CN101902486A - Method and system for protecting security of personal information - Google Patents

Method and system for protecting security of personal information Download PDF

Info

Publication number
CN101902486A
CN101902486A CN2009100850452A CN200910085045A CN101902486A CN 101902486 A CN101902486 A CN 101902486A CN 2009100850452 A CN2009100850452 A CN 2009100850452A CN 200910085045 A CN200910085045 A CN 200910085045A CN 101902486 A CN101902486 A CN 101902486A
Authority
CN
China
Prior art keywords
party
subscriber
information
oneself
contact way
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2009100850452A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING XIEYOU JUXIN INFORMATION TECHNOLOGY Co Ltd
Original Assignee
BEIJING XIEYOU JUXIN INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING XIEYOU JUXIN INFORMATION TECHNOLOGY Co Ltd filed Critical BEIJING XIEYOU JUXIN INFORMATION TECHNOLOGY Co Ltd
Priority to CN2009100850452A priority Critical patent/CN101902486A/en
Publication of CN101902486A publication Critical patent/CN101902486A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a method and a system for protecting security of personal information. When an information security module starts, a monitoring module monitors the security setting of the personal information. If contacts of a user A are divided into friends, relatives, business, strangers, and other classes, the user A sets the personal information to be visual to the 'friends' only. A user B and a user C are in the classes of 'friends' and 'business' in a address list of the user A respectively, the user B can see the personal information of the user A, while the user C cannot see the personal information of the user A. Due to the adoption of the technical scheme, the method and the system can protect the personal information of the user to the greatest degree according to the public degree of the personal information set by the user and prevent the user information from being used in some commercial activities and causing inconvenience for the user; and the user information moment is in the most secure state at any time. Therefore, the aim of protecting the security of the user information is fulfilled.

