通讯录、读取用户的历史操作记录、读取用户的历史行为记录等数据以为用户提供更丰富更完善的服务,但上述信息的传输不可避免地会带来信息安全隐患,导致用户信息的泄露。因此亟需一种在能够保障用户信息安全的前提下,还能够根据用户的信息为其提供丰富完善的服务的方法。As mentioned above, with the development of Internet technology, more and more businesses or service providers conduct information transmission and interaction with users through Internet platforms. In order to provide users with richer and more complete services, the transmission of the above information will inevitably bring information security risks and lead to the leakage of user information. Therefore, there is an urgent need for a method that can provide users with rich and comprehensive services based on their information on the premise of ensuring the security of user information.
考虑到上述缺陷,在该实施方式中,提出一种信息处理方法,该方法通过对于用户信息的加密处理和加密传输,以及对于加密结果的加密运算,来实现在未知用户信息的情况下能够执行预设运算的效果。该技术方案能够在保障用户信息安全的前提下,根据用户的信息为其提供丰富完善的服务的方法,进而消除了信息安全隐患,避免出现用户信息泄露的情况。Taking into account the above-mentioned defects, in this embodiment, an information processing method is proposed, which can be executed in the case of unknown user information through encryption processing and encryption transmission of user information, and encryption operation for encryption results. The effect of the preset operation. The technical solution can provide users with rich and complete services based on their information on the premise of ensuring user information security, thereby eliminating information security risks and avoiding user information leakage.
在本实施例的一个可选实现方式中,所述待处理信息指的是客户端需要发送给服务器,或者服务器需要从客户端获取的、可执行预设处理、得到预设处理结果并可根据预设处理结果执行相应的预设操作的信息。比如,所述待处理信息可以为用户客户端中存储的通讯录信息,客户端将所述通讯录信息发送给服务器,或者服务器从客户端获取得到所述通讯录信息之后。服务器可将其与服务器存储的注册用户通讯信息相比较,即执行比较处理,根据比较结果判断所述通讯录信息中是否存在还未注册的潜在新用户,并进一步确定是否需要对于该潜在新用户执行邀请注册操作、激励注册操作等预设操作。In an optional implementation manner of this embodiment, the information to be processed refers to the information that the client needs to send to the server, or the server needs to obtain from the client, execute preset processing, obtain the preset processing result, and Preset processing result to perform corresponding preset operation information. For example, the information to be processed may be the address book information stored in the user client, the client sends the address book information to the server, or the server obtains the address book information from the client. The server can compare it with the registered user communication information stored in the server, that is, perform a comparison process, determine whether there is a potential new user that has not been registered in the address book information according to the comparison result, and further determine whether it is necessary to contact the potential new user. Perform preset operations such as invitation registration operation, incentive registration operation, etc.
在本实施例的一个可选实现方式中,所述预设运算指的是用于实现一定运算目的的运算操作,比如其可以为比较运算、加减乘除运算、逻辑运算、组合运算等运算方式。本领域技术人员可根据实际应用的需要以及待处理信息的特点确定所述预设运算的具体运算形式,本公开对其不作具体限定。In an optional implementation manner of this embodiment, the preset operation refers to an operation operation used to achieve a certain operation purpose, for example, it may be a comparison operation, an addition, subtraction, multiplication and division operation, a logical operation, a combination operation, and other operation methods . Those skilled in the art can determine the specific operation form of the preset operation according to the needs of practical applications and the characteristics of the information to be processed, which is not specifically limited in the present disclosure.
在本实施例的一个可选实现方式中,所述第一密钥与所述第二密钥相对应,且配对使用。其中,为了提高信息传输的安全性,减少信息泄露的风险,所述第一密钥仅用于加密,而与其配对的所述第二密钥仅用于解密,另外,为了方便加密信息的处理,所述第一密钥可公开,发送给其他操作方进行加密操作,但所述第二密钥只能由所述待处理信息的归属方所有和使用,不能够被公开也不能够被其他操作方所使用。比如,某一待处理信息的归属方A使用所述第一密钥加密得到的信息,只能由归属方A使用与所述第一密钥对应的第二密钥解密得到,无论归属方A还是其他操作方B都无法使用第一密钥进行解密,即使归属方A和其他操作方B都能够获得所述第一密钥。In an optional implementation manner of this embodiment, the first key corresponds to the second key and is used in pair. Wherein, in order to improve the security of information transmission and reduce the risk of information leakage, the first key is only used for encryption, and the second key paired with it is only used for decryption. In addition, in order to facilitate the processing of encrypted information , the first key can be disclosed and sent to other operators for encryption operations, but the second key can only be owned and used by the owner of the information to be processed, and cannot be disclosed or used by other operators. used by the operator. For example, the information encrypted by the home party A of a certain information to be processed using the first key can only be decrypted by the home party A using the second key corresponding to the first key. Still other operators B cannot use the first key for decryption, even though both the home party A and other operators B can obtain the first key.
在上述实现方式中,客户端首先确定并获取待处理信息,然后使用第一密钥对于所述待处理信息进行加密,得到第一加密信息,所述客户端将所述第一加密信息发送给服务器,使其对于所述第一加密信息进行预设运算得到信息运算结果,比如将所述第一加密信息与其计算得到的其他信息进行比较得到信息比较结果,同时所述服务器还使用所述第一密钥对于得到的信息运算结果进行加密得到加密信息运算结果发送给客户端;客户端在接收到所述服务器发送回来的加密信息运算结果后,使用自己独有的、与所述第一密钥配对的第二密钥对于所述加密信息运算结果进行解密,得到真实的信息运算结果。In the above implementation manner, the client first determines and obtains the information to be processed, and then uses the first key to encrypt the information to be processed to obtain the first encrypted information, and the client sends the first encrypted information to The server makes it perform a preset operation on the first encrypted information to obtain an information operation result, for example, compare the first encrypted information with other information obtained by calculation to obtain an information comparison result, and the server also uses the first encrypted information to obtain an information comparison result. A key encrypts the obtained information operation result to obtain the encrypted information operation result and sends it to the client; after receiving the encrypted information operation result sent back by the server, the client uses its own unique encryption and the first encryption key. The second key of the key pair decrypts the encrypted information operation result to obtain the real information operation result.
在本实施例的一个可选实现方式中,所述方法还包括根据所述信息运算结果执行第一预设操作的步骤,即如图2所示,所述信息处理方法包括以下步骤S201-S204:In an optional implementation manner of this embodiment, the method further includes the step of executing a first preset operation according to the information operation result, that is, as shown in FIG. 2 , the information processing method includes the following steps S201-S204 :
在步骤S201中,获取待处理信息;In step S201, obtain information to be processed;
在步骤S202中,使用第一密钥对于所述待处理信息进行加密,并将得到的第一加密信息发送给服务器,使其对于所述第一加密信息进行预设运算得到信息运算结果;In step S202, the information to be processed is encrypted using the first key, and the obtained first encrypted information is sent to the server, so that it performs a preset operation on the first encrypted information to obtain an information operation result;
在步骤S203中,响应于接收到所述服务器发送的加密信息运算结果,使用第二密钥对于所述加密信息运算结果进行解密,得到所述信息运算结果,其中,所述加密信息运算结果由所述服务器使用所述第一密钥对于所述信息运算结果进行加密得到;In step S203, in response to receiving the encrypted information operation result sent by the server, use the second key to decrypt the encrypted information operation result to obtain the information operation result, wherein the encrypted information operation result is represented by Obtained by the server encrypting the information operation result by using the first key;
在步骤S204中,根据所述信息运算结果执行第一预设操作。In step S204, a first preset operation is performed according to the information operation result.
其中,所述第一预设操作指的是根据所述信息运算结果产生的、与所述信息运算结果相关联的操作。在本实施例的一个可选实现方式中,所述第一预设操作可以为以下操作中的一种或多种:推送操作、邀请操作、激励操作等等。The first preset operation refers to an operation generated according to the information operation result and associated with the information operation result. In an optional implementation manner of this embodiment, the first preset operation may be one or more of the following operations: a push operation, an invitation operation, an incentive operation, and the like.
