CN111708559A - Data updating method and device, electronic equipment and storage medium - Google Patents

Data updating method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN111708559A
CN111708559A CN202010552406.6A CN202010552406A CN111708559A CN 111708559 A CN111708559 A CN 111708559A CN 202010552406 A CN202010552406 A CN 202010552406A CN 111708559 A CN111708559 A CN 111708559A
Authority
CN
China
Prior art keywords
privacy
user
data
terminal equipment
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010552406.6A
Other languages
Chinese (zh)
Inventor
黄德俊
唐博
邓密密
罗阿文
康红娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Hongwei Technology Co Ltd
Original Assignee
Sichuan Hongwei Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Hongwei Technology Co Ltd filed Critical Sichuan Hongwei Technology Co Ltd
Priority to CN202010552406.6A priority Critical patent/CN111708559A/en
Publication of CN111708559A publication Critical patent/CN111708559A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application provides a data updating method, a data updating device, electronic equipment and a storage medium. The method comprises the following steps: receiving a data updating request sent by terminal equipment, wherein the data updating request comprises a first privacy ID and a second privacy ID; the first privacy ID is a privacy ID currently used by the terminal equipment, and the second privacy ID is a privacy ID to be updated by the terminal equipment; and unbinding the first privacy ID from the user ID corresponding to the terminal equipment, and binding the second privacy ID with the user ID. In the embodiment of the application, the privacy ID corresponding to the terminal device is updatable, so that the user can update the privacy ID regularly or irregularly, the binding relationship between the privacy ID before updating and the user data is released, even if the user takes the previous privacy ID, the data corresponding to the updated privacy ID cannot be acquired, and the data of the user are prevented from being leaked.

Description

Data updating method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of information security technologies, and in particular, to a data updating method, apparatus, electronic device, and storage medium.
Background
In order to distinguish the identity of the electronic device, the electronic device typically generates a unique device identifier for the electronic device before shipment, or registers a unique device identifier for the electronic device after shipment, and the device identifier is fixed.
Taking temperature measuring bracelets as an example, each temperature measuring bracelet has a corresponding equipment identification, the temperature measuring bracelets are used for detecting body temperature data of a wearing user and position information of the wearing user at the current moment, the body temperature data, the position information and the corresponding equipment identification are sent to corresponding servers together, and the servers store the body temperature data, the position information and the corresponding equipment identification together. Meanwhile, the equipment identification is also bound with the user identification corresponding to the user identity information. Once the device identification or user identification is obtained by others, some sensitive information of the wearing user is at risk of being revealed.
Disclosure of Invention
An object of the embodiments of the present application is to provide a data updating method, an apparatus, an electronic device, and a storage medium, so as to improve security of user private data.
In a first aspect, an embodiment of the present application provides a data updating method, including: receiving a data updating request sent by terminal equipment, wherein the data updating request comprises a first privacy ID and a second privacy ID; the first privacy ID is a privacy ID currently used by the terminal equipment, and the second privacy ID is a privacy ID to be updated by the terminal equipment; and unbinding the first privacy ID and the user ID corresponding to the terminal equipment, and binding the second privacy ID and the user ID.
In the embodiment of the application, the privacy ID corresponding to the terminal device is updatable, so that the user can update the privacy ID regularly or irregularly, the binding relationship between the privacy ID before updating and the user data is released, even if the user takes the previous privacy ID, the data corresponding to the updated privacy ID cannot be acquired, and the risk that the data of the user is leaked is reduced.
Further, the second privacy ID is obtained by signing through a device private key; before unbinding the first privacy ID from the user ID corresponding to the terminal device, the method further comprises: acquiring a public key corresponding to the terminal equipment according to the first privacy ID, and verifying the signature of the second privacy ID by using the public key; and if the signature verification is passed, executing a step of unbinding the first privacy ID and the user ID corresponding to the terminal equipment.
According to the embodiment of the application, the terminal equipment signs the second privacy ID through the private key, the server checks the signature through the public key, the privacy ID is updated after the signature passes, and other people are prevented from randomly changing the privacy ID, so that the safety of user data is improved.