Description

A kind of method and system of protecting personal information security
Technical field
The present invention relates to network information technology field, relate in particular to a kind of method and system of protecting personal information security.
Background technology
When a computer user carries out comings and goings on the net, usually need fill in personal information, user profile will expose like this, being used as commercialization probably. computer user or cellphone subscriber can receive a considerable amount of mass-sending Emails or sending grouped short message in one day, people will usually be subjected to bothering of this Email of unknown origin or short message, and this content mass-sending Email or short message much at one is referred to as " SPAM " or " junk short message ".Along with the development that information technology is maked rapid progress, network provides increasing facility to people, and when people's enjoy network brought their various service, just there were various potential threats in the information of user network.
In current this information age, information is the most valuable resource, and information security is the problem of the most worth drawing attention.
Summary of the invention
The objective of the invention is to propose a kind of method and system of protecting personal information security, can guarantee userspersonal information's high safety, realize the function of personal settings information disclosure object and information disclosure degree.
For reaching this purpose, the present invention by the following technical solutions:
May further comprise the steps:
The party A-subscriber preserves an online address book on a server and the own various information of input comprise own summary and contact way, the party A-subscriber according to different relational hierarchies definite oneself summary and that part information of contact way can be read by other people;
The party B-subscriber also preserves an online address book on described server and the own various information of input comprise own summary and contact way, the party B-subscriber according to different relational hierarchies definite oneself summary and that part information of contact way can be read by other people;
When summary and the contact way that the party B-subscriber visits the party A-subscriber, described server only shows that according to party A-subscriber's setting and party B-subscriber and party A-subscriber's relation the party A-subscriber allows can show under the described relation the definite summary of oneself and that part information of contact way;
Same summary and contact way of visiting the party B-subscriber as the party A-subscriber, described server only show that according to party B-subscriber's setting and party A-subscriber and party B-subscriber's relation the party B-subscriber allows can show under the described relation the definite summary of oneself and that part information of contact way; Described party A-subscriber allow to show under the described relation oneself definite summary and contact way that partly information and party B-subscriber allow to show under the described relation that the definite summary of oneself is the same or different with that part information of contact way, so depend on that fully the other side is to oneself fixed relational hierarchy.
The online address book of described A or the online address book of described B can be synchronized to the client of party A-subscriber or party B-subscriber's appointment.
Described client is fixture or mobile device.
Described different relational hierarchy comprises friend, commercial affairs, classmate, relatives and general.
For reaching this purpose, the present invention also adopts following system, it is characterized in that, described system comprises:
The A terminal equipment that the party A-subscriber uses, the party A-subscriber preserves an online address book on a server, and comprise own summary and contact way by the various information of A terminal equipment input oneself, the party A-subscriber according to different relational hierarchies definite oneself summary and that part information of contact way can be read by other people;
The B terminal equipment that the party B-subscriber uses, the party B-subscriber also preserves an online address book on described server, and comprise own summary and contact way by the various information of B terminal equipment input oneself, the party B-subscriber according to different relational hierarchies definite oneself summary and that part information of contact way can be read by other people;
When summary and the contact way of party B-subscriber by B terminal equipment visit party A-subscriber, described server only allows the B terminal equipment to show that the party A-subscriber allows can show under the described relation the definite summary of oneself and that part information of contact way according to party A-subscriber's setting and party B-subscriber and party A-subscriber's relation;
Same when summary and the contact way of party A-subscriber by A terminal equipment visit party B-subscriber, described server only allows the A terminal equipment only to show that the party B-subscriber allows can show under the described relation the definite summary of oneself and that part information of contact way according to party B-subscriber's setting and party A-subscriber and party B-subscriber's relation; Described party A-subscriber allow to show under the described relation oneself definite summary and contact way that partly information and party B-subscriber allow to show under the described relation that the definite summary of oneself is the same or different with that part information of contact way, so depend on that fully the other side is to oneself fixed relational hierarchy.
Adopted technical scheme of the present invention, for the user provides personal settings, the user can be provided with the extent of disclosure of personal information according to the wish of oneself, and different people is disclosed different information, thereby realizes protection userspersonal information purpose of safety.
Description of drawings
Fig. 1 is the functional structure chart of an a kind of embodiment of contact book management system;
Fig. 2 is the system configuration schematic diagram of protection personal information security in the one embodiment of the invention;
Fig. 3 is the schematic diagram that contact person's grouping is set in the one embodiment of the invention;
Fig. 4 is the schematic diagram that configuration information is openly spent in the one embodiment of the invention;
Fig. 5 is the flow chart of protection personal information security in the one embodiment of the invention.
Embodiment
Further specify technical scheme of the present invention below in conjunction with accompanying drawing and by embodiment.
The main thought of technical solution of the present invention is that the user can be provided with the open degree and the disclosed object of personal information, to guarantee userspersonal information's high safety.
The technical scheme of this protection personal information security can realize by hardware, equally also can be realized by software, and perhaps the combination by software and hardware realizes.
At first introduce contact book management system below, so that the technical scheme of the protection personal information security that the present invention proposes to be described.
Fig. 1 is the functional structure chart of an a kind of embodiment of contact book management system.As shown in Figure 1, this contact book management system comprises communicating terminal 10, management server 20 and is used to store the database 30 of data, communicating terminal 10 can be communication terminal 12 or terminal 14, described communication terminal 12 can be a mobile phone, also can be that palm computer or other have the portable electronic equipment of communication capacity, can also be the fixed communication terminal.In certain embodiments, also can do management server 20 and database 30 as a whole.