以上文示例为例,比如,所述待处理信息为用户A客户端中存储的通讯录信息,具体可以为用户B的通信信息,若所述服务器执行了比较运算之后,确定所述用户B的通信信息在服务器存储的注册用户通讯录信息中并不存在,这说明用户B对于所述服务器来说是一个潜在的新用户,可将其发展为新注册用户,服务器在将用户B为新用户的运算结果发送给用户A客户端之后,用户A客户端就可以向用户B发出注册邀请,同时还可向其发送注册奖励等信息,以提高用户B执行注册操作的可能性。Taking the above example as an example, for example, the information to be processed is the address book information stored in the client of user A, and may specifically be the communication information of user B. The communication information does not exist in the registered user address book information stored by the server, which means that user B is a potential new user for the server, and can be developed into a new registered user. The server is treating user B as a new user. After the calculation result of , is sent to the client of user A, the client of user A can send a registration invitation to user B, and can also send information such as registration rewards to him, so as to improve the possibility of user B to perform the registration operation.
在本实施例的一个可选实现方式中,所述客户端在向服务器发送第一加密信息时,还可再次进行加密操作,比如使用第三密钥对于所述第一加密信息进行加密后再进行传输,这样服务器在接收到经过再次加密的第一加密信息后,需要使用同样的密钥或者与所述第三密钥配对的密钥执行相应的解密操作后才可以进行预设运算。其中,所述第三密钥可以与所述第一密钥相同,也可以不相同,另外,所述第三密钥可以为一个也可以为多个,即进行多次再加密操作,如果所述第三密钥为多个,则所述第三密钥可以相同,也可以不同,即每次可使用相同或不同的密钥执行再加密操作。需要说明的是,本领域技术人员可根据实际应用的需要设置或者不设置第三密钥、设置第三密钥的内容以及数量,本公开对其均不作具体限定,只是服务器端在解密时需要根据客户端的具体加密方式执行相应的解密。In an optional implementation manner of this embodiment, when the client sends the first encrypted information to the server, the client may also perform an encryption operation again, for example, encrypt the first encrypted information with a third key and then encrypt the first encrypted information. In this way, after receiving the re-encrypted first encrypted information, the server needs to use the same key or the key paired with the third key to perform a corresponding decryption operation before performing a preset operation. The third key may be the same or different from the first key. In addition, the third key may be one or multiple, that is, multiple re-encryption operations are performed. If there are multiple third keys, the third keys may be the same or different, that is, the same or different keys may be used to perform the re-encryption operation each time. It should be noted that those skilled in the art can set or not set the third key, set the content and quantity of the third key according to the needs of practical applications, and this disclosure does not specifically limit it, but the server needs to decrypt it. The corresponding decryption is performed according to the specific encryption method of the client.
图3示出根据本公开另一实施方式的信息处理方法的流程图,适用于服务器,如图3所示,所述信息处理方法包括以下步骤S301-S303:FIG. 3 shows a flowchart of an information processing method according to another embodiment of the present disclosure, which is applicable to a server. As shown in FIG. 3 , the information processing method includes the following steps S301-S303:
在步骤S301中,获取待运算信息,并使用第一密钥对于所述待运算信息进行加密,得到第二加密信息;In step S301, obtain the information to be calculated, and use the first key to encrypt the information to be calculated to obtain the second encrypted information;
在步骤S302中,响应于接收到客户端发送的第一加密信息,对于所述第一加密信息和第二加密信息进行预设运算得到信息运算结果;In step S302, in response to receiving the first encrypted information sent by the client, perform a preset operation on the first encrypted information and the second encrypted information to obtain an information operation result;
在步骤S303中,使用所述第一密钥对于所述信息运算结果进行加密得到加密信息运算结果,并将其发送给所述客户端。In step S303, the information operation result is encrypted by using the first key to obtain an encrypted information operation result, and the encrypted information operation result is sent to the client.
上文提及,随着互联网技术的发展,越来越多的商家或者服务提供商通过互联网平台与用户进行信息传输和互动,比如现有技术中通常通过读取用户的通讯录、读取用户的历史操作记录、读取用户的历史行为记录等数据以为用户提供更丰富更完善的服务,但上述信息的传输不可避免地会带来信息安全隐患,导致用户信息的泄露。因此亟需一种在能够保障用户信息安全的前提下,还能够根据用户的信息为其提供丰富完善的服务的方法。As mentioned above, with the development of Internet technology, more and more businesses or service providers conduct information transmission and interaction with users through Internet platforms. In order to provide users with richer and more complete services, the transmission of the above information will inevitably bring information security risks and lead to the leakage of user information. Therefore, there is an urgent need for a method that can provide users with rich and comprehensive services based on their information on the premise of ensuring the security of user information.
考虑到上述缺陷,在该实施方式中,提出一种信息处理方法,该方法通过对于用户信息的加密处理和加密传输,以及对于加密结果的加密运算,来实现在未知用户信息的情况下能够执行预设运算的效果。该技术方案能够在保障用户信息安全的前提下,根据用户的信息为其提供丰富完善的服务的方法,进而消除了信息安全隐患,避免出现用户信息泄露的情况。Taking into account the above-mentioned defects, in this embodiment, an information processing method is proposed, which can be executed in the case of unknown user information through encryption processing and encryption transmission of user information, and encryption operation for encryption results. The effect of the preset operation. The technical solution can provide users with rich and complete services based on their information on the premise of ensuring user information security, thereby eliminating information security risks and avoiding user information leakage.
在本实施例的一个可选实现方式中,所述待运算信息指的是存储在服务器中,需要与从客户端获取的待处理信息进行运算、能够得到预设运算结果并可根据预设运算结果执行相应的预设操作的信息。In an optional implementation of this embodiment, the information to be calculated refers to information stored in the server, which needs to be calculated with the information to be processed obtained from the client, can obtain a preset calculation result and can be calculated according to the preset The result is the information about performing the corresponding preset operation.
比如,所述待运算信息可以为服务器存储的注册用户通讯信息,所述待处理信息为客户端中存储的通讯录信息,服务器在获取到客户端中存储的通讯录信息之后,就可将所述通讯录信息与所述注册用户通讯信息相比较,即执行比较处理,然后根据比较结果判断所述通讯录信息中是否存在还未注册的潜在新用户,并进一步确定是否需要对于该潜在新用户执行邀请注册操作、激励注册操作等预设操作。For example, the information to be calculated may be the registered user communication information stored by the server, and the information to be processed is the address book information stored in the client. After acquiring the address book information stored in the client, the server can The address book information is compared with the registered user communication information, that is, a comparison process is performed, and then according to the comparison result, it is judged whether there is an unregistered potential new user in the address book information, and further determines whether the potential new user needs to be Perform preset operations such as invitation registration operation, incentive registration operation, etc.
在上述实现方式中,服务器获取其存储的待运算信息,并使用第一密钥对其进行加密,得到第二加密信息,然后对于从客户端获取的同样使用第一密钥进行加密得到的第一加密信息和第二加密信息进行预设运算得到信息运算结果,比如对所述第一加密信息和第二加密信息进行比较得到信息比较结果,然后所述服务器使用所述第一密钥对于得到的信息运算结果进行加密得到加密信息运算结果发送给客户端;客户端在接收到所述加密信息运算结果后,使用自己独有的、与所述第一密钥配对的第二密钥对于所述加密信息运算结果进行解密,得到真实的信息运算结果。In the above implementation manner, the server obtains the stored information to be calculated, and encrypts it with the first key to obtain the second encrypted information, and then obtains the second encrypted information obtained from the client that is also encrypted with the first key. An information operation result is obtained by performing a preset operation on the encrypted information and the second encrypted information, for example, comparing the first encrypted information and the second encrypted information to obtain an information comparison result, and then the server uses the first key to obtain an information comparison result. The encrypted information operation result is encrypted to obtain the encrypted information operation result and sent to the client; after receiving the encrypted information operation result, the client uses its own unique second key paired with the first key to The encrypted information operation result is decrypted to obtain the real information operation result.
在本实施例的一个可选实现方式中,所述方法还包括响应于接收到第一预设操作反馈信息,执行第二预设操作的步骤,即如图4所示,所述信息处理方法包括以下步骤S401-S404:In an optional implementation manner of this embodiment, the method further includes a step of executing a second preset operation in response to receiving the feedback information of the first preset operation, that is, as shown in FIG. 4 , the information processing method It includes the following steps S401-S404:
在步骤S401中,获取待运算信息,并使用第一密钥对于所述待运算信息进行加密,得到第二加密信息;In step S401, obtain the information to be calculated, and use the first key to encrypt the information to be calculated to obtain second encrypted information;
在步骤S402中,响应于接收到客户端发送的第一加密信息,对于所述第一加密信息和第二加密信息进行预设运算得到信息运算结果;In step S402, in response to receiving the first encrypted information sent by the client, a preset operation is performed on the first encrypted information and the second encrypted information to obtain an information operation result;
在步骤S403中,使用所述第一密钥对于所述信息运算结果进行加密得到加密信息运算结果,并将其发送给所述客户端;In step S403, use the first key to encrypt the information operation result to obtain an encrypted information operation result, and send it to the client;
在步骤S404中,响应于接收到第一预设操作反馈信息,执行第二预设操作。In step S404, in response to receiving the first preset operation feedback information, a second preset operation is performed.
