Information pushing method and device, computer equipment and storage medium

文档序号:1601804 发布日期:2020-01-07 浏览:35次 中文

阅读说明:本技术 信息推送方法、装置、计算机设备及存储介质 (Information pushing method and device, computer equipment and storage medium ) 是由 赵辉 于 2019-08-15 设计创作,主要内容包括:本发明公开了一种信息推送方法、装置、计算机设备及存储介质,所述方法包括:通过获取基础数据集,并对基础数据集中的每条用户业务数据进行解析,得到其中包含的用户敏感信息、用户业务资料和业务服务链接,进而采用长链接转短链接的方式,对业务服务链接进行链接转换处理,得到目标短链接,减少业务服务链接占用的资源,实现在数据量较大时,大幅度降低系统资源的开销,有利于提高信息推送的效率,同时,对用户敏感信息进行脱敏处理,得到脱敏数据,将脱敏数据、用户业务资料和目标短链接写入到预设短信模板中,生成目标短信息,并发送给用户业务数据对应的客户端,避免将用户信息相关数据直接公开,有利于用户隐私保护,提升信息推送的安全性。(The invention discloses an information pushing method, an information pushing device, computer equipment and a storage medium, wherein the method comprises the following steps: by acquiring the basic data set and analyzing each user service data in the basic data set, the user sensitive information, the user service data and the service link contained in the basic data set are obtained, and then a mode of switching long chain to short link is adopted, the link conversion processing is carried out on the business service link to obtain the target short link, the resources occupied by the business service link are reduced, and when the data volume is large, greatly reduces the expenditure of system resources, is beneficial to improving the information push efficiency, and simultaneously, desensitizing the user sensitive information to obtain desensitized data, writing the desensitized data, user service data and target short link into a preset short message template to generate a target short message, and the data is sent to the client corresponding to the user service data, so that the direct disclosure of the data related to the user information is avoided, the privacy protection of the user is facilitated, and the safety of information pushing is improved.)

1. An information pushing method, characterized in that the information pushing method comprises:

acquiring a basic data set, wherein the basic data set comprises user service data of each user;

analyzing each piece of user service data to obtain user sensitive information, user service data and service links contained in each piece of user service data;

performing link conversion processing on the service link by adopting a mode of switching a long link to a short link to obtain a target short link;

desensitizing the user sensitive information by using a preset data desensitizing mode to obtain desensitized data;

writing the desensitization data, the user service data and the target short link into a preset short message template to generate a target short message;

and sending the target short message to a client corresponding to the user service data.

2. The information push method according to claim 1, wherein the performing link conversion processing on the service link by using a long-chain to short-chain mode to obtain a target short-chain comprises:

inquiring whether the business service link exists in a preset key-value storage system to obtain an inquiry result;

if the query result is that the service link does not exist in the preset key-value storage system, generating a target short link through a distributed number sending mode, establishing a key-value key value pair between the service link and the target short link, and storing the key-value key value pair into the preset key-value storage system;

and if the query result is that the service link exists in the preset key-value storage system, acquiring a short link corresponding to the service link from the preset key-value storage system, and taking the acquired short link as the target short link.

3. The information pushing method according to claim 2, wherein after the link conversion processing is performed on the service link by using a long link to short link mode to obtain a target short link, the information pushing method further comprises:

and detecting each key-value key value pair in the preset key-value storage system at regular time, and if the unused key-value key value pair exists in a preset time threshold range, destroying the unused key-value key value pair in the preset time threshold range from the preset key-value storage system to obtain the updated preset key-value storage system.

4. The information pushing method according to claim 1, wherein the desensitizing processing is performed on the user sensitive information by using a preset data desensitizing mode, and obtaining desensitized data comprises:

analyzing the user sensitive information to obtain each metadata contained in the user sensitive information, wherein each metadata corresponds to a data tag;

for each metadata, acquiring a desensitization mode of the data tag corresponding to the metadata as a target desensitization mode of the metadata;

for each metadata, performing desensitization treatment on the metadata by using the target desensitization mode to obtain desensitization data corresponding to the metadata;

and combining the desensitization data corresponding to each metadata to obtain desensitization data corresponding to the user sensitive information.

5. The information pushing method according to any one of claims 1 to 4, wherein the user sensitive information includes a user name, the desensitization processing is performed on the user sensitive information by using a preset data desensitization mode, and obtaining desensitization data further includes:

determining a target surname corresponding to the user name;

and combining the target surname with a preset wildcard character to serve as desensitization data corresponding to the user name.

