CN117459634B - Method, system and medium for improving cross-data center blacklist interface access performance - Google Patents
Method, system and medium for improving cross-data center blacklist interface access performance Download PDFInfo
- Publication number
- CN117459634B CN117459634B CN202311560928.0A CN202311560928A CN117459634B CN 117459634 B CN117459634 B CN 117459634B CN 202311560928 A CN202311560928 A CN 202311560928A CN 117459634 B CN117459634 B CN 117459634B
- Authority
- CN
- China
- Prior art keywords
- blacklist
- user
- index information
- index
- interface
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 230000002708 enhancing effect Effects 0.000 claims description 13
- 238000004364 calculation method Methods 0.000 claims description 6
- 238000007405 data analysis Methods 0.000 claims description 3
- 230000005540 biological transmission Effects 0.000 description 6
- 238000012795 verification Methods 0.000 description 6
- 230000003203 everyday effect Effects 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 230000002427 irreversible effect Effects 0.000 description 5
- 230000008569 process Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 230000008520 organization Effects 0.000 description 3
- 238000005336 cracking Methods 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 239000002699 waste material Substances 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Arrangements for supervision, monitoring or testing
- H04M3/2281—Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42025—Calling or Called party identification service
- H04M3/42034—Calling party identification service
- H04M3/42059—Making use of the calling party identifier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/062—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Technology Law (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a method, a system and a medium for improving the access performance of a blacklist interface of a cross data center, wherein the method comprises the following steps: the user invokes a full-quantity interface of the blacklist early warning index service, acquires a private key of the user and full-quantity blacklist index information, stores the information in a local data center and establishes a blacklist index information database; and periodically calling an increment interface to update the blacklist index information database; acquiring a telephone number to be identified; calculating the telephone number to be identified through the private key of the user to obtain a Hash value of the telephone number to be identified; inquiring in a blacklist index information database based on the Hash value of the telephone number to be identified, and calling a blacklist interface through the telephone number to be identified with the blacklist index information to acquire blacklist information corresponding to the telephone number to be identified. And the calling performance of the blacklist interface is improved, and meanwhile, the data security of the blacklist service is ensured.
Description
Technical Field
The application relates to the technical field of blacklist management, in particular to a method, a system and a medium for improving the access performance of a blacklist interface of a cross-data center.
Background
Telephone number blacklist interface: in the field of call centers, businesses and institutions need to contact users via telephone, and there are a variety of authorities that can provide risk identification for telephone numbers, build a blacklist of telephone numbers, and provide query services to businesses and institutions by way of interfaces. Because of the phone number term privacy data, the blacklist interface provider cannot provide phone numbers directly to the businesses and institutions served. Enterprises and institutions can only use their own user telephone numbers to query (bump) the blacklist interface to identify if these numbers present a particular risk. A blacklist typically has millions of telephone numbers and is updated every day by a certain number of numbers.
The blacklist provider typically provides a blacklist service through a cloud computing interface, and a cloud data center where the blacklist service is located is typically different from a cloud data center where a serviced enterprise or organization invokes the service. Each call requires communication across the internet. In order to ensure data security, secure interface call is generally realized through an encrypted network protocol such as https. For small blacklist interface consumers, the times of calling the blacklist interface every day are not large, and the common technology can completely meet the requirements. But for some large consumers there are hundreds of millions of users who are each day provided with various services based on the blacklist information of these user numbers. This will result in a large number of calls to the blacklist interface per day (e.g., up to 20 tens of thousands of calls per second). The inherent delay of interface calls across the internet is around 50ms, and the high number of concurrent calls will place pressure on network bandwidth and server computing power, which can be a serious performance problem for such consumers.
Functional limitations: for large blacklist service consumers, the traditional blacklist interface cannot meet the performance requirements. First, up to 20 tens of thousands of calls per second can encounter performance bottlenecks and cause significant waste of bandwidth and computational resources. Secondly, some organizations' demands also involve federal computing, requiring more data modeling in their own cloud data center based on blacklist information using techniques such as machine learning. Because the blacklist is updated every day, invoking the blacklist interface to refresh hundreds of millions of numbers of blacklist information at intervals is a task that is limited by performance bottlenecks and cannot be accomplished. In addition, considering that the possibility that the numbers belong to the blacklist is very low, most of blacklist interface call returned information is worthless, but in order to ensure the accuracy of the risk model, the information must be acquired, so that a great deal of calculation power and waste of network bandwidth resources are caused. These organizations want blacklist service providers to offer blacklist numbers directly, which, while solving performance problems, do not meet data security requirements.
Therefore, the prior art has defects, and improvement is needed.
Disclosure of Invention
In view of the above problems, the present invention aims to provide a method, a system and a medium for improving the access performance of a blacklist interface across a data center, which introduces an irreversible Hash algorithm, provides a blacklist early warning index service to improve the performance of blacklist interface call, and simultaneously ensures the data security of the blacklist service.
The first aspect of the present invention provides a method for improving access performance of a blacklist interface across a data center, comprising:
The user invokes a full-quantity interface of the blacklist early warning index service, acquires a private key of the user and full-quantity blacklist index information, stores the information in a local data center and establishes a blacklist index information database; and periodically calling an increment interface to update the blacklist index information database;
acquiring a telephone number to be identified;
calculating the telephone number to be identified through the user private key to obtain a Hash value of the telephone number to be identified;
Inquiring in a blacklist index information database based on the Hash value of the telephone number to be identified, and judging whether blacklist index information with the same Hash value exists or not;
If yes, judging that the telephone number to be identified has blacklist risk, and calling a blacklist interface based on the telephone number to be identified to acquire blacklist information corresponding to the telephone number to be identified;
and if the telephone number to be identified does not exist, judging that the telephone number to be identified does not exist a blacklist risk.
In this scheme, the user invokes the full-scale interface of blacklist early warning index service, obtains the private key of the user and the full-scale blacklist index information and stores them in the local data center, establishes a blacklist index information database, and includes:
the blacklist provider generates a user private key according to the identity information of the user and sends the user private key to the equipment terminal of the user;
the blacklist provider encrypts blacklist numbers in a database through the private key of the user to obtain Hash index values of the blacklist numbers;
sorting the Hash index values of the blacklist numbers to obtain blacklist index information;
transmitting the blacklist index information to the equipment terminal of the user through a full interface of a blacklist early warning index service;
And the user stores the blacklist index information to a local data center and establishes a blacklist index information database.