其中,所述第一预设操作反馈信息指的是客户端在执行了第一预设操作后产生的反馈信息。比如,若所述第一预设操作为邀请操作,则所述第一预设操作反馈信息可以为邀请成功信息或邀请失败信息。其中,所述第一预设操作反馈信息既可以由客户端发出,也可由所述客户端所邀请的客户端对象发出,比如,若客户端A向客户端B发出邀请信息,即执行邀请操作,客户端B在收到该邀请信息之后打开服务器对应的注册页面执行了新用户注册操作,这说明客户端A的邀请操作成功,同时服务器检测到到客户端B发出了新用户注册请求,此时可认为所述新用户注册请求即为由客户端B发出的第一预设操作反馈信息。The first preset operation feedback information refers to feedback information generated after the client performs the first preset operation. For example, if the first preset operation is an invitation operation, the first preset operation feedback information may be invitation success information or invitation failure information. The first preset operation feedback information can be sent either by the client or by the client object invited by the client. For example, if client A sends an invitation to client B, the invitation operation is performed. , Client B opens the registration page corresponding to the server and performs the new user registration operation after receiving the invitation information, which indicates that the invitation operation of Client A is successful, and the server detects that Client B has sent a new user registration request. It can be considered that the new user registration request is the first preset operation feedback information sent by the client B.
其中,所述第二预设操作指的是根据所述第一预设操作反馈信息产生的、与所述第一预设操作反馈信息相关联的操作。在本实施例的一个可选实现方式中,所述第二预设操作可以为以下操作中的一种或多种:推送操作、激励操作等等。The second preset operation refers to an operation generated according to the first preset operation feedback information and associated with the first preset operation feedback information. In an optional implementation manner of this embodiment, the second preset operation may be one or more of the following operations: a push operation, an excitation operation, and the like.
在本实施例的一个可选实现方式中,若所述服务器接收到的第一加密信息是经过多次加密操作后得到的加密信息时,所述服务器端在解密时需要根据客户端的具体加密方式执行相应的解密。对其上文已经详细描述,此处不再赘述。In an optional implementation of this embodiment, if the first encrypted information received by the server is encrypted information obtained after multiple encryption operations, the server needs to decrypt according to the specific encryption method of the client when decrypting. Perform the corresponding decryption. It has been described in detail above and will not be repeated here.
在本实施例的一个可选实现方式中,所述第一密钥与所述第二密钥相对应,且配对使用。In an optional implementation manner of this embodiment, the first key corresponds to the second key and is used in pair.
需要说明的是,图3-图4所示实施例与上文实施例存在部分相同的技术特征或相似的技术方案,对其详细的描述可参见上文类似的描述,本公开在此不再赘述。It should be noted that the embodiments shown in FIG. 3 to FIG. 4 have some of the same technical features or similar technical solutions as the above embodiments, and the detailed description thereof can refer to the above similar descriptions, and the present disclosure will not be repeated here. Repeat.
图5示出根据本公开再一实施方式的信息处理方法的流程图,适用于包含有客户端和服务器的信息处理系统,如图5所示,所述信息处理方法包括以下步骤S501-S504:FIG. 5 shows a flowchart of an information processing method according to yet another embodiment of the present disclosure, which is suitable for an information processing system including a client and a server. As shown in FIG. 5 , the information processing method includes the following steps S501-S504:
在步骤S501中,客户端获取待处理信息,使用第一密钥对于待处理信息进行加密,并将得到的第一加密信息发送给服务器;In step S501, the client obtains the information to be processed, encrypts the information to be processed using the first key, and sends the obtained first encrypted information to the server;
在步骤S502中,服务器获取待运算信息,使用所述第一密钥对于所述待运算信息进行加密,得到第二加密信息;In step S502, the server obtains the information to be calculated, and uses the first key to encrypt the information to be calculated to obtain second encrypted information;
在步骤S503中,服务器对于所述第一加密信息和第二加密信息进行预设运算得到信息运算结果,使用所述第一密钥对于所述信息运算结果进行加密得到加密信息运算结果,并将其发送给所述客户端;In step S503, the server performs a preset operation on the first encrypted information and the second encrypted information to obtain an information operation result, encrypts the information operation result with the first key to obtain an encrypted information operation result, and encrypts the information operation result. it is sent to said client;
在步骤S504中,客户端使用第二密钥对于服务器发送的加密信息运算结果进行解密,得到所述信息运算结果。In step S504, the client uses the second key to decrypt the encrypted information operation result sent by the server to obtain the information operation result.
上文提及,随着互联网技术的发展,越来越多的商家或者服务提供商通过互联网平台与用户进行信息传输和互动,比如现有技术中通常通过读取用户的通讯录、读取用户的历史操作记录、读取用户的历史行为记录等数据以为用户提供更丰富更完善的服务,但上述信息的传输不可避免地会带来信息安全隐患,导致用户信息的泄露。因此亟需一种在能够保障用户信息安全的前提下,还能够根据用户的信息为其提供丰富完善的服务的方法。As mentioned above, with the development of Internet technology, more and more businesses or service providers conduct information transmission and interaction with users through Internet platforms. In order to provide users with richer and more complete services, the transmission of the above information will inevitably bring information security risks and lead to the leakage of user information. Therefore, there is an urgent need for a method that can provide users with rich and comprehensive services based on their information on the premise of ensuring the security of user information.
考虑到上述缺陷,在该实施方式中,提出一种信息处理方法,该方法通过对于用户信息的加密处理和加密传输,以及对于加密结果的加密运算,来实现在未知用户信息的情况下能够执行预设运算的效果。该技术方案能够在保障用户信息安全的前提下,根据用户的信息为其提供丰富完善的服务的方法,进而消除了信息安全隐患,避免出现用户信息泄露的情况。Taking into account the above-mentioned defects, in this embodiment, an information processing method is proposed, which can be executed in the case of unknown user information through encryption processing and encryption transmission of user information, and encryption operation for encryption results. The effect of the preset operation. The technical solution can provide users with rich and complete services based on their information on the premise of ensuring user information security, thereby eliminating information security risks and avoiding user information leakage.
在本实施例的一个可选实现方式中,所述第一密钥与所述第二密钥相对应,且配对使用。In an optional implementation manner of this embodiment, the first key corresponds to the second key and is used in pair.
在本实施例的一个可选实现方式中,所述预设运算为比较运算。In an optional implementation manner of this embodiment, the preset operation is a comparison operation.
在上述实现方式中,客户端首先确定并获取待处理信息,然后使用第一密钥对于所述待处理信息进行加密,得到第一加密信息,所述客户端将所述第一加密信息发送给服务器;服务器获取其存储的待运算信息,并使用第一密钥对其进行加密,得到第二加密信息,然后对于从客户端获取的同样使用第一密钥进行加密得到的第一加密信息和第二加密信息进行预设运算得到信息运算结果,比如对所述第一加密信息和第二加密信息进行比较得到信息比较结果;然后所述服务器使用所述第一密钥对于得到的信息运算结果进行加密得到加密信息运算结果发送给客户端;客户端在接收到所述加密信息运算结果后,使用自己独有的、与所述第一密钥配对的第二密钥对于所述加密信息运算结果进行解密,得到真实的信息运算结果。In the above implementation manner, the client first determines and obtains the information to be processed, and then uses the first key to encrypt the information to be processed to obtain the first encrypted information, and the client sends the first encrypted information to The server; the server obtains the stored information to be calculated, encrypts it with the first key, and obtains the second encrypted information, and then obtains the first encrypted information obtained from the client and encrypts it with the first key and obtains the second encrypted information. The second encrypted information is subjected to a preset operation to obtain an information operation result, for example, an information comparison result is obtained by comparing the first encrypted information and the second encrypted information; then the server uses the first key for the obtained information operation result Perform encryption to obtain the encrypted information operation result and send it to the client; after receiving the encrypted information operation result, the client uses its own unique second key paired with the first key to operate on the encrypted information The result is decrypted to obtain the real information operation result.