6. The information pushing method of claim 5, wherein the determining the target surname corresponding to the user name comprises:

acquiring preset surname data, wherein the surname data comprises basic compound surnames;

respectively using each basic surname and the first two digits of the user name to carry out accurate matching to obtain a matching result;

and if the matching result is successful, taking the first two digits of the user name as a target surname corresponding to the user name, and if the matching result is failed, taking the first digit of the user name as the target surname corresponding to the user name.

7. The information push method of claim 5, wherein the determining the target surname corresponding to the user name further comprises:

and judging the character digit number of the user name, and if the character digit number of the user name is two, taking the first digit of the user name as a target surname corresponding to the user name.

8. An information pushing apparatus, characterized in that the information pushing apparatus comprises:

the data acquisition module is used for acquiring a basic data set, wherein the basic data set comprises user service data of each user;

the data analysis module is used for analyzing each piece of user service data to obtain user sensitive information, user service data and service links contained in each piece of user service data;

the link conversion module is used for performing link conversion processing on the business service link in a mode of switching long links to short links to obtain target short links;

the information desensitization module is used for performing desensitization treatment on the user sensitive information by using a preset data desensitization mode to obtain desensitization data;

the information generation module is used for writing the desensitization data, the user service data and the target short link into a preset short message template to generate a target short message;

and the information sending module is used for sending the target short message to a client corresponding to the user service data.

9. A computer device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the information pushing method according to any one of claims 1 to 7 when executing the computer program.

10. A computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, implements the information pushing method according to any one of claims 1 to 7.

Technical Field

The present invention relates to the field of data processing, and in particular, to an information pushing method and apparatus, a computer device, and a storage medium.

Background

With the development of social economy, the scale of some group companies is larger and larger, the business expansion is wider and wider, and the number of the served customer groups and the number of the customer businesses are larger, so that the number of the customers is larger, generally in the level of millions or even tens of millions, and the business data corresponding to the customers are also larger. In order to improve the quality of service for the client, information push, such as service promotion, service survey, activity feedback, and the like, is often required to be performed on the client regularly, so as to bring a better service experience to the user.

At present, mainly through collecting user data, and send the SMS for user's crowd through third party's SMS platform, directly contain user information and business information in the SMS, user information is used for the user to check and confirm the identity, business information is used for the business service, business information generally contains the website link of corresponding business service, however, when the data bulk is great, use this kind of mode to carry out information push and lead to information omission easily, information error and information transmission delay, lead to the system anomaly even, make the efficiency of information push lower, therefore, when the data bulk is great, how to carry out effective information push, become the difficult problem that awaits the solution urgently.

Disclosure of Invention

The embodiment of the invention provides an information pushing method and device, computer equipment and a storage medium, and aims to solve the problem of low information pushing efficiency when the data volume is large.

An information push method, comprising:

acquiring a basic data set, wherein the basic data set comprises user service data of each user;

analyzing each piece of user service data to obtain user sensitive information, user service data and service links contained in each piece of user service data;

performing link conversion processing on the service link by adopting a mode of switching a long link to a short link to obtain a target short link;

desensitizing the user sensitive information by using a preset data desensitizing mode to obtain desensitized data;

writing the desensitization data, the user service data and the target short link into a preset short message template to generate a target short message;

and sending the target short message to a client corresponding to the user service data.

An information pushing apparatus comprising:

the data acquisition module is used for acquiring a basic data set, wherein the basic data set comprises user service data of each user;

the data analysis module is used for analyzing each piece of user service data to obtain user sensitive information, user service data and service links contained in each piece of user service data;

the link conversion module is used for performing link conversion processing on the business service link in a mode of switching long links to short links to obtain target short links;

the information desensitization module is used for performing desensitization treatment on the user sensitive information by using a preset data desensitization mode to obtain desensitization data;

the information generation module is used for writing the desensitization data, the user service data and the target short link into a preset short message template to generate a target short message;

and the information sending module is used for sending the target short message to a client corresponding to the user service data.

A computer device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the above information pushing method when executing the computer program.

A computer-readable storage medium, which stores a computer program that, when executed by a processor, implements the steps of the above-described information pushing method.

On one hand, by obtaining a basic data set which contains user service data of each user and analyzing each user service data to obtain user sensitive information, user service data and service links contained in each user service data, and further adopting a long-chain switching short link mode to perform link conversion processing on the service links to obtain target short links, resource occupation of subsequent service links is reduced, when the data volume is large, the overhead of system resources can be greatly reduced, which is beneficial to improving the information pushing efficiency, on the other hand, desensitization processing is performed on the user sensitive information by using a preset data desensitization mode to obtain desensitization data, and finally the desensitization data, the user service data and the target short links are written into a preset short message template, and generating a target short message, and sending the target short message to a client corresponding to the user service data, so that the related data of the user information is prevented from being directly disclosed, the privacy of the user is protected, the protection of the related data of the user information is facilitated, and the safety of information pushing is improved.

