Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security and privacy level maintenance method and device, electronic equipment and storage medium

A privacy-level, security-level technology, applied in the blockchain field, can solve problems such as data matching, inability to update customer security and privacy levels in a timely manner, and poor timeliness

Pending Publication Date: 2020-10-20
PINGAN PUHUI ENTERPRISE MANAGEMENT CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing technology, the security and privacy level of the customer is directly determined after signing the risk assessment agreement and the security and privacy agreement with the customer, and the information provided by the customer is not matched with the data in the database of the public security and banks. The accuracy of the customer's security level and privacy level
In addition, when the customer's basic information changes, the agreement is not signed again, resulting in the inability to update the customer's security and privacy level in time, so the timeliness is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security and privacy level maintenance method and device, electronic equipment and storage medium
  • Security and privacy level maintenance method and device, electronic equipment and storage medium
  • Security and privacy level maintenance method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] figure 1 It is a flow chart of the method for maintaining security and privacy levels provided by Embodiment 1 of the present invention.

[0062] The method for maintaining security and privacy levels specifically includes the following steps. According to different requirements, the order of the steps in the flow chart can be changed, and some of them can be omitted.

[0063] S11: Collect the key data of the customer from the search engine, obtain the channel number corresponding to the key data, and guide the customer to log in through the page corresponding to the channel number.

[0064] In this embodiment, the channel number refers to the number corresponding to the media source, and the information left by the customer after browsing the server of the search engine is collected from the search engine, wherein the information includes key data left by the user, the The key data can be the user's mobile phone number, QQ account, WeChat account, etc., and guide the ...

Embodiment 2

[0118] figure 2 It is a structural diagram of a device for maintaining security and privacy levels provided by Embodiment 2 of the present invention.

[0119] In some embodiments, the device 20 for maintaining security and privacy levels may include a plurality of functional modules composed of program code segments. The program codes of the various program segments in the security and privacy level maintenance device 20 can be stored in the memory of the electronic device, and executed by the at least one processor for execution (see figure 1 Description) Maintenance of security and privacy levels.

[0120] In this embodiment, the device 20 for maintaining security and privacy levels can be divided into multiple functional modules according to the functions it performs. The functional modules may include: an acquisition module 201 , a sending module 202 , a matching module 203 , a calculation module 204 , a generation module 205 , an assembly module 206 , a push module 207...

Embodiment 3

[0173] refer to image 3 As shown in , it is a schematic structural diagram of the electronic device provided by Embodiment 3 of the present invention. In a preferred embodiment of the present invention, the electronic device 3 includes a memory 31 , at least one processor 32 , at least one communication bus 33 and a transceiver 34 .

[0174] Those skilled in the art should understand that, image 3 The structure of the electronic device shown does not constitute a limitation of the embodiment of the present invention, it can be a bus structure or a star structure, and the electronic device 3 can also include more or less other hardware than shown in the figure Or software, or a different arrangement of components.

[0175] In some embodiments, the electronic device 3 is an electronic device that can automatically perform numerical calculation and / or information processing according to preset or stored instructions, and its hardware includes but not limited to microprocessor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an artificial intelligence technology, and provides a security and privacy level maintenance method and a device, electronic equipment and a storage medium, and the method comprises the steps: collecting key data of a client, obtaining a page corresponding to a channel number to guide the client to input basic information, associating the basic information with the channelnumber, and sending the associated basic information to a message queue; matching the basic information of each client with data in a plurality of preset data sources, calculating security and privacy levels, and generating a landing data table; and assembling the landing data table to obtain a new table, and pushing the new table to the local database to update the client security level and theprivacy level. According to the invention, the security level and the privacy level of each client are calculated according to the security and privacy level weight ratio and the channel number of each client, so that the management efficiency of the security level and the privacy level of the client is improved. In addition, the invention also relates to a blockchain technology, and the preset data source can be stored in the blockchain.

Description

technical field [0001] The present invention relates to the technical field of block chains, in particular to a security and privacy level maintenance method, device, electronic equipment and storage medium. Background technique [0002] At present, with the rapid development of mobile Internet and smart phones, various commercial banks have launched various mobile financial applications including mobile banking to provide flexible and convenient mobile financial services for different groups of people and different scenarios. With the rapid development of mobile finance, issues related to maintaining customer security and privacy are becoming more and more important. [0003] In the existing technology, the security and privacy level of the customer is directly determined after signing the risk assessment agreement and the security and privacy agreement with the customer, and the information provided by the customer is not matched with the data in the database of the public...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F16/22G06F16/2457
CPCG06F21/6245G06F16/2282G06F16/24578
Inventor 刘皋相
Owner PINGAN PUHUI ENTERPRISE MANAGEMENT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products