In this scheme, still include:
determining a Hash algorithm according to the data security level requirement;
and calculating the value range of the Hash index value according to the performance requirement of the unnecessary interface call times.
In this scheme, the periodically calling an incremental interface updates the blacklist index information database, including:
the user periodically sends an increment acquisition request to the blacklist provider;
The blacklist provider encrypts newly added blacklist numbers in a preset time interval in a database according to the private key of the user to obtain Hash index values of the newly added blacklist numbers;
sorting the Hash index values of the newly added blacklist numbers to obtain newly added blacklist index information;
Transmitting the newly added blacklist index information to the equipment terminal of the user through an increment interface of a blacklist early warning index service;
And the user stores the newly added blacklist index information to a local data center and updates the blacklist index information in a blacklist index information database.
In this scheme, still include:
Analyzing according to the private key of the user;
Updating the user private key when the risk exists in the user private key or the service time is greater than a first preset threshold value;
the blacklist provider calculates blacklist numbers in the database according to the updated private key of the user, and regenerates blacklist index data;
And the user calls the full interface to acquire regenerated blacklist index data, and replaces the blacklist index information database of the local data center through the regenerated blacklist index data.
In this scheme, still include:
analyzing according to blacklist index information in the blacklist index information database, and determining the number of blacklist numbers corresponding to each blacklist index information;
marking blacklist index information of which the number of the corresponding blacklist numbers is larger than a second preset threshold value;
Calculating the duty ratio of the index information of the marked blacklist;
And when the duty ratio of the blacklist index information is larger than a third preset threshold value, adjusting the value range of the Hash index value when the blacklist index data is regenerated next time.
A second aspect of the present invention provides a system for enhancing access performance across a blacklist interface of a data center, comprising:
The blacklist index information database management module is used for calling the full-quantity interface of the blacklist early warning index service by a user, acquiring a private key of the user and full-quantity blacklist index information, storing the private key and the full-quantity blacklist index information in a local data center, and establishing a blacklist index information database; and periodically calling an increment interface to update the blacklist index information database;
the data acquisition module is used for acquiring a telephone number to be identified;
the Hash value calculation module is used for calculating the telephone number to be identified through the private key of the user to obtain a Hash value of the telephone number to be identified;
The data analysis module is used for inquiring in the blacklist index information database based on the Hash value of the telephone number to be identified and judging whether the blacklist index information with the same Hash value exists or not; if yes, judging that the telephone number to be identified has blacklist risk, and calling a blacklist interface based on the telephone number to be identified to acquire blacklist information corresponding to the telephone number to be identified; and if the telephone number to be identified does not exist, judging that the telephone number to be identified does not exist a blacklist risk.
In this scheme, the user invokes the full-scale interface of blacklist early warning index service, obtains the private key of the user and the full-scale blacklist index information and stores them in the local data center, establishes a blacklist index information database, and includes:
the blacklist provider generates a user private key according to the identity information of the user and sends the user private key to the equipment terminal of the user;
the blacklist provider encrypts blacklist numbers in a database through the private key of the user to obtain Hash index values of the blacklist numbers;
sorting the Hash index values of the blacklist numbers to obtain blacklist index information;
transmitting the blacklist index information to the equipment terminal of the user through a full interface of a blacklist early warning index service;
And the user stores the blacklist index information to a local data center and establishes a blacklist index information database.
In this scheme, still include:
determining a Hash algorithm according to the data security level requirement;
and calculating the value range of the Hash index value according to the performance requirement of the unnecessary interface call times.
In this scheme, the periodically calling an incremental interface updates the blacklist index information database, including:
the user periodically sends an increment acquisition request to the blacklist provider;
The blacklist provider encrypts newly added blacklist numbers in a preset time interval in a database according to the private key of the user to obtain Hash index values of the newly added blacklist numbers;
sorting the Hash index values of the newly added blacklist numbers to obtain newly added blacklist index information;
Transmitting the newly added blacklist index information to the equipment terminal of the user through an increment interface of a blacklist early warning index service;
And the user stores the newly added blacklist index information to a local data center and updates the blacklist index information in a blacklist index information database.
In this scheme, still include:
Analyzing according to the private key of the user;
Updating the user private key when the risk exists in the user private key or the service time is greater than a first preset threshold value;
the blacklist provider calculates blacklist numbers in the database according to the updated private key of the user, and regenerates blacklist index data;
And the user calls the full interface to acquire regenerated blacklist index data, and replaces the blacklist index information database of the local data center through the regenerated blacklist index data.
In this scheme, still include:
analyzing according to blacklist index information in the blacklist index information database, and determining the number of blacklist numbers corresponding to each blacklist index information;
marking blacklist index information of which the number of the corresponding blacklist numbers is larger than a second preset threshold value;
Calculating the duty ratio of the index information of the marked blacklist;
And when the duty ratio of the blacklist index information is larger than a third preset threshold value, adjusting the value range of the Hash index value when the blacklist index data is regenerated next time.
A third aspect of the present invention provides a computer readable storage medium having embodied therein a method program for enhancing cross-data center blacklist interface access performance, the method program for enhancing cross-data center blacklist interface access performance, when executed by a processor, implementing the steps of the method for enhancing cross-data center blacklist interface access performance as described in any one of the preceding claims.
The invention discloses a method, a system and a medium for improving the access performance of a blacklist interface of a cross data center, wherein the method comprises the following steps: the user invokes a full-quantity interface of the blacklist early warning index service, acquires a private key of the user and full-quantity blacklist index information, stores the information in a local data center and establishes a blacklist index information database; and periodically calling an increment interface to update the blacklist index information database; acquiring a telephone number to be identified; calculating the telephone number to be identified through the private key of the user to obtain a Hash value of the telephone number to be identified; inquiring in a blacklist index information database based on the Hash value of the telephone number to be identified, and calling a blacklist interface through the telephone number to be identified with the blacklist index information to acquire blacklist information corresponding to the telephone number to be identified. And the calling performance of the blacklist interface is improved, and meanwhile, the data security of the blacklist service is ensured.