Communication terminal 12 can communicate by communication network and other communication terminals or terminal, include the address list of record associated person information in the communication terminal 12, every the associated person information record can include contact person's user name (Identifier, be called for short ID), contact name, contact method and other information, wherein contact person ID is used for the pairing contact person of unique identification in management server 20 scopes, contact person ID generally can not be presented in the address list, contact name is the address of the user of communication terminal 12 for this contact person's appointment or the own appointment of this contact person, contact method can comprise Mobile Directory Number or/and landline telephone etc. can also comprise e-mail address.
Terminal 14 can utilize e-mail system (such as outlook, lotus notes) communicates by the Internet and other terminals or communication terminal, in the e-mail system of terminal 14, include the address list that records associated person information, here every associated person information record can be just the same or partly the same with the associated person information content in the communication terminal 12, can include contact name, contact method and other information, wherein said contact method can comprise e-mail address, can also comprise Mobile Directory Number or/and landline telephone.
Out of Memory can comprise that the contact person reached information such as present post and company in the past.In some embodiments, other information can comprise service (as: letting agency) that the contact person can provide and the ability of getting in touch other people (as: understanding car trading field occurrences in human life).According to communication terminal 12 display performances or its function, the associated person information content in the communication terminal 12 can be confined to contact name, and telephone number and e-mail address perhaps expand to contact person's out of Memory.
If contact book management system is exactly a website, such as www.mingoe.com, for the more effective protection of energy user's personal information security, the method for one of them is exactly to allow user oneself that the open object and the extent of disclosure of personal information are set.
Fig. 2 is the system configuration schematic diagram of protection personal information security in the one embodiment of the invention.As shown in Figure 2, this system comprises source information terminal 102 and target information terminal 103, and wherein source information terminal 102 and target information terminal 103 can be computers, also can be fixed communication terminal or mobile communication terminal.
In source information terminal 102, comprised information security module 105 and monitoring module 104, information security module 105 is to be used for carrying out data by communication network or the Internet with other information terminals to exchange.
Monitoring module 104 is user side plug-in units, can download from management server, also can directly embed installation, is used to monitor address list.
Information security module 105 inside also comprise an information preservation unit 106, are used for the communications records of storing contact, as contact name, phone number, e-mail address or other information.
This system also comprises a management server 101 in addition, and management server 101 can upgrade by 105 pairs of monitoring modules 104 of information security module, also can the associated person information record that information is preserved in the unit 106 be upgraded.
For example, the registered user's of a website computer is referred to as source information terminal here, use the information security module to store personal information, for user's convenience, information is preserved the unit will provide a address list, whole records of its address list record registered user and other people exchange message.
Now a monitoring module is inserted in the address list monitoring module monitoring address list.If during the personal information of user's preservation or renewal oneself, this monitoring module is triggered and according to the security set of user to personal information, makes user's information only open to open object.
Fig. 3 is the schematic diagram that contact person's grouping is set in the one embodiment of the invention.
Fig. 4 is the schematic diagram that configuration information is openly spent in the one embodiment of the invention.The registered user Zhang San of website, people Li Si is related in the grouping of his address list " friend ", as Li Si, when king five checks Zhang San's information, the setting that monitoring module is openly spent personal information according to Zhang San, Li Si, king five can see that Zhang San is to his disclosed information.
If Zhang San's personal information comprises: e-mail address, phone, mobile phone, company etc.Li Si is the contact person of " friend " grouping in Zhang San's address list, king five is contact persons of " commercial affairs " grouping in Zhang San's address list, contact person's visual information that Zhang San is provided with " friend " grouping is: email, phone, the contact person that " commercial affairs " grouping is set cannot see any information, so Li Si check Zhang San information the time only seeing Zhang San email, phone, king five just can't see any contact details.
It should be noted that this example and one of different places of technology formerly are that the user can allow different people see own different information.The contact person of user elder generation is set to a certain group in the address list, and the extent of disclosure of certain group contact person to personal information is set then.
The monitoring module setting is preserved the unit with information and is worked.The exchange message security module starts operation, and monitoring module just moves the address list in the monitoring information preservation unit together.If the information terminal user preserves or upgrade the personal information of oneself, monitoring module will produce a prompting automatically, by the information security module, and according to the security set of user to personal information, the open different contact details of information terminal of giving correspondence.
Fig. 5 is the flow chart of protection userspersonal information safety in the one embodiment of the invention.As shown in Figure 5, user's flow process that open object of personal information and extent of disclosure be set specifically comprises the steps (order can be done certain change according to actual conditions).
Step 102, the user is provided with the classification of contact person in the address list, is not that the acquiescence in address list is classified as the stranger.
Step 104, monitoring module are opened operation simultaneously, openly are provided with personal information in the monitoring information security module.
Step 106, the monitoring module monitor user ' is to the security set of personal information.
Step 108, the user preserves or upgrades personal information, and the automatic monitor user ' of monitoring module is provided with the open object and the extent of disclosure of personal information.
Step 110 determines the whether open of personal information.User A has been provided with contact person's grouping in the step 102, is exactly now to judge whether user B is the object of information disclosure.
Step 112, monitoring module read the setting that user A personal information is openly spent, and judge whether user B can see the information of user A, and user B is if the friend of user A, and user B can see the information of user A so.
Step 114, monitoring module read the setting that user A personal information is openly spent, and judge whether user B can see the information of user A, and user B is if not the friend of user A, and user B cannot see the information of user A so.
The above; only for the preferable embodiment of the present invention, but protection scope of the present invention is not limited thereto, and anyly is familiar with the people of this technology in the disclosed technical scope of the present invention; the variation that can expect easily or replacement all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claim.