Further, before obtaining the public key corresponding to the terminal device according to the first privacy ID, the method further includes: receiving key information sent by the terminal equipment, wherein the key information comprises a public key and a first privacy ID corresponding to the terminal equipment; the public key is generated in the terminal equipment; and correspondingly storing the public key and the first privacy ID. The identity of the terminal equipment can be confirmed through the public and private keys, and the privacy ID can be prevented from being updated by other people pretending to be the terminal equipment.
Further, after receiving the ID update request sent by the terminal device, the method further includes: acquiring historical physiological parameters corresponding to the first privacy ID and a preset time period away from the current time; and if the historical physiological parameters are abnormal, prohibiting the operation of updating the data. Users with abnormal physiological parameters are prevented from deleting abnormal data of the users.
Further, after binding the second privacy ID with the user ID, the method further comprises: receiving user data uploaded by a terminal device, wherein the user data comprises physiological parameters, behavior parameters and a second privacy ID of the terminal device of a detected user; and acquiring a corresponding user ID according to the second privacy ID, and correspondingly storing the physiological parameters and the behavior parameters of the detected user and the user ID corresponding to the second privacy ID.
Further, the behavior parameter includes location information of the terminal device; the method further comprises the following steps: acquiring physiological parameters and behavior parameters of all detected users within the preset range of the position information, which are the latest time from the current time; and sending physiological parameters and behavior parameters of all detected users to the terminal equipment. By sending the physiological parameters of all users in the preset range to the corresponding terminal equipment, the users corresponding to the terminal equipment can check whether people with abnormal physiological parameters exist around, so that prevention is enhanced.
Further, the physiological parameter includes body temperature data of the detected user, and the method further includes: and if the body temperature data is abnormal, acquiring the user data corresponding to the second privacy ID, and sending the user data corresponding to the second privacy ID to a target terminal. Therefore, abnormal users can be found in time, and corresponding measures can be taken by the abnormal users in time.
In a second aspect, an embodiment of the present application provides a data updating apparatus, including: the terminal equipment comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving a data updating request sent by the terminal equipment, and the data updating request comprises a first privacy ID and a second privacy ID; the first privacy ID is a privacy ID currently used by the terminal equipment, and the second privacy ID is a privacy ID to be updated by the terminal equipment; and the data updating module is used for unbinding the first privacy ID and the user ID corresponding to the terminal equipment and binding the second privacy ID and the user ID.
In a third aspect, an embodiment of the present application provides an electronic device, including: the system comprises a processor, a memory and a bus, wherein the processor and the memory are communicated with each other through the bus; the memory stores program instructions executable by the processor, the processor being capable of performing the method of the first aspect when invoked by the program instructions.
In a fourth aspect, an embodiment of the present application provides a non-transitory computer-readable storage medium, including: the non-transitory computer readable storage medium stores computer instructions that cause the computer to perform the method of the first aspect.
Additional features and advantages of the present application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the embodiments of the present application. The objectives and other advantages of the application may be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments of the present application will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and that those skilled in the art can also obtain other related drawings based on the drawings without inventive efforts.
FIG. 1 is a diagram of a system architecture for a comparative example provided in the present application;
fig. 2 is a schematic structural diagram of a data update server according to an embodiment of the present application;
FIG. 3 is a flowchart illustrating an updating method according to an embodiment of the present application;
fig. 4 is a schematic view illustrating an interaction flow between a server and a user and a terminal device according to an embodiment of the present application;
FIG. 5 is a schematic structural diagram of an apparatus according to an embodiment of the present disclosure;
fig. 6 is a schematic physical structure of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
Fig. 1 is a schematic diagram of a system according to a contrast scheme provided in an embodiment of the present application, and as shown in fig. 1, the system may be applied to body temperature acquisition, body temperature uploading, and body temperature storage. The intelligent temperature control system mainly comprises a user management platform, an equipment management platform and intelligent equipment, wherein the intelligent equipment can be a body temperature bracelet worn on the hand of a user. The working principle is as follows:
a user registers on a user management platform through a user terminal, and the user management platform generates a user ID for the user; the method comprises the steps that the intelligent equipment is registered on an equipment management platform, the equipment management platform generates a corresponding equipment ID for the intelligent equipment, and the equipment ID is unique and fixed; binding the device ID with the user ID on the device management platform; the user enables the intelligent device to detect the body temperature data of the user by wearing the intelligent device, and uploads the detected body temperature data to the device management platform. Because the device ID is bound with the user ID, if other people acquire the device ID corresponding to the user, the corresponding user ID can be acquired according to the device ID, and then sensitive historical privacy information corresponding to the user ID is acquired, so that the privacy information of the user is leaked. The privacy information may be information such as a track of the user.