Drawings
FIG. 1 illustrates a flow chart of a method of the present invention for enhancing access performance across a data center blacklist interface;
FIG. 2 is a flow chart of a blacklist index information database creation method of the present invention;
FIG. 3 is a flow chart of a blacklist index information database update method of the present invention;
FIG. 4 illustrates a block diagram of a system for enhancing access performance across a data center blacklist interface in accordance with the present invention;
fig. 5 shows a block diagram of a blacklist early warning index service of the present invention.
Detailed Description
In order that the above-recited objects, features and advantages of the present application will be more clearly understood, a more particular description of the application will be rendered by reference to the appended drawings and appended detailed description. It should be noted that, without conflict, the embodiments of the present application and features in the embodiments may be combined with each other.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, but the present invention may be practiced in other ways than those described herein, and therefore the scope of the present invention is not limited to the specific embodiments disclosed below.
FIG. 1 illustrates a flow chart of a method of the present invention for enhancing access performance across a data center blacklist interface.
As shown in fig. 1, the invention discloses a method for improving the access performance of a blacklist interface across a data center, which comprises the following steps:
S102, a user calls a full-quantity interface of a blacklist early warning index service, obtains a private key of the user and full-quantity blacklist index information, stores the information in a local data center and establishes a blacklist index information database; and periodically calling an increment interface to update the blacklist index information database;
S104, obtaining a telephone number to be identified;
s106, calculating the telephone number to be identified through the private key of the user to obtain a Hash value of the telephone number to be identified;
s108, inquiring in a blacklist index information database based on the Hash value of the telephone number to be identified, and judging whether blacklist index information with the same Hash value exists or not;
s110, if yes, judging that the telephone number to be identified has blacklist risk, and calling a blacklist interface based on the telephone number to be identified to acquire blacklist information corresponding to the telephone number to be identified;
and S112, if the telephone number to be identified does not exist, judging that the telephone number to be identified does not exist a blacklist risk.
According to the embodiment of the invention, a user refers to a user which is served by a blacklist provider and is required to use blacklist interface service, the blacklist provider firstly determines identity information of the user according to login information of the user, generates a user private key special for the user with the identity information of the user, selects a corresponding irreversible Hash algorithm and a value range of a Hash index value according to user requirements, carries out encryption calculation on blacklist data recorded in a database through the generated user private key, sends the obtained blacklist index information to terminal equipment of the user through a full interface, and the user establishes a blacklist index information database in a local data center according to the received blacklist index information. Under the condition, the user can only obtain the Hash index value of the blacklist number, and the original blacklist number cannot be obtained reversely, so that the data safety is ensured.
As shown in fig. 5, after the blacklist index information database is established, the user periodically invokes the increment interface (for example, once every day) to obtain the blacklist index information of the newly added blacklist number, and updates the blacklist index information database, so as to ensure the real-time property of the data. When a user needs to determine whether the telephone number to be identified is a blacklist number, calculating the telephone number to be identified through a private key of the user, inquiring (collision) in a local blacklist index information database by using a generated Hash value of the telephone number to be identified, if the telephone number to be identified is not hit, indicating that the telephone number to be identified has no blacklist risk, and if the telephone number to be identified is hit, calling a blacklist interface to acquire blacklist information corresponding to the telephone number to be identified. In this way, the invalid call times of the blacklist interface can be effectively reduced.
Fig. 2 shows a flowchart of a blacklist index information database creation method of the present invention.
As shown in fig. 2, according to an embodiment of the present invention, the user invokes a full-scale interface of a blacklist early warning index service, obtains a private key of the user and full-scale blacklist index information, stores the information in a local data center, and establishes a blacklist index information database, including:
S202, the blacklist provider generates a user private key according to the identity information of the user,
And sending the user private key to the user's device terminal;
s204, the blacklist provider encrypts the blacklist number in the database through the private key of the user to obtain a Hash index value of the blacklist number;
s206, sorting the Hash index values of the blacklist numbers to obtain blacklist index information;
S208, transmitting the blacklist index information to the equipment terminal of the user through a full interface of a blacklist early warning index service;
and S210, the user stores the blacklist index information to a local data center, and a blacklist index information database is built.
It should be noted that, the user private key is a randomly generated character string, and the length of the user private key should be greater than 32 characters in order to prevent the private key from being cracked by an attacker. When a user acquires blacklist index information, the user logs in a blacklist early warning index service platform provided by a blacklist provider by inputting a user account number, a password, a verification code and the like, the blacklist early warning index service platform verifies login information (the user account number, the password, the verification code and the like) provided by the user, after verification is successful, identity information of the user is determined according to the user account number, and a user private key special for the user is generated according to the identity information of the user. The blacklist provider encrypts the blacklist number in the data by using the private key of the user, sorts the Hash index value obtained after encryption to obtain blacklist index information, and provides the blacklist index information to the user of the service enterprise or organization. The method and the system avoid unrestricted transmission of telephone numbers after the blacklist provider provides blacklist information to enterprises or institutions serving the service, and are not in accordance with the requirement of data security. Since the user private key is generated according to the identity information of the user, the user private key provided by the blacklist provider to each user is different. The user's equipment terminal may be a computer terminal or a mobile phone terminal, and the received blacklist index information is saved to the local data center through the equipment terminal.
According to an embodiment of the present invention, further comprising:
determining a Hash algorithm according to the data security level requirement;
and calculating the value range of the Hash index value according to the performance requirement of the unnecessary interface call times.
It should be noted that, before encrypting the blacklist number in the database, the Hash algorithm used for encryption needs to be determined, and parameters of the Hash function of the blacklist index are set, where the parameters of the Hash function include two values, namely, the user private key and the Hash index value. The user private key is generated according to the identity information of the user; the value range of the Hash index value is calculated according to the performance requirement of the unnecessary interface call times.
The Hash algorithm is an irreversible Hash algorithm and can be a non-cryptographic Hash algorithm or a cryptographic Hash algorithm, wherein the non-cryptographic Hash algorithm comprises MurmurHash series, cityHash, FNV, DJB2 Hash, jenkins Hash, CRC32 and the like; cryptographic Hash algorithms include SHA-256, SHA-3, SM3, BLAKE2, and the like. The choice of Hash algorithm is based mainly on the user's requirements on the security level of the data. In most cases MurmurHash is chosen, and if further increased difficulty in brute force cracking is required, SHA-256 or a similar cryptographic Hash algorithm may be chosen.