Drawings

In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.

Fig. 1 is an application environment schematic diagram of an information push method provided by an embodiment of the present invention;

fig. 2 is a flowchart of an implementation of an information pushing method provided by an embodiment of the present invention;

fig. 3 is a flowchart of implementing step S30 in the information pushing method provided by the embodiment of the present invention;

fig. 4 is a flowchart of an implementation of step S40 in the information pushing method according to the embodiment of the present invention;

fig. 5 is a flowchart of another implementation of step S40 in the information pushing method according to the embodiment of the present invention;

fig. 6 is a flowchart of an implementation of step S45 in the information pushing method according to the embodiment of the present invention;

FIG. 7 is a schematic diagram of an information pushing apparatus provided in an embodiment of the present invention;

fig. 8 is a schematic diagram of a computer device provided by an embodiment of the invention.

Detailed Description

The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.

Referring to fig. 1, fig. 1 illustrates an application environment of an information pushing method according to an embodiment of the present invention. The information pushing method is applied to an information pushing scene of business service. The recording scene comprises a server and a client, wherein the server is connected with the client through a network, the server generates a target short message by processing an acquired basic data set and sends the target short message to the corresponding client, and the client receives the target short message and interacts with the server. The client may specifically be, but is not limited to, an intelligent device capable of receiving a short message, such as a mobile phone and a tablet computer, and the server may specifically be implemented by an independent server or a server cluster composed of a plurality of servers.

Referring to fig. 2, fig. 2 shows an information pushing method according to an embodiment of the present invention, which is described by taking the method applied to the server in fig. 1 as an example, and is detailed as follows:

s10: and acquiring a basic data set, wherein the basic data set comprises user service data of each user.

Specifically, the server acquires the basic data set through a preset acquisition mode, so as to obtain user service data of each user included in the basic data set.

The user service data refers to relevant information for the user to perform service processing, such as insurance application data or renewal data. User traffic data includes, but is not limited to: user sensitive information, user business data, business service links and the like, wherein the user sensitive information refers to data related to user stealth and includes but is not limited to: the user name, the user telephone number, the user identification number, the bank card number and the like, the user business data refers to information related to business, such as the license plate number in the automobile insurance, and the business service link refers to a web page hyperlink address used for business processing.

The basic data set may be specifically stored in a preset path of the server in a preset storage manner, for example, in a preset database, a preset Extensible Markup Language (XML) library, or a preset folder, or may be called from a third-party system.

And if the preset storage mode is to store the data into a preset database or a preset folder, acquiring a data table or a folder storing the association relationship through a specified path, and further extracting corresponding data contents from the data table or the folder to serve as a basic data set.

If the preset storage mode is to store in an XML library or an XML file, the XML library or the XML file can be analyzed in a regular expression mode to obtain a basic data set.

And if the basic data set is called from the third-party system, acquiring data of a specified data structure from the third-party system as the basic data set by calling the third-party data interface and setting specified calling conditions.

For example, in a specific embodiment, the third-party system is a PA18 safety E marketing system, the system stores user service data related to vehicle insurance, the system provides a data interface and allows an authorized external program to obtain the user service data related to vehicle insurance stored in the system through the data interface, and the server obtains a basic data set from the PA18 safety E marketing system by calling the data interface provided by the PA18 safety E marketing system and inputting a preset calling instruction, where the preset calling instruction includes a selection condition of the basic data set, and the like.

It should be noted that, in order to ensure the utilization efficiency of the obtained basic data set, each piece of user service data is stored in the basic data set according to a preset storage format during storage, so that the user service data of the basic data set can be rapidly analyzed subsequently.

For example, in a specific embodiment, a user service data stored according to a preset storage format is "zhangsan, 15600000000, 2109051900000000000", sue 88888, 11 ", http:// www.pingan.com/ebusiness/car/newwal-to-log.do? pre _ license", wherein the first three items of the first part number are user sensitive information, a user service material is arranged between the first part number and the second part number, and a service link is arranged after the second part number.

S20: and analyzing each piece of user service data to obtain user sensitive information, user service data and service links contained in each piece of user service data.

Specifically, each piece of user service data is analyzed in a preset analysis mode to obtain user sensitive information, user service data and service links contained in the user service data.

