CN111741024A - Differential buried point acquisition encryption method and system - Google Patents

Differential buried point acquisition encryption method and system Download PDF

Info

Publication number
CN111741024A
CN111741024A CN202010772398.6A CN202010772398A CN111741024A CN 111741024 A CN111741024 A CN 111741024A CN 202010772398 A CN202010772398 A CN 202010772398A CN 111741024 A CN111741024 A CN 111741024A
Authority
CN
China
Prior art keywords
buried point
data
user information
item
buried
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010772398.6A
Other languages
Chinese (zh)
Inventor
姚振中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo Joynext Technology Corp
Original Assignee
Ningbo Joynext Technology Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningbo Joynext Technology Corp filed Critical Ningbo Joynext Technology Corp
Priority to CN202010772398.6A priority Critical patent/CN111741024A/en
Publication of CN111741024A publication Critical patent/CN111741024A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a differential buried point acquisition encryption method and system, and relates to the technical field of data processing. The method comprises the following steps: collecting buried point item data, wherein the buried point item data comprises a content item and a user information item; and after encrypting the user information items in the embedded point item data, sending the embedded point item data to a background for processing. The system is applied with the method provided by the scheme.

Description

Differential buried point acquisition encryption method and system
Technical Field
The invention relates to the technical field of data processing, in particular to a differential buried point acquisition encryption method and system.
Background
In order to count and analyze the user's behavior, a method is usually adopted to implant a statistical code, i.e. a buried point, at a corresponding position of the applied code.
Through embedding points, the behavior of the user on the corresponding application can be tracked, including clicking, sliding, downloading, browsing and the like; the buried point data is counted, the continuous behavior of the user can be tracked, and the collected data can be input into the established model to obtain the operation behavior of the user. Through the embedding of points, statistical data such as page browsing amount, the number of independent visitors, IP, page staying time, page operation time, page access times, button clicking times, file downloading times and the like can be obtained through statistics, and the statistical data can be used as a basis for application development and optimization.
The safety of data in the data transaction process is crucial, and for the scene requirements of large data volume and high real-time requirement, the defect of large delay can exist in the background re-decryption by uniformly encrypting the collected buried point items.
Disclosure of Invention
The invention aims to provide a differential buried point acquisition encryption method and system, which can identify and mark sensitive information of a user through a buried point, encrypt the marked sensitive information only, and ensure low delay of data processing while considering data security.
In order to achieve the above object, a first aspect of the present invention provides a differential buried point collection encryption method, including:
collecting buried point item data, the buried point item data including a content item and a user information item;
and after encrypting the user information items in the embedded point item data, sending the embedded point item data to a background for processing.
Preferably, before the step of collecting the data of the buried point item, the method further comprises:
and respectively deploying buried points in each upper-layer application, wherein the buried points are used for collecting buried point item data from the upper-layer applications.
Preferably, before the step of encrypting the user information item in the buried point item data, the method further includes:
and adding a zone bit to the user information item in the buried point item data.
Preferably, the method for encrypting the user information item in the buried point item data includes:
and identifying the user information item through a flag bit, and encrypting the user information item.
Further, the method for sending the buried point item data to the background processing comprises the following steps:
and collecting a plurality of data of the buried point items collected at the same time or in the same time period, and uniformly sending the data to a background for processing.
Illustratively, the upper layer application is a vehicle-end application.
Compared with the prior art, the differential buried point acquisition encryption method provided by the invention has the following beneficial effects:
according to the differential buried point acquisition encryption method provided by the invention, buried point item data comprising content items and user information items are acquired, the user information items in the buried point item data are encrypted, the content items in the buried point item data are not encrypted, and finally the processed buried point item data are sent to a background for analysis.
Therefore, the invention only carries out encryption processing on the user information item, can obviously reduce the data encryption processing amount of the embedded point, also lightens the data decryption processing amount of the background, reduces the resource occupation of the system and further ensures the low delay of the data processing process while considering the data security compared with the encryption processing of all data in the embedded point item data.
A second aspect of the present invention provides a differential buried point acquisition encryption system, which is applied to the differential buried point acquisition encryption method in the foregoing technical solution, and the system includes:
a collection unit for collecting buried point item data, the buried point item data including a content item and a user information item;
and the processing unit is used for sending the embedded point item data to a background for processing after encrypting the user information items in the embedded point item data.
Preferably, the method further comprises the following steps:
and the buried point deployment unit is used for respectively deploying buried points in each upper-layer application, and the buried points are used for collecting buried point item data from the upper-layer application.
Preferably, the device further comprises, between the acquisition unit and the processing unit:
and the marking unit is used for adding a flag bit to the user information item in the buried point item data, so that the processing unit identifies the user information item through the flag bit and encrypts the user information item.
Compared with the prior art, the beneficial effects of the differential buried point acquisition encryption system provided by the invention are the same as those of the differential buried point acquisition encryption method provided by the technical scheme, and the detailed description is omitted here.
A third aspect of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, executes the steps of the above differential buried point collecting and encrypting method.
Compared with the prior art, the beneficial effects of the computer-readable storage medium provided by the invention are the same as the beneficial effects of the differential buried point acquisition encryption method provided by the technical scheme, and the detailed description is omitted here.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and not to limit the invention. In the drawings:
fig. 1 is a schematic flow chart of a differential buried point acquisition encryption method according to an embodiment of the present invention;
fig. 2 is a block diagram of a differential buried point acquisition encryption system according to a second embodiment of the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention. Example one
Referring to fig. 1, the present embodiment provides a differential buried point acquisition encryption method, including:
collecting buried point item data, wherein the buried point item data comprises a content item and a user information item; and after encrypting the user information items in the embedded point item data, sending the embedded point item data to a background for processing.
It can be understood that the identification of the user information item by the buried point is prior art in the art, and this embodiment will not be described in detail here. In addition, the data of the buried point item may only include the content item, or may include both the content item and the user information item, or may only include the user information item in a special case.
In the differential buried point acquisition encryption method provided by this embodiment, buried point item data including a content item and a user information item is acquired, the user information item in the buried point item data is encrypted, the content item in the buried point item data is not encrypted, and finally, the processed buried point item data is sent to a background for analysis.
As can be seen, in the embodiment, only the user information item is encrypted, and compared with encryption of all data in the data of the buried point item, the data encryption processing amount of the buried point can be significantly reduced, the data decryption processing amount of the background is also reduced, the resource occupation of the system is reduced, and low delay of the data processing process is ensured while data security is considered.
In the above embodiment, before the step of collecting the data of the buried point item, the method further includes:
and respectively deploying a buried point in each upper-layer application, wherein the buried point is used for collecting buried point item data from the upper-layer application.
Illustratively, the upper layer application in the above embodiments is a vehicle-end application. Such as an online radio application, an online multimedia application, a vehicle map application, etc.
Preferably, before the step of encrypting the user information item in the buried point item data, the above embodiment further includes:
and adding a flag bit to the user information item in the buried point item data.
When the encryption method is specifically implemented, the user information item in the buried point item data is identified through the set buried point, and the flag bit is added according to the data structure of the user information item, so that the data needing to be encrypted is identified through the flag bit in the following process. As shown in the following table:
Figure 469586DEST_PATH_IMAGE001
wherein, resource ID represents the number of the data of the buried point item, Composite represents a flag bit for marking the user information item, Composite-Value represents the user information item with the added flag bit, and Value represents the non-user information item without the added flag bit. In the subsequent encryption process, only the data structure containing the marker bit Composite is encrypted, and the Value data structure is not encrypted any more.
The method for encrypting the user information item in the buried point item data comprises the following steps:
and identifying the user information item through the zone bit, and encrypting the user information item. The specific encryption method may be the prior art in the art, and this embodiment will not be described in detail.
Further, the method for sending the buried point item data to the background processing in the above embodiment includes:
and collecting a plurality of data of the buried point items collected at the same time or in the same time period, and uniformly sending the data to a background for processing.
During specific implementation, as the embedded points are arranged in each upper-layer application, a plurality of embedded point item data can be correspondingly generated at the same time or the same time period, and at the moment, the plurality of embedded point item data generated at the same time or the same time period can be summarized through the bottom layer and then uniformly sent to the background of the server side for analysis processing.
Preferably, the upper layer application in the above embodiment is a vehicle-end application. By adopting the scheme in the embodiment, desensitization processing can be carried out on the user information collected by the buried point, and the safety of vehicle end data is ensured. In addition, only the user information items in the buried point item data are encrypted, but the content items are not encrypted, so that the encryption time of the vehicle end and the decryption time of the background of the server end can be reduced, and the resource occupation of the system is reduced.
Example two
Referring to fig. 2, the present embodiment provides a differential buried point acquisition encryption system, including:
a collecting unit for collecting buried point item data including a content item or simultaneously a user information item;
and the processing unit is used for sending the embedded point item data to a background for processing after encrypting the user information items in the embedded point item data.
Preferably, the method further comprises the following steps:
and the buried point deployment unit is used for respectively deploying buried points in each upper-layer application, and the buried points are used for collecting buried point item data from the upper-layer application.
Preferably, the device further comprises, between the acquisition unit and the processing unit:
and the marking unit is used for adding a flag bit to the user information item in the buried point item data, so that the processing unit identifies the user information item through the flag bit and encrypts the user information item.
Compared with the prior art, the beneficial effects of the differential buried point acquisition encryption system provided by the embodiment of the invention are the same as those of the differential buried point acquisition encryption method provided by the first embodiment, and are not repeated herein.
EXAMPLE III
The present embodiment provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the above differential buried point acquisition encryption method are performed.
Compared with the prior art, the beneficial effects of the computer-readable storage medium provided by the embodiment are the same as the beneficial effects of the differential buried point acquisition encryption method provided by the technical scheme, and are not repeated herein.
It will be understood by those skilled in the art that all or part of the steps in the method for implementing the invention may be implemented by hardware instructions related to a program, the program may be stored in a computer-readable storage medium, and when executed, the program includes the steps of the method of the embodiment, and the storage medium may be: ROM/RAM, magnetic disks, optical disks, memory cards, and the like.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (7)