Claims (5)

1. a method of protecting personal information security is characterized in that, may further comprise the steps:
The party A-subscriber preserves an online address book on a server and the own various information of input comprise own summary and contact way, the party A-subscriber according to different relational hierarchies definite oneself summary and that part information of contact way can be read by other people;
The party B-subscriber also preserves an online address book on described server and the own various information of input comprise own summary and contact way, the party B-subscriber according to different relational hierarchies definite oneself summary and that part information of contact way can be read by other people;
When summary and the contact way that the party B-subscriber visits the party A-subscriber, described server only shows that according to party A-subscriber's setting and party B-subscriber and party A-subscriber's relation the party A-subscriber allows can show under the described relation the definite summary of oneself and that part information of contact way;
Same summary and contact way of visiting the party B-subscriber as the party A-subscriber, described server only show that according to party B-subscriber's setting and party A-subscriber and party B-subscriber's relation the party B-subscriber allows can show under the described relation the definite summary of oneself and that part information of contact way; Described party A-subscriber allow to show under the described relation oneself definite summary and contact way that partly information and party B-subscriber allow to show under the described relation that the definite summary of oneself is the same or different with that part information of contact way, so depend on that fully the other side is to oneself fixed relational hierarchy.
2. the method for protection personal information security according to claim 1 is characterized in that, the online address book of described A or the online address book of described B can be synchronized to the client of party A-subscriber or party B-subscriber's appointment.
3. according to the method for claim 1 or 2 described protection personal information securities, it is characterized in that described client is fixture or mobile device.
4. the method for protection personal information security according to claim 1 is characterized in that, described different relational hierarchy comprises friend, commercial affairs, classmate, relatives and general.
5. a system that protects personal information security is characterized in that, described system comprises:
The A terminal equipment that the party A-subscriber uses, the party A-subscriber preserves an online address book on a server, and comprise own summary and contact way by the various information of A terminal equipment input oneself, the party A-subscriber according to different relational hierarchies definite oneself summary and that part information of contact way can be read by other people;
The B terminal equipment that the party B-subscriber uses, the party B-subscriber also preserves an online address book on described server, and comprise own summary and contact way by the various information of B terminal equipment input oneself, the party B-subscriber according to different relational hierarchies definite oneself summary and that part information of contact way can be read by other people;
When summary and the contact way of party B-subscriber by B terminal equipment visit party A-subscriber, described server only allows the B terminal equipment to show that the party A-subscriber allows can show under the described relation the definite summary of oneself and that part information of contact way according to party A-subscriber's setting and party B-subscriber and party A-subscriber's relation;
Same when summary and the contact way of party A-subscriber by A terminal equipment visit party B-subscriber, described server only allows the A terminal equipment only to show that the party B-subscriber allows can show under the described relation the definite summary of oneself and that part information of contact way according to party B-subscriber's setting and party A-subscriber and party B-subscriber's relation; Described party A-subscriber allow to show under the described relation oneself definite summary and contact way that partly information and party B-subscriber allow to show under the described relation that the definite summary of oneself is the same or different with that part information of contact way, so depend on that fully the other side is to oneself fixed relational hierarchy.
CN2009100850452A 2009-05-27 2009-05-27 Method and system for protecting security of personal information Pending CN101902486A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009100850452A CN101902486A (en) 2009-05-27 2009-05-27 Method and system for protecting security of personal information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100850452A CN101902486A (en) 2009-05-27 2009-05-27 Method and system for protecting security of personal information

Publications (1)

Publication Number Publication Date
CN101902486A true CN101902486A (en) 2010-12-01