The preset analysis mode includes but is not limited to: regular expressions, keyword queries, template matching, and the like.

Preferably, the embodiment adopts a regular expression mode to extract the user sensitive information, the user service data and the service link contained in the user service data.

S30: and performing link conversion processing on the service link by adopting a mode of switching long chain to short link to obtain the target short link.

Specifically, the embodiment finally needs to send the service link to the user in a short message manner, and the service link is generally long, that is, the number of related characters is large, which may cause the content of the short message to be too long, and when a large number of short messages are sent to perform information push at the same time, the short message sending efficiency is low, which easily causes system blockage, and causes information push omission, information push error, and the like.

The target short link includes a preset number of characters, and the components include but are not limited to: at least two combinations of letters, numbers and symbols, the preset number can be set according to actual conditions, and preferably, the preset number is 6 in the embodiment, that is, a short link containing 6 characters is generated as the target short link.

For example, in one embodiment, the business service link is "http:// www.pingan.com/ebusiness/car/renewal-to-logic. do? pre _ license", which translates to the target short link being "e 79nk 3".

The mode of switching long chain to short chain is that the long chain is switched into short chain with preset digit through a preset switching algorithm, then the corresponding relation between the long chain and the short chain is established and stored in a database, when the short chain is detected to be accessed, the corresponding long chain is found in the database, and the access of the long chain is realized through redirection.

The preset conversion algorithm includes, but is not limited to: md5 hashing algorithm and base64 encoding algorithm, etc.

S40: and desensitizing the user sensitive information by using a preset data desensitizing mode to obtain desensitized data.

Specifically, the user sensitive information is analyzed to obtain various items of metadata contained in the user sensitive data, desensitization processing is performed on each item of metadata according to a desensitization mode corresponding to each item of metadata, and the desensitized metadata are combined to obtain desensitization data.

Data desensitization refers to deformation of data of sensitive information under desensitization conditions, and reliable protection of sensitive private data is achieved. Under the condition of user safety data or some commercial sensitive data, real data is modified and test use is provided under the condition of not violating a system, personal sensitive information such as identity card numbers, mobile phone numbers, card numbers, user names, user addresses and the like needs to be subjected to data deformation through desensitization rules, and reliable protection of sensitive private data is achieved.

In the application, a suitable data desensitization mode is selected according to the type and the actual need of the needed desensitization data, and the data desensitization mode is not specifically limited herein.

The data replacement refers to uniformly replacing fixed type data to be desensitized with preset characters, the method is similar to an eye blocking method, information integrity can be kept for internal personnel, and the replaced characters are displayed on an external client side, for example, all female names are uniformly replaced with the characters F.

The data rearrangement is to scramble the data to be desensitized in a certain order, for example, data "12345" is rearranged to "54321".

The data encryption is to encrypt the data to be desensitized by an encryption algorithm, for example, data "12345" is encrypted to obtain "23456".

The data truncation refers to discarding necessary information to ensure the ambiguity of the data to be desensitized, and generally, a preset padding is used for padding after the data truncation to ensure the integrity of the data length, for example, a telephone number "13872253006" is data truncated to obtain "138", and then a preset padding "0" is used for padding to obtain "13800000000".

The masking refers to retaining partial information to be desensitized, and performing a masking process on additional information, for example, performing a masking process on identification card information on a train ticket, to obtain "1303 ×. 3957".

The rounding of the date offset means that the safety of the data to be desensitized is ensured when the data to be desensitized is discarded, for example, when the desensitization is 2019052012: 30:45, the rounding of the date offset is performed to obtain 2019052012: 00: 00.

It should be noted that, there is no necessary sequential execution order between step S30 and step S40, and the steps may be executed in parallel, which is not limited herein.

S50: and writing the desensitization data, the user service data and the target short link into a preset short message template to generate a target short message.

Specifically, the service end prestores a short message template corresponding to the service information, desensitization data, target service data and position information corresponding to the target short link are reserved in the short message template, and according to the position information, the desensitization data, the user service data and the target short link are written into the preset short message template to generate the target short message.

S60: and sending the target short message to a client corresponding to the user service data.

Specifically, the target short messages generated in step S50 are summarized, and the target short messages are sent to the client corresponding to the user service data according to a preset short message sending mode.

The preset short message sending mode can be that the number of the target short messages which can be safely sent currently is calculated in a polling mode according to the load of the service end, and the target short messages are sent according to the number of the target short messages which can be safely sent.

The client corresponding to the user service data refers to a terminal device which is used by a user corresponding to the user service data and can receive the target short message, for example, a terminal device corresponding to a mobile phone number of the user in the user service data, or a mail server corresponding to a user mailbox number in the user service data.