在本实施例的一个可选实现方式中,所述方法还包括所述客户端根据所述信息运算结果执行第一预设操作,所述服务器响应于接收到第一预设操作反馈信息,执行第二预设操作的步骤,即如图6所示,所述信息处理方法包括以下步骤S601-S605:In an optional implementation manner of this embodiment, the method further includes that the client performs a first preset operation according to the information operation result, and the server performs a first preset operation in response to receiving feedback information of the first preset operation. The steps of the second preset operation, as shown in FIG. 6 , the information processing method includes the following steps S601-S605:
在步骤S601中,客户端获取待处理信息,使用第一密钥对于待处理信息进行加密,并将得到的第一加密信息发送给服务器;In step S601, the client obtains the information to be processed, encrypts the information to be processed using the first key, and sends the obtained first encrypted information to the server;
在步骤S602中,服务器获取待运算信息,使用所述第一密钥对于所述待运算信息进行加密,得到第二加密信息;In step S602, the server obtains the information to be calculated, and uses the first key to encrypt the information to be calculated to obtain second encrypted information;
在步骤S603中,服务器对于所述第一加密信息和第二加密信息进行预设运算得到信息运算结果,使用所述第一密钥对于所述信息运算结果进行加密得到加密信息运算结果,并将其发送给所述客户端;In step S603, the server performs a preset operation on the first encrypted information and the second encrypted information to obtain an information operation result, encrypts the information operation result with the first key to obtain an encrypted information operation result, and encrypts the information operation result. it is sent to said client;
在步骤S604中,客户端使用第二密钥对于服务器发送的加密信息运算结果进行解密,得到所述信息运算结果;In step S604, the client uses the second key to decrypt the encrypted information operation result sent by the server to obtain the information operation result;
在步骤S605中,所述客户端根据所述信息运算结果执行第一预设操作,所述服务器响应于接收到第一预设操作反馈信息,执行第二预设操作。In step S605, the client performs a first preset operation according to the information operation result, and the server performs a second preset operation in response to receiving feedback information of the first preset operation.
在本实施例的一个可选实现方式中,所述第一预设操作可为以下操作中的一种或多种:推送操作、邀请操作、激励操作等等;所述第二预设操作可为以下操作中的一种或多种:推送操作、激励操作等等。In an optional implementation of this embodiment, the first preset operation may be one or more of the following operations: a push operation, an invitation operation, an incentive operation, etc.; the second preset operation may be One or more of the following operations: push operations, incentivize operations, and so on.
需要说明的是,图5-图6所示实施例与上文实施例存在部分相同的技术特征或相似的技术方案,对其详细的描述可参见上文类似的描述,本公开在此不再赘述。It should be noted that the embodiments shown in FIG. 5 to FIG. 6 have some of the same technical features or similar technical solutions as the above-mentioned embodiments, and the detailed description thereof can refer to the above-mentioned similar description, which is not omitted in the present disclosure. Repeat.
图7所示为根据本公开一实施方式的信息处理整体流程图,如图7所示,客户端首先确定并获取待处理信息,然后使用第一密钥对于所述待处理信息进行加密,得到第一加密信息,所述客户端将所述第一加密信息发送给服务器;服务器获取其存储的待运算信息,并使用第一密钥对其进行加密,得到第二加密信息,然后对于从客户端获取的同样使用第一密钥进行加密得到的第一加密信息和第二加密信息进行比较运算得到信息比较结果;然后所述服务器使用所述第一密钥对于得到的信息比较结果进行加密得到加密信息比较结果发送给客户端;客户端在接收到所述加密信息比较结果后,使用自己独有的、与所述第一密钥配对的第二密钥对于所述加密信息比较结果进行解密,得到真实的信息比较结果,接下来客户端可以根据所述信息比较结果执行推送操作、邀请操作、激励操作等第一预设操作,所述服务器响应于接收到第一预设操作反馈信息,执行推送操作、激励操作等第二预设操作。FIG. 7 is an overall flow chart of information processing according to an embodiment of the present disclosure. As shown in FIG. 7 , the client first determines and obtains the information to be processed, and then uses the first key to encrypt the information to be processed to obtain The first encrypted information, the client sends the first encrypted information to the server; the server obtains the stored information to be calculated, and uses the first key to encrypt it to obtain the second encrypted information, and then for the data from the client The first encrypted information obtained by the terminal that is also encrypted with the first key and the second encrypted information are compared and calculated to obtain an information comparison result; then the server uses the first key to encrypt the obtained information comparison result to obtain The encrypted information comparison result is sent to the client; after receiving the encrypted information comparison result, the client uses its own unique second key paired with the first key to decrypt the encrypted information comparison result , to obtain a real information comparison result, then the client can perform a first preset operation such as a push operation, an invitation operation, an incentive operation, etc. according to the information comparison result, and the server responds to receiving the first preset operation feedback information, A second preset operation such as a push operation and an incentive operation is performed.
下述为本公开装置实施例,可以用于执行本公开方法实施例。The following are the apparatus embodiments of the present disclosure, which can be used to execute the method embodiments of the present disclosure.
图8示出根据本公开一实施方式的信息处理装置的结构框图,该装置可以通过软件、硬件或者两者的结合实现成为电子设备的部分或者全部,可实现为客户端。如图8所示,所述信息处理装置包括:8 shows a structural block diagram of an information processing apparatus according to an embodiment of the present disclosure. The apparatus can be implemented as part or all of an electronic device through software, hardware, or a combination of the two, and can be implemented as a client. As shown in Figure 8, the information processing device includes:
获取模块801,被配置为获取待处理信息;an
第一加密模块802,被配置为使用第一密钥对于所述待处理信息进行加密,并将得到的第一加密信息发送给服务器,使其对于所述第一加密信息进行预设运算得到信息运算结果;The
解密模块803,被配置为响应于接收到所述服务器发送的加密信息运算结果,使用第二密钥对于所述加密信息运算结果进行解密,得到所述信息运算结果,其中,所述加密信息运算结果由所述服务器使用所述第一密钥对于所述信息运算结果进行加密得到。The
上文提及,随着互联网技术的发展,越来越多的商家或者服务提供商通过互联网平台与用户进行信息传输和互动,比如现有技术中通常通过读取用户的通讯录、读取用户的历史操作记录、读取用户的历史行为记录等数据以为用户提供更丰富更完善的服务,但上述信息的传输不可避免地会带来信息安全隐患,导致用户信息的泄露。因此亟需一种在能够保障用户信息安全的前提下,还能够根据用户的信息为其提供丰富完善的服务的方法。As mentioned above, with the development of Internet technology, more and more businesses or service providers conduct information transmission and interaction with users through Internet platforms. In order to provide users with richer and more complete services, the transmission of the above information will inevitably bring information security risks and lead to the leakage of user information. Therefore, there is an urgent need for a method that can provide users with rich and comprehensive services based on their information on the premise of ensuring the security of user information.
考虑到上述缺陷,在该实施方式中,提出一种信息处理装置,该装置通过对于用户信息的加密处理和加密传输,以及对于加密结果的加密运算,来实现在未知用户信息的情况下能够执行预设运算的效果。该技术方案能够在保障用户信息安全的前提下,根据用户的信息为其提供丰富完善的服务的方法,进而消除了信息安全隐患,避免出现用户信息泄露的情况。Considering the above-mentioned defects, in this embodiment, an information processing device is proposed, which can perform encryption processing and encrypted transmission of user information, and encryption operation for encrypted results, so as to realize that the user information can be executed when the user information is unknown. The effect of the preset operation. The technical solution can provide users with rich and complete services based on their information on the premise of ensuring user information security, thereby eliminating information security risks and avoiding user information leakage.