1. A differential buried point acquisition encryption method is characterized by comprising the following steps:
collecting buried point item data, the buried point item data including a content item and a user information item;
adding a flag bit to a user information item in the buried point item data;
and after identifying the user information items in the buried point item data through the flag bits and carrying out encryption processing, sending the buried point item data to a background for processing.
2. The method of claim 1, further comprising, prior to the step of collecting the data on the buried point term:
and respectively deploying buried points in each upper-layer application, wherein the buried points are used for collecting buried point item data from the upper-layer applications.
3. The method of claim 1, wherein sending the buried point item data to a background process comprises:
and collecting a plurality of data of the buried point items collected at the same time or in the same time period, and uniformly sending the data to a background for processing.
4. The method of claim 2, wherein the upper layer application is a car-end application.
5. A differentiation buried point acquisition encryption system is characterized by comprising:
a collection unit for collecting buried point item data, the buried point item data including a content item and a user information item;
the marking unit is used for adding a flag bit to the user information item in the buried point item data; enabling a processing unit to identify the user information item through a flag bit and encrypt the user information item;
and the processing unit is used for identifying the user information item in the embedded point item data through the flag bit, and then sending the embedded point item data to the background for processing.
6. The system of claim 5, further comprising:
and the buried point deployment unit is used for respectively deploying buried points in each upper-layer application, and the buried points are used for collecting buried point item data from the upper-layer application.
7. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method according to any one of the claims 1 to 4.
CN202010772398.6A 2020-08-04 2020-08-04 Differential buried point acquisition encryption method and system Pending CN111741024A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010772398.6A CN111741024A (en) 2020-08-04 2020-08-04 Differential buried point acquisition encryption method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010772398.6A CN111741024A (en) 2020-08-04 2020-08-04 Differential buried point acquisition encryption method and system