In the embodiment, a basic data set is obtained, wherein the basic data set comprises user service data of each user, and each user service data is analyzed to obtain user sensitive information, user service data and service links contained in each user service data, and then a long-chain switching short link mode is adopted to perform link conversion processing on the service links to obtain target short links, so that the resource occupation of subsequent service links is reduced, and when the data volume is large, the overhead of system resources can be greatly reduced, which is beneficial to improving the information pushing efficiency, on the other hand, a preset data desensitization mode is used to perform desensitization processing on the user sensitive information to obtain desensitization data, and finally the desensitization data, the user service data and the target short links are written into a preset short message template to generate a target short message, and the target short message is sent to a client corresponding to the user service data, the method and the device avoid directly disclosing the related data of the user information, protect the privacy of the user, facilitate the protection of the related data of the user information and improve the safety of information pushing.

Based on the embodiment corresponding to fig. 2, a specific implementation method for performing link conversion processing on the service link by using a long-chain short-to-short link manner mentioned in step S30 to obtain the target short link is described in detail below by using a specific embodiment.

Referring to fig. 3, fig. 3 shows a specific implementation flow of step S30 provided in the embodiment of the present invention, which is detailed as follows:

s31: and inquiring whether a business service link exists in a preset key-value storage system to obtain an inquiry result.

Specifically, whether a business service link exists in a preset key-value storage system is queried in a traversal query mode to obtain a query result, wherein the query result comprises that the business service link does not exist in the preset key-value storage system and the business service link exists in the preset key-value storage system.

The preset key-value storage system is a storage system for storing data by key value pairs, adopts a distributed structure, has the characteristics of high query speed, large data storage quantity and high concurrency support, and is very suitable for query through a main key.

The Traversal (Traversal) refers to accessing information of all nodes in a node tree in a preset key-value storage system, that is, accessing each node in the node tree once and only once in sequence. Traversal approaches include, but are not limited to: a pre-order traversal, a mid-order traversal, a post-order traversal, and the like.

Preferably, the traversal manner used in the embodiment of the present invention is a predecessor traversal, and the order of the predecessor traversal includes NLR or NRL, where N refers to a root (Node), L refers to a Left Node (Left subtree) of the root, and R refers to a right Node (Rightsubtree) of the root.

It should be noted that the traversal operation in this step aims to find a value that is the same as the service link, and each key-value pair appears only once in the preset key-value storage system, so that the embodiment of the present invention provides a preferable scheme that a value that is the same as the service link is found in the preset key-value storage system, that is, this traversal is ended, and the query result is determined to be that the service link exists in the key-value storage system.

S32: and if the query result is that no service link exists in the preset key-value storage system, generating a target short link through a distributed number sending mode, establishing a key-value key value pair between the service link and the target short link, and storing the key-value key value pair into the preset key-value storage system.

Specifically, when the query result is that no service link exists in the preset key-value storage system, a target short link is generated through a distributed number sending mode, a key-value key value pair between the service link and the target short link is established, and the key-value key value pair is stored in the preset key-value storage system.

Wherein, the process of sending a number in this embodiment includes: the method comprises the steps of generating a basic serial number of a business service link by using an md5 hash algorithm, converting the serial number by using a preset system to obtain a target serial number, and converting the target serial number into a target short link by using a long-to-short hash table (hash table).

Preferably, the preset system is a 62 system, and the 62 system refers to a coding mode using 10 arabic numbers, 26 capital english letters and 26 lowercase letters.

S33: and if the query result is that the service link exists in the key-value storage system, acquiring a short link corresponding to the service link from the key-value storage system, and taking the acquired short link as a target short link.

Specifically, when the query result is that the business service link exists in the key-value storage system, the short link corresponding to the business service link is obtained from the key-value storage system, the obtained short link is used as a target short link, and meanwhile, the generation time of the key-value key value pair with the business service link is updated to be the current time point, so that whether the key-value key value pair is invalid or not can be judged according to the time point subsequently.

It should be noted that, step S32 and step S33 do not have a certain sequential execution order, and may be executed in parallel, which is not limited herein.

In this embodiment, whether a service link exists or not is queried in a preset key-value storage system to obtain a query result, when the query result is that the service link does not exist in the preset key-value storage system, a target short link is generated through a distributed signaling mode, a key-value key value pair between the service link and the target short link is established, the key-value key value pair is stored in the preset key-value storage system, when the query result is that the service link exists in the preset key-value storage system, a short link corresponding to the service link is obtained from the key-value storage system, and the obtained short link is used as the target short link. The method realizes the conversion of the business service link into a shorter target short link, and is beneficial to improving the sending efficiency of the subsequent target short message.

