Summary of the invention
The objective of the invention is to propose a kind of method and system of protecting personal information security, can guarantee userspersonal information's high safety, realize the function of personal settings information disclosure object and information disclosure degree.
For reaching this purpose, the present invention by the following technical solutions:
May further comprise the steps:
The party A-subscriber preserves an online address book on a server and the own various information of input comprise own summary and contact way, the party A-subscriber according to different relational hierarchies definite oneself summary and that part information of contact way can be read by other people;
The party B-subscriber also preserves an online address book on described server and the own various information of input comprise own summary and contact way, the party B-subscriber according to different relational hierarchies definite oneself summary and that part information of contact way can be read by other people;
When summary and the contact way that the party B-subscriber visits the party A-subscriber, described server only shows that according to party A-subscriber's setting and party B-subscriber and party A-subscriber's relation the party A-subscriber allows can show under the described relation the definite summary of oneself and that part information of contact way;
Same summary and contact way of visiting the party B-subscriber as the party A-subscriber, described server only show that according to party B-subscriber's setting and party A-subscriber and party B-subscriber's relation the party B-subscriber allows can show under the described relation the definite summary of oneself and that part information of contact way; Described party A-subscriber allow to show under the described relation oneself definite summary and contact way that partly information and party B-subscriber allow to show under the described relation that the definite summary of oneself is the same or different with that part information of contact way, so depend on that fully the other side is to oneself fixed relational hierarchy.
The online address book of described A or the online address book of described B can be synchronized to the client of party A-subscriber or party B-subscriber's appointment.
Described client is fixture or mobile device.
Described different relational hierarchy comprises friend, commercial affairs, classmate, relatives and general.
For reaching this purpose, the present invention also adopts following system, it is characterized in that, described system comprises:
The A terminal equipment that the party A-subscriber uses, the party A-subscriber preserves an online address book on a server, and comprise own summary and contact way by the various information of A terminal equipment input oneself, the party A-subscriber according to different relational hierarchies definite oneself summary and that part information of contact way can be read by other people;
The B terminal equipment that the party B-subscriber uses, the party B-subscriber also preserves an online address book on described server, and comprise own summary and contact way by the various information of B terminal equipment input oneself, the party B-subscriber according to different relational hierarchies definite oneself summary and that part information of contact way can be read by other people;
When summary and the contact way of party B-subscriber by B terminal equipment visit party A-subscriber, described server only allows the B terminal equipment to show that the party A-subscriber allows can show under the described relation the definite summary of oneself and that part information of contact way according to party A-subscriber's setting and party B-subscriber and party A-subscriber's relation;
Same when summary and the contact way of party A-subscriber by A terminal equipment visit party B-subscriber, described server only allows the A terminal equipment only to show that the party B-subscriber allows can show under the described relation the definite summary of oneself and that part information of contact way according to party B-subscriber's setting and party A-subscriber and party B-subscriber's relation; Described party A-subscriber allow to show under the described relation oneself definite summary and contact way that partly information and party B-subscriber allow to show under the described relation that the definite summary of oneself is the same or different with that part information of contact way, so depend on that fully the other side is to oneself fixed relational hierarchy.
Adopted technical scheme of the present invention, for the user provides personal settings, the user can be provided with the extent of disclosure of personal information according to the wish of oneself, and different people is disclosed different information, thereby realizes protection userspersonal information purpose of safety.
Embodiment
Further specify technical scheme of the present invention below in conjunction with accompanying drawing and by embodiment.
The main thought of technical solution of the present invention is that the user can be provided with the open degree and the disclosed object of personal information, to guarantee userspersonal information's high safety.
The technical scheme of this protection personal information security can realize by hardware, equally also can be realized by software, and perhaps the combination by software and hardware realizes.
At first introduce contact book management system below, so that the technical scheme of the protection personal information security that the present invention proposes to be described.
Fig. 1 is the functional structure chart of an a kind of embodiment of contact book management system.As shown in Figure 1, this contact book management system comprises communicating terminal 10, management server 20 and is used to store the database 30 of data, communicating terminal 10 can be communication terminal 12 or terminal 14, described communication terminal 12 can be a mobile phone, also can be that palm computer or other have the portable electronic equipment of communication capacity, can also be the fixed communication terminal.In certain embodiments, also can do management server 20 and database 30 as a whole.
Communication terminal 12 can communicate by communication network and other communication terminals or terminal, include the address list of record associated person information in the communication terminal 12, every the associated person information record can include contact person's user name (Identifier, be called for short ID), contact name, contact method and other information, wherein contact person ID is used for the pairing contact person of unique identification in management server 20 scopes, contact person ID generally can not be presented in the address list, contact name is the address of the user of communication terminal 12 for this contact person's appointment or the own appointment of this contact person, contact method can comprise Mobile Directory Number or/and landline telephone etc. can also comprise e-mail address.