Therefore, in order to avoid disclosure of privacy information of a user, an update server and an update method are provided in an embodiment of the present application, fig. 2 is a schematic structural diagram of a data update server provided in an embodiment of the present application, as shown in fig. 2, the server includes a user management platform, a device management platform, and an intelligent device; the user can register on the user management platform, the user management platform generates a corresponding user ID for the user, and stores the user ID and user information of the user correspondingly, and it can be understood that the user information can be information such as a real name, an identification number, a telephone number and the like of the user. The device management platform stores the corresponding relation between the user ID and the device public key and the corresponding relation between the user ID and the privacy ID of the device. The privacy ID is generated by registering the intelligent device with the device management platform, can also be a privacy ID updated subsequently, and can enable the device management platform to acquire corresponding user information from the user management platform through the user ID. The intelligent device stores a device private key and a privacy ID of the device, and the device management platform can be connected with the intelligent device through the privacy ID.
Fig. 3 is a schematic flow chart of a data updating method provided in an embodiment of the present application, and as shown in fig. 3, the method may be applied to a server, and includes:
step 301: receiving a data updating request sent by terminal equipment, wherein the data updating request comprises a first privacy ID and a second privacy ID; the first privacy ID is a privacy ID currently used by the terminal equipment, and the second privacy ID is a privacy ID to be updated by the terminal equipment;
step 302: and unbinding the first privacy ID and the user ID corresponding to the terminal equipment, and binding the second privacy ID and the user ID.
In step 301, the user may send a data update request to the server through the terminal device periodically or aperiodically, where periodically means that the user sends the data update request to the server through the terminal device every preset time interval, and aperiodically sends the data update request to the server through the terminal device when the user thinks or suspects that the first privacy ID is possibly revealed. The first privacy ID in the data updating request refers to the privacy ID corresponding to the user currently stored in the server and is an old privacy ID; the second privacy ID is the new privacy ID, i.e. is substituted for the first privacy ID. It can be understood that the second privacy ID may be set by the user, or a privacy ID generation algorithm may be set in the terminal device in advance, and the user only needs to send an instruction for generating the privacy ID to the terminal device, and the terminal device generates the second privacy ID according to the privacy ID generation algorithm, and sends the newly generated second privacy ID and the currently used first privacy ID to generate a data update request to the server. It will be appreciated that other parameters may also be included in the data update request, such as: a timestamp, etc.
In step 302, after receiving the data update request, the server unbundles the first privacy ID from the corresponding user ID, and further removes the correspondence between the first privacy ID and the user data generated during the binding of the user ID, which can be understood as deleting the user data of all the histories. And the second privacy ID is rebinding with the user ID, thereby realizing that the first privacy ID is replaced by the second privacy ID. It is understood that the user data may be a historical track of the user, because the address, the company, the preference, and the like of the user may be inferred according to the historical track, and in addition, the user data may also be other sensitive data, and specific parameters may be preset, which is not specifically limited in this embodiment of the present application.
In the embodiment of the application, the privacy ID corresponding to the terminal device is updatable, so that the user can update the privacy ID regularly or irregularly, the binding relationship between the privacy ID before updating and the user data is released, even if the user takes the previous privacy ID, the data corresponding to the updated privacy ID cannot be acquired, and the risk that the data of the user is leaked is reduced.
On the basis of the above embodiment, the second privacy ID is obtained by signing with a device private key; before unbinding the first privacy ID from the user ID corresponding to the terminal device, the method further comprises:
acquiring a public key corresponding to the terminal equipment according to the first privacy ID, and verifying the signature of the second privacy ID by using the public key;
and if the signature verification is passed, executing a step of unbinding the first privacy ID and the user ID corresponding to the terminal equipment.