In an embodiment, after step S30, the information pushing method further includes:

and detecting each key-value key value pair in a preset key-value storage system at regular time, if the unused key-value key value pair exists in a preset time threshold range, destroying the unused key-value key value pair in the preset time threshold range from the preset key-value storage system to obtain an updated preset key-value storage system.

Specifically, each key-value key value pair in the key-value storage system is detected in a traversing mode through a preset timing script at regular time, whether the unused key-value key value pair exists in a preset time threshold range is judged, if the unused key-value key value pair exists in the preset time threshold range, the key-value key value pair is judged to be invalid, and the unused key-value key value pair in the preset time threshold range is destroyed from the preset key-value storage system, so that the resource overhead of the key-value storage system is reduced, the efficiency of the storage system is improved, meanwhile, the reduction of redundant key-value pairs in the key-value storage system is facilitated, and the query quantity in the subsequent generation of target short links is reduced.

The preset time threshold range can be determined according to the generation time of the key-value key value and a preset effective threshold, for example, the generation time of a key-value key value is between 2019, 3, month, 14, 17:44:38, and the preset effective threshold is 1 hour, so that the preset time threshold of the key-value key value is between 2019, 3, month, 14, 17:44:38 and 2019, 3, month, 14, 18:44: 37.

In the embodiment, each key-value key value pair in the preset key-value storage system is detected at regular time, and the unused key-value key value pair in the preset time threshold range is destroyed, so that redundant key value pairs in the key-value storage system are reduced, system resource overhead is saved, and the subsequent query efficiency during target short link generation is improved.

Based on the embodiment corresponding to fig. 2, a specific implementation method for performing desensitization processing on user sensitive information to obtain desensitization data by using a preset data desensitization manner mentioned in step S40 is described in detail below by using a specific embodiment.

Referring to fig. 4, fig. 4 shows a specific implementation flow of step S40 provided in the embodiment of the present invention, which is detailed as follows:

s41: and analyzing the user sensitive information to obtain each metadata contained in the user sensitive information, wherein each metadata corresponds to one data tag.

Specifically, each piece of user sensitive information contains a plurality of items of metadata of the user, each piece of metadata contained in the user sensitive information is obtained by analyzing the user sensitive information, and each piece of metadata corresponds to one data tag.

The metadata refers to a data unit in the user sensitive information, and a data tag corresponding to each metadata is a category to which the metadata belongs.

For example, in one embodiment, a piece of user sensitive information is "zhang san, man, 15623232323, 210322198012120000", which includes 4 pieces of metadata, respectively, "zhang san", "man", "15623232323", and "210322198012120000", where the data tag corresponding to "zhang san" is a user name, the data tag corresponding to "man" is a user gender, the user tag corresponding to "15623232323" is a user phone number, and the user tag corresponding to "210322198012120000" is a user identification number.

S42: and aiming at each metadata, acquiring a desensitization mode of a data tag corresponding to the metadata as a target desensitization mode of the metadata.

Specifically, each data tag corresponds to a preset desensitization mode, and for each metadata, the desensitization mode of the data tag corresponding to the metadata is acquired and used as a target desensitization mode of the metadata.

In this embodiment, the metadata included in the user sensitive information may be different in desensitization modes of data tags corresponding to different metadata according to actual requirements, and common desensitization modes include, but are not limited to: substitution, rearrangement, encryption, truncation, mask and date offset rounding, etc.

S43: and for each metadata, performing desensitization treatment on the metadata by using a target desensitization mode to obtain desensitization data corresponding to the metadata.

Specifically, for each metadata, desensitization processing is performed on the metadata by using a target desensitization mode, so that desensitization data corresponding to the metadata is obtained.

S44: and combining the desensitization data corresponding to each metadata to obtain desensitization data corresponding to the user sensitive information.

Specifically, desensitization data corresponding to each metadata is combined to obtain desensitization data corresponding to user sensitive information.

In this embodiment, the user sensitive information is analyzed to obtain each metadata included in the user sensitive information, where each metadata corresponds to one data tag, and for each metadata, a desensitization mode of the data tag corresponding to the metadata is obtained and used as a target desensitization mode of the metadata.

In an embodiment, in step S40, the user sensitive information includes a user name, please refer to fig. 5, where fig. 5 shows another implementation flow of step S40 provided by the embodiment of the present invention, which is detailed as follows:

s45: and determining a target surname corresponding to the user name.