Terminal 14 can utilize e-mail system (such as outlook, lotus notes) communicates by the Internet and other terminals or communication terminal, in the e-mail system of terminal 14, include the address list that records associated person information, here every associated person information record can be just the same or partly the same with the associated person information content in the communication terminal 12, can include contact name, contact method and other information, wherein said contact method can comprise e-mail address, can also comprise Mobile Directory Number or/and landline telephone.
Out of Memory can comprise that the contact person reached information such as present post and company in the past.In some embodiments, other information can comprise service (as: letting agency) that the contact person can provide and the ability of getting in touch other people (as: understanding car trading field occurrences in human life).According to communication terminal 12 display performances or its function, the associated person information content in the communication terminal 12 can be confined to contact name, and telephone number and e-mail address perhaps expand to contact person's out of Memory.
If contact book management system is exactly a website, such as www.mingoe.com, for the more effective protection of energy user's personal information security, the method for one of them is exactly to allow user oneself that the open object and the extent of disclosure of personal information are set.
Fig. 2 is the system configuration schematic diagram of protection personal information security in the one embodiment of the invention.As shown in Figure 2, this system comprises source information terminal 102 and target information terminal 103, and wherein source information terminal 102 and target information terminal 103 can be computers, also can be fixed communication terminal or mobile communication terminal.
In source information terminal 102, comprised information security module 105 and monitoring module 104, information security module 105 is to be used for carrying out data by communication network or the Internet with other information terminals to exchange.
Monitoring module 104 is user side plug-in units, can download from management server, also can directly embed installation, is used to monitor address list.
Information security module 105 inside also comprise an information preservation unit 106, are used for the communications records of storing contact, as contact name, phone number, e-mail address or other information.
This system also comprises a management server 101 in addition, and management server 101 can upgrade by 105 pairs of monitoring modules 104 of information security module, also can the associated person information record that information is preserved in the unit 106 be upgraded.
For example, the registered user's of a website computer is referred to as source information terminal here, use the information security module to store personal information, for user's convenience, information is preserved the unit will provide a address list, whole records of its address list record registered user and other people exchange message.
Now a monitoring module is inserted in the address list monitoring module monitoring address list.If during the personal information of user's preservation or renewal oneself, this monitoring module is triggered and according to the security set of user to personal information, makes user's information only open to open object.
Fig. 3 is the schematic diagram that contact person's grouping is set in the one embodiment of the invention.
Fig. 4 is the schematic diagram that configuration information is openly spent in the one embodiment of the invention.The registered user Zhang San of website, people Li Si is related in the grouping of his address list " friend ", as Li Si, when king five checks Zhang San's information, the setting that monitoring module is openly spent personal information according to Zhang San, Li Si, king five can see that Zhang San is to his disclosed information.
If Zhang San's personal information comprises: e-mail address, phone, mobile phone, company etc.Li Si is the contact person of " friend " grouping in Zhang San's address list, king five is contact persons of " commercial affairs " grouping in Zhang San's address list, contact person's visual information that Zhang San is provided with " friend " grouping is: email, phone, the contact person that " commercial affairs " grouping is set cannot see any information, so Li Si check Zhang San information the time only seeing Zhang San email, phone, king five just can't see any contact details.
It should be noted that this example and one of different places of technology formerly are that the user can allow different people see own different information.The contact person of user elder generation is set to a certain group in the address list, and the extent of disclosure of certain group contact person to personal information is set then.
The monitoring module setting is preserved the unit with information and is worked.The exchange message security module starts operation, and monitoring module just moves the address list in the monitoring information preservation unit together.If the information terminal user preserves or upgrade the personal information of oneself, monitoring module will produce a prompting automatically, by the information security module, and according to the security set of user to personal information, the open different contact details of information terminal of giving correspondence.
Fig. 5 is the flow chart of protection userspersonal information safety in the one embodiment of the invention.As shown in Figure 5, user's flow process that open object of personal information and extent of disclosure be set specifically comprises the steps (order can be done certain change according to actual conditions).
Step 102, the user is provided with the classification of contact person in the address list, is not that the acquiescence in address list is classified as the stranger.
Step 104, monitoring module are opened operation simultaneously, openly are provided with personal information in the monitoring information security module.
Step 106, the monitoring module monitor user ' is to the security set of personal information.
Step 108, the user preserves or upgrades personal information, and the automatic monitor user ' of monitoring module is provided with the open object and the extent of disclosure of personal information.
Step 110 determines the whether open of personal information.User A has been provided with contact person's grouping in the step 102, is exactly now to judge whether user B is the object of information disclosure.
Step 112, monitoring module read the setting that user A personal information is openly spent, and judge whether user B can see the information of user A, and user B is if the friend of user A, and user B can see the information of user A so.
Step 114, monitoring module read the setting that user A personal information is openly spent, and judge whether user B can see the information of user A, and user B is if not the friend of user A, and user B cannot see the information of user A so.
The above; only for the preferable embodiment of the present invention, but protection scope of the present invention is not limited thereto, and anyly is familiar with the people of this technology in the disclosed technical scope of the present invention; the variation that can expect easily or replacement all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claim.