In a specific implementation process, in order to prevent others from using their own terminal devices to impersonate the terminal devices of the users to send the first privacy IDs of the modified users to the server, the user data of the users are at risk of being leaked. Meanwhile, the second privacy ID is also intercepted and modified by others in the process of sending the data updating request to the server by the terminal device of the user, so that the user data of the user is prevented from being leaked. When the terminal device sends a data update request to the server, the terminal device may sign the second privacy ID by using the private key, and generate a corresponding data update request from the signed second privacy ID and the first privacy ID. And after receiving the data updating request, the server acquires a public key corresponding to the first privacy ID, verifies and signs the signed second privacy ID by using the public key, and if the verification is passed, the terminal equipment which sends the data updating request is legal and is not tampered by others midway. The first privacy ID may be replaced with the second privacy ID. And the server binds the public key with the second privacy ID and with the first privacy ID. If the verification is not passed, the data updating request is not legal, and the updating operation of the privacy ID is not carried out.
It is understood that the public key in the server is pre-stored, and specifically, a public-private key pair is generated in the terminal device, the private key is stored on the terminal device, and the terminal device sends key information to the server, where the key information includes the generated public key and a first privacy ID corresponding to the terminal device. And after receiving the key information, the server correspondingly stores the public key and the first privacy ID.
According to the embodiment of the application, the terminal equipment signs the second privacy ID through the private key, the server checks the signature through the public key, the privacy ID is updated after the signature passes, and other people are prevented from randomly changing the privacy ID, so that the safety of user data is improved.
On the basis of the above embodiment, after receiving the ID update request sent by the terminal device, the method further includes:
acquiring historical physiological parameters corresponding to the first privacy ID and a preset time period away from the current time;
and if the historical physiological parameters are abnormal, prohibiting the operation of updating the data.
In a specific implementation process, since the user can delete the historical user data generated before updating by updating the privacy ID, if the user with abnormal physiological parameters is allowed to update the privacy ID under the condition that the physiological parameters of the user are abnormal, the purpose of monitoring the physiological parameters of the user by a relevant supervision department cannot be achieved. In order to solve the technical problem, in the embodiment of the application, after receiving a data updating request of a user, a server acquires historical physiological parameters of a preset time period according to a first privacy ID in the data updating request, judges whether the historical physiological parameters are abnormal, and prohibits updating the privacy ID if the historical physiological parameters are abnormal, so that the user is prevented from modifying the privacy ID privately under the condition that the physiological parameters are abnormal.
On the basis of the above embodiment, after the second privacy ID is bound to the user ID, the method further includes:
receiving user data uploaded by a terminal device, wherein the user data comprises physiological parameters, behavior parameters and a second privacy ID of the terminal device of a detected user;
and acquiring a corresponding user ID according to the second privacy ID, and correspondingly storing the physiological parameters and the behavior parameters of the detected user and the user ID corresponding to the second privacy ID.
In a specific implementation process, after updating the privacy ID, the terminal device detects user data of the user and sends the user data to the server. It is understood that the user data includes physiological parameters (e.g., body temperature, blood pressure, etc.) of the detected user, behavior parameters (e.g., location information), and a second privacy ID of the terminal device, where the second privacy ID is a current corresponding privacy ID of the terminal device after updating the privacy ID.
And after receiving the user data, the server acquires a second privacy ID from the user data, acquires a corresponding user ID according to the second privacy ID, and stores the physiological parameters and the behavior parameters in the user data under the user ID name. It is understood that the user ID may be understood as a key (key), and the physiological parameter and the behavior parameter may be understood as a value (value). The user ID, the physiological parameters and the behavior parameters form a key value pair, and the physiological parameters and the behavior parameters corresponding to the user can be obtained through the user ID.
On the basis of the above embodiment, the behavior parameter includes location information of the terminal device; the method further comprises the following steps:
acquiring physiological parameters and behavior parameters of all detected users within the preset range of the position information, which are the latest time from the current time;
and sending physiological parameters and behavior parameters of all detected users to the terminal equipment.
In a specific implementation process, in order to enable the detected user to know whether a person with abnormal physiological parameters exists around the detected user, the physiological parameters and the behavior parameters of all other detected users in the preset range of the current position information of the detected user can be acquired, and specifically, the physiological parameters and the behavior parameters of other detected users which are uploaded to the server last time can be acquired. And sending the acquired physiological parameters and behavior parameters of other detected users to the terminal equipment.