Family

ID=43227687

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100850452A Pending CN101902486A (en) 2009-05-27 2009-05-27 Method and system for protecting security of personal information

Country Status (1)

Country Link
CN (1) CN101902486A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015014310A1 (en) * 2013-08-02 2015-02-05 Tencent Technology (Shenzhen) Company Limited Method, apparatus, and server for displaying information
CN107766785A (en) * 2017-01-25 2018-03-06 丁贤根 A kind of face recognition method
CN110163001A (en) * 2019-05-20 2019-08-23 北京字节跳动网络技术有限公司 Information display method and device based on customer relationship
CN110377857A (en) * 2019-06-25 2019-10-25 北京达佳互联信息技术有限公司 A kind of display information processing method, device, electronic equipment and storage medium

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015014310A1 (en) * 2013-08-02 2015-02-05 Tencent Technology (Shenzhen) Company Limited Method, apparatus, and server for displaying information
CN104348706A (en) * 2013-08-02 2015-02-11 腾讯科技(深圳)有限公司 Information display method and device and server
CN107766785A (en) * 2017-01-25 2018-03-06 丁贤根 A kind of face recognition method
CN107766785B (en) * 2017-01-25 2022-04-29 丁贤根 Face recognition method
CN110163001A (en) * 2019-05-20 2019-08-23 北京字节跳动网络技术有限公司 Information display method and device based on customer relationship
CN110377857A (en) * 2019-06-25 2019-10-25 北京达佳互联信息技术有限公司 A kind of display information processing method, device, electronic equipment and storage medium
CN110377857B (en) * 2019-06-25 2021-11-02 北京达佳互联信息技术有限公司 Display information processing method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN103024061B (en) Network communication contact book shared system and method
CN107533619A (en) Workflow device is simulated by Social Engineering
US20130252588A1 (en) Computerized System and Method of Recording Communications Between Parties Using Telecommunications Devices
US20140280632A1 (en) Method and system for secure social networking on feature phones
CN102917035A (en) Address book updating method and system
WO2009108534A2 (en) Aggregated view of local and remote social information
CN103179245B (en) Incoming phone number identification system and method
CN102611746B (en) Method and system for sharing contact person information
CN101668263A (en) System for receiving and dispatching mail based on short message platform of mobile phone and method for processing mail attachment
CN104602242A (en) Method and device for preventing voice phishing
EP2040497B1 (en) Tracking mobile communication devices
CN104917796A (en) Credit account creating method, system and method
US20230214376A1 (en) System and Method for Capturing Data Sent by a Mobile Device
CN101902486A (en) Method and system for protecting security of personal information
CN103493077A (en) Method and apparatus for the processing of data relating to calendar entries
CN102664994A (en) Method and system for friend relation authentication through contacts on mobile terminals
CN100375546C (en) Apparatus and method for automatic network storage of short messages received by mobile telephone
US10616234B2 (en) System and method for facilitating communications between inmates and non-inmates
CN104601442B (en) A kind of information updating method and device
CN101370298B (en) Method for improving call transfer reliability
US10498840B2 (en) Method and system for efficient review of exchanged content
CN102469457A (en) Communication system and synchronization and maintenance method of address list information
CN102711111A (en) Intelligent firewall device and intelligent firewall method for mobile phones
CN104301876B (en) The method and apparatus of transmission of message
CN102045446B (en) Contact management method and system

Legal Events

Date Code Title Description
C57 Notification of unclear or unknown address
DD01 Delivery of document by public notice

Addressee: Zhang Lei

Document name: Notification of Passing Preliminary Examination of the Application for Invention

C06 Publication
PB01 Publication
DD01 Delivery of document by public notice

Addressee: Zhang Lei

Document name: Notification of Publication of the Application for Invention

DD01 Delivery of document by public notice

Addressee: Beijing Xieyou Juxin Information Technology Co., Ltd. Zhang Lei

Document name: Notification of before Expiration of Request of Examination as to Substance

DD01 Delivery of document by public notice

Addressee: Beijing friends with a letter of Information Technology Co., Ltd. Zhang Lei

Document name: Notification that Application Deemed to be Withdrawn

C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20101201