在本实施例的一个可选实现方式中,所述待处理信息指的是客户端需要发送给服务器,或者服务器需要从客户端获取的、可执行预设处理、得到预设处理结果并可根据预设处理结果执行相应的预设操作的信息。比如,所述待处理信息可以为用户客户端中存储的通讯录信息,客户端将所述通讯录信息发送给服务器,或者服务器从客户端获取得到所述通讯录信息之后。服务器可将其与服务器存储的注册用户通讯信息相比较,即执行比较处理,根据比较结果判断所述通讯录信息中是否存在还未注册的潜在新用户,并进一步确定是否需要对于该潜在新用户执行邀请注册操作、激励注册操作等预设操作。In an optional implementation manner of this embodiment, the information to be processed refers to the information that the client needs to send to the server, or the server needs to obtain from the client, execute preset processing, obtain the preset processing result, and Preset processing result to perform corresponding preset operation information. For example, the information to be processed may be the address book information stored in the user client, the client sends the address book information to the server, or the server obtains the address book information from the client. The server can compare it with the registered user communication information stored in the server, that is, perform a comparison process, determine whether there is a potential new user that has not been registered in the address book information according to the comparison result, and further determine whether it is necessary to contact the potential new user. Perform preset operations such as invitation registration operation, incentive registration operation, etc.
在本实施例的一个可选实现方式中,所述预设运算指的是用于实现一定运算目的的运算操作,比如其可以为比较运算、加减乘除运算、逻辑运算、组合运算等运算方式。本领域技术人员可根据实际应用的需要以及待处理信息的特点确定所述预设运算的具体运算形式,本公开对其不作具体限定。In an optional implementation manner of this embodiment, the preset operation refers to an operation operation used to achieve a certain operation purpose, for example, it may be a comparison operation, an addition, subtraction, multiplication and division operation, a logical operation, a combination operation, and other operation methods . Those skilled in the art can determine the specific operation form of the preset operation according to the needs of practical applications and the characteristics of the information to be processed, which is not specifically limited in the present disclosure.
在本实施例的一个可选实现方式中,所述第一密钥与所述第二密钥相对应,且配对使用。其中,为了提高信息传输的安全性,减少信息泄露的风险,所述第一密钥仅用于加密,而与其配对的所述第二密钥仅用于解密,另外,为了方便加密信息的处理,所述第一密钥可公开,发送给其他操作方进行加密操作,但所述第二密钥只能由所述待处理信息的归属方所有和使用,不能够被公开也不能够被其他操作方所使用。比如,某一待处理信息的归属方A使用所述第一密钥加密得到的信息,只能由归属方A使用与所述第一密钥对应的第二密钥解密得到,无论归属方A还是其他操作方B都无法使用第一密钥进行解密,即使归属方A和其他操作方B都能够获得所述第一密钥。In an optional implementation manner of this embodiment, the first key corresponds to the second key and is used in pair. Wherein, in order to improve the security of information transmission and reduce the risk of information leakage, the first key is only used for encryption, and the second key paired with it is only used for decryption. In addition, in order to facilitate the processing of encrypted information , the first key can be disclosed and sent to other operators for encryption operations, but the second key can only be owned and used by the owner of the information to be processed, and cannot be disclosed or used by other operators. used by the operator. For example, the information encrypted by the home party A of a certain information to be processed using the first key can only be decrypted by the home party A using the second key corresponding to the first key. Still other operators B cannot use the first key for decryption, even though both the home party A and other operators B can obtain the first key.
在上述实现方式中,客户端首先确定并获取待处理信息,然后使用第一密钥对于所述待处理信息进行加密,得到第一加密信息,所述客户端将所述第一加密信息发送给服务器,使其对于所述第一加密信息进行预设运算得到信息运算结果,比如将所述第一加密信息与其计算得到的其他信息进行比较得到信息比较结果,同时所述服务器还使用所述第一密钥对于得到的信息运算结果进行加密得到加密信息运算结果发送给客户端;客户端在接收到所述服务器发送回来的加密信息运算结果后,使用自己独有的、与所述第一密钥配对的第二密钥对于所述加密信息运算结果进行解密,得到真实的信息运算结果。In the above implementation manner, the client first determines and obtains the information to be processed, and then uses the first key to encrypt the information to be processed to obtain the first encrypted information, and the client sends the first encrypted information to The server makes it perform a preset operation on the first encrypted information to obtain an information operation result, for example, compare the first encrypted information with other information obtained by calculation to obtain an information comparison result, and the server also uses the first encrypted information to obtain an information comparison result. A key encrypts the obtained information operation result to obtain the encrypted information operation result and sends it to the client; after receiving the encrypted information operation result sent back by the server, the client uses its own unique encryption and the first encryption key. The second key of the key pair decrypts the encrypted information operation result to obtain the real information operation result.
在本实施例的一个可选实现方式中,所述装置还包括根据所述信息运算结果执行第一预设操作的部分,即如图9所示,所述信息处理装置包括:In an optional implementation manner of this embodiment, the apparatus further includes a part that performs a first preset operation according to the information operation result, that is, as shown in FIG. 9 , the information processing apparatus includes:
获取模块901,被配置为获取待处理信息;an obtaining
第一加密模块902,被配置为使用第一密钥对于所述待处理信息进行加密,并将得到的第一加密信息发送给服务器,使其对于所述第一加密信息进行预设运算得到信息运算结果;The
解密模块903,被配置为响应于接收到所述服务器发送的加密信息运算结果,使用第二密钥对于所述加密信息运算结果进行解密,得到所述信息运算结果,其中,所述加密信息运算结果由所述服务器使用所述第一密钥对于所述信息运算结果进行加密得到;The
第一执行模块904,被配置为根据所述信息运算结果执行第一预设操作。The
其中,所述第一预设操作指的是根据所述信息运算结果产生的、与所述信息运算结果相关联的操作。在本实施例的一个可选实现方式中,所述第一预设操作可以为以下操作中的一种或多种:推送操作、邀请操作、激励操作等等。The first preset operation refers to an operation generated according to the information operation result and associated with the information operation result. In an optional implementation manner of this embodiment, the first preset operation may be one or more of the following operations: a push operation, an invitation operation, an incentive operation, and the like.
以上文示例为例,比如,所述待处理信息为用户A客户端中存储的通讯录信息,具体可以为用户B的通信信息,若所述服务器执行了比较运算之后,确定所述用户B的通信信息在服务器存储的注册用户通讯录信息中并不存在,这说明用户B对于所述服务器来说是一个潜在的新用户,可将其发展为新注册用户,服务器在将用户B为新用户的运算结果发送给用户A客户端之后,用户A客户端就可以向用户B发出注册邀请,同时还可向其发送注册奖励等信息,以提高用户B执行注册操作的可能性。Taking the above example as an example, for example, the information to be processed is the address book information stored in the client of user A, and may specifically be the communication information of user B. The communication information does not exist in the registered user address book information stored by the server, which means that user B is a potential new user for the server, and can be developed into a new registered user. The server is treating user B as a new user. After the calculation result of , is sent to the client of user A, the client of user A can send a registration invitation to user B, and can also send information such as registration rewards to him, so as to improve the possibility of user B to perform the registration operation.
在本实施例的一个可选实现方式中,所述客户端在向服务器发送第一加密信息时,还可再次进行加密操作,比如使用第三密钥对于所述第一加密信息进行加密后再进行传输,这样服务器在接收到经过再次加密的第一加密信息后,需要使用同样的密钥或者与所述第三密钥配对的密钥执行相应的解密操作后才可以进行预设运算。其中,所述第三密钥可以与所述第一密钥相同,也可以不相同,另外,所述第三密钥可以为一个也可以为多个,即进行多次再加密操作,如果所述第三密钥为多个,则所述第三密钥可以相同,也可以不同,即每次可使用相同或不同的密钥执行再加密操作。需要说明的是,本领域技术人员可根据实际应用的需要设置或者不设置第三密钥、设置第三密钥的内容以及数量,本公开对其均不作具体限定,只是服务器端在解密时需要根据客户端的具体加密方式执行相应的解密。In an optional implementation manner of this embodiment, when the client sends the first encrypted information to the server, the client may also perform an encryption operation again, for example, encrypt the first encrypted information with a third key and then encrypt the first encrypted information. In this way, after receiving the re-encrypted first encrypted information, the server needs to use the same key or the key paired with the third key to perform a corresponding decryption operation before performing a preset operation. The third key may be the same or different from the first key. In addition, the third key may be one or multiple, that is, multiple re-encryption operations are performed. If there are multiple third keys, the third keys may be the same or different, that is, the same or different keys may be used to perform the re-encryption operation each time. It should be noted that those skilled in the art can set or not set the third key, set the content and quantity of the third key according to the needs of practical applications, and this disclosure does not specifically limit it, but the server needs to decrypt it. The corresponding decryption is performed according to the specific encryption method of the client.