Specifically, in view of that the user surnames include a single surname and a double surname, after the sensitive information of the user name is obtained, the surname extraction is performed on the user name to obtain a target surname corresponding to the user name, and the specific extraction manner may refer to the descriptions in step S451 to step S453 or refer to the description in step S454, and the times are not repeated in order to avoid repetition.

S46: and combining the target surname with the preset wildcard character to serve as desensitization data corresponding to the user name.

Specifically, the server stores preset wildcards, and after the target surname is obtained, the combination of the target surname and the preset wildcards is used as desensitization data corresponding to the user name.

The preset wildcard characters can be punctuation marks, specific marks or preset characters, and can be selected according to actual conditions.

For example, in a specific embodiment, the preset wildcard is determined according to the gender in the user sensitive information, the preset wildcard with the gender of the user being male is mr, the preset wildcard with the gender of the user being female is ms, the acquired user sensitive information has the gender of the user being male and the target surname being lie, and then the acquired desensitization data corresponding to the user name is mr.

In this embodiment, the target surname corresponding to the user name is determined, and then the combination of the target surname and the preset wildcard is used as desensitization data corresponding to the user name, so that the privacy of the user is ensured not to be leaked, and the data security in information push is improved.

In an embodiment, please refer to fig. 6, where fig. 6 shows an implementation flow of step S45 provided in the embodiment of the present invention, which is detailed as follows:

s451: and acquiring preset surname data, wherein the surname data comprises basic compound surnames.

Specifically, surname data is preset at the server, and the surname data comprises data of all basic compound surnames.

Wherein, the basic compound surname refers to a surname composed of more than one Chinese character. Such as euro yang, sima, etc.

S452: and respectively carrying out accurate matching on each basic compound name and the first two digits of the user name to obtain a matching result.

Specifically, each basic compound surname in the preset surname data is used for carrying out accurate matching with the first two digits of the user name in sequence, and a matching result is obtained.

The precise matching method includes, but is not limited to: character string comparison, text similarity comparison and the like.

It should be noted that the purpose of performing accurate matching between the preset surname data and the first two digits of the user name in this embodiment is to determine whether the first two digits of the user name are complex surnames, stop the matching operation if the basic complex surnames that are the same as the first two digits of the user name are found, determine that the matching result is a matching success, and determine that the matching result is a matching failure if the first two digits of the user name are different from all the basic surnames.

S453: and if the matching result is successful, taking the first two digits of the user name as the target surname corresponding to the user name, and if the matching result is failed, taking the first digit of the user name as the target surname corresponding to the user name.

Specifically, when the matching result is that the matching is successful, the first two digits of the user name are obtained through a character intercepting function (String intercepting function) and are used as the target surname corresponding to the user name, and when the matching result is that the matching is failed, the first digit of the user name is obtained through the character intercepting function and is used as the target surname corresponding to the user name.

The character intercepting function refers to a function used for processing a character string in a programming language, and commonly used character intercepting functions include, but are not limited to: InStr, InStrRev, InStrB, Mid, Right, and Left, among others.

In this embodiment, preset surname data is obtained, each basic compound surname is used for performing accurate matching with the first two digits of the user name, a matching result is obtained, when the matching result is that the matching is successful, the first two digits of the user name are taken as the target surname corresponding to the user name, when the matching result is that the matching is failed, the first digit of the user name is taken as the target surname corresponding to the user name, the determination of the user surname is realized, and the accuracy of subsequent desensitization processing on the user name is ensured.

In an embodiment, another implementation flow of step S45 provided in the embodiment of the present invention is shown, and is detailed as follows:

s454: and judging the character digit number of the user name, and if the character digit number of the user name is two, taking the first digit of the user name as a target surname corresponding to the user name.

Specifically, in the chinese name, the surname and the first name of the user are included, so the user name includes two or more characters, when the number of character bits is three, there is a possibility of a compound surname and a single surname, it is easy to understand that when the number of character bits is two, the two-digit characters of the user name correspond to one surname and one first name respectively, therefore, when the user surname is two-digit character, the first digit of the user name is taken as the target surname corresponding to the user name, and then the step of step S46 is executed to combine the target surname with the preset wildcard as the desensitization data corresponding to the user name.

In the embodiment, by judging the number of the character bits of the user name first, when the number of the character bits of the user name is two, the surname in the user name is determined to be a single surname, the first bit of the user name is taken as the target surname, and the traversal comparison with the preset surname data is not needed, so that the acquisition efficiency of desensitization data corresponding to the user name is improved.

It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.