By taking the physiological parameters as the body temperature data and the behavior parameters as the position information, the server can send the body temperature data and the position information of people nearby the server to the terminal equipment of the detected user at regular time, so that the detected user can acquire whether people with abnormal body temperature exist nearby through the terminal equipment, and if so, the server can acquire the position information of the people with abnormal body temperature.
It can be understood that, the terminal device may display the positions of the users and the corresponding physiological parameters in a list according to the distance from the detected user, or may display the positions of the users and the corresponding physiological parameters in a map coordinate manner. The display may also be performed on the terminal device in other forms, which is not specifically limited in this application embodiment.
According to the embodiment of the application, the physiological parameters of all users in the preset range are sent to the corresponding terminal equipment, so that the users corresponding to the terminal equipment can check whether people with abnormal physiological parameters exist around, and prevention is enhanced.
On the basis of the above embodiment, the physiological parameter includes body temperature data of the detected user, and the method further includes:
and if the body temperature data is abnormal, acquiring the user data corresponding to the second privacy ID, and sending the user data corresponding to the second privacy ID to a target terminal.
In the specific implementation process, the detected user carries the terminal device, and one of the purposes is to monitor the body temperature data of the detected user, find the detected user with abnormal body temperature in time, and acquire the position information of the detected user with abnormal body temperature, so as to better prevent and control. Therefore, a body temperature threshold value can be set in the server in advance, when the body temperature data of a certain detected user exceeds the body temperature threshold value, the body temperature of the detected user is abnormal, and the server can acquire corresponding user data according to the second privacy ID of the detected user and send the user data to the target terminal. The target terminal is configured in advance and can be a terminal used by a prevention and control person, and the user data comprises the body temperature data and the position information of the detected user, so that the prevention and control person can draw the historical track of the detected user after acquiring the user data, and subsequent prevention and control work is facilitated.
Fig. 4 is a schematic view of an interaction flow between a server and a user and a terminal device according to an embodiment of the present application, and as shown in fig. 4, the interaction flow includes: user, user management platform, equipment management platform and smart machine, wherein, user management platform and equipment management platform can be as two servers, and smart machine can be intelligent bracelet:
step 401: a user registers on a user management platform; during registration, a user can provide real name, telephone, identity card information and the like to a user management platform, and the user management platform generates a unique user ID for the user;
step 402: the intelligent equipment registers in the equipment management platform; after the intelligent device leaves a factory, the intelligent device needs to be registered with a device management platform before being used by a user, and the device management platform generates a unique first privacy ID for the intelligent device.
Step 403: a binding relation is established between a user and the intelligent equipment; before the user uses the intelligent device, the user binds on the device management platform so as to correspond the user data collected by the intelligent device with the user ID.
Step 404: establishing a mapping relation between a user and a device public key and between the user and a first privacy ID; the public and private key pair is generated by the intelligent equipment, the private key of the equipment is stored in the intelligent equipment, the public key of the equipment is stored on the equipment management platform, and the corresponding relation between the first privacy ID and the user ID is also stored on the equipment management platform, so that the corresponding relation between the public key of the equipment and the user ID can be established.
Step 405: the intelligent equipment uploads user data; the intelligent equipment can acquire the user data of the detected user at regular time and upload the acquired user data to the equipment management platform.
Step 406: the device management platform may send user data of other users in its vicinity to the smart device.
Step 407: updating the privacy ID by the user; the user can send a data updating request to the intelligent device, the intelligent device can generate a second privacy ID according to the data updating request, signs the second privacy ID by using a private key, and sends the signed second privacy ID and the signed first privacy ID to the device management platform.
Step 408: updating the privacy ID by the equipment management platform; and after the device management platform acquires the data updating request, verifying the signed second privacy ID by using the corresponding public key, and after the verification passes, replacing the first privacy ID by using the second privacy ID.
Step 409: finding abnormal body temperature information; the device management platform may determine whether the body temperature data in the user data is abnormal, and if the body temperature data is abnormal, execute step 410.
Step 410: inquiring user information; the device management platform may query the information of the corresponding user from the user management platform by using the user ID, for example: telephone, identification number, etc.