图10示出根据本公开另一实施方式的信息处理装置的结构框图,该装置可以通过软件、硬件或者两者的结合实现成为电子设备的部分或者全部,可实现为服务器。如图10所示,所述信息处理装置包括:10 shows a structural block diagram of an information processing apparatus according to another embodiment of the present disclosure. The apparatus may be implemented as part or all of an electronic device through software, hardware or a combination of the two, and may be implemented as a server. As shown in Figure 10, the information processing device includes:
第二加密模块1001,被配置为获取待运算信息,并使用第一密钥对于所述待运算信息进行加密,得到第二加密信息;The
运算模块1002,被配置为响应于接收到客户端发送的第一加密信息,对于所述第一加密信息和第二加密信息进行预设运算得到信息运算结果;The
第三加密模块1003,被配置为使用所述第一密钥对于所述信息运算结果进行加密得到加密信息运算结果,并将其发送给所述客户端。The
上文提及,随着互联网技术的发展,越来越多的商家或者服务提供商通过互联网平台与用户进行信息传输和互动,比如现有技术中通常通过读取用户的通讯录、读取用户的历史操作记录、读取用户的历史行为记录等数据以为用户提供更丰富更完善的服务,但上述信息的传输不可避免地会带来信息安全隐患,导致用户信息的泄露。因此亟需一种在能够保障用户信息安全的前提下,还能够根据用户的信息为其提供丰富完善的服务的方法。As mentioned above, with the development of Internet technology, more and more businesses or service providers conduct information transmission and interaction with users through Internet platforms. In order to provide users with richer and more complete services, the transmission of the above information will inevitably bring information security risks and lead to the leakage of user information. Therefore, there is an urgent need for a method that can provide users with rich and comprehensive services based on their information on the premise of ensuring the security of user information.
考虑到上述缺陷,在该实施方式中,提出一种信息处理装置,该装置通过对于用户信息的加密处理和加密传输,以及对于加密结果的加密运算,来实现在未知用户信息的情况下能够执行预设运算的效果。该技术方案能够在保障用户信息安全的前提下,根据用户的信息为其提供丰富完善的服务的方法,进而消除了信息安全隐患,避免出现用户信息泄露的情况。Considering the above-mentioned defects, in this embodiment, an information processing device is proposed, which can perform encryption processing and encrypted transmission of user information, and encryption operation for encrypted results, so as to realize that the user information can be executed when the user information is unknown. The effect of the preset operation. The technical solution can provide users with rich and complete services based on their information on the premise of ensuring user information security, thereby eliminating information security risks and avoiding user information leakage.
在本实施例的一个可选实现方式中,所述待运算信息指的是存储在服务器中,需要与从客户端获取的待处理信息进行运算、能够得到预设运算结果并可根据预设运算结果执行相应的预设操作的信息。In an optional implementation of this embodiment, the information to be calculated refers to information stored in the server, which needs to be calculated with the information to be processed obtained from the client, can obtain a preset calculation result and can be calculated according to the preset The result is the information about executing the corresponding preset operation.
比如,所述待运算信息可以为服务器存储的注册用户通讯信息,所述待处理信息为客户端中存储的通讯录信息,服务器在获取到客户端中存储的通讯录信息之后,就可将所述通讯录信息与所述注册用户通讯信息相比较,即执行比较处理,然后根据比较结果判断所述通讯录信息中是否存在还未注册的潜在新用户,并进一步确定是否需要对于该潜在新用户执行邀请注册操作、激励注册操作等预设操作。For example, the information to be calculated may be the registered user communication information stored by the server, and the information to be processed is the address book information stored in the client. After acquiring the address book information stored in the client, the server can The address book information is compared with the registered user communication information, that is, a comparison process is performed, and then according to the comparison result, it is judged whether there is an unregistered potential new user in the address book information, and further determines whether the potential new user needs to be Perform preset operations such as invitation registration operation, incentive registration operation, etc.
在上述实现方式中,服务器获取其存储的待运算信息,并使用第一密钥对其进行加密,得到第二加密信息,然后对于从客户端获取的同样使用第一密钥进行加密得到的第一加密信息和第二加密信息进行预设运算得到信息运算结果,比如对所述第一加密信息和第二加密信息进行比较得到信息比较结果,然后所述服务器使用所述第一密钥对于得到的信息运算结果进行加密得到加密信息运算结果发送给客户端;客户端在接收到所述加密信息运算结果后,使用自己独有的、与所述第一密钥配对的第二密钥对于所述加密信息运算结果进行解密,得到真实的信息运算结果。In the above implementation manner, the server obtains the stored information to be calculated, and encrypts it with the first key to obtain the second encrypted information, and then obtains the second encrypted information obtained from the client that is also encrypted with the first key. An information operation result is obtained by performing a preset operation on the encrypted information and the second encrypted information, for example, comparing the first encrypted information and the second encrypted information to obtain an information comparison result, and then the server uses the first key to obtain an information comparison result. The encrypted information operation result is encrypted to obtain the encrypted information operation result and sent to the client; after receiving the encrypted information operation result, the client uses its own unique second key paired with the first key to The encrypted information operation result is decrypted to obtain the real information operation result.
在本实施例的一个可选实现方式中,所述装置还包括响应于接收到第一预设操作反馈信息,执行第二预设操作的部分,即如图11所示,所述信息处理装置包括:In an optional implementation manner of this embodiment, the apparatus further includes a part that performs a second preset operation in response to receiving the feedback information of the first preset operation, that is, as shown in FIG. 11 , the information processing apparatus include:
第二加密模块1101,被配置为获取待运算信息,并使用第一密钥对于所述待运算信息进行加密,得到第二加密信息;The
运算模块1102,被配置为响应于接收到客户端发送的第一加密信息,对于所述第一加密信息和第二加密信息进行预设运算得到信息运算结果;The
第三加密模块1103,被配置为使用所述第一密钥对于所述信息运算结果进行加密得到加密信息运算结果,并将其发送给所述客户端;The
第二执行模块1104,被配置为响应于接收到第一预设操作反馈信息,执行第二预设操作。The
其中,所述第一预设操作反馈信息指的是客户端在执行了第一预设操作后产生的反馈信息。比如,若所述第一预设操作为邀请操作,则所述第一预设操作反馈信息可以为邀请成功信息或邀请失败信息。其中,所述第一预设操作反馈信息既可以由客户端发出,也可由所述客户端所邀请的客户端对象发出,比如,若客户端A向客户端B发出邀请信息,即执行邀请操作,客户端B在收到该邀请信息之后打开服务器对应的注册页面执行了新用户注册操作,这说明客户端A的邀请操作成功,同时服务器检测到到客户端B发出了新用户注册请求,此时可认为所述新用户注册请求即为由客户端B发出的第一预设操作反馈信息。The first preset operation feedback information refers to feedback information generated after the client performs the first preset operation. For example, if the first preset operation is an invitation operation, the first preset operation feedback information may be invitation success information or invitation failure information. The first preset operation feedback information can be sent either by the client or by the client object invited by the client. For example, if client A sends an invitation to client B, the invitation operation is performed. , client B opens the registration page corresponding to the server to perform the new user registration operation after receiving the invitation information, which indicates that the invitation operation of client A is successful, and the server detects that client B has sent a new user registration request. It can be considered that the new user registration request is the first preset operation feedback information sent by the client B.
其中,所述第二预设操作指的是根据所述第一预设操作反馈信息产生的、与所述第一预设操作反馈信息相关联的操作。在本实施例的一个可选实现方式中,所述第二预设操作可以为以下操作中的一种或多种:推送操作、激励操作等等。The second preset operation refers to an operation generated according to the first preset operation feedback information and associated with the first preset operation feedback information. In an optional implementation manner of this embodiment, the second preset operation may be one or more of the following operations: a push operation, an excitation operation, and the like.
在本实施例的一个可选实现方式中,若所述服务器接收到的第一加密信息是经过多次加密操作后得到的加密信息时,所述服务器端在解密时需要根据客户端的具体加密方式执行相应的解密。对其上文已经详细描述,此处不再赘述。In an optional implementation of this embodiment, if the first encrypted information received by the server is encrypted information obtained after multiple encryption operations, the server needs to decrypt according to the specific encryption method of the client when decrypting. Perform the corresponding decryption. It has been described in detail above and will not be repeated here.
在本实施例的一个可选实现方式中,所述第一密钥与所述第二密钥相对应,且配对使用。In an optional implementation manner of this embodiment, the first key corresponds to the second key and is used in pair.