The Hash index value is usually an integer greater than 3 hundred million, and the specific value is calculated by the system according to the number of the blacklist numbers, the data transmission delay, the network bandwidth and the computing power resource. Reducing the number of unnecessary interface calls means reducing the number of times that a non-blacklist number calls a blacklist interface, assuming that the Hash value of a number hits the blacklist index, how likely the number does not belong to the blacklist number. If it is 1% probability, the unnecessary call count is reduced by 100 times. The larger this selected value, the larger the multiple of the decrease in the number of unnecessary calls.
Fig. 3 shows a flowchart of a blacklist index information database updating method according to the present invention.
As shown in fig. 3, according to an embodiment of the present invention, the periodically calling an incremental interface to update the blacklist index information database includes:
s302, a user periodically sends an increment acquisition request to a blacklist provider;
S304, the blacklist provider encrypts newly added blacklist numbers in a preset time interval in a database according to the private key of the user to obtain Hash index values of the newly added blacklist numbers;
S306, sorting the Hash index values of the newly added blacklist numbers to obtain newly added blacklist index information;
s308, the newly added blacklist index information is sent to the equipment terminal of the user through an increment interface of a blacklist early warning index service;
and S310, the user stores the newly added blacklist index information to a local data center, and updates the blacklist index information in a blacklist index information database.
It should be noted that, the preset time interval is a time interval between the current calling incremental interface time and the last calling incremental interface time, and the user may set a time interval for calling the incremental interface according to a user requirement, for example, the calling time interval is set to be called once a day, and the calling time is 12 a.m. each day. And acquiring the blacklist index information of the newly added blacklist number in the previous day by calling an increment interface, and updating the blacklist index information in the blacklist index information database in the local data center periodically. The device terminal of the user can be a computer terminal or a mobile phone terminal, and the received newly-added blacklist index information is stored in a local data center through the device terminal.
According to an embodiment of the present invention, further comprising:
Analyzing according to the private key of the user;
Updating the user private key when the risk exists in the user private key or the service time is greater than a first preset threshold value;
the blacklist provider calculates blacklist numbers in the database according to the updated private key of the user, and regenerates blacklist index data;
And the user calls the full interface to acquire regenerated blacklist index data, and replaces the blacklist index information database of the local data center through the regenerated blacklist index data.
In practical application, the key may be guessed and cracked by an attacker in a long-time use process, so that the user private key obtains the corresponding blacklist number, and loss is caused to the blacklist provider of the user, so that the key needs to be updated periodically to improve encryption security. The private key is updated periodically by setting a first preset threshold, and the updating method can be to replace the current private key with a new private key. The first preset threshold is determined according to the user use requirement and the actual application scene. And after the blacklist index information database of the local data center is replaced, the blacklist provider deletes the blacklist index data recorded in the database last time from the database. The leaked index information cannot be used for reversely pushing out the blacklist number, and is useless because it cannot be continuously updated in increments.
Meanwhile, under the condition that the blacklist index data and the secret key of the user are revealed due to some reasons, the user private secret key can be actively applied to update, and new blacklist index data can be obtained again.
According to an embodiment of the present invention, further comprising:
analyzing according to blacklist index information in the blacklist index information database, and determining the number of blacklist numbers corresponding to each blacklist index information;
marking blacklist index information of which the number of the corresponding blacklist numbers is larger than a second preset threshold value;
Calculating the duty ratio of the index information of the marked blacklist;
And when the duty ratio of the blacklist index information is larger than a third preset threshold value, adjusting the value range of the Hash index value when the blacklist index data is regenerated next time.
It should be noted that, because the value range of the blacklist number is greater than the value range of the Hash index value, the value range of the Hash index value is determined based on the number of blacklist numbers in the database when the full-scale interface is called for the first time, so that the number of blacklist numbers is increased in the subsequent updating process of the blacklist index information database, and one blacklist index information corresponds to a plurality of blacklist numbers. When the blacklist interface is called through the blacklist index information with a plurality of corresponding blacklist numbers, the blacklist information corresponding to one or more useless blacklist numbers is obtained on the basis of obtaining the blacklist information corresponding to the current telephone number to be identified, so that invalid call is caused, and network bandwidth and computing power resources are occupied. Therefore, the value range of the next Hash index value is adjusted by monitoring the duty ratio of the blacklist index information with a plurality of blacklist numbers, and the network bandwidth and the computational power resources of the blacklist provider during data transmission are reduced. The second preset threshold and the third preset threshold can be set by a person skilled in the art according to actual use requirements.
FIG. 4 illustrates a block diagram of a system for enhancing access performance across a data center blacklist interface in accordance with the present invention.
As shown in fig. 4, a second aspect of the present invention provides a system for enhancing access performance across a blacklist interface of a data center, comprising:
The blacklist index information database management module is used for calling the full-quantity interface of the blacklist early warning index service by a user, acquiring a private key of the user and full-quantity blacklist index information, storing the private key and the full-quantity blacklist index information in a local data center, and establishing a blacklist index information database; and periodically calling an increment interface to update the blacklist index information database;
the data acquisition module is used for acquiring a telephone number to be identified;
the Hash value calculation module is used for calculating the telephone number to be identified through the private key of the user to obtain a Hash value of the telephone number to be identified;
The data analysis module is used for inquiring in the blacklist index information database based on the Hash value of the telephone number to be identified and judging whether the blacklist index information with the same Hash value exists or not; if yes, judging that the telephone number to be identified has blacklist risk, and calling a blacklist interface based on the telephone number to be identified to acquire blacklist information corresponding to the telephone number to be identified; and if the telephone number to be identified does not exist, judging that the telephone number to be identified does not exist a blacklist risk.
According to the embodiment of the invention, a user refers to a user which is served by a blacklist provider and is required to use blacklist interface service, the blacklist provider firstly determines identity information of the user according to login information of the user, generates a user private key special for the user with the identity information of the user, selects a corresponding irreversible Hash algorithm and a value range of a Hash index value according to user requirements, carries out encryption calculation on blacklist data recorded in a database through the generated user private key, sends the obtained blacklist index information to terminal equipment of the user through a full interface, and the user establishes a blacklist index information database in a local data center according to the received blacklist index information. Under the condition, the user can only obtain the Hash index value of the blacklist number, and the original blacklist number cannot be obtained reversely, so that the data safety is ensured.