Publications (1)

Publication Number Publication Date
CN111741024A true CN111741024A (en) 2020-10-02

Family

ID=72657076

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010772398.6A Pending CN111741024A (en) 2020-08-04 2020-08-04 Differential buried point acquisition encryption method and system

Country Status (1)

Country Link
CN (1) CN111741024A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109525643A (en) * 2018-10-19 2019-03-26 中国银行股份有限公司 A kind of user behavior analysis method and device of bank's mobile application
CN110276680A (en) * 2019-05-24 2019-09-24 国家计算机网络与信息安全管理中心 A kind of truthful data acquisition methods applied to internet finance
CN110413852A (en) * 2019-07-19 2019-11-05 深圳市元征科技股份有限公司 A kind of information-pushing method, device, equipment and medium
CN111242661A (en) * 2018-11-29 2020-06-05 北京京东尚科信息技术有限公司 Coupon issuing method and device, computer system and medium
CN111400714A (en) * 2020-04-16 2020-07-10 Oppo广东移动通信有限公司 Virus detection method, device, equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109525643A (en) * 2018-10-19 2019-03-26 中国银行股份有限公司 A kind of user behavior analysis method and device of bank's mobile application
CN111242661A (en) * 2018-11-29 2020-06-05 北京京东尚科信息技术有限公司 Coupon issuing method and device, computer system and medium
CN110276680A (en) * 2019-05-24 2019-09-24 国家计算机网络与信息安全管理中心 A kind of truthful data acquisition methods applied to internet finance
CN110413852A (en) * 2019-07-19 2019-11-05 深圳市元征科技股份有限公司 A kind of information-pushing method, device, equipment and medium
CN111400714A (en) * 2020-04-16 2020-07-10 Oppo广东移动通信有限公司 Virus detection method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
US8955143B1 (en) Use of decoy data in a data store
CN107870860A (en) Bury a checking system and method
CN107370604A (en) A kind of more granularity access control methods under big data environment
CN103024090A (en) Method and system for identifying user terminal
Yuan et al. Context-dependent privacy-aware photo sharing based on machine learning
CN108681671A (en) A kind of Android mobile attacks source tracing method
CN110555482A (en) Vulgar picture identification method and device based on artificial intelligence and electronic equipment
Al-Sharif et al. Towards the memory forensics of ms word documents
Kobusińska et al. Big Data fingerprinting information analytics for sustainability
CN113709513B (en) Equipment fingerprint processing method, user side, server, system and storage medium
CN116186759A (en) Sensitive data identification and desensitization method for privacy calculation
CN115632839A (en) Smart campus environment network supervision method and system
CN113518080B (en) TLS encrypted traffic detection method and device and electronic equipment
CN108833500B (en) Service calling method, service providing method, data transmission method and server
CN114240344A (en) Enterprise personnel data processing method and device, computer equipment and storage medium
CN112732693B (en) Intelligent internet of things data acquisition method, device, equipment and storage medium
CN103780690A (en) Method and system for safely sharing user data
CN111784360B (en) Anti-fraud prediction method and system based on network link backtracking
CN104750824A (en) Application functional data processing method and device
CN111027065B (en) Leucavirus identification method and device, electronic equipment and storage medium
CN107196935A (en) Positioning information transmission method and system
CN111741024A (en) Differential buried point acquisition encryption method and system
CN107995167B (en) Equipment identification method and server
CN109492655B (en) Feature extraction method and device and terminal
CN113010865B (en) Big data base component safety management method and system of intelligent education platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201002