Fig. 5 is a schematic structural diagram of an apparatus provided in an embodiment of the present application, where the apparatus may be a module, a program segment, or code on an electronic device. It should be understood that the apparatus corresponds to the above-mentioned embodiment of the method of fig. 3, and can perform various steps related to the embodiment of the method of fig. 3, and the specific functions of the apparatus can be referred to the above description, and the detailed description is appropriately omitted here to avoid redundancy. The device includes: a receiving module 501 and a data updating module 502, wherein:
the receiving module 501 is configured to receive a data update request sent by a terminal device, where the data update request includes a first privacy ID and a second privacy ID; the first privacy ID is a privacy ID currently used by the terminal equipment, and the second privacy ID is a privacy ID to be updated by the terminal equipment; the data updating module 502 is configured to unbind the first privacy ID from the user ID corresponding to the terminal device, and bind the second privacy ID to the user ID.
On the basis of the above embodiment, the second privacy ID is obtained by signing with a device private key; the device also includes a signature verification module for:
acquiring a public key corresponding to the terminal equipment according to the first privacy ID, and verifying the signature of the second privacy ID by using the public key;
and if the signature verification is passed, executing a step of unbinding the first privacy ID and the user ID corresponding to the terminal equipment.
On the basis of the above embodiment, the apparatus further includes a key storage module, configured to:
receiving key information sent by the terminal equipment, wherein the key information comprises a public key and a first privacy ID corresponding to the terminal equipment; the public key is generated in the terminal equipment;
and correspondingly storing the public key and the first privacy ID.
On the basis of the above embodiment, the apparatus further includes a parameter auditing module, configured to:
acquiring historical physiological parameters corresponding to the first privacy ID and a preset time period away from the current time;
and if the historical physiological parameters are abnormal, prohibiting the operation of updating the data.
On the basis of the above embodiment, the apparatus further includes a data uploading module, configured to:
receiving user data uploaded by a terminal device, wherein the user data comprises physiological parameters, behavior parameters and a second privacy ID of the terminal device of a detected user;
and acquiring a corresponding user ID according to the second privacy ID, and correspondingly storing the physiological parameters and the behavior parameters of the detected user and the user ID corresponding to the second privacy ID.
On the basis of the above embodiment, the behavior parameter includes location information of the terminal device; the apparatus further comprises a parameter sending module configured to:
acquiring physiological parameters and behavior parameters of all detected users within the preset range of the position information, which are the latest time from the current time;
and sending physiological parameters and behavior parameters of all detected users to the terminal equipment.
On the basis of the above embodiment, the physiological parameter includes body temperature data of the detected user, and the apparatus further includes an abnormality monitoring module configured to:
and if the body temperature data is abnormal, acquiring the user data corresponding to the second privacy ID, and sending the user data corresponding to the second privacy ID to a target terminal.
In the embodiment of the application, the privacy ID corresponding to the terminal device is updatable, so that the user can remove corresponding data by regularly or irregularly updating the privacy ID and removing the binding relationship between the privacy ID before updating and the user data, so that even if other people take the previous privacy ID, the data corresponding to the updated privacy ID cannot be obtained, and the risk of the data leakage of the user is reduced.
Fig. 6 is a schematic structural diagram of an entity of an electronic device provided in an embodiment of the present application, and as shown in fig. 6, the electronic device includes: a processor (processor)601, a memory (memory)602, and a bus 603; wherein the content of the first and second substances,
the processor 601 and the memory 602 communicate with each other through the bus 603;
the processor 601 is configured to call program instructions in the memory 602 to perform the methods provided by the above-mentioned method embodiments, for example, including: receiving a data updating request sent by terminal equipment, wherein the data updating request comprises a first privacy ID and a second privacy ID; the first privacy ID is a privacy ID currently used by the terminal equipment, and the second privacy ID is a privacy ID to be updated by the terminal equipment; and unbinding the first privacy ID and the user ID corresponding to the terminal equipment, and binding the second privacy ID and the user ID.
The processor 601 may be an integrated circuit chip having signal processing capabilities. The processor 601 may be a general-purpose processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. Which may implement or perform the various methods, steps, and logic blocks disclosed in the embodiments of the present application. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The Memory 602 may include, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Read Only Memory (EPROM), an Electrically Erasable Read Only Memory (EEPROM), and the like.