As shown in fig. 5, after the blacklist index information database is established, the user periodically invokes the increment interface (for example, once every day) to obtain the blacklist index information of the newly added blacklist number, and updates the blacklist index information database, so as to ensure the real-time property of the data. When a user needs to determine whether the telephone number to be identified is a blacklist number, calculating the telephone number to be identified through a private key of the user, inquiring (collision) in a local blacklist index information database by using a generated Hash value of the telephone number to be identified, if the telephone number to be identified is not hit, indicating that the telephone number to be identified has no blacklist risk, and if the telephone number to be identified is hit, calling a blacklist interface to acquire blacklist information corresponding to the telephone number to be identified. In this way, the invalid call times of the blacklist interface can be effectively reduced.
According to the embodiment of the invention, the user invokes the full-quantity interface of the blacklist early warning index service, obtains the private key of the user and the full-quantity blacklist index information and stores the information in the local data center, and establishes a blacklist index information database, which comprises the following steps:
the blacklist provider generates a user private key according to the identity information of the user and sends the user private key to the equipment terminal of the user;
the blacklist provider encrypts blacklist numbers in a database through the private key of the user to obtain Hash index values of the blacklist numbers;
sorting the Hash index values of the blacklist numbers to obtain blacklist index information;
transmitting the blacklist index information to the equipment terminal of the user through a full interface of a blacklist early warning index service;
And the user stores the blacklist index information to a local data center and establishes a blacklist index information database.
It should be noted that, the user private key is a randomly generated character string, and the length of the user private key should be greater than 32 characters in order to prevent the private key from being cracked by an attacker. When a user acquires blacklist index information, the user logs in a blacklist early warning index service platform provided by a blacklist provider by inputting a user account number, a password, a verification code and the like, the blacklist early warning index service platform verifies login information (the user account number, the password, the verification code and the like) provided by the user, after verification is successful, identity information of the user is determined according to the user account number, and a user private key special for the user is generated according to the identity information of the user. The blacklist provider encrypts the blacklist number in the data by using the private key of the user, sorts the Hash index value obtained after encryption to obtain blacklist index information, and provides the blacklist index information to the user of the service enterprise or organization. The method and the system avoid unrestricted transmission of telephone numbers after the blacklist provider provides blacklist information to enterprises or institutions serving the service, and are not in accordance with the requirement of data security. Since the user private key is generated according to the identity information of the user, the user private key provided by the blacklist provider to each user is different. The user's equipment terminal may be a computer terminal or a mobile phone terminal, and the received blacklist index information is saved to the local data center through the equipment terminal.
According to an embodiment of the present invention, further comprising:
determining a Hash algorithm according to the data security level requirement;
and calculating the value range of the Hash index value according to the performance requirement of the unnecessary interface call times.
It should be noted that, before encrypting the blacklist number in the database, the Hash algorithm used for encryption needs to be determined, and parameters of the Hash function of the blacklist index are set, where the parameters of the Hash function include two values, namely, the user private key and the Hash index value. The user private key is generated according to the identity information of the user; the value range of the Hash index value is calculated according to the performance requirement of the unnecessary interface call times.
The Hash algorithm is an irreversible Hash algorithm and can be a non-cryptographic Hash algorithm or a cryptographic Hash algorithm, wherein the non-cryptographic Hash algorithm comprises MurmurHash series, cityHash, FNV, DJB2 Hash, jenkins Hash, CRC32 and the like; cryptographic Hash algorithms include SHA-256, SHA-3, SM3, BLAKE2, and the like. The choice of Hash algorithm is based mainly on the user's requirements on the security level of the data. In most cases MurmurHash is chosen, and if further increased difficulty in brute force cracking is required, SHA-256 or a similar cryptographic Hash algorithm may be chosen.
The Hash index value is usually an integer greater than 3 hundred million, and the specific value is calculated by the system according to the number of the blacklist numbers, the data transmission delay, the network bandwidth and the computing power resource. Reducing the number of unnecessary interface calls means reducing the number of times that a non-blacklist number calls a blacklist interface, assuming that the Hash value of a number hits the blacklist index, how likely the number does not belong to the blacklist number. If it is 1% probability, the unnecessary call count is reduced by 100 times. The larger this selected value, the larger the multiple of the decrease in the number of unnecessary calls.
According to an embodiment of the present invention, the periodically calling an incremental interface to update the blacklist index information database includes:
the user periodically sends an increment acquisition request to the blacklist provider;
The blacklist provider encrypts newly added blacklist numbers in a preset time interval in a database according to the private key of the user to obtain Hash index values of the newly added blacklist numbers;
sorting the Hash index values of the newly added blacklist numbers to obtain newly added blacklist index information;
Transmitting the newly added blacklist index information to the equipment terminal of the user through an increment interface of a blacklist early warning index service;
And the user stores the newly added blacklist index information to a local data center and updates the blacklist index information in a blacklist index information database.
It should be noted that, the preset time interval is a time interval between the current calling incremental interface time and the last calling incremental interface time, and the user may set a time interval for calling the incremental interface according to a user requirement, for example, the calling time interval is set to be called once a day, and the calling time is 12 a.m. each day. And acquiring the blacklist index information of the newly added blacklist number in the previous day by calling an increment interface, and updating the blacklist index information in the blacklist index information database in the local data center periodically. The device terminal of the user can be a computer terminal or a mobile phone terminal, and the received newly-added blacklist index information is stored in a local data center through the device terminal.
According to an embodiment of the present invention, further comprising:
Analyzing according to the private key of the user;
Updating the user private key when the risk exists in the user private key or the service time is greater than a first preset threshold value;
the blacklist provider calculates blacklist numbers in the database according to the updated private key of the user, and regenerates blacklist index data;
And the user calls the full interface to acquire regenerated blacklist index data, and replaces the blacklist index information database of the local data center through the regenerated blacklist index data.
In practical application, the key may be guessed and cracked by an attacker in a long-time use process, so that the user private key obtains the corresponding blacklist number, and loss is caused to the blacklist provider of the user, so that the key needs to be updated periodically to improve encryption security. The private key is updated periodically by setting a first preset threshold, and the updating method can be to replace the current private key with a new private key. The first preset threshold is determined according to the user use requirement and the actual application scene. And after the blacklist index information database of the local data center is replaced, the blacklist provider deletes the blacklist index data recorded in the database last time from the database. The leaked index information cannot be used for reversely pushing out the blacklist number, and is useless because it cannot be continuously updated in increments.