需要说明的是,图10-图11所示实施例与上文实施例存在部分相同的技术特征或相似的技术方案,对其详细的描述可参见上文类似的描述,本公开在此不再赘述。It should be noted that the embodiments shown in FIGS. 10 to 11 have some of the same technical features or similar technical solutions as the above-mentioned embodiments, and the detailed description thereof can refer to the above-mentioned similar description, which is not omitted in the present disclosure. Repeat.
图12示出根据本公开再一实施方式的信息处理装置的结构框图,该装置可以通过软件、硬件或者两者的结合实现成为电子设备的部分或者全部,可实现为包含有客户端和服务器的信息处理系统。如图12所示,所述信息处理装置包括:12 shows a structural block diagram of an information processing apparatus according to still another embodiment of the present disclosure. The apparatus can be implemented as part or all of an electronic device through software, hardware, or a combination of the two, and can be implemented as an electronic device including a client and a server. information processing system. As shown in Figure 12, the information processing device includes:
客户端1201,被配置为获取待处理信息,使用第一密钥对于待处理信息进行加密,并将得到的第一加密信息发送给服务器,使用第二密钥对于服务器发送的加密信息运算结果进行解密,得到所述信息运算结果;The
服务器1202,被配置为获取待运算信息,使用所述第一密钥对于所述待运算信息进行加密,得到第二加密信息,对于所述第一加密信息和第二加密信息进行预设运算得到信息运算结果,使用所述第一密钥对于所述信息运算结果进行加密得到加密信息运算结果,并将其发送给所述客户端。The
上文提及,随着互联网技术的发展,越来越多的商家或者服务提供商通过互联网平台与用户进行信息传输和互动,比如现有技术中通常通过读取用户的通讯录、读取用户的历史操作记录、读取用户的历史行为记录等数据以为用户提供更丰富更完善的服务,但上述信息的传输不可避免地会带来信息安全隐患,导致用户信息的泄露。因此亟需一种在能够保障用户信息安全的前提下,还能够根据用户的信息为其提供丰富完善的服务的方法。As mentioned above, with the development of Internet technology, more and more businesses or service providers conduct information transmission and interaction with users through Internet platforms. In order to provide users with richer and more complete services, the transmission of the above information will inevitably bring information security risks and lead to the leakage of user information. Therefore, there is an urgent need for a method that can provide users with rich and comprehensive services based on their information on the premise of ensuring the security of user information.
考虑到上述缺陷,在该实施方式中,提出一种信息处理装置,该装置通过对于用户信息的加密处理和加密传输,以及对于加密结果的加密运算,来实现在未知用户信息的情况下能够执行预设运算的效果。该技术方案能够在保障用户信息安全的前提下,根据用户的信息为其提供丰富完善的服务的方法,进而消除了信息安全隐患,避免出现用户信息泄露的情况。Considering the above-mentioned defects, in this embodiment, an information processing device is proposed, which can perform encryption processing and encrypted transmission of user information, and encryption operation for encrypted results, so as to realize that the user information can be executed when the user information is unknown. The effect of the preset operation. The technical solution can provide users with rich and complete services based on their information on the premise of ensuring user information security, thereby eliminating information security risks and avoiding user information leakage.
在本实施例的一个可选实现方式中,所述第一密钥与所述第二密钥相对应,且配对使用。In an optional implementation manner of this embodiment, the first key corresponds to the second key and is used in pair.
在本实施例的一个可选实现方式中,所述预设运算为比较运算。In an optional implementation manner of this embodiment, the preset operation is a comparison operation.
在本实施例的一个可选实现方式中,所述客户端1201还被配置为根据所述信息运算结果执行第一预设操作,所述服务器1202还被配置为响应于接收到第一预设操作反馈信息,执行第二预设操作。其中,所述第一预设操作可为以下操作中的一种或多种:推送操作、邀请操作、激励操作等等;所述第二预设操作可为以下操作中的一种或多种:推送操作、激励操作等等。In an optional implementation manner of this embodiment, the
在上述实现方式中,客户端首先确定并获取待处理信息,然后使用第一密钥对于所述待处理信息进行加密,得到第一加密信息,所述客户端将所述第一加密信息发送给服务器;服务器获取其存储的待运算信息,并使用第一密钥对其进行加密,得到第二加密信息,然后对于从客户端获取的同样使用第一密钥进行加密得到的第一加密信息和第二加密信息进行预设运算得到信息运算结果,比如对所述第一加密信息和第二加密信息进行比较得到信息比较结果;然后所述服务器使用所述第一密钥对于得到的信息运算结果进行加密得到加密信息运算结果发送给客户端;客户端在接收到所述加密信息运算结果后,使用自己独有的、与所述第一密钥配对的第二密钥对于所述加密信息运算结果进行解密,得到真实的信息运算结果。In the above implementation manner, the client first determines and obtains the information to be processed, and then uses the first key to encrypt the information to be processed to obtain the first encrypted information, and the client sends the first encrypted information to The server; the server obtains the stored information to be calculated, encrypts it with the first key, and obtains the second encrypted information, and then obtains the first encrypted information obtained from the client and encrypts it with the first key and obtains the second encrypted information. The second encrypted information is subjected to a preset operation to obtain an information operation result, for example, an information comparison result is obtained by comparing the first encrypted information and the second encrypted information; then the server uses the first key for the obtained information operation result Perform encryption to obtain the encrypted information operation result and send it to the client; after receiving the encrypted information operation result, the client uses its own unique second key paired with the first key to operate on the encrypted information The result is decrypted to obtain the real information operation result.
需要说明的是,图12所示及相关实施例与上文实施例存在部分相同的技术特征或相似的技术方案,对其详细的描述可参见上文类似的描述,本公开在此不再赘述。It should be noted that the embodiments shown in FIG. 12 and related embodiments have some of the same technical features or similar technical solutions as the above embodiments, and the detailed descriptions thereof can refer to the above similar descriptions, which will not be repeated in the present disclosure. .
本公开还公开了一种电子设备,图13示出根据本公开一实施方式的电子设备的结构框图,如图13所示,所述电子设备1300包括存储器1301和处理器1302;其中,The present disclosure also discloses an electronic device. FIG. 13 shows a structural block diagram of the electronic device according to an embodiment of the present disclosure. As shown in FIG. 13 , the
所述存储器1301用于存储一条或多条计算机指令,其中,所述一条或多条计算机指令被所述处理器1302执行以实现上述方法步骤。The
图14适于用来实现根据本公开实施方式的信息处理方法的计算机系统的结构示意图。FIG. 14 is a schematic structural diagram of a computer system suitable for implementing the information processing method according to an embodiment of the present disclosure.
如图14所示,计算机系统1400包括中央处理单元(CPU)1401,其可以根据存储在只读存储器(ROM)1402中的程序或者从存储部分1408加载到随机访问存储器(RAM)1403中的程序而执行上述实施方式中的各种处理。在RAM1403中,还存储有系统1400操作所需的各种程序和数据。CPU1401、ROM1402以及RAM1403通过总线1404彼此相连。输入/输出(I/O)接口1405也连接至总线1404。As shown in FIG. 14, a
以下部件连接至I/O接口1405:包括键盘、鼠标等的输入部分1406;包括诸如阴极射线管(CRT)、液晶显示器(LCD)等以及扬声器等的输出部分1407;包括硬盘等的存储部分1408;以及包括诸如LAN卡、调制解调器等的网络接口卡的通信部分1409。通信部分1409经由诸如因特网的网络执行通信处理。驱动器1410也根据需要连接至I/O接口1405。可拆卸介质1411,诸如磁盘、光盘、磁光盘、半导体存储器等等,根据需要安装在驱动器1410上,以便于从其上读出的计算机程序根据需要被安装入存储部分1408。The following components are connected to the I/O interface 1405: an
特别地,根据本公开的实施方式,上文描述的方法可以被实现为计算机软件程序。例如,本公开的实施方式包括一种计算机程序产品,其包括有形地包含在及其可读介质上的计算机程序,所述计算机程序包含用于执行上述信息处理方法的程序代码。在这样的实施方式中,该计算机程序可以通过通信部分1409从网络上被下载和安装,和/或从可拆卸介质1411被安装。In particular, according to embodiments of the present disclosure, the methods described above may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product including a computer program tangibly embodied on a readable medium thereof, the computer program including program code for executing the above-described information processing method. In such an embodiment, the computer program may be downloaded and installed from the network via the
附图中的流程图和框图,图示了按照本公开各种实施方式的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,路程图或框图中的每个方框可以代表一个模块、程序段或代码的一部分,所述模块、程序段或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个接连地表示的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或操作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the diagram or block diagram may represent a module, segment, or portion of code that contains one or more functions for implementing the specified logical function. executable instructions. It should also be noted that, in some alternative implementations, the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It is also noted that each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented in dedicated hardware-based systems that perform the specified functions or operations , or can be implemented in a combination of dedicated hardware and computer instructions.