The present embodiment discloses a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions which, when executed by a computer, enable the computer to perform the method provided by the above-mentioned method embodiments, for example, comprising: receiving a data updating request sent by terminal equipment, wherein the data updating request comprises a first privacy ID and a second privacy ID; the first privacy ID is a privacy ID currently used by the terminal equipment, and the second privacy ID is a privacy ID to be updated by the terminal equipment; and unbinding the first privacy ID and the user ID corresponding to the terminal equipment, and binding the second privacy ID and the user ID.
The present embodiments provide a non-transitory computer-readable storage medium storing computer instructions that cause the computer to perform the methods provided by the above method embodiments, for example, including: receiving a data updating request sent by terminal equipment, wherein the data updating request comprises a first privacy ID and a second privacy ID; the first privacy ID is a privacy ID currently used by the terminal equipment, and the second privacy ID is a privacy ID to be updated by the terminal equipment; and unbinding the first privacy ID and the user ID corresponding to the terminal equipment, and binding the second privacy ID and the user ID.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
In addition, units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
Furthermore, the functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
In this document, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions.
The above description is only an example of the present application and is not intended to limit the scope of the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (10)

1. A method for updating data, comprising:
receiving a data updating request sent by terminal equipment, wherein the data updating request comprises a first privacy ID and a second privacy ID; the first privacy ID is a privacy ID currently used by the terminal equipment, and the second privacy ID is a privacy ID to be updated by the terminal equipment;
and unbinding the first privacy ID and the user ID corresponding to the terminal equipment, and binding the second privacy ID and the user ID.
2. The method of claim 1, wherein the second privacy ID is obtained by signing with a device private key; before unbinding the first privacy ID from the user ID corresponding to the terminal device, the method further comprises:
acquiring a public key corresponding to the terminal equipment according to the first privacy ID, and verifying the signature of the second privacy ID by using the public key;
and if the signature verification is passed, executing a step of unbinding the first privacy ID and the user ID corresponding to the terminal equipment.
3. The method according to claim 2, wherein before obtaining the corresponding public key of the terminal device according to the first privacy ID, the method further comprises:
receiving key information sent by the terminal equipment, wherein the key information comprises a public key and a first privacy ID corresponding to the terminal equipment; the public key is generated in the terminal equipment;
and correspondingly storing the public key and the first privacy ID.
4. The method according to claim 1, wherein after receiving the ID update request sent by the terminal device, the method further comprises:
acquiring historical physiological parameters corresponding to the first privacy ID and a preset time period away from the current time;
and if the historical physiological parameters are abnormal, prohibiting the operation of updating the data.
5. The method of claim 1, wherein after binding the second privacy ID with the user ID, the method further comprises:
receiving user data uploaded by a terminal device, wherein the user data comprises physiological parameters, behavior parameters and a second privacy ID of the terminal device of a detected user;
and acquiring a corresponding user ID according to the second privacy ID, and correspondingly storing the physiological parameters and the behavior parameters of the detected user and the user ID corresponding to the second privacy ID.
6. The method of claim 5, wherein the behavior parameter comprises location information of the terminal device; the method further comprises the following steps:
acquiring physiological parameters and behavior parameters of all detected users within the preset range of the position information, which are the latest time from the current time;
and sending physiological parameters and behavior parameters of all detected users to the terminal equipment.
7. The method of claim 5, wherein the physiological parameter comprises body temperature data of the detected user, the method further comprising:
and if the body temperature data is abnormal, acquiring the user data corresponding to the second privacy ID, and sending the user data corresponding to the second privacy ID to a target terminal.
8. A data update apparatus, comprising:
the terminal equipment comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving a data updating request sent by the terminal equipment, and the data updating request comprises a first privacy ID and a second privacy ID; the first privacy ID is a privacy ID currently used by the terminal equipment, and the second privacy ID is a privacy ID to be updated by the terminal equipment;
and the data updating module is used for unbinding the first privacy ID and the user ID corresponding to the terminal equipment and binding the second privacy ID and the user ID.
9. An electronic device, comprising: a processor, a memory, and a bus, wherein,
the processor and the memory are communicated with each other through the bus;
the memory stores program instructions executable by the processor, the processor invoking the program instructions to perform the method of any one of claims 1-7.