Meanwhile, under the condition that the blacklist index data and the secret key of the user are revealed due to some reasons, the user private secret key can be actively applied to update, and new blacklist index data can be obtained again.
According to an embodiment of the present invention, further comprising:
analyzing according to blacklist index information in the blacklist index information database, and determining the number of blacklist numbers corresponding to each blacklist index information;
marking blacklist index information of which the number of the corresponding blacklist numbers is larger than a second preset threshold value;
Calculating the duty ratio of the index information of the marked blacklist;
And when the duty ratio of the blacklist index information is larger than a third preset threshold value, adjusting the value range of the Hash index value when the blacklist index data is regenerated next time.
It should be noted that, because the value range of the blacklist number is greater than the value range of the Hash index value, the value range of the Hash index value is determined based on the number of blacklist numbers in the database when the full-scale interface is called for the first time, so that the number of blacklist numbers is increased in the subsequent updating process of the blacklist index information database, and one blacklist index information corresponds to a plurality of blacklist numbers. When the blacklist interface is called through the blacklist index information with a plurality of corresponding blacklist numbers, the blacklist information corresponding to one or more useless blacklist numbers is obtained on the basis of obtaining the blacklist information corresponding to the current telephone number to be identified, so that invalid call is caused, and network bandwidth and computing power resources are occupied. Therefore, the value range of the next Hash index value is adjusted by monitoring the duty ratio of the blacklist index information with a plurality of blacklist numbers, and the network bandwidth and the computational power resources of the blacklist provider during data transmission are reduced. The second preset threshold and the third preset threshold can be set by a person skilled in the art according to actual use requirements.
A third aspect of the present invention provides a computer readable storage medium having embodied therein a method program for enhancing cross-data center blacklist interface access performance, the method program for enhancing cross-data center blacklist interface access performance, when executed by a processor, implementing the steps of the method for enhancing cross-data center blacklist interface access performance as described in any one of the preceding claims.
The invention discloses a method, a system and a medium for improving the access performance of a blacklist interface of a cross data center, wherein the method comprises the following steps: the user invokes a full-quantity interface of the blacklist early warning index service, acquires a private key of the user and full-quantity blacklist index information, stores the information in a local data center and establishes a blacklist index information database; and periodically calling an increment interface to update the blacklist index information database; acquiring a telephone number to be identified; calculating the telephone number to be identified through the private key of the user to obtain a Hash value of the telephone number to be identified; inquiring in a blacklist index information database based on the Hash value of the telephone number to be identified, and calling a blacklist interface through the telephone number to be identified with the blacklist index information to acquire blacklist information corresponding to the telephone number to be identified. And the calling performance of the blacklist interface is improved, and meanwhile, the data security of the blacklist service is ensured.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above described device embodiments are only illustrative, e.g. the division of the units is only one logical function division, and there may be other divisions in practice, such as: multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. In addition, the various components shown or discussed may be coupled or directly coupled or communicatively coupled to each other via some interface, whether indirectly coupled or communicatively coupled to devices or units, whether electrically, mechanically, or otherwise.
The units described above as separate components may or may not be physically separate, and components shown as units may or may not be physical units; can be located in one place or distributed to a plurality of network units; some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present invention may be integrated in one processing unit, or each unit may be separately used as one unit, or two or more units may be integrated in one unit; the integrated units may be implemented in hardware or in hardware plus software functional units.
Those of ordinary skill in the art will appreciate that: all or part of the steps for implementing the above method embodiments may be implemented by hardware related to program instructions, and the foregoing program may be stored in a computer readable storage medium, where the program, when executed, performs steps including the above method embodiments; and the aforementioned storage medium includes: a mobile storage device, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk or optical disk, or the like, which can store program codes.
Or the above-described integrated units of the invention may be stored in a computer-readable storage medium if implemented in the form of software functional modules and sold or used as separate products. Based on such understanding, the technical solutions of the embodiments of the present invention may be embodied in essence or a part contributing to the prior art in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a removable storage device, ROM, RAM, magnetic or optical disk, or other medium capable of storing program code.
Claims (7)
1. The method for improving the cross-data center blacklist interface access performance is characterized by comprising the following steps:
The user invokes a full-quantity interface of the blacklist early warning index service, acquires a private key of the user and full-quantity blacklist index information, stores the information in a local data center and establishes a blacklist index information database; and periodically calling an increment interface to update the blacklist index information database;
acquiring a telephone number to be identified;
calculating the telephone number to be identified through the user private key to obtain a Hash value of the telephone number to be identified;
Inquiring in a blacklist index information database based on the Hash value of the telephone number to be identified, and judging whether blacklist index information with the same Hash value exists or not;
If yes, judging that the telephone number to be identified has blacklist risk, and calling a blacklist interface based on the telephone number to be identified to acquire blacklist information corresponding to the telephone number to be identified;
If the telephone number to be identified does not exist, judging that the telephone number to be identified does not exist a blacklist risk;
The user invokes the full-quantity interface of the blacklist early warning index service, obtains the private key of the user and the full-quantity blacklist index information, stores the information in a local data center, and establishes a blacklist index information database, comprising:
the blacklist provider generates a user private key according to the identity information of the user, and sends the user private key to the equipment terminal of the user;
The blacklist provider encrypts the blacklist number in the database through the private key of the user to obtain a Hash index value of the blacklist number;
sorting the Hash index values of the blacklist numbers to obtain blacklist index information;
transmitting the blacklist index information to the equipment terminal of the user through a full interface of a blacklist early warning index service;
the user stores the blacklist index information to a local data center, and a blacklist index information database is established;
Further comprises:
analyzing according to blacklist index information in the blacklist index information database, and determining the number of blacklist numbers corresponding to each blacklist index information;
marking blacklist index information of which the number of the corresponding blacklist numbers is larger than a second preset threshold value;
Calculating the duty ratio of the index information of the marked blacklist;
and when the duty ratio of the marked blacklist index information is larger than a third preset threshold value, adjusting the value range of the Hash index value when the blacklist index data is regenerated next time.
2. The method for improving cross-data center blacklist interface access performance of claim 1, further comprising:
determining a Hash algorithm according to the data security level requirement;
Calculating the value range of the Hash index value according to the performance requirement of the unnecessary interface call times;
The unnecessary interface calling times are the times of calling the blacklist interface by the non-blacklist number.