描述于本公开实施方式中所涉及到的单元或模块可以通过软件的方式实现,也可以通过硬件的方式来实现。所描述的单元或模块也可以设置在处理器中,这些单元或模块的名称在某种情况下并不构成对该单元或模块本身的限定。The units or modules involved in the embodiments of the present disclosure can be implemented in software or hardware. The described units or modules may also be provided in the processor, and the names of these units or modules do not constitute a limitation on the units or modules themselves in certain circumstances.
作为另一方面,本公开还提供了一种计算机可读存储介质,该计算机可读存储介质可以是上述实施方式中所述装置中所包含的计算机可读存储介质;也可以是单独存在,未装配入设备中的计算机可读存储介质。计算机可读存储介质存储有一个或者一个以上程序,所述程序被一个或者一个以上的处理器用来执行描述于本公开的方法。As another aspect, the present disclosure also provides a computer-readable storage medium, and the computer-readable storage medium may be a computer-readable storage medium included in the apparatus described in the foregoing embodiments; A computer-readable storage medium that fits into a device. The computer-readable storage medium stores one or more programs used by one or more processors to perform the methods described in the present disclosure.
以上描述仅为本公开的较佳实施例以及对所运用技术原理的说明。本领域技术人员应当理解,本公开中所涉及的发明范围,并不限于上述技术特征的特定组合而成的技术方案,同时也应涵盖在不脱离所述发明构思的情况下,由上述技术特征或其等同特征进行任意组合而形成的其它技术方案。例如上述特征与本公开中公开的(但不限于)具有类似功能的技术特征进行互相替换而形成的技术方案。The above description is merely a preferred embodiment of the present disclosure and an illustration of the technical principles employed. Those skilled in the art should understand that the scope of the invention involved in the present disclosure is not limited to the technical solutions formed by the specific combination of the above-mentioned technical features, and should also cover the above-mentioned technical features without departing from the inventive concept. Other technical solutions formed by any combination of its equivalent features. For example, a technical solution is formed by replacing the above features with the technical features disclosed in the present disclosure (but not limited to) with similar functions.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201911136539.9A CN110995669A (en) | 2019-11-19 | 2019-11-19 | Information processing method, apparatus, electronic device, and computer-readable storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201911136539.9A CN110995669A (en) | 2019-11-19 | 2019-11-19 | Information processing method, apparatus, electronic device, and computer-readable storage medium |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN110995669A true CN110995669A (en) | 2020-04-10 |
Family
ID=70085322
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201911136539.9A Pending CN110995669A (en) | 2019-11-19 | 2019-11-19 | Information processing method, apparatus, electronic device, and computer-readable storage medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN110995669A (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112507349A (en) * | 2020-10-30 | 2021-03-16 | 深圳市琦迹技术服务有限公司 | Data encryption storage, encryption search and application method and related equipment thereof |
Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101068152A (en) * | 2006-12-11 | 2007-11-07 | 陆杨 | Method for extending network user |
| CN101763567A (en) * | 2008-11-21 | 2010-06-30 | 北京携友聚信信息技术有限公司 | Online share-car mate matching method and system |
| CN102118698A (en) * | 2011-03-21 | 2011-07-06 | 广州市动景计算机科技有限公司 | Method and device for establishing community relation network on basis of information of contacts in mobile terminal |
| CN102843308A (en) * | 2011-06-23 | 2012-12-26 | 腾讯科技(深圳)有限公司 | Instant messaging method and system based on mobile terminal local address book |
| CN103546435A (en) * | 2012-07-13 | 2014-01-29 | 中兴通讯股份有限公司 | Data synchronizing method and server |
| US20140075192A1 (en) * | 2000-07-06 | 2014-03-13 | Sony Corporation | Information processing apparatus and method |
| CN105045916A (en) * | 2015-08-20 | 2015-11-11 | 广东顺德中山大学卡内基梅隆大学国际联合研究院 | Mobile game recommendation system and recommendation method thereof |
| CN107566397A (en) * | 2017-09-28 | 2018-01-09 | 深圳市汉普电子技术开发有限公司 | Video conference information transferring method, terminal device, server and storage medium |
| CN110266480A (en) * | 2019-06-13 | 2019-09-20 | 腾讯科技(深圳)有限公司 | Data transmission method, device and storage medium |
-
2019
- 2019-11-19 CN CN201911136539.9A patent/CN110995669A/en active Pending
Patent Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20140075192A1 (en) * | 2000-07-06 | 2014-03-13 | Sony Corporation | Information processing apparatus and method |
| CN101068152A (en) * | 2006-12-11 | 2007-11-07 | 陆杨 | Method for extending network user |
| CN101763567A (en) * | 2008-11-21 | 2010-06-30 | 北京携友聚信信息技术有限公司 | Online share-car mate matching method and system |
| CN102118698A (en) * | 2011-03-21 | 2011-07-06 | 广州市动景计算机科技有限公司 | Method and device for establishing community relation network on basis of information of contacts in mobile terminal |
| CN102843308A (en) * | 2011-06-23 | 2012-12-26 | 腾讯科技(深圳)有限公司 | Instant messaging method and system based on mobile terminal local address book |
| CN103546435A (en) * | 2012-07-13 | 2014-01-29 | 中兴通讯股份有限公司 | Data synchronizing method and server |
| CN105045916A (en) * | 2015-08-20 | 2015-11-11 | 广东顺德中山大学卡内基梅隆大学国际联合研究院 | Mobile game recommendation system and recommendation method thereof |
| CN107566397A (en) * | 2017-09-28 | 2018-01-09 | 深圳市汉普电子技术开发有限公司 | Video conference information transferring method, terminal device, server and storage medium |
| CN110266480A (en) * | 2019-06-13 | 2019-09-20 | 腾讯科技(深圳)有限公司 | Data transmission method, device and storage medium |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112507349A (en) * | 2020-10-30 | 2021-03-16 | 深圳市琦迹技术服务有限公司 | Data encryption storage, encryption search and application method and related equipment thereof |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10903976B2 (en) | End-to-end secure operations using a query matrix | |
| US12309127B2 (en) | End-to-end secure operations using a query vector | |
| US20200084051A1 (en) | Systems and methods for preserving privacy and incentivizing third-party data sharing | |
| JP7133285B2 (en) | User terminal, method and computer program for sending and receiving messages | |
| US11509709B1 (en) | Providing access to encrypted insights using anonymous insight records | |
| WO2019071886A1 (en) | Softphone encryption and decryption method and apparatus, and computer-readable storage medium | |
| WO2020019478A1 (en) | Communication data encryption method and apparatus | |
| CN112039902A (en) | Data encryption method and device | |
| CN114039785B (en) | Data encryption, decryption and processing methods, devices, equipment and storage medium | |
| CN115567263A (en) | Data transmission management method, data processing method and device | |
| CN118984212A (en) | Generates a sequence of network data while preventing the acquisition or manipulation of time data | |
| CN116614280A (en) | Data transmission method and device, electronic equipment and storage medium | |
| CN116112172B (en) | Android client gRPC interface security verification method and device | |
| CN117078255A (en) | Digital asset anonymous payment method, device, equipment and medium | |
| CN107196918B (en) | Data matching method and device | |
| CN115001828B (en) | Method, system, electronic device and medium for secure access to transaction data | |
| CN111698264A (en) | Method and apparatus for maintaining user authentication sessions | |
| CN115883207A (en) | Multi-party secure computing method and device | |
| CN110995669A (en) | Information processing method, apparatus, electronic device, and computer-readable storage medium | |
| JP2018519585A (en) | Dialog record query processing method and device | |
| CN112784305A (en) | Encrypted voting method, computer device, and storage medium | |
| CN117555946A (en) | A data query method, device, computer equipment and storage medium | |
| CN114679724B (en) | Key updating system and method | |
| CN112865968B (en) | Data ciphertext hosting method and system, computer equipment and storage medium | |
| CN116346486A (en) | Joint login method, device, equipment and storage medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200410 |
|
| RJ01 | Rejection of invention patent application after publication |