Fig. 7 shows a schematic block diagram of an information pushing apparatus corresponding to the information pushing method of the above-described embodiments one to one. As shown in fig. 7, the information pushing apparatus includes a data obtaining module 10, a data parsing module 20, a link converting module 30, an information desensitizing module 40, an information generating module 50, and an information sending module 60. The functional modules are explained in detail as follows:

a data obtaining module 10, configured to obtain a basic data set, where the basic data set includes user service data of each user;

the data analysis module 20 is configured to analyze each piece of user service data to obtain user sensitive information, user service data, and a service link included in each piece of user service data;

the link conversion module 30 is configured to perform link conversion processing on the service link in a manner of switching a long link to a short link, so as to obtain a target short link;

the information desensitization module 40 is used for performing desensitization processing on the user sensitive information by using a preset data desensitization mode to obtain desensitization data;

the information generating module 50 is used for writing the desensitization data, the user service data and the target short link into a preset short message template to generate a target short message;

and an information sending module 60, configured to send the target short message to the client corresponding to the user service data.

Further, the link converting module 30 includes:

the service link query unit is used for querying whether a service link exists in a preset key-value storage system to obtain a query result;

the first target determining unit is used for generating a target short link through a distributed number sending mode if the query result is that no service link exists in a preset key-value storage system, establishing a key-value key value pair between the service link and the target short link, and storing the key-value key value pair into the preset key-value storage system;

and the second target determining unit is used for acquiring a short link corresponding to the service link from the key-value storage system if the query result shows that the service link exists in the key-value storage system, and taking the acquired short link as a target short link.

The information pushing apparatus further includes:

and the timing updating module is used for detecting each key-value key value pair in the preset key-value storage system at regular time, and if the unused key-value key value pair in the preset time threshold range exists, destroying the unused key-value key value pair in the preset time threshold range from the preset key-value storage system to obtain the updated preset key-value storage system.

Further, the desensitization module 40 includes:

the information analysis unit is used for analyzing the user sensitive information to obtain each metadata contained in the user sensitive information, wherein each metadata corresponds to one data tag;

the mode determining unit is used for acquiring a desensitization mode of a data tag corresponding to the metadata as a target desensitization mode of the metadata for each metadata;

the data desensitization unit is used for desensitizing the metadata by using a target desensitization mode according to each metadata to obtain desensitization data corresponding to the metadata;

and the data combination unit is used for combining the desensitization data corresponding to each metadata to obtain desensitization data corresponding to the user sensitive information.

Further, the desensitization module 40 also includes:

the surname determining unit is used for determining a target surname corresponding to the user name;

and the data generation unit is used for combining the target surname with the preset wildcard character to serve as desensitization data corresponding to the user name.

Further, the last name determination unit includes:

the surname acquisition subunit is used for acquiring preset surname data, wherein the surname data comprises basic compound surnames;

the precise matching subunit is used for respectively and precisely matching each basic surname with the first two digits of the user name to obtain a matching result;

the surname matching subunit is used for taking the first two digits of the user name as the target surname corresponding to the user name if the matching result is that the matching is successful, and taking the first digit of the user name as the target surname corresponding to the user name if the matching result is that the matching is failed;

further, the last name determination unit further includes:

and the double-character surname judging subunit is used for judging the character digit of the user name by the user, and if the character digit of the user name is two digits, the first digit of the user name is taken as the target surname corresponding to the user name.

For specific limitations of the information pushing apparatus, reference may be made to the above limitations of the information pushing method, which is not described herein again. All or part of the modules in the information pushing device can be realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.

Fig. 8 is a schematic diagram of a computer device provided by an embodiment of the invention. The computer device may be a server and its internal structure diagram may be as shown in fig. 8. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer equipment is used for storing a preset short message template. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement an information push method.

In one embodiment, a computer device is provided, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and the processor executes the computer program to implement the steps of the information pushing method of the above embodiments, such as steps S10 to S60 shown in fig. 2. Alternatively, the processor, when executing the computer program, implements the functions of the modules/units of the information pushing apparatus according to the above-described embodiments, such as the functions of the modules 10 to 60 shown in fig. 7. To avoid repetition, further description is omitted here.

It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions.

In an embodiment, a computer-readable storage medium is provided, and a computer program is stored on the computer-readable storage medium, and when being executed by a processor, the computer program implements the steps of the above-described embodiment information pushing method, or when being executed by the processor, the computer program implements the functions of the modules/units in the above-described embodiment information pushing apparatus. To avoid repetition, further description is omitted here.

It is to be understood that the computer-readable storage medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, and the like.

The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

19页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:图表短信的发送方法、装置及终端设备

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类