3. The method for improving access performance across data center blacklist interfaces of claim 1, wherein the periodically invoking an incremental interface to update the blacklist index information database comprises:
the user periodically sends an increment acquisition request to the blacklist provider;
The blacklist provider encrypts newly added blacklist numbers in a preset time interval in a database according to the private key of the user to obtain Hash index values of the newly added blacklist numbers;
sorting the Hash index values of the newly added blacklist numbers to obtain newly added blacklist index information;
Transmitting the newly added blacklist index information to the equipment terminal of the user through an increment interface of a blacklist early warning index service;
And the user stores the newly added blacklist index information to a local data center and updates the blacklist index information in a blacklist index information database.
4. The method for improving cross-data center blacklist interface access performance of claim 1, further comprising:
Analyzing according to the private key of the user;
Updating the user private key when the risk exists in the user private key or the service time is greater than a first preset threshold value;
the blacklist provider calculates blacklist numbers in the database according to the updated private key of the user, and regenerates blacklist index data;
And the user calls the full interface to acquire regenerated blacklist index data, and replaces the blacklist index information database of the local data center through the regenerated blacklist index data.
5. Device for improving access performance of cross-data center blacklist interfaces, which is characterized by comprising:
The blacklist index information database management module is used for calling the full-quantity interface of the blacklist early warning index service by a user, acquiring a private key of the user and full-quantity blacklist index information, storing the private key and the full-quantity blacklist index information in a local data center, and establishing a blacklist index information database; and periodically calling an increment interface to update the blacklist index information database;
the data acquisition module is used for acquiring a telephone number to be identified;
the Hash value calculation module is used for calculating the telephone number to be identified through the private key of the user to obtain a Hash value of the telephone number to be identified;
The data analysis module is used for inquiring in the blacklist index information database based on the Hash value of the telephone number to be identified and judging whether the blacklist index information with the same Hash value exists or not; if yes, judging that the telephone number to be identified has blacklist risk, and calling a blacklist interface based on the telephone number to be identified to acquire blacklist information corresponding to the telephone number to be identified; if the telephone number to be identified does not exist, judging that the telephone number to be identified does not exist a blacklist risk;
The user invokes the full-quantity interface of the blacklist early warning index service, obtains the private key of the user and the full-quantity blacklist index information, stores the information in a local data center, and establishes a blacklist index information database, comprising:
the blacklist provider generates a user private key according to the identity information of the user, and sends the user private key to the equipment terminal of the user;
The blacklist provider encrypts the blacklist number in the database through the private key of the user to obtain a Hash index value of the blacklist number;
sorting the Hash index values of the blacklist numbers to obtain blacklist index information;
transmitting the blacklist index information to the equipment terminal of the user through a full interface of a blacklist early warning index service;
the user stores the blacklist index information to a local data center, and a blacklist index information database is established;
Further comprises:
analyzing according to blacklist index information in the blacklist index information database, and determining the number of blacklist numbers corresponding to each blacklist index information;
marking blacklist index information of which the number of the corresponding blacklist numbers is larger than a second preset threshold value;
Calculating the duty ratio of the index information of the marked blacklist;
and when the duty ratio of the marked blacklist index information is larger than a third preset threshold value, adjusting the value range of the Hash index value when the blacklist index data is regenerated next time.
6. The apparatus for enhancing access performance across data center blacklist interfaces as recited in claim 5, wherein the periodically invoking an incremental interface to update the blacklist index information database comprises:
the user periodically sends an increment acquisition request to the blacklist provider;
The blacklist provider encrypts newly added blacklist numbers in a preset time interval in a database according to the private key of the user to obtain Hash index values of the newly added blacklist numbers;
sorting the Hash index values of the newly added blacklist numbers to obtain newly added blacklist index information;
Transmitting the newly added blacklist index information to the equipment terminal of the user through an increment interface of a blacklist early warning index service;
And the user stores the newly added blacklist index information to a local data center and updates the blacklist index information in a blacklist index information database.
7. A computer readable storage medium, wherein the computer readable storage medium includes a method program for improving the access performance of the cross-data center blacklist interface, and the method program for improving the access performance of the cross-data center blacklist interface is executed by a processor, and implements the steps of the method for improving the access performance of the cross-data center blacklist interface according to any one of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311560928.0A CN117459634B (en) | 2023-11-22 | 2023-11-22 | Method, system and medium for improving cross-data center blacklist interface access performance |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311560928.0A CN117459634B (en) | 2023-11-22 | 2023-11-22 | Method, system and medium for improving cross-data center blacklist interface access performance |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117459634A CN117459634A (en) | 2024-01-26 |
CN117459634B true CN117459634B (en) | 2024-06-11 |
Family
ID=89594816
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311560928.0A Active CN117459634B (en) | 2023-11-22 | 2023-11-22 | Method, system and medium for improving cross-data center blacklist interface access performance |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117459634B (en) |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2011030012A (en) * | 2009-07-27 | 2011-02-10 | Casio Computer Co Ltd | Secret information management system |