10. A non-transitory computer-readable storage medium storing computer instructions which, when executed by a computer, cause the computer to perform the method of any one of claims 1-7.
CN202010552406.6A 2020-06-16 2020-06-16 Data updating method and device, electronic equipment and storage medium Pending CN111708559A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010552406.6A CN111708559A (en) 2020-06-16 2020-06-16 Data updating method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010552406.6A CN111708559A (en) 2020-06-16 2020-06-16 Data updating method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111708559A true CN111708559A (en) 2020-09-25

Family

ID=72540901

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010552406.6A Pending CN111708559A (en) 2020-06-16 2020-06-16 Data updating method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111708559A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105138927A (en) * 2015-08-12 2015-12-09 中国联合网络通信集团有限公司 Privacy data protection method and apparatus
CN105515768A (en) * 2016-01-08 2016-04-20 腾讯科技(深圳)有限公司 Method, device and system for updating secret key
CN109858235A (en) * 2019-02-13 2019-06-07 广东小天才科技有限公司 A kind of portable device and its private mark acquisition methods and device
US20190303610A1 (en) * 2018-03-30 2019-10-03 Microsoft Technology Licensing, Llc On-demand de-identification of data in computer storage systems
CN111125741A (en) * 2019-12-31 2020-05-08 广东卓启投资有限责任公司 Zero knowledge verification method based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105138927A (en) * 2015-08-12 2015-12-09 中国联合网络通信集团有限公司 Privacy data protection method and apparatus
CN105515768A (en) * 2016-01-08 2016-04-20 腾讯科技(深圳)有限公司 Method, device and system for updating secret key
US20190303610A1 (en) * 2018-03-30 2019-10-03 Microsoft Technology Licensing, Llc On-demand de-identification of data in computer storage systems
CN109858235A (en) * 2019-02-13 2019-06-07 广东小天才科技有限公司 A kind of portable device and its private mark acquisition methods and device
CN111125741A (en) * 2019-12-31 2020-05-08 广东卓启投资有限责任公司 Zero knowledge verification method based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
严竞雄: ""云平台技术在高校新冠肺炎疫情防控监测管理中的运用"", 《电脑编程技巧与维护》 *

Similar Documents

Publication Publication Date Title
CN110113167B (en) Information protection method and system of intelligent terminal and readable storage medium
CN109257342B (en) Block chain cross-chain authentication method, system, server and readable storage medium
CN110365670B (en) Blacklist sharing method and device, computer equipment and storage medium
CN110363020B (en) Screen capturing monitoring method, device, computer equipment and storage medium
CN110535971B (en) Interface configuration processing method, device, equipment and storage medium based on block chain
CN106487767A (en) The update method of checking information and device
CN109981682A (en) Data verification method, the apparatus and system of internet of things equipment
CN111709055A (en) User information acquisition method and device, electronic equipment and storage medium
CN110598474B (en) Block chain-based data acquisition method, system, device and storage medium
CN111259026B (en) Block chain-based anti-counterfeiting method, system and storage medium
CN108763062B (en) Method for filtering buried point names and terminal equipment
CN111552928A (en) Authentication method and device
CN107659579B (en) On-site certificate storing method and device and related certificate storing system
CN110597541A (en) Interface updating processing method, device, equipment and storage medium based on block chain
CN110276193B (en) Risk feature output method, application operation control method, system and device
CN110011796B (en) Certificate updating method and device, computer equipment and storage medium
CN112866285B (en) Gateway interception method and device, electronic equipment and storage medium
CN110677261A (en) Credible two-dimensional code generation method and device, electronic equipment and storage medium
CN111708559A (en) Data updating method and device, electronic equipment and storage medium
CN110365656B (en) Data management method, data management device and environment-friendly detection equipment
CN116112216B (en) Cloud data verification method and device, electronic equipment and nonvolatile storage medium
CN111723410A (en) Hard disk encryption method, hard disk lock system, hard disk encryption device and storage medium
CN113301557A (en) eSIM card state management method, device, equipment and storage medium
CN112068779A (en) Data storage system
CN113438598B (en) Terminal positioning method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200925