WO2014169688A1 (en) * | 2013-04-17 | 2014-10-23 | Tencent Technology (Shenzhen) Company Limited | Method and system for identifying prank call, client, server, and storage medium |
US10034153B1 (en) * | 2015-11-19 | 2018-07-24 | Securus Technologies, Inc. | Creation and use of mobile communications device identities |
CN109327627A (en) * | 2018-11-27 | 2019-02-12 | 深圳声笑科技有限公司 | Telephone number recognition methods, device and storage medium based on block chain |
CN109756467A (en) * | 2017-11-07 | 2019-05-14 | 中国移动通信集团广东有限公司 | Method and device for identifying a phishing website |
WO2019214066A1 (en) * | 2018-05-09 | 2019-11-14 | 深圳壹账通智能科技有限公司 | Method and apparatus for re-establishing user database on blockchain, and device and medium |
CN111510415A (en) * | 2019-01-31 | 2020-08-07 | 中国移动通信集团终端有限公司 | Method, device, equipment and storage medium for sharing and identifying blacklist number |
WO2020193271A1 (en) * | 2019-03-28 | 2020-10-01 | British Telecommunications Public Limited Company | Spoof call detection in telephone network |
WO2021003980A1 (en) * | 2019-07-08 | 2021-01-14 | 深圳壹账通智能科技有限公司 | Blacklist sharing method and apparatus, computer device and storage medium |
CN113596844A (en) * | 2021-07-29 | 2021-11-02 | 恒安嘉新(北京)科技股份公司 | Early warning method, device, medium and electronic equipment based on data information |
CN113722419A (en) * | 2021-09-01 | 2021-11-30 | 中国电信股份有限公司 | Harassment mark data processing method, harassment mark data processing device, electronic equipment and medium |
CN113961764A (en) * | 2021-10-19 | 2022-01-21 | 平安国际智慧城市科技股份有限公司 | Identification method, device, equipment and storage medium of fraudulent call |
CN114064722A (en) * | 2021-11-15 | 2022-02-18 | 京东科技信息技术有限公司 | Intelligent customer service flow processing method and device, electronic equipment and storage medium |
CN116028950A (en) * | 2022-12-27 | 2023-04-28 | 西安电子科技大学 | Encryption database connection query optimization method under trusted execution environment based on hash |
CN116992486A (en) * | 2023-08-30 | 2023-11-03 | 中设数字技术有限公司 | Cryptography-based united blacklist multiparty privacy query method and system |
CN117033012A (en) * | 2023-07-17 | 2023-11-10 | 中国工商银行股份有限公司 | Query method and device for interface call blacklist, electronic equipment and storage medium |
-
2023
- 2023-11-22 CN CN202311560928.0A patent/CN117459634B/en active Active
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2011030012A (en) * | 2009-07-27 | 2011-02-10 | Casio Computer Co Ltd | Secret information management system |
WO2014169688A1 (en) * | 2013-04-17 | 2014-10-23 | Tencent Technology (Shenzhen) Company Limited | Method and system for identifying prank call, client, server, and storage medium |
US10034153B1 (en) * | 2015-11-19 | 2018-07-24 | Securus Technologies, Inc. | Creation and use of mobile communications device identities |
CN109756467A (en) * | 2017-11-07 | 2019-05-14 | 中国移动通信集团广东有限公司 | Method and device for identifying a phishing website |
WO2019214066A1 (en) * | 2018-05-09 | 2019-11-14 | 深圳壹账通智能科技有限公司 | Method and apparatus for re-establishing user database on blockchain, and device and medium |
CN109327627A (en) * | 2018-11-27 | 2019-02-12 | 深圳声笑科技有限公司 | Telephone number recognition methods, device and storage medium based on block chain |
CN111510415A (en) * | 2019-01-31 | 2020-08-07 | 中国移动通信集团终端有限公司 | Method, device, equipment and storage medium for sharing and identifying blacklist number |
WO2020193271A1 (en) * | 2019-03-28 | 2020-10-01 | British Telecommunications Public Limited Company | Spoof call detection in telephone network |
WO2021003980A1 (en) * | 2019-07-08 | 2021-01-14 | 深圳壹账通智能科技有限公司 | Blacklist sharing method and apparatus, computer device and storage medium |
CN113596844A (en) * | 2021-07-29 | 2021-11-02 | 恒安嘉新(北京)科技股份公司 | Early warning method, device, medium and electronic equipment based on data information |
CN113722419A (en) * | 2021-09-01 | 2021-11-30 | 中国电信股份有限公司 | Harassment mark data processing method, harassment mark data processing device, electronic equipment and medium |
CN113961764A (en) * | 2021-10-19 | 2022-01-21 | 平安国际智慧城市科技股份有限公司 | Identification method, device, equipment and storage medium of fraudulent call |
CN114064722A (en) * | 2021-11-15 | 2022-02-18 | 京东科技信息技术有限公司 | Intelligent customer service flow processing method and device, electronic equipment and storage medium |
CN116028950A (en) * | 2022-12-27 | 2023-04-28 | 西安电子科技大学 | Encryption database connection query optimization method under trusted execution environment based on hash |
CN117033012A (en) * | 2023-07-17 | 2023-11-10 | 中国工商银行股份有限公司 | Query method and device for interface call blacklist, electronic equipment and storage medium |
CN116992486A (en) * | 2023-08-30 | 2023-11-03 | 中设数字技术有限公司 | Cryptography-based united blacklist multiparty privacy query method and system |
Non-Patent Citations (2)
Title |
---|
张曼 ; 咸鹤群 ; 张曙光 ; .加密数据库快速关键词查询技术.计算机工程与应用.2018,(13),全文. * |
电话号码查询管理系统的设计与实现;蒋海明;任靖宇;刘媛;;电力系统通信;20110310(03);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN117459634A (en) | 2024-01-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109639642B (en) | MQTT-based security authentication method, device and storage medium | |
US20170041307A1 (en) | Identity authentication method and device | |
CN104768139B (en) | A kind of method and device that short message is sent | |
CN102271035A (en) | Password transmission method and device | |
CN109726578B (en) | Dynamic two-dimensional code anti-counterfeiting solution | |
CN110662184A (en) | Information pushing method and device, computer equipment and storage medium | |
CN112199412B (en) | Payment bill processing method based on block chain and block chain bill processing system | |
KR102421567B1 (en) | Internet access management service server capable of providing internet access management service based on terminal grouping and operating method thereof | |
CN114245323B (en) | Message processing method and device, computer equipment and storage medium | |
CN104917765A (en) | Attack prevention method, and equipment | |
CN110381049A (en) | A kind of WEB dynamic security defence method and system | |
CN111988644B (en) | Anti-stealing-link method, device, equipment and storage medium for network video | |
CN114239072B (en) | Block chain node management method and block chain network | |
CN105376733A (en) | Information processing method and electronic apparatus | |
GB2356530A (en) | Mobile authentication using authentication vector | |
CN111246407A (en) | Data encryption and decryption method and device for short message transmission | |
CN111224955A (en) | Service response method and system | |
CN117459634B (en) | Method, system and medium for improving cross-data center blacklist interface access performance | |
CN107995616B (en) | User behavior data processing method and device | |
CN118713892A (en) | A multi-factor authentication instant message processing method and system | |
EP2566126A1 (en) | Secure storage of provisioning data on network for control of lawful intercept | |
CN114553573B (en) | Identity authentication method and device | |
CN114692201B (en) | Multi-party security calculation method and system | |
AT&T | behavior.dvi | |
CN111163466B (en) | Method for 5G user terminal to access block chain, user terminal equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |