CN109583227B - Privacy information protection method, device and system - Google Patents

Privacy information protection method, device and system Download PDF

Info

Publication number
CN109583227B
CN109583227B CN201811272603.1A CN201811272603A CN109583227B CN 109583227 B CN109583227 B CN 109583227B CN 201811272603 A CN201811272603 A CN 201811272603A CN 109583227 B CN109583227 B CN 109583227B
Authority
CN
China
Prior art keywords
privacy protection
privacy
algorithm
information
scheme
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811272603.1A
Other languages
Chinese (zh)
Other versions
CN109583227A (en
Inventor
李凤华
牛犇
李晖
谢绒娜
李维皓
朱辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Institute of Information Engineering of CAS
Original Assignee
Xidian University
Institute of Information Engineering of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University, Institute of Information Engineering of CAS filed Critical Xidian University
Priority to CN201811272603.1A priority Critical patent/CN109583227B/en
Publication of CN109583227A publication Critical patent/CN109583227A/en
Application granted granted Critical
Publication of CN109583227B publication Critical patent/CN109583227B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a method, a device and a system for protecting privacy information, wherein the method for protecting the privacy information comprises the following steps: acquiring the privacy information characteristics of the privacy information; a privacy protection scheme is determined based on at least one of the scene information and the privacy information characteristics, and at least one of the privacy protection scheme and a privacy protection algorithm in the privacy protection scheme is evaluated. According to the embodiment of the invention, a normalization framework of a privacy protection algorithm and a privacy protection scheme is determined according to the privacy information characteristics and the scene information, and the privacy protection algorithm and the privacy protection scheme which are suitable for specific application scenes and privacy information are designed; according to the evaluation results of the privacy protection algorithm and the privacy protection scheme, the privacy protection algorithm and the privacy protection scheme which are suitable for specific application scenes and privacy information and meet privacy protection requirements are designed in an iteration mode of the privacy protection algorithm and the privacy protection scheme, and the design, implementation and evaluation efficiency is improved.

Description

一种隐私信息保护方法、装置及系统A kind of privacy information protection method, device and system

技术领域technical field

本发明实施例涉及但不限于信息技术领域,尤指一种隐私信息保护方法、装置及系统。The embodiments of the present invention relate to, but are not limited to, the field of information technology, and in particular, refer to a privacy information protection method, device, and system.

背景技术Background technique

随着信息技术和网络技术持续、快速发展,相关应用广泛普及和个性化服务不断演进,大型的互联网公司在提供服务的过程中积累了海量数据,这些数据频繁跨境、跨系统、跨生态圈交互已成为常态,造成了隐私信息在不同信息系统中有意或者无意存留,而被积累的数据中包含了大量用户隐私信息。使得用户在享受工作、生活、学习等方面便利的同时,其数据在数据收集、共享、存储、分析等过程中面临泄露风险,严重地威胁用户隐私安全。With the continuous and rapid development of information technology and network technology, the widespread popularization of related applications and the continuous evolution of personalized services, large Internet companies have accumulated massive amounts of data in the process of providing services, and these data are frequently cross-border, cross-system, and cross-ecosystem Interaction has become the norm, resulting in the intentional or unintentional retention of private information in different information systems, and the accumulated data contains a large amount of user private information. While users enjoy the convenience of work, life, study, etc., their data faces the risk of leakage in the process of data collection, sharing, storage, analysis, etc., which seriously threatens user privacy and security.

现有隐私信息保护方案仅针对特定场景、特定数据进行保护,但由于隐私信息类型多样、隐私保护需求不同,隐私算法保护能力各异,在设计具体隐私保护算法时缺少行之有效的指导原则;不同应用场景下不同的隐私保护需求导致需要对相同或类似算法进行多次开发,降低了代码的复用性,增加了开发工作量和成本;算法参数的由开发人员根据需求人工选择,缺乏自动化求解最优参数的机制,影响了算法的效果。The existing privacy information protection scheme only protects specific scenarios and specific data, but due to the diverse types of privacy information, different privacy protection requirements, and different privacy algorithm protection capabilities, there is no effective guiding principle when designing specific privacy protection algorithms; Different privacy protection requirements in different application scenarios lead to the need to develop the same or similar algorithms multiple times, which reduces code reusability and increases development workload and cost; algorithm parameters are manually selected by developers according to their needs, lacking automation The mechanism of solving the optimal parameters affects the effect of the algorithm.

发明内容SUMMARY OF THE INVENTION

本发明实施例提供了一种隐私信息保护方法、装置及系统,能够设计出适应特定应用场景和隐私信息、满足隐私保护需求的隐私保护算法和隐私保护方案,提高了设计、实现和评估的效率。The embodiments of the present invention provide a privacy information protection method, device and system, which can design privacy protection algorithms and privacy protection schemes that are suitable for specific application scenarios and privacy information and meet privacy protection requirements, and improve the efficiency of design, implementation and evaluation. .

本发明实施例提供了一种隐私信息保护方法,包括以下步骤至少之一:An embodiment of the present invention provides a privacy information protection method, comprising at least one of the following steps:

获取隐私信息的隐私信息特征;Obtain private information characteristics of private information;

根据场景信息和隐私信息特征中的至少一个确定隐私保护方案。The privacy protection scheme is determined according to at least one of the scene information and the privacy information feature.

在本发明实施例中,还包括:In the embodiment of the present invention, it also includes:

对所述隐私保护方案和隐私保护方案中的隐私保护算法中的至少之一进行评估。Evaluate at least one of the privacy protection scheme and the privacy protection algorithm in the privacy protection scheme.

在本发明实施例中,所述对隐私保护方案进行评估包括以下至少之一:In this embodiment of the present invention, the evaluating the privacy protection scheme includes at least one of the following:

对隐私保护方案的隐私保护效果进行评估;Evaluate the privacy protection effect of the privacy protection scheme;

对隐私保护方案的复杂度进行评估;Evaluate the complexity of the privacy protection scheme;

所述对隐私保护方案中的隐私保护算法进行评估包括以下至少之一:The evaluation of the privacy protection algorithm in the privacy protection scheme includes at least one of the following:

对隐私保护方案中的隐私保护算法的隐私保护效果进行评估;Evaluate the privacy protection effect of the privacy protection algorithm in the privacy protection scheme;

对隐私保护方案中的隐私保护算法的复杂度进行评估。Evaluate the complexity of privacy-preserving algorithms in privacy-preserving schemes.

在本发明实施例中,所述对隐私保护方案中的隐私保护算法的隐私保护效果进行评估包括:In the embodiment of the present invention, the evaluation of the privacy protection effect of the privacy protection algorithm in the privacy protection scheme includes:

计算所述隐私保护算法的隐私保护效果值;Calculate the privacy protection effect value of the privacy protection algorithm;

当所述隐私保护算法的隐私保护效果值大于或等于所述的隐私保护算法的需求中隐私保护效果期望值,判断出所述隐私保护算法通过隐私保护算法的隐私保护效果评估;When the privacy protection effect value of the privacy protection algorithm is greater than or equal to the expected value of the privacy protection effect in the demand of the privacy protection algorithm, it is judged that the privacy protection algorithm passes the privacy protection effect evaluation of the privacy protection algorithm;

当所述隐私保护算法的隐私保护效果值小于所述的隐私保护算法的需求中隐私保护效果期望值,判断出所述隐私保护算法没有通过隐私保护算法的隐私保护效果评估。When the privacy protection effect value of the privacy protection algorithm is less than the expected value of the privacy protection effect in the requirements of the privacy protection algorithm, it is determined that the privacy protection algorithm has not passed the privacy protection effect evaluation of the privacy protection algorithm.

在本发明实施例中,所述隐私保护算法的隐私保护效果值包括以下一种或多种的任意组合:In this embodiment of the present invention, the privacy protection effect value of the privacy protection algorithm includes any combination of one or more of the following:

采用所述隐私保护算法处理后的隐私信息与处理前的隐私信息之间的偏差量、采用所述隐私保护算法处理后的隐私信息与处理前的隐私信息之间的损失比、攻击者推测出所述隐私保护算法处理前隐私信息的概率。The amount of deviation between the private information processed by using the privacy protection algorithm and the private information before processing, the loss ratio between the private information processed by using the privacy protection algorithm and the private information before processing, the attacker's guess The probability of private information before being processed by the privacy-preserving algorithm.

在本发明实施例中,所述隐私保护算法的复杂度包括以下一种或多种的任意组合:时间复杂度、空间复杂度;In this embodiment of the present invention, the complexity of the privacy protection algorithm includes any combination of one or more of the following: time complexity and space complexity;

所述对隐私保护方案中的隐私保护算法的复杂度进行评估包括以下一种或多种的任意组合:The evaluation of the complexity of the privacy protection algorithm in the privacy protection scheme includes any combination of one or more of the following:

对所述隐私保护算法的时间复杂度进行评估;Evaluate the time complexity of the privacy protection algorithm;

对所述隐私保护算法的空间复杂度进行评估。Evaluate the space complexity of the privacy-preserving algorithm.

在本发明实施例中,所述对隐私保护算法的时间复杂度进行评估包括:In this embodiment of the present invention, the evaluating the time complexity of the privacy protection algorithm includes:

判断隐私保护算法的运行速度是否满足所述的隐私保护算法的需求中的最低运行速度;Determine whether the running speed of the privacy protection algorithm meets the minimum running speed in the requirements of the privacy protection algorithm;

当隐私保护算法的运行速度大于或等于隐私保护算法的需求中的最低运行速度时,判断出隐私保护算法通过隐私保护算法的时间复杂度评估;When the running speed of the privacy protection algorithm is greater than or equal to the minimum running speed in the requirements of the privacy protection algorithm, it is determined that the privacy protection algorithm passes the time complexity evaluation of the privacy protection algorithm;

当隐私保护算法的运行速度小于隐私保护算法的需求中的最低运行速度时,判断出隐私保护算法没有通过隐私保护算法的时间复杂度评估。When the running speed of the privacy-preserving algorithm is less than the minimum running speed in the requirements of the privacy-preserving algorithm, it is determined that the privacy-preserving algorithm has not passed the time complexity evaluation of the privacy-preserving algorithm.

在本发明实施例中,所述对隐私保护算法的空间复杂度进行评估包括以下一种或多种的任意组合:In this embodiment of the present invention, the evaluation of the space complexity of the privacy protection algorithm includes any combination of one or more of the following:

判断所述隐私保护算法运行占用的软件资源是否满足隐私保护算法的需求中的需要的软件资源;Determine whether the software resources occupied by the operation of the privacy protection algorithm meet the required software resources in the requirements of the privacy protection algorithm;

当所述隐私保护算法运行占用的软件资源小于或等于隐私保护算法的需求中的需要的软件资源时,判断出所述隐私保护算法通过隐私保护算法的空间复杂度评估中的软件资源评估;When the software resources occupied by the operation of the privacy protection algorithm are less than or equal to the required software resources in the requirements of the privacy protection algorithm, it is determined that the privacy protection algorithm passes the software resource evaluation in the space complexity evaluation of the privacy protection algorithm;

当所述隐私保护算法运行占用的软件资源大于所述隐私保护算法的需求中的需要的软件资源时,判断出所述隐私保护算法没有通过所述隐私保护算法的空间复杂度评估中的软件资源评估;When the software resources occupied by the operation of the privacy protection algorithm are greater than the required software resources in the requirements of the privacy protection algorithm, it is determined that the privacy protection algorithm does not pass the software resources in the space complexity evaluation of the privacy protection algorithm Evaluate;

判断所述隐私保护算法的运行占用的硬件资源是否满足所述隐私保护算法的需求中需要的硬件资源;Determine whether the hardware resources occupied by the operation of the privacy protection algorithm meet the hardware resources required in the requirements of the privacy protection algorithm;

当所述隐私保护算法运行占用的硬件资源小于或等于所述隐私保护算法的需求中的需要的硬件资源时,判断出所述隐私保护算法通过所述隐私保护算法的空间复杂度评估中硬件资源评估;When the hardware resources occupied by the operation of the privacy protection algorithm are less than or equal to the required hardware resources in the requirements of the privacy protection algorithm, it is determined that the privacy protection algorithm passes the hardware resources in the space complexity evaluation of the privacy protection algorithm Evaluate;

当所述隐私保护算法运行占用的硬件资源大于所述隐私保护算法的需求中的硬件资源时,判断出所述隐私保护算法没有通过所述隐私保护算法的空间复杂度评估中硬件资源评估。When the hardware resources occupied by the operation of the privacy protection algorithm are greater than the hardware resources required by the privacy protection algorithm, it is determined that the privacy protection algorithm has not passed the hardware resource evaluation in the space complexity evaluation of the privacy protection algorithm.

在本发明实施例中,所述对隐私保护方案的隐私保护效果进行评估包括:In the embodiment of the present invention, the evaluation of the privacy protection effect of the privacy protection scheme includes:

计算所述隐私保护方案的隐私保护效果值;calculating the privacy protection effect value of the privacy protection scheme;

当所述隐私保护方案的隐私保护效果值大于或等于所述隐私保护需求中隐私保护效果期望值时,判断出所述隐私保护方案通过隐私保护方案的隐私保护效果评估;When the privacy protection effect value of the privacy protection scheme is greater than or equal to the expected value of the privacy protection effect in the privacy protection requirement, it is determined that the privacy protection scheme passes the privacy protection effect evaluation of the privacy protection scheme;

当所述隐私保护方案的隐私保护效果值小于所述的隐私保护方案需求中隐私保护效果期望值时,判断出所述隐私保护方案没有通过隐私保护算法的隐私保护效果评估。When the privacy protection effect value of the privacy protection scheme is smaller than the privacy protection effect expectation value in the privacy protection scheme requirement, it is determined that the privacy protection scheme has not passed the privacy protection effect evaluation of the privacy protection algorithm.

在本发明实施例中,所述隐私保护方案的隐私保护效果值包括以下一种或多种的任意组合:In this embodiment of the present invention, the privacy protection effect value of the privacy protection scheme includes any combination of one or more of the following:

采用所述隐私保护方案处理后的隐私信息与处理前的隐私信息之间的偏差量、采用所述隐私保护方案处理后的隐私信息与处理前的隐私信息之间的损失比、攻击者推测出所述隐私保护方案处理前隐私信息的概率。The amount of deviation between the private information processed by the privacy protection scheme and the private information before processing, the loss ratio between the private information processed by the privacy protection scheme and the private information before processing, the attacker's guess The privacy protection scheme deals with the probability of private information before processing.

在本发明实施例中,所述隐私保护方案的复杂度包括以下一种或多种的任意组合:时间复杂度、空间复杂度;In this embodiment of the present invention, the complexity of the privacy protection scheme includes any combination of one or more of the following: time complexity and space complexity;

所述对隐私保护方案的复杂度进行评估包括以下一种或多种的任意组合:The evaluation of the complexity of the privacy protection scheme includes any combination of one or more of the following:

对所述隐私保护方案的时间复杂度进行评估;Evaluate the time complexity of the privacy protection scheme;

对所述隐私保护方案的空间复杂度进行评估。The space complexity of the privacy protection scheme is evaluated.

在本发明实施例中,所述对隐私保护方案的时间复杂度进行评估包括:In the embodiment of the present invention, the evaluating the time complexity of the privacy protection scheme includes:

判断隐私保护方案的运行速度是否满足所述的隐私保护需求中的最低运行速度;Determine whether the operating speed of the privacy protection scheme meets the minimum operating speed in the privacy protection requirements;

当隐私保护方案的运行速度大于或等于隐私保护需求中的最低运行速度时,判断出隐私保护方案通过隐私保护方案的时间复杂度评估;When the running speed of the privacy protection scheme is greater than or equal to the minimum running speed in the privacy protection requirement, it is judged that the privacy protection scheme passes the time complexity evaluation of the privacy protection scheme;

当隐私保护方案的运行速度小于隐私保护需求中的最低运行速度时,判断出隐私保护方案没有通过隐私保护方案的时间复杂度评估。When the running speed of the privacy protection scheme is less than the minimum running speed in the privacy protection requirement, it is determined that the privacy protection scheme has not passed the time complexity evaluation of the privacy protection scheme.

在本发明实施例中,所述对隐私保护方案的空间复杂度进行评估包括以下一种或多种的任意组合:In this embodiment of the present invention, the evaluation of the space complexity of the privacy protection scheme includes any combination of one or more of the following:

判断所述隐私保护方案运行占用的软件资源是否满足隐私保护需求中的需要的软件资源;Determine whether the software resources occupied by the operation of the privacy protection scheme meet the required software resources in the privacy protection requirements;

当所述隐私保护方案运行占用的软件资源小于或等于隐私保护需求中的需要的软件资源时,判断出所述隐私保护方案通过隐私保护方案的空间复杂度评估中的软件资源评估;When the software resources occupied by the operation of the privacy protection scheme are less than or equal to the required software resources in the privacy protection requirements, it is determined that the privacy protection scheme passes the software resource evaluation in the space complexity evaluation of the privacy protection scheme;

当所述隐私保护方案运行占用的软件资源大于所述隐私保护需求中的需要的软件资源时,判断出所述隐私保护方案没有通过所述隐私保护方案的空间复杂度评估中的软件资源评估;When the software resources occupied by the operation of the privacy protection scheme are greater than the required software resources in the privacy protection requirements, it is determined that the privacy protection scheme has not passed the software resource evaluation in the space complexity evaluation of the privacy protection scheme;

判断所述隐私保护方案运行占用的硬件资源是否满足所述隐私保护需求中需要的硬件资源;Determine whether the hardware resources occupied by the operation of the privacy protection scheme meet the hardware resources required in the privacy protection requirement;

当所述隐私保护方案运行占用的硬件资源小于或等于所述隐私保护需求中的需要的硬件资源时,判断出所述隐私保护方案通过所述隐私保护方案的空间复杂度评估中硬件资源评估;When the hardware resources occupied by the operation of the privacy protection scheme are less than or equal to the hardware resources required in the privacy protection requirement, it is determined that the privacy protection scheme passes the hardware resource evaluation in the space complexity evaluation of the privacy protection scheme;

当所述隐私保护方案运行占用的硬件资源大于所述隐私保护需求中的硬件资源时,判断出所述隐私保护方案没有通过所述隐私保护方案的空间复杂度评估中硬件资源评估。When the hardware resources occupied by the operation of the privacy protection scheme are greater than the hardware resources in the privacy protection requirement, it is determined that the privacy protection scheme fails the hardware resource evaluation in the space complexity evaluation of the privacy protection scheme.

在本发明实施例中,所述根据场景信息和隐私信息特征中的至少一个确定隐私保护方案包括以下步骤一个或多个任意组合:In this embodiment of the present invention, the determining of a privacy protection scheme according to at least one of scene information and privacy information features includes any combination of one or more of the following steps:

根据场景信息和隐私信息特征中的至少一个生成隐私保护需求;Generate privacy protection requirements according to at least one of scene information and privacy information features;

根据场景信息、隐私信息特征、隐私保护需求中的一个或多个任意组合确定隐私保护算法的需求;Determine the requirements of the privacy protection algorithm according to any combination of one or more of scene information, privacy information characteristics, and privacy protection requirements;

根据场景信息、隐私信息特征、隐私保护需求、隐私保护算法的需求中的一个或多个的任意组合确定以下至少之一:隐私保护算法的类型和隐私保护算法的理论基础;Determine at least one of the following according to any combination of one or more of scene information, privacy information features, privacy protection requirements, and privacy protection algorithm requirements: the type of privacy protection algorithm and the theoretical basis of the privacy protection algorithm;

根据场景信息、隐私信息特征、隐私保护需求、隐私保护算法的需求、隐私保护算法的类型、隐私保护算法的理论基础中的一个或多个的任意组合给出隐私保护算法步骤及隐私保护算法步骤间的组合关系;According to any combination of one or more of scene information, privacy information characteristics, privacy protection requirements, privacy protection algorithm requirements, types of privacy protection algorithms, and theoretical foundations of privacy protection algorithms, privacy protection algorithm steps and privacy protection algorithm steps are given. Combination relationship between;

根据场景信息、隐私保护需求、隐私保护算法的需求、隐私保护算法步骤中的一个或多个的任意组合选择隐私保护算法的参数;Select the parameters of the privacy protection algorithm according to any combination of one or more of the scene information, privacy protection requirements, privacy protection algorithm requirements, and privacy protection algorithm steps;

按照隐私保护算法步骤间的组合关系对所述的隐私保护算法步骤和隐私保护算法的参数进行组合生成隐私保护算法;According to the combination relationship between the steps of the privacy protection algorithm, the privacy protection algorithm steps and the parameters of the privacy protection algorithm are combined to generate the privacy protection algorithm;

根据场景信息、隐私信息特征、隐私保护需求、隐私保护算法中的一个或多个的任意组合确定隐私保护算法的组合方案;Determine the combination scheme of the privacy protection algorithm according to any combination of one or more of the scene information, privacy information features, privacy protection requirements, and privacy protection algorithms;

根据所述隐私保护算法的组合方案对所述的隐私保护算法进行组合生成隐私保护方案。The privacy protection algorithm is combined according to the combination solution of the privacy protection algorithm to generate a privacy protection solution.

在本发明实施例中,还包括:In the embodiment of the present invention, it also includes:

对所述隐私保护方案和隐私保护方案中的隐私保护算法中的至少之一进行评估,执行以下至少之一:Evaluate at least one of the privacy protection scheme and the privacy protection algorithm in the privacy protection scheme, and perform at least one of the following:

当所述隐私保护算法没有通过评估时,根据评估结果修改隐私保护算法步骤、隐私保护算法步骤间的组合关系、隐私保护算法的参数中的一个或多个的任意组合,继续执行所述按照隐私保护算法步骤间的组合关系对所述的隐私保护算法步骤和隐私保护算法的参数进行组合生成隐私保护算法的步骤;When the privacy-preserving algorithm fails the evaluation, modify any combination of one or more of the privacy-preserving algorithm steps, the combination relationship between the privacy-preserving algorithm steps, and the parameters of the privacy-preserving algorithm according to the evaluation result, and continue to execute the privacy-preserving algorithm. The combination relationship between the protection algorithm steps is a step of combining the privacy protection algorithm steps and the parameters of the privacy protection algorithm to generate the privacy protection algorithm;

当所述隐私保护算法已经通过评估,且所述隐私保护方案没有通过评估时,修改所述隐私保护算法组合方案,继续执行所述根据所述隐私保护算法的组合方案对所述的隐私保护算法进行组合生成隐私保护方案的步骤;When the privacy protection algorithm has passed the evaluation and the privacy protection scheme has not passed the evaluation, modify the privacy protection algorithm combination scheme, and continue to execute the privacy protection algorithm according to the privacy protection algorithm combination scheme. Perform the steps of combining to generate a privacy protection scheme;

当隐私保护算法已经通过评估,但通过多次修改隐私保护算法组合方案,新的隐私保护方案还是没有通过评估时,修改隐私保护算法步骤、隐私保护算法步骤间的组合关系、隐私保护算法的参数中的一个或多个的任意组合,继续执行所述按照隐私保护算法步骤间的组合关系对所述的隐私保护算法步骤和隐私保护算法的参数进行组合生成隐私保护算法的步骤,再修改所述隐私保护算法组合方案,继续执行所述根据所述隐私保护算法的组合方案对所述的隐私保护算法进行组合生成隐私保护方案的步骤。When the privacy protection algorithm has passed the evaluation, but the new privacy protection solution fails to pass the evaluation after modifying the combination scheme of the privacy protection algorithm many times, modify the privacy protection algorithm steps, the combination relationship between the privacy protection algorithm steps, and the parameters of the privacy protection algorithm. Arbitrary combination of one or more of the above, continue to perform the described step of combining the privacy-preserving algorithm steps and the parameters of the privacy-preserving algorithm to generate a privacy-preserving algorithm according to the combination relationship between the privacy-preserving algorithm steps, and then modify the described privacy-preserving algorithm steps. For the privacy protection algorithm combination scheme, continue to perform the step of combining the privacy protection algorithms according to the privacy protection algorithm combination scheme to generate the privacy protection scheme.

在本发明实施例中,所述隐私保护需求包括以下一种或多种的任意组合:In this embodiment of the present invention, the privacy protection requirement includes any combination of one or more of the following:

隐私保护方案的隐私保护效果期望值、隐私保护方案的性能需求、隐私操作、约束条件、隐私操作和约束条件之间的对应关系;The expected value of the privacy protection effect of the privacy protection scheme, the performance requirements of the privacy protection scheme, the privacy operation, the constraints, the corresponding relationship between the privacy operation and the constraints;

其中,约束条件用于描述进行隐私操作需要满足的条件,包括:操作实体属性、操作环境;Among them, the constraints are used to describe the conditions that need to be met for privacy operations, including: operating entity attributes, operating environment;

所述操作环境包括:时间、空间位置、网络、设备。The operating environment includes: time, spatial location, network, and equipment.

在本发明实施例中,所述隐私保护方案的性能需求不限于包括以下一种或多种的任意组合:In this embodiment of the present invention, the performance requirements of the privacy protection solution are not limited to include any combination of one or more of the following:

运行的环境、最低运行速度、需要的软件资源、需要的硬件资源。Operating environment, minimum operating speed, required software resources, required hardware resources.

在本发明实施例中,所述隐私保护算法的需求包括以下至少之一:隐私保护算法的隐私保护效果期望值和性能需求;In this embodiment of the present invention, the requirements of the privacy protection algorithm include at least one of the following: privacy protection effect expectation value and performance requirements of the privacy protection algorithm;

所述隐私保护算法的性能需求不限于包括以下一种或多种的任意组合:The performance requirements of the privacy protection algorithm are not limited to include any combination of one or more of the following:

运行的环境、最低运行速度、需要的软件资源、需要的硬件资源。Operating environment, minimum operating speed, required software resources, required hardware resources.

在本发明实施例中,所述隐私保护算法的类型包括以下一种或多种的任意组合:In this embodiment of the present invention, the type of the privacy protection algorithm includes any combination of one or more of the following:

基于密码学的隐私保护算法、基于扰乱的隐私保护算法、基于混淆的隐私保护算法、基于泛化的隐私保护算法、基于访问控制的隐私保护算法。Cryptography-based privacy protection algorithm, scrambling-based privacy protection algorithm, obfuscation-based privacy protection algorithm, generalization-based privacy protection algorithm, and access control-based privacy protection algorithm.

在本发明实施例中,所述隐私保护算法的理论基础包括以下一种或多种的任意组合:In this embodiment of the present invention, the theoretical basis of the privacy protection algorithm includes any combination of one or more of the following:

基于密码学的隐私保护技术、基于概率的隐私保护技术、基于博弈的隐私保护技术。Cryptography-based privacy protection technology, probability-based privacy protection technology, and game-based privacy protection technology.

在本发明实施例中,所述隐私保护算法步骤不限于包括以下一种或多种的任意组合:In this embodiment of the present invention, the privacy protection algorithm steps are not limited to include any combination of one or more of the following:

S变化、P置换、密钥扩展、初始化、设定记忆、线性反馈移位寄存器器、非线性反馈移位寄存器、确定扰乱粒度、添加噪声、设定信息权重、筛选满足条件的混淆信息、选取混淆信息、结合真实信息构成请求信息、确定模糊粒度、设定模糊范围、构造请求信息。S change, P replacement, key extension, initialization, memory setting, linear feedback shift register, nonlinear feedback shift register, determining the granularity of disturbance, adding noise, setting information weight, filtering out the confusing information that meets the conditions, selecting Confuse the information, combine the real information to form the request information, determine the fuzzy granularity, set the fuzzy scope, and construct the request information.

在本发明实施例中,所述隐私保护算法的参数包括以下一种或多种的任意组合:In this embodiment of the present invention, the parameters of the privacy protection algorithm include any combination of one or more of the following:

密钥长度、匿名集合大小、隐私预算、敏感度、偏移度、分组长度、加密轮数、S盒、多项式参数、MDS码、P置换表。Key length, anonymous set size, privacy budget, sensitivity, offset, block length, number of encryption rounds, S-box, polynomial parameters, MDS code, P permutation table.

在本发明实施例中,所述隐私信息特征包括以下一个或多个的任意组合:In this embodiment of the present invention, the privacy information feature includes any combination of one or more of the following:

隐私信息类型、隐私信息内容、数据取值范围、数据分布特征、隐私信息的敏感度、可执行的隐私操作、隐私操作次数的期望值、隐私操作结果的社会经验值。Types of privacy information, content of privacy information, data value range, data distribution characteristics, sensitivity of privacy information, executable privacy operations, expected value of privacy operation times, and social experience value of privacy operation results.

在本发明实施例中,所述隐私信息的敏感度为用于衡量信息敏感程度的值,通过概率、数学期望、数学方差中一个或多个的任意组合计算获得。In this embodiment of the present invention, the sensitivity of the private information is a value used to measure the sensitivity of the information, and is obtained by calculating any combination of one or more of probability, mathematical expectation, and mathematical variance.

在本发明实施例中,所述可执行的隐私操作包括以下一种或多种的任意组合:In this embodiment of the present invention, the executable privacy operations include any combination of one or more of the following:

读、写、加密、模糊、泛化、加噪、匿名、签名、验签、计算摘要、加密、保存、复制、粘贴、转发、剪切、修改、删除。Read, write, encrypt, obfuscate, generalize, add noise, anonymize, sign, verify, calculate digest, encrypt, save, copy, paste, forward, cut, modify, delete.

在本发明实施例中,所述场景信息包括以下一种或多种的任意组合:In this embodiment of the present invention, the scene information includes any combination of one or more of the following:

时间、空间位置、设备、设备性能、交互对象、交互途径、请求类型、服务类型。Time, space location, device, device performance, interaction object, interaction approach, request type, service type.

本发明实施例提出了一种隐私信息保护装置,包括以下模块至少之一:An embodiment of the present invention provides a privacy information protection device, including at least one of the following modules:

隐私信息特征获取模块,用于获取隐私信息的隐私信息特征;The private information feature acquisition module is used to obtain the private information features of the private information;

隐私保护方案决策模块,用于根据场景信息和隐私信息特征中的至少一个确定隐私保护方案。The privacy protection scheme decision module is configured to determine the privacy protection scheme according to at least one of the scene information and the characteristics of the privacy information.

在本发明实施例中,还包括:In the embodiment of the present invention, it also includes:

隐私保护方案评估模块,用于对所述隐私保护方案和隐私保护方案中的隐私保护算法中的至少一个进行评估。A privacy protection scheme evaluation module, configured to evaluate at least one of the privacy protection scheme and the privacy protection algorithm in the privacy protection scheme.

本发明实施例提出了一种隐私信息保护装置,包括处理器和计算机可读存储介质,所述计算机可读存储介质中存储有指令,当所述指令被所述处理器执行时,实现上述任一种隐私信息保护方法。An embodiment of the present invention provides an apparatus for protecting privacy information, including a processor and a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when the instructions are executed by the processor, any of the above-mentioned options are implemented. A method of protecting privacy information.

本发明实施例提出了一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现上述任一种隐私信息保护方法的步骤。An embodiment of the present invention provides a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, implements the steps of any of the foregoing methods for protecting privacy information.

本发明实施例提出了一种隐私信息保护系统,包括:The embodiment of the present invention proposes a privacy information protection system, including:

隐私信息特征获取模块,用于获取隐私信息的隐私信息特征;The private information feature acquisition module is used to obtain the private information features of the private information;

隐私保护方案决策模块,用于根据场景信息和隐私信息特征中的至少一个确定隐私保护方案;a privacy protection scheme decision module, configured to determine a privacy protection scheme according to at least one of the scene information and the characteristics of the privacy information;

其中,隐私信息特征获取模块和隐私保护方案决策模块设置在不同的设备。Among them, the privacy information feature acquisition module and the privacy protection scheme decision module are set in different devices.

在本发明实施例中,还包括:In the embodiment of the present invention, it also includes:

隐私保护方案评估模块,用于对所述隐私保护方案和隐私保护方案中的隐私保护算法中的至少一个进行评估;a privacy protection scheme evaluation module, configured to evaluate at least one of the privacy protection scheme and the privacy protection algorithm in the privacy protection scheme;

其中,所述隐私保护方案评估模块、隐私信息特征获取模块和隐私保护方案决策模块中至少两个模块设置在不同的设备。Wherein, at least two modules of the privacy protection scheme evaluation module, the privacy information feature acquisition module and the privacy protection scheme decision module are set in different devices.

本发明实施例包括:获取隐私信息的隐私信息特征;根据场景信息和隐私信息特征中的至少一个确定隐私保护方案。本发明实施例基于隐私信息特征和场景信息确定隐私保护方案,提高了隐私保护算法和隐私保护方案设计、实现和评估的效率。The embodiments of the present invention include: acquiring private information features of private information; and determining a privacy protection scheme according to at least one of scene information and private information features. The embodiments of the present invention determine the privacy protection scheme based on the characteristics of the privacy information and the scene information, and improve the efficiency of designing, implementing and evaluating the privacy protection algorithm and the privacy protection scheme.

在本发明另一个实施例中,通过预处理、隐私信息特征的获取、隐私保护算法的类型或理论基础的确定、隐私保护算法步骤的选取和设计、隐私保护算法步骤间的组合关系的确定和设计、参数设计等环节设计了满足特定应用场景和隐私信息的安全高效隐私保护算法。其中,预处理主要用于预先对隐私信息、场景信息进行适配性处理,确保设计的隐私保护算法满足特定的隐私信息和场景信息;隐私保护算法的类型或理论基础主要根据场景信息、隐私信息特征、隐私保护需求、隐私保护算法的需求确定,确保设计的隐私保护算法按需提供隐私保护;通过确定隐私保护算法的类型或理论基础、隐私保护算法步骤、隐私保护算法步骤组合、参数设计等环节,提高了隐私保护算法设计效率和隐私保护效果;根据场景信息、隐私信息特征、隐私保护需求确定隐私保护算法组合方案,对设计或选择的隐私保护算法进行组合,进而生成一套完整的、体系化的隐私保护方案;隐私保护方案的评估用于对生成的隐私保护算法和隐私保护方案从隐私保护效果和性能进行评估。In another embodiment of the present invention, through preprocessing, acquisition of privacy information features, determination of the type or theoretical basis of privacy protection algorithm, selection and design of privacy protection algorithm steps, determination and combination of privacy protection algorithm steps Design, parameter design and other links designed a safe and efficient privacy protection algorithm that meets specific application scenarios and privacy information. Among them, preprocessing is mainly used to pre-adaptively process privacy information and scene information to ensure that the designed privacy protection algorithm meets specific privacy information and scene information; the type or theoretical basis of privacy protection algorithm is mainly based on scene information and privacy information. Determine the characteristics, privacy protection requirements, and privacy protection algorithm requirements to ensure that the designed privacy protection algorithm provides privacy protection on demand; by determining the type or theoretical basis of the privacy protection algorithm, privacy protection algorithm steps, privacy protection algorithm step combination, parameter design, etc. It improves the design efficiency and privacy protection effect of privacy protection algorithms; determines the privacy protection algorithm combination scheme according to the scene information, privacy information characteristics, and privacy protection requirements, and combines the designed or selected privacy protection algorithms to generate a complete set of privacy protection algorithms. Systematic privacy protection scheme; the evaluation of privacy protection scheme is used to evaluate the privacy protection effect and performance of the generated privacy protection algorithm and privacy protection scheme.

本发明实施例根据应用场景、隐私信息的特点和隐私保护算法,抽取隐私保护算法的基本特征,确定隐私保护算法的归一化框架,并设计出适应特定应用场景和隐私信息的隐私保护算法。基于此,实现了隐私保护算法迭代设计和隐私保护算法的通用编程框架。The embodiment of the present invention extracts the basic features of the privacy protection algorithm according to the application scenario, the characteristics of the privacy information and the privacy protection algorithm, determines the normalization framework of the privacy protection algorithm, and designs the privacy protection algorithm suitable for the specific application scenario and privacy information. Based on this, a general programming framework for iterative design of privacy-preserving algorithms and privacy-preserving algorithms is implemented.

本发明实施例提供根据应用场景、隐私信息的特点,选择隐私保护算法,确定隐私保护算法的组合方案,并根据隐私保护算法的组合方案对设计和/或选择的一个或多个隐私保护算法进行组合生成隐私保护方案。基于此,实现了隐私保护方案迭代设计和隐私保护方案的通用编程框架。The embodiment of the present invention provides selecting a privacy protection algorithm according to application scenarios and characteristics of privacy information, determining a combination scheme of the privacy protection algorithm, and performing the designed and/or selected one or more privacy protection algorithms according to the combination scheme of the privacy protection algorithm. The combination generates a privacy protection scheme. Based on this, a general programming framework for iterative design of privacy protection scheme and privacy protection scheme is implemented.

本发明实施例提供根据隐私保护算法评估结果,通过算法迭代方式,确定隐私保护算法步骤、隐私保护算法步骤间的组合关系和算法参数选择与优化,设计出适应特定隐私信息和应用场景,满足隐私保护需求的隐私保护算法,提高算法设计与实现的效率。The embodiments of the present invention provide, according to the evaluation results of the privacy protection algorithm, through algorithm iteration, determine the steps of the privacy protection algorithm, the combination relationship between the steps of the privacy protection algorithm, and the selection and optimization of algorithm parameters, so as to design a design that adapts to specific privacy information and application scenarios, and satisfies privacy requirements. Protect the privacy protection algorithm of the demand, and improve the efficiency of algorithm design and implementation.

本发明实施例提供根据隐私保护方案评估结果,通过隐私保护算法和隐私保护算法组合方案的调整和修改,设计满足隐私保护需求的隐私保护方案,提高隐私保护方案设计与实现的效率。The embodiments of the present invention provide a privacy protection scheme that meets privacy protection requirements by adjusting and revising the privacy protection algorithm and the privacy protection algorithm combination scheme according to the evaluation result of the privacy protection scheme, thereby improving the efficiency of designing and implementing the privacy protection scheme.

本发明实施例的其它特征和优点将在随后的说明书中阐述,并且,部分地从说明书中变得显而易见,或者通过实施本发明实施例而了解。本发明实施例的目的和其他优点可通过在说明书、权利要求书以及附图中所特别指出的结构来实现和获得。Other features and advantages of embodiments of the invention will be set forth in the description that follows, and in part will be apparent from the description, or learned by practice of the embodiments of the invention. The objectives and other advantages of the embodiments of the invention may be realized and attained by the structure particularly pointed out in the description, claims and drawings.

附图说明Description of drawings

附图用来提供对本发明实施例技术方案的进一步理解,并且构成说明书的一部分,与本发明实施例的实施例一起用于解释本发明实施例的技术方案,并不构成对本发明实施例技术方案的限制。The accompanying drawings are used to provide a further understanding of the technical solutions of the embodiments of the present invention, and constitute a part of the specification. They are used to explain the technical solutions of the embodiments of the present invention together with the embodiments of the present invention, and do not constitute the technical solutions of the embodiments of the present invention. limits.

图1为本发明一个实施例提出的隐私信息保护方法的流程图;FIG. 1 is a flowchart of a privacy information protection method proposed by an embodiment of the present invention;

图2为本发明实施例根据场景信息和隐私信息特征中的至少一个确定隐私保护方案的方法的流程图;2 is a flowchart of a method for determining a privacy protection scheme according to at least one of scene information and privacy information features according to an embodiment of the present invention;

图3为本发明另一个实施例提出的隐私信息保护装置的结构组成示意图;3 is a schematic diagram of the structure and composition of a privacy information protection device proposed by another embodiment of the present invention;

图4为本发明实施例隐私保护方案决策模块的结构组成示意图。FIG. 4 is a schematic structural composition diagram of a decision module of a privacy protection scheme according to an embodiment of the present invention.

具体实施方式Detailed ways

下文中将结合附图对本发明实施例进行详细说明。需要说明的是,在不冲突的情况下,本发明中的实施例及实施例中的特征可以相互任意组合。Hereinafter, the embodiments of the present invention will be described in detail with reference to the accompanying drawings. It should be noted that the embodiments of the present invention and the features of the embodiments may be arbitrarily combined with each other unless there is conflict.

在附图的流程图示出的步骤可以在诸如一组计算机可执行指令的计算机系统中执行。并且,虽然在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤。The steps shown in the flowcharts of the figures may be performed in a computer system, such as a set of computer-executable instructions. Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that herein.

参见图1,本发明一个实施例提出了一种隐私保护方法,包括以下步骤至少之一:Referring to FIG. 1, an embodiment of the present invention provides a privacy protection method, which includes at least one of the following steps:

步骤100、获取隐私信息的隐私信息特征。Step 100: Acquire private information features of the private information.

在本发明实施例中,可以对隐私信息进行信息分析和/或计算得到隐私信息中的隐私信息特征。具体的,可以采用以下技术的一种或多种的任意组合得到隐私信息特征:In this embodiment of the present invention, private information features in the private information may be obtained by performing information analysis and/or computing on the private information. Specifically, any combination of one or more of the following technologies can be used to obtain private information features:

语义分析技术、机器学习技术、深度学习技术、概率统计方法、信息论方法。Semantic analysis technology, machine learning technology, deep learning technology, probability and statistics methods, information theory methods.

在本发明实施例中,隐私信息特征包括以下一个或多个的任意组合:In this embodiment of the present invention, the privacy information feature includes any combination of one or more of the following:

隐私信息类型、隐私信息内容、数据取值范围、数据分布特征、隐私信息的敏感度、可执行的隐私操作、隐私操作次数的期望值、隐私操作结果的社会经验值。Types of privacy information, content of privacy information, data value range, data distribution characteristics, sensitivity of privacy information, executable privacy operations, expected value of privacy operation times, and social experience value of privacy operation results.

其中,数据分布特征用于衡量隐私信息分布的统计特性,可以通过概率统计的方法获得。Among them, the data distribution characteristics are used to measure the statistical characteristics of the distribution of private information, and can be obtained by means of probability statistics.

隐私信息的敏感度为用于衡量信息敏感程度的值,可以通过概率、数学期望、数学方差中一个或多个的任意组合计算所述信息的敏感度。The sensitivity of private information is a value used to measure the sensitivity of information, and the sensitivity of the information can be calculated by any combination of one or more of probability, mathematical expectation, and mathematical variance.

所述可执行的隐私操作包括以下一种或多种的任意组合:The executable privacy operations include any combination of one or more of the following:

读、写、加密、模糊、泛化、加噪、匿名、签名、验签、计算摘要、加密、保存、复制、粘贴、转发、剪切、修改、删除。Read, write, encrypt, obfuscate, generalize, add noise, anonymize, sign, verify, calculate digest, encrypt, save, copy, paste, forward, cut, modify, delete.

步骤101、根据场景信息和隐私信息特征中的至少一个确定隐私保护方案。Step 101: Determine a privacy protection scheme according to at least one of scene information and privacy information features.

在本发明实施例中,参见图2,步骤101包括:In this embodiment of the present invention, referring to FIG. 2 , step 101 includes:

步骤201、根据场景信息和隐私信息特征中的至少一个生成隐私保护需求。Step 201: Generate a privacy protection requirement according to at least one of the scene information and the privacy information feature.

在本发明实施例中,场景信息包括不限于包括以下一种或多种的任意组合:In this embodiment of the present invention, the scene information includes, but is not limited to, any combination including one or more of the following:

时间、空间位置、设备、设备性能、交互对象、交互途径、请求类型、服务类型。Time, space location, device, device performance, interaction object, interaction approach, request type, service type.

其中,场景属于不同的应用场景,可以包括以下一种或多种的任意组合:共享场景、查询场景、支付场景。不同的应用场景具有不同的场景信息。The scenarios belong to different application scenarios, and may include any combination of one or more of the following: sharing scenarios, query scenarios, and payment scenarios. Different application scenarios have different scenario information.

在本发明实施例中,隐私保护需求包括不限于包括以下一种或多种的任意组合:In this embodiment of the present invention, the privacy protection requirements include, but are not limited to, any combination of one or more of the following:

隐私保护方案的隐私保护效果期望值、隐私保护方案的性能需求、隐私操作、约束条件、隐私操作和约束条件之间的对应关系;The expected value of the privacy protection effect of the privacy protection scheme, the performance requirements of the privacy protection scheme, the privacy operation, the constraints, the corresponding relationship between the privacy operation and the constraints;

隐私保护方案的隐私保护效果期望值用于描述隐私信息采用隐私保护方案处理前后的各种期望值,包括以下一种或多种的任意组合:The expected value of privacy protection effect of the privacy protection scheme is used to describe various expected values of private information before and after processing the privacy protection scheme, including any combination of one or more of the following:

采用隐私保护方案处理后的隐私信息与处理前的隐私信息之间的偏差量期望值、采用隐私保护方案处理后的隐私信息与处理前的隐私信息之间的损失比期望值、攻击者推测出隐私保护方案处理前隐私信息的概率的期望值;The expected value of the deviation between the private information processed by the privacy protection scheme and the private information before processing, the expected value of the loss ratio between the private information processed by the privacy protection scheme and the private information before processing, the attacker infers the privacy protection The expected value of the probability of the private information before the solution is processed;

隐私保护方案的性能需求包括不限于包括以下一种或多种的任意组合:The performance requirements of the privacy protection scheme include, but are not limited to, any combination of one or more of the following:

运行的环境、最低运行速度、需要的软件资源、需要的硬件资源;Operating environment, minimum operating speed, required software resources, required hardware resources;

约束条件用于描述进行隐私操作需要满足的条件,包括不限于包括:操作实体属性、操作环境;Constraints are used to describe the conditions that need to be met for privacy operations, including but not limited to: operating entity attributes, operating environment;

其中,操作实体属性为对隐私信息进行隐私操作的实体的属性,包括不限于包括:身份、角色、关系、地址、手机号、ID号、电话号码、职业。The operating entity attribute is the attribute of the entity that performs privacy operations on private information, including but not limited to: identity, role, relationship, address, mobile phone number, ID number, phone number, and occupation.

所述操作环境包括不限于包括:时间、空间位置、网络、设备;The operating environment includes, but is not limited to, including: time, spatial location, network, and equipment;

其中,生成隐私保护需求可以采用人工输入的方式生成,或根据预先设计的规则生成,这两种方式都在本发明实施例的保护范围内。Wherein, the generation of the privacy protection requirement may be generated by manual input, or generated according to a pre-designed rule, both of which are within the protection scope of the embodiments of the present invention.

其中,预先设计规则用于描述根据场景信息和隐私信息特征生成隐私保护需求的方法,可以采用自然语言和/或形式化语言方式描述。The pre-designed rules are used to describe the method for generating privacy protection requirements according to scene information and privacy information features, and can be described in natural language and/or formal language.

预先设计规则可以采用下面方法,但不限于下面方法:可以将场景信息和/或隐私信息特征通过图表或集合方式直接映射,或者通过函数进行映射。The following methods can be adopted for the pre-designed rules, but not limited to the following methods: the scene information and/or privacy information features can be directly mapped through a graph or set, or through a function.

例如:将场景信息中的服务类型映射为隐私保护效果期望值,比如服务类型为金融业务,所涉及的数据敏感性比较高,隐私保护效果期望值高,如果服务类型为搜索某个位置周边的饭店或商场,所涉及的数据敏感性不高,隐私保护效果期望值低;根据场景信息中设备或设备性能映射为隐私保护方案的性能需求,比如需要的软件资源、需要的硬件资源、运行的环境;可以将隐私信息特征中隐私信息类型映射为对应操作实体属性、隐私操作、隐私操作约束条件,对于不同类型的隐私信息比如文本、图片、视频等可以进行的操作不同,对操作实体属性也不同;For example: map the service type in the scene information to the expected value of privacy protection effect. For example, if the service type is financial business, the data sensitivity involved is relatively high, and the expected value of privacy protection effect is high. If the service type is to search for restaurants around a certain location or In shopping malls, the data involved is not sensitive, and the expected value of privacy protection effect is low; according to the device or device performance in the scene information, it is mapped to the performance requirements of the privacy protection scheme, such as required software resources, required hardware resources, and operating environment; Map the privacy information type in the privacy information feature to the corresponding operation entity attributes, privacy operations, and privacy operation constraints. For different types of privacy information such as text, pictures, videos, etc., the operations that can be performed are different, and the attributes of the operation entities are also different;

可以将场景信息的空间位置映射为对应的操作实体属性、隐私操作、隐私操作约束条件,比如在办公室环境下,可以进行读、写等操作,操作实体属性中的身份满足一定的条件就可以,而在外面宾馆、飞机场和火车站这种公开环境,只允许进行读操作,操作实体属性中的身份必须满足特定的条件等。The spatial location of the scene information can be mapped to the corresponding operating entity attributes, privacy operations, and privacy operation constraints. For example, in an office environment, operations such as reading and writing can be performed, and the identity in the operating entity attributes can meet certain conditions. In the public environment such as hotels, airports and railway stations outside, only read operations are allowed, and the identity in the attributes of the operating entity must meet certain conditions.

步骤202、根据场景信息、隐私信息特征、隐私保护需求中的一个或多个任意组合确定隐私保护算法的需求。Step 202: Determine the requirements of the privacy protection algorithm according to any combination of one or more of the scene information, privacy information features, and privacy protection requirements.

在本发明实施例中,隐私保护算法的需求包括以下至少之一:In this embodiment of the present invention, the requirements of the privacy protection algorithm include at least one of the following:

隐私保护算法的隐私保护效果期望值、隐私保护算法的性能需求。The expected value of privacy protection effect of privacy protection algorithm and the performance requirements of privacy protection algorithm.

其中,隐私保护算法的隐私保护效果期望值用于描述隐私信息采用隐私保护算法处理前后的各种期望值,包括以下一种或多种的任意组合:Among them, the expected value of the privacy protection effect of the privacy protection algorithm is used to describe various expected values before and after the privacy information is processed by the privacy protection algorithm, including any combination of one or more of the following:

采用隐私保护算法处理后的隐私信息与处理前的隐私信息之间的偏差量期望值、采用隐私保护算法处理后的隐私信息与处理前的隐私信息之间的损失比期望值、攻击者推测出隐私保护算法处理前隐私信息的概率的期望值;The expected value of deviation between the private information processed by the privacy protection algorithm and the private information before processing, the expected value of the loss ratio between the private information processed by using the privacy protection algorithm and the private information before processing, the attacker infers the privacy protection The expected value of the probability of the private information before the algorithm processes it;

其中,隐私保护算法的性能需求包括但不限于包括以下一种或多种的任意组合:The performance requirements of the privacy protection algorithm include, but are not limited to, any combination of one or more of the following:

运行的环境、最低运行速度、需要的软件资源、需要的硬件资源。Operating environment, minimum operating speed, required software resources, required hardware resources.

其中,确定隐私保护算法的隐私保护效果期望值和隐私保护算法的性能需求可以采用人工输入的方式生成,或根据预先设计的规则生成,这两种方式都在本发明实施例的保护范围内。Wherein, determining the expected value of the privacy protection effect of the privacy protection algorithm and the performance requirement of the privacy protection algorithm may be generated by manual input, or generated according to pre-designed rules, both of which are within the protection scope of the embodiments of the present invention.

其中,预先设计规则用于描述根据场景信息、隐私信息特征、隐私保护需求确定隐私保护算法性能需求。The pre-designed rules are used to describe the performance requirements of the privacy protection algorithm determined according to scene information, privacy information characteristics, and privacy protection requirements.

预先设计规则可以采用下面方法,但不限于下面方法:可以将场景信息、隐私信息特征、隐私保护需求通过图表或集合方式直接映射,或者通过函数进行映射。The following methods may be adopted for the pre-designed rules, but are not limited to the following methods: the scene information, privacy information features, and privacy protection requirements may be directly mapped by a graph or a set, or by a function.

本发明实施例中,根据场景信息、隐私信息特征、隐私保护需求中一个或多个的任意组合确定隐私保护算法的隐私保护效果期望值,例如将场景信息、隐私信息特征、隐私保护需求的隐私保护效果期望值映射为隐私保护算法的隐私保护效果期望值;In this embodiment of the present invention, the expected value of the privacy protection effect of the privacy protection algorithm is determined according to any combination of one or more of the scene information, privacy information features, and privacy protection requirements. The effect expectation value is mapped to the privacy protection effect expectation value of the privacy protection algorithm;

根据场景信息、隐私信息特征、隐私保护需求中一个或多个的任意组合确定隐私保护算法的性能需求,例如:如果场景信息属于服务器端,对于隐私保护算法要求运行速度要快,比如要求每秒计算多少次,或处理多少字节的数据流。假如隐私保护算法为签名算法,要求每秒完成多少次签名;如果场景信息为终端设备,软硬件资源环境受限,隐私保护算法软硬件资源会设定限制;如果隐私保护需求中对运行的空间有限制,对隐私保护算法的运行环境也有相应的要求。Determine the performance requirements of the privacy protection algorithm according to any combination of one or more of the scene information, privacy information characteristics, and privacy protection requirements. For example, if the scene information belongs to the server side, the privacy protection algorithm requires a faster running speed, such as requiring every second How many times to calculate, or how many bytes of data stream to process. If the privacy protection algorithm is a signature algorithm, how many signatures are required per second; if the scene information is a terminal device and the hardware and software resources are limited, the privacy protection algorithm software and hardware resources will be limited; There are restrictions, and there are corresponding requirements for the operating environment of the privacy protection algorithm.

步骤203、根据场景信息、隐私信息特征、隐私保护需求、隐私保护算法的需求中的一个或多个的任意组合确定以下至少之一:隐私保护算法的类型和隐私保护算法的理论基础。Step 203: Determine at least one of the following according to any combination of one or more of scene information, privacy information features, privacy protection requirements, and privacy protection algorithm requirements: the type of privacy protection algorithm and the theoretical basis of the privacy protection algorithm.

在本发明实施例中,隐私保护算法的类型包括但不限于包括以下一种或多种的任意组合:In this embodiment of the present invention, the types of privacy protection algorithms include, but are not limited to, any combination of one or more of the following:

基于密码学的隐私保护算法、基于扰乱的隐私保护算法、基于混淆的隐私保护算法、基于泛化的隐私保护算法、基于访问控制的隐私保护算法。Cryptography-based privacy protection algorithm, scrambling-based privacy protection algorithm, obfuscation-based privacy protection algorithm, generalization-based privacy protection algorithm, and access control-based privacy protection algorithm.

所述隐私保护算法的理论基础包括但不限于包括以下一种或多种的任意组合:The theoretical basis of the privacy protection algorithm includes, but is not limited to, any combination of one or more of the following:

基于密码学的隐私保护技术、基于概率的隐私保护技术、基于博弈的隐私保护技术。Cryptography-based privacy protection technology, probability-based privacy protection technology, and game-based privacy protection technology.

其中,确定隐私保护算法的类型和隐私保护算法的理论基础可以采用人工输入的方式生成,或根据预先设计的规则生成,这两种方式都在本发明实施例的保护范围内。The determination of the type of the privacy protection algorithm and the theoretical basis of the privacy protection algorithm may be generated by manual input, or generated according to pre-designed rules, both of which are within the protection scope of the embodiments of the present invention.

其中,预先设计规则用于描述根据场景信息、隐私信息特征、隐私保护需求、隐私保护算法性能需求确定隐私保护算法类型和隐私保护算法的理论基础。Among them, the pre-designed rules are used to describe the theoretical basis for determining the type of privacy protection algorithm and the privacy protection algorithm according to scene information, privacy information characteristics, privacy protection requirements, and performance requirements of privacy protection algorithms.

预先设计规则可以采用下面方法,但不限于下面方法:可以将场景信息、隐私信息特征、隐私保护需求、隐私保护算法的需求通过图表或集合方式直接映射、分类匹配方法或者通过函数进行映射;The following methods can be used for pre-designing the rules, but not limited to the following methods: the scene information, privacy information features, privacy protection requirements, and privacy protection algorithm requirements can be directly mapped through charts or sets, classification matching methods, or mapping through functions;

比如:根据隐私保护算法的需求中可进行的隐私操作确定隐私保护算法的类型,假如隐私操作只有混淆,那么隐私保护算法只能选择基于混淆的隐私保护算法;如果隐私保护算法的性能需求中要求运行速度比较快,那么隐私保护算法的类型只能选择满足运行速度的算法类型;如果隐私保护算法的隐私保护效果期望值比较高,隐私保护算法只能选择基于密码学的隐私保护算法;For example: determine the type of privacy protection algorithm according to the privacy operations that can be performed in the requirements of the privacy protection algorithm. If the privacy operation is only obfuscated, then the privacy protection algorithm can only choose the privacy protection algorithm based on confusion; if the performance requirements of the privacy protection algorithm require If the running speed is relatively fast, the type of privacy protection algorithm can only choose the algorithm type that meets the running speed; if the expected value of the privacy protection effect of the privacy protection algorithm is relatively high, the privacy protection algorithm can only choose the privacy protection algorithm based on cryptography;

同样可以根据场景信息、隐私信息特征、隐私保护需求、隐私保护算法性能需求选择隐私保护算法理论基础,比如隐私保护算法的隐私保护效果期望值比较高,隐私保护算法理论基础必须采用基于密码学的隐私保护技术;如果隐私操作只有匿名操作,隐私保护算法理论基础只能采用基于概率的隐私保护技术。The theoretical basis of privacy protection algorithm can also be selected according to scene information, privacy information characteristics, privacy protection requirements, and performance requirements of privacy protection algorithm. For example, the expected value of privacy protection effect of privacy protection algorithm is relatively high. Protection technology; if the privacy operation is only anonymous, the theoretical basis of the privacy protection algorithm can only use the probability-based privacy protection technology.

步骤204、根据场景信息、隐私信息特征、隐私保护需求、隐私保护算法的需求、隐私保护算法的类型、隐私保护算法的理论基础中的一个或多个的任意组合,给出隐私保护算法步骤及隐私保护算法步骤间的组合关系。Step 204: According to any combination of one or more of the scene information, privacy information characteristics, privacy protection requirements, requirements of privacy protection algorithms, types of privacy protection algorithms, and theoretical foundations of privacy protection algorithms, provide privacy protection algorithm steps and The compositional relationship between the steps of a privacy-preserving algorithm.

在本发明实施例中,所述根据场景信息、隐私信息特征、隐私保护需求、隐私保护算法的需求、隐私保护算法的类型、隐私保护算法的理论基础中的一个或多个的任意组合,确定隐私保护算法步骤同样可以直接映射或采用函数进行映射。比如,根据隐私保护算法的类型和隐私保护算法的理论基础选择隐私保护算法步骤,假如隐私保护算法的理论为基于密码学的隐私保护技术,隐私保护算法的类型为基于密码学的隐私保护算法,只能选择密码算法步骤,进一步隐私操作为签名,隐私保护算法步骤只能选择基于签名算法密码模块;如果隐私保护算法的性能需求中软件硬件资源受限,主要选择轻量级密码算法步骤;In the embodiment of the present invention, according to any combination of one or more of scene information, privacy information characteristics, privacy protection requirements, requirements of privacy protection algorithms, types of privacy protection algorithms, and theoretical foundations of privacy protection algorithms, determining Privacy-preserving algorithm steps can also be directly mapped or mapped using functions. For example, the steps of privacy protection algorithm are selected according to the type of privacy protection algorithm and the theoretical basis of privacy protection algorithm. If the theory of privacy protection algorithm is a privacy protection technology based on cryptography, and the type of privacy protection algorithm is a privacy protection algorithm based on cryptography, Only the cryptographic algorithm step can be selected, and the further privacy operation is signature, and the privacy protection algorithm step can only select the cryptographic module based on the signature algorithm; if the performance requirements of the privacy protection algorithm are limited in software and hardware resources, the lightweight cryptographic algorithm step is mainly selected;

所述根据场景信息、隐私信息特征、隐私保护需求、隐私保护算法的性能需求、隐私保护算法的类型、隐私保护算法的理论基础中的一个或多个的任意组合,确定隐私保护算法步骤间的组合关系同样可以直接映射或采用函数进行映射。其中,所选择算法的步骤之间存在先后的逻辑和执行顺序,则保证原本的逻辑和执行顺序不变,进行执行;所选择算法的步骤之间未存在先后的逻辑和执行顺序,则随机对算法的步骤进行排序。According to any combination of one or more of scene information, privacy information characteristics, privacy protection requirements, performance requirements of privacy protection algorithms, types of privacy protection algorithms, and theoretical foundations of privacy protection algorithms, the interval between steps of the privacy protection algorithm is determined. Combination relationships can also be directly mapped or mapped using functions. Among them, if there is a sequential logic and execution order between the steps of the selected algorithm, the original logic and execution order are guaranteed to remain unchanged, and the execution is carried out; if there is no sequential logic and execution order between the steps of the selected algorithm, random The steps of the algorithm are sorted.

例如,在基于混淆的隐私保护算法中,选取k-1个匿名位置来实现对真实信息的混淆过程:地图划分、地图中每个位置单元查询概率的计算、用户所在位置单元的查询概率进行比较、选取概率满足条件的位置单元、选取位置满足要求的位置单元、构造请求信息。其中,步骤1-3为具有逻辑和执行的先后顺序,则需保证该步骤不变,步骤4和5则为不具备逻辑和执行先后顺序的步骤,则随机的对4和5进行排序。For example, in an obfuscation-based privacy protection algorithm, k-1 anonymous locations are selected to implement the process of obfuscation of real information: map division, calculation of the query probability of each location unit in the map, and comparison of the query probability of the user's location unit , Select the location unit whose probability satisfies the condition, select the location unit whose location satisfies the requirement, and construct the request information. Among them, steps 1-3 have the order of logic and execution, and it is necessary to ensure that the step remains unchanged, and steps 4 and 5 are steps that do not have the order of logic and execution, so 4 and 5 are randomly sorted.

比如:隐私保护算法采用分组密码算法中SP结构,所有隐私保护算法步骤按照SP结构组合;For example, the privacy protection algorithm adopts the SP structure in the block cipher algorithm, and all privacy protection algorithm steps are combined according to the SP structure;

在本发明实施例中,所述隐私保护算法步骤包括但不限于包括以下一种或多种的任意组合:In this embodiment of the present invention, the privacy protection algorithm steps include, but are not limited to, any combination of one or more of the following:

S变化、P置换、密钥扩展、初始化、设定记忆、线性反馈移位寄存器器、非线性反馈移位寄存器、确定扰乱粒度、添加噪声、设定信息权重、筛选满足条件的混淆信息、选取混淆信息、结合真实信息构成请求信息、确定模糊粒度、设定模糊范围、构造请求信息。S change, P replacement, key extension, initialization, memory setting, linear feedback shift register, nonlinear feedback shift register, determining the granularity of disturbance, adding noise, setting information weight, filtering out the confusing information that meets the conditions, selecting Confuse the information, combine the real information to form the request information, determine the fuzzy granularity, set the fuzzy scope, and construct the request information.

步骤205、根据场景信息、隐私保护需求、隐私保护算法的需求、隐私保护算法步骤中的一个或多个的任意组合选择隐私保护算法的参数。Step 205: Select parameters of the privacy protection algorithm according to any combination of one or more of the scene information, privacy protection requirements, privacy protection algorithm requirements, and privacy protection algorithm steps.

在本发明实施例中,所述的隐私保护算法的参数包括以下一种或多种的任意组合:In this embodiment of the present invention, the parameters of the privacy protection algorithm include any combination of one or more of the following:

密钥长度、匿名集合大小、隐私预算、敏感度、偏移度、分组长度、加密轮数、S盒、多项式参数、MDS码、P置换表。Key length, anonymous set size, privacy budget, sensitivity, offset, block length, number of encryption rounds, S-box, polynomial parameters, MDS code, P permutation table.

在本发明实施例中,根据场景信息、隐私保护需求、隐私保护算法的需求、隐私保护算法步骤中的一个或多个的任意组合选择隐私保护算法的参数可以根据预先设计的规则。预先设计的规则可以直接映射或通过函数进行映射。In the embodiment of the present invention, the parameters of the privacy protection algorithm are selected according to any combination of one or more of scene information, privacy protection requirements, privacy protection algorithm requirements, and privacy protection algorithm steps according to pre-designed rules. Pre-designed rules can be mapped directly or through functions.

比如可以制定运行速度、运行软件硬件资源与参数之间的对应表,如果隐私保护算法的运行速度要求比较快,算法的运行的软件硬件环境受限,可以隐私保护算法步骤参数可以选择小些,密钥长度短些,加密轮数少些;如果场景信息中隐私保护算法隐私保护效果期望值比较高,参数选择大些,密钥长度长些,加密轮数大些;比如设置隐私保护算法安全要求与参数之间的对应表,根据对应表选择参数。For example, the correspondence table between the running speed, running software and hardware resources and parameters can be formulated. If the running speed of the privacy protection algorithm is required to be relatively fast, and the software and hardware environment for the algorithm to run is limited, the parameters of the privacy protection algorithm steps can be selected to be smaller. The key length is shorter and the number of encryption rounds is smaller; if the expected value of the privacy protection effect of the privacy protection algorithm in the scene information is relatively high, the parameter selection is larger, the key length is longer, and the number of encryption rounds is larger; for example, set the security requirements of the privacy protection algorithm Correspondence table with parameters, select parameters according to the correspondence table.

步骤206、按照隐私保护算法步骤间组合关系对所述的隐私保护算法步骤和隐私保护算法的参数进行组合生成隐私保护算法。Step 206 , combine the steps of the privacy protection algorithm and the parameters of the privacy protection algorithm according to the combination relationship between the steps of the privacy protection algorithm to generate a privacy protection algorithm.

步骤207、根据场景信息、隐私信息特征、隐私保护需求、隐私保护算法中的一个或多个的任意组合确定隐私保护算法的组合方案。Step 207: Determine a combination scheme of the privacy protection algorithm according to any combination of one or more of the scene information, the privacy information feature, the privacy protection requirement, and the privacy protection algorithm.

在本发明实施例中,根据场景信息、隐私信息特征、隐私保护需求、隐私保护算法中的一个或多个的任意组合确定隐私保护算法组合方案可以采用预先设计的规则,预先设计的规则可以直接映射或通过函数进行映射。In this embodiment of the present invention, pre-designed rules may be used to determine the combination scheme of privacy protection algorithms according to any combination of one or more of scene information, privacy information features, privacy protection requirements, and privacy protection algorithms, and the pre-designed rules may directly map or map through a function.

比如,制定根据所述的隐私保护需求中的隐私保护效果期望值与隐私保护算法的类型、隐私保护算法组合方案对应表,根据隐私保护算法的类型选择对应的隐私保护算法和隐私保护算法组合方案;比如制定隐私信息特征与隐私保护算法类型对应表,根据隐私信息特征选择隐私保护算法,并根据输入隐私信息确定隐私保护算法组合方案,比如隐私信息类型为文本,选择1号隐私保护算法,如果隐私信息类型为图像,选择2号隐私保护算法,那就按照输入隐私信息选择对应的隐私保护算法,进而确定隐私保护方案。比如隐私保护算法为一个,不同隐私保护效果期望值采用不同组合方式,制定一个隐私保护效果期望值与组合方案对应表,根据不同期望值选择不同的组合方案,比如可以认证加密认证组合方案、输入反馈组合方案等。For example, formulate a correspondence table according to the expected value of privacy protection effect in the privacy protection requirement, the type of privacy protection algorithm, and the combination scheme of privacy protection algorithm, and select the corresponding privacy protection algorithm and combination scheme of privacy protection algorithm according to the type of privacy protection algorithm; For example, formulate a correspondence table between privacy information characteristics and privacy protection algorithm types, select privacy protection algorithms according to privacy information characteristics, and determine the combination scheme of privacy protection algorithms according to the input privacy information. For example, if the privacy information type is text, choose privacy protection algorithm No. 1. The information type is image, and the privacy protection algorithm No. 2 is selected, then the corresponding privacy protection algorithm is selected according to the input privacy information, and then the privacy protection scheme is determined. For example, there is one privacy protection algorithm, and different expected values of privacy protection effects are combined in different ways. A table corresponding to the expected values of privacy protection effects and combination schemes is formulated, and different combination schemes are selected according to different expectations. For example, the combination scheme of authentication encryption authentication and combination scheme of input feedback Wait.

步骤208、根据所述的隐私保护算法的组合方案对所述的隐私保护算法进行组合生成隐私保护方案。Step 208 , combine the privacy protection algorithms according to the combination scheme of the privacy protection algorithms to generate a privacy protection scheme.

在本发明另一个实施例中,隐私信息保护方法还包括:In another embodiment of the present invention, the privacy information protection method further includes:

步骤102、对生成的隐私保护方案和隐私保护方案中的隐私保护算法中的至少之一进行评估。Step 102: Evaluate at least one of the generated privacy protection scheme and the privacy protection algorithm in the privacy protection scheme.

在本发明实施例中,对生成的隐私保护方案进行评估包括以下至少之一:In this embodiment of the present invention, evaluating the generated privacy protection scheme includes at least one of the following:

对隐私保护方案的隐私保护效果进行评估;Evaluate the privacy protection effect of the privacy protection scheme;

对隐私保护方案的复杂度进行评估;Evaluate the complexity of the privacy protection scheme;

对隐私保护方案中的隐私保护算法进行评估包括以下至少之一:The evaluation of the privacy protection algorithm in the privacy protection scheme includes at least one of the following:

对隐私保护方案中的隐私保护算法的隐私保护效果进行评估;Evaluate the privacy protection effect of the privacy protection algorithm in the privacy protection scheme;

对隐私保护方案中的隐私保护算法的复杂度进行评估。Evaluate the complexity of privacy-preserving algorithms in privacy-preserving schemes.

其中,对隐私保护方案中的隐私保护算法的隐私保护效果进行评估包括:Among them, the evaluation of the privacy protection effect of the privacy protection algorithm in the privacy protection scheme includes:

计算隐私保护算法的隐私保护效果值;Calculate the privacy protection effect value of the privacy protection algorithm;

当隐私保护算法的隐私保护效果值大于或等于所述的隐私保护算法的需求中隐私保护效果期望值,判断出隐私保护算法通过隐私保护算法的隐私保护效果评估;When the privacy protection effect value of the privacy protection algorithm is greater than or equal to the expected value of the privacy protection effect in the requirements of the privacy protection algorithm, it is judged that the privacy protection algorithm passes the privacy protection effect evaluation of the privacy protection algorithm;

当隐私保护算法的隐私保护效果值小于所述的隐私保护算法的需求中隐私保护效果期望值,判断出隐私保护算法没有通过隐私保护算法的隐私保护效果评估。When the privacy protection effect value of the privacy protection algorithm is less than the expected value of the privacy protection effect in the requirement of the privacy protection algorithm, it is determined that the privacy protection algorithm has not passed the privacy protection effect evaluation of the privacy protection algorithm.

其中,隐私保护效果值包括但不限于包括以下一种或多种的任意组合:The privacy protection effect value includes, but is not limited to, any combination of one or more of the following:

采用所述的隐私保护算法处理后的隐私信息与处理前的隐私信息之间的偏差量、采用所述的隐私保护算法处理后的隐私信息与处理前的隐私信息之间的损失比、攻击者推测出处理前隐私信息的概率。The amount of deviation between the private information processed by using the privacy protection algorithm and the private information before processing, the loss ratio between the private information processed by using the privacy protection algorithm and the private information before processing, the attacker Infer the probability of private information before processing.

其中,隐私保护算法的复杂度包括以下一种或多种的任意组合:时间复杂度、空间复杂度。The complexity of the privacy protection algorithm includes any combination of one or more of the following: time complexity and space complexity.

对隐私保护方案中的隐私保护算法的复杂度进行评估包括以下一种或多种的任意组合:Assessing the complexity of the privacy protection algorithm in the privacy protection scheme includes any combination of one or more of the following:

对所述隐私保护算法的时间复杂度进行评估;Evaluate the time complexity of the privacy protection algorithm;

对所述隐私保护算法的空间复杂度进行评估。Evaluate the space complexity of the privacy-preserving algorithm.

其中,所述对隐私保护算法的时间复杂度进行评估包括:Wherein, the evaluation of the time complexity of the privacy protection algorithm includes:

判断所述隐私保护算法运行占用的软件资源是否满足隐私保护算法的需求中的需要的软件资源;Determine whether the software resources occupied by the operation of the privacy protection algorithm meet the required software resources in the requirements of the privacy protection algorithm;

当所述隐私保护算法运行占用的软件资源小于或等于隐私保护算法的需求中的需要的软件资源时,判断出所述隐私保护算法通过隐私保护算法的空间复杂度评估中的软件资源评估;When the software resources occupied by the operation of the privacy protection algorithm are less than or equal to the required software resources in the requirements of the privacy protection algorithm, it is determined that the privacy protection algorithm passes the software resource evaluation in the space complexity evaluation of the privacy protection algorithm;

当所述隐私保护算法运行占用的软件资源大于所述隐私保护算法的需求中的需要的软件资源时,判断出所述隐私保护算法没有通过所述隐私保护算法的空间复杂度评估中的软件资源评估;When the software resources occupied by the operation of the privacy protection algorithm are greater than the required software resources in the requirements of the privacy protection algorithm, it is determined that the privacy protection algorithm does not pass the software resources in the space complexity evaluation of the privacy protection algorithm Evaluate;

判断所述隐私保护算法运行占用的硬件资源是否满足所述隐私保护算法的需求中需要的硬件资源;Determine whether the hardware resources occupied by the operation of the privacy protection algorithm meet the hardware resources required in the requirements of the privacy protection algorithm;

当所述隐私保护算法运行占用的硬件资源小于或等于所述隐私保护算法的需求中的需要的硬件资源时,判断出所述隐私保护算法通过所述隐私保护算法的空间复杂度评估中硬件资源评估;When the hardware resources occupied by the operation of the privacy protection algorithm are less than or equal to the required hardware resources in the requirements of the privacy protection algorithm, it is determined that the privacy protection algorithm passes the hardware resources in the space complexity evaluation of the privacy protection algorithm Evaluate;

当所述隐私保护算法运行占用的硬件资源大于所述隐私保护算法的需求中的硬件资源时,判断出所述隐私保护算法没有通过所述隐私保护算法的空间复杂度评估中硬件资源评估。When the hardware resources occupied by the operation of the privacy protection algorithm are greater than the hardware resources required by the privacy protection algorithm, it is determined that the privacy protection algorithm has not passed the hardware resource evaluation in the space complexity evaluation of the privacy protection algorithm.

其中,对隐私保护方案的隐私保护效果进行评估包括:Among them, the evaluation of the privacy protection effect of the privacy protection scheme includes:

计算所述隐私保护方案的隐私保护效果值;calculating the privacy protection effect value of the privacy protection scheme;

当所述隐私保护方案的隐私保护效果值大于或等于所述隐私保护需求中隐私保护效果期望值时,判断出所述隐私保护方案通过隐私保护方案的隐私保护效果评估;When the privacy protection effect value of the privacy protection scheme is greater than or equal to the expected value of the privacy protection effect in the privacy protection requirement, it is determined that the privacy protection scheme passes the privacy protection effect evaluation of the privacy protection scheme;

当所述隐私保护方案的隐私保护效果值小于所述的隐私保护方案需求中隐私保护效果期望值时,判断出所述隐私保护方案没有通过隐私保护算法的隐私保护效果评估。When the privacy protection effect value of the privacy protection scheme is smaller than the privacy protection effect expectation value in the privacy protection scheme requirement, it is determined that the privacy protection scheme has not passed the privacy protection effect evaluation of the privacy protection algorithm.

其中,隐私保护方案的隐私保护效果值包括但不限于包括以下一种或多种的任意组合:Wherein, the privacy protection effect value of the privacy protection scheme includes, but is not limited to, any combination of one or more of the following:

采用所述的隐私保护方案处理后的隐私信息与处理前的隐私信息之间的偏差量、采用所述的隐私保护方案处理后的隐私信息与处理前的隐私信息之间的损失比、攻击者推测出处理前隐私信息的概率。The amount of deviation between the private information processed by using the privacy protection scheme and the private information before processing, the loss ratio between the private information processed by using the privacy protection scheme and the private information before processing, the attacker Infer the probability of private information before processing.

其中,所述隐私保护方案的复杂度包括以下一种或多种的任意组合:时间复杂度、空间复杂度;Wherein, the complexity of the privacy protection scheme includes any combination of one or more of the following: time complexity, space complexity;

所述对隐私保护方案的复杂度进行评估包括以下一种或多种的任意组合:The evaluation of the complexity of the privacy protection scheme includes any combination of one or more of the following:

对所述隐私保护方案的时间复杂度进行评估;Evaluate the time complexity of the privacy protection scheme;

对所述隐私保护方案的空间复杂度进行评估。The space complexity of the privacy protection scheme is evaluated.

其中,所述对隐私保护方案的时间复杂度进行评估包括:Wherein, the evaluation of the time complexity of the privacy protection scheme includes:

判断隐私保护方案的运行速度是否满足所述的隐私保护需求中的最低运行速度;Determine whether the operating speed of the privacy protection scheme meets the minimum operating speed in the privacy protection requirements;

当隐私保护方案的运行速度大于或等于隐私保护需求中的最低运行速度时,判断出隐私保护方案通过隐私保护方案的时间复杂度评估;When the running speed of the privacy protection scheme is greater than or equal to the minimum running speed in the privacy protection requirement, it is judged that the privacy protection scheme passes the time complexity evaluation of the privacy protection scheme;

当隐私保护方案的运行速度小于隐私保护需求中的运行速度时,判断出隐私保护方案没有通过隐私保护方案的时间复杂度评估。When the running speed of the privacy protection scheme is less than the running speed in the privacy protection requirement, it is determined that the privacy protection scheme has not passed the time complexity evaluation of the privacy protection scheme.

其中,所述对隐私保护方案的空间复杂度进行评估包括以下一种或多种的任意组合:Wherein, the evaluation of the space complexity of the privacy protection scheme includes any combination of one or more of the following:

判断所述隐私保护方案运行占用的软件资源是否满足隐私保护需求中的需要的软件资源;Determine whether the software resources occupied by the operation of the privacy protection scheme meet the required software resources in the privacy protection requirements;

当所述隐私保护方案运行占用的软件资源小于或等于隐私保护需求中的需要的软件资源时,判断出所述隐私保护方案通过隐私保护方案的空间复杂度评估中的软件资源评估;When the software resources occupied by the operation of the privacy protection scheme are less than or equal to the required software resources in the privacy protection requirements, it is determined that the privacy protection scheme passes the software resource evaluation in the space complexity evaluation of the privacy protection scheme;

当所述隐私保护方案运行占用的软件资源大于所述隐私保护需求中的需要的软件资源时,判断出所述隐私保护方案没有通过所述隐私保护方案的空间复杂度评估中的软件资源评估;When the software resources occupied by the operation of the privacy protection scheme are greater than the required software resources in the privacy protection requirements, it is determined that the privacy protection scheme has not passed the software resource evaluation in the space complexity evaluation of the privacy protection scheme;

判断所述隐私保护方案运行占用的硬件资源是否满足所述隐私保护需求中需要的硬件资源;Determine whether the hardware resources occupied by the operation of the privacy protection scheme meet the hardware resources required in the privacy protection requirement;

当所述隐私保护方案运行占用的硬件资源小于或等于所述隐私保护需求中的需要的硬件资源时,判断出所述隐私保护方案通过所述隐私保护方案的空间复杂度评估中硬件资源评估;When the hardware resources occupied by the operation of the privacy protection scheme are less than or equal to the hardware resources required in the privacy protection requirement, it is determined that the privacy protection scheme passes the hardware resource evaluation in the space complexity evaluation of the privacy protection scheme;

当所述隐私保护方案运行占用的硬件资源大于所述隐私保护需求中的硬件资源时,判断出所述隐私保护方案没有通过所述隐私保护方案的空间复杂度评估中硬件资源评估。When the hardware resources occupied by the operation of the privacy protection scheme are greater than the hardware resources in the privacy protection requirement, it is determined that the privacy protection scheme fails the hardware resource evaluation in the space complexity evaluation of the privacy protection scheme.

在本发明另一个实施例中,该方法还包括:In another embodiment of the present invention, the method further includes:

当隐私保护算法没有通过评估时,根据评估结果不断修改迭代隐私保护算法步骤、隐私保护算法步骤间的组合关系、隐私保护算法的参数中的一个或多个的任意组合,继续执行所述按照隐私保护算法步骤间的组合关系对所述的隐私保护算法步骤和隐私保护算法的参数进行组合生成隐私保护算法的步骤,再对新的隐私保护算法进行评估,直至新的隐私保护算法通过隐私保护算法的评估。When the privacy protection algorithm fails the evaluation, continuously modify any combination of one or more of the iterative privacy protection algorithm steps, the combination relationship between the privacy protection algorithm steps, and the parameters of the privacy protection algorithm according to the evaluation results, and continue to perform the above according to the privacy protection algorithm. The combination relationship between the steps of the protection algorithm is the step of combining the steps of the privacy protection algorithm and the parameters of the privacy protection algorithm to generate the privacy protection algorithm, and then the new privacy protection algorithm is evaluated until the new privacy protection algorithm passes the privacy protection algorithm. evaluation of.

下面通过具体例子说明隐私保护算法如何进行不断修改迭代,但并不限于下述情况。比如:隐私保护算法的评估结果显示没有通过隐私保护算法的复杂度评估,通过隐私保护效果评估,这时可以通过简单修改隐私保护算法的参数和/或隐私保护步骤间的组合关系,生成新的隐私保护算法,再对新生成的隐私保护算法进行评估,如果评估结果显示隐私保护效果和隐私保护算法复杂度均通过评估,结束隐私保护算法设计;The following uses specific examples to illustrate how to continuously modify and iterate the privacy protection algorithm, but it is not limited to the following cases. For example, the evaluation result of the privacy protection algorithm shows that the complexity evaluation of the privacy protection algorithm has not passed, but the privacy protection effect evaluation has passed. At this time, a new algorithm can be generated by simply modifying the parameters of the privacy protection algorithm and/or the combination relationship between the privacy protection steps. Privacy protection algorithm, and then evaluate the newly generated privacy protection algorithm. If the evaluation result shows that both the privacy protection effect and the complexity of the privacy protection algorithm pass the evaluation, the privacy protection algorithm design is ended;

如果隐私保护算法的评估结果显示没有通过隐私保护效果评估,而通过隐私保护算法的复杂度评估,通过简单修改隐私保护算法的参数和/或隐私保护步骤间的组合关系,生成新的隐私保护算法,再对新生成的隐私保护算法进行评估,如果新的隐私保护算法的隐私保护效果评估结果显示还没有通过隐私保护效果评估。根据隐私保护算法的类型和隐私保护算法的理论基础,选择新的隐私保护算法步骤、隐私保护算法步骤间的组合关系、隐私保护算法的参数,再生成新的隐私保护算法并进行评估,如果评估结果显示隐私保护效果和隐私保护算法复杂度均通过评估,结束隐私保护算法设计;If the evaluation result of the privacy-preserving algorithm shows that it does not pass the privacy-preserving effect evaluation, but passes the complexity evaluation of the privacy-preserving algorithm, generate a new privacy-preserving algorithm by simply modifying the parameters of the privacy-preserving algorithm and/or the combination relationship between the privacy-preserving steps. , and then evaluate the newly generated privacy protection algorithm. If the privacy protection effect evaluation result of the new privacy protection algorithm shows that it has not passed the privacy protection effect evaluation. According to the type of privacy protection algorithm and the theoretical basis of the privacy protection algorithm, select the new privacy protection algorithm steps, the combination relationship between the privacy protection algorithm steps, and the parameters of the privacy protection algorithm, and then generate a new privacy protection algorithm and evaluate it. The results show that both the privacy protection effect and the complexity of the privacy protection algorithm pass the evaluation, and the design of the privacy protection algorithm is completed;

如果隐私保护算法的评估结果显示隐私保护效果和隐私保护算法的复杂度均没有通过评估,根据隐私保护算法类型和隐私保护算法理论基础,选择新的隐私保护算法步骤、隐私保护算法步骤间的组合关系、隐私保护算法参数,再生成新的隐私保护算法并进行评估,如果评估结果显示隐私保护效果和隐私保护算法复杂度均通过评估,结束隐私保护算法设计。If the evaluation result of the privacy protection algorithm shows that neither the privacy protection effect nor the complexity of the privacy protection algorithm pass the evaluation, according to the type of privacy protection algorithm and the theoretical basis of the privacy protection algorithm, select a new privacy protection algorithm step and a combination between the privacy protection algorithm steps. relationship and privacy protection algorithm parameters, and then generate a new privacy protection algorithm and evaluate it. If the evaluation results show that both the privacy protection effect and the complexity of the privacy protection algorithm pass the evaluation, the design of the privacy protection algorithm ends.

当隐私保护算法已经通过评估,且隐私保护方案没有通过评估时,修改隐私保护算法组合方案,继续执行所述根据所述隐私保护算法的组合方案对所述的隐私保护算法进行组合生成隐私保护方案的步骤,再对生成的新的隐私保护方案进行评估,直至新生成的隐私保护方案通过隐私保护方案的评估;When the privacy protection algorithm has passed the evaluation and the privacy protection scheme has not passed the evaluation, modify the privacy protection algorithm combination scheme, and continue to perform the combination of the privacy protection algorithms according to the privacy protection algorithm combination scheme to generate the privacy protection scheme. step, and then evaluate the generated new privacy protection scheme until the newly generated privacy protection scheme passes the evaluation of the privacy protection scheme;

当隐私保护算法已经通过评估,但通过多次修改隐私保护算法组合方案,新的隐私保护方案还是没有通过评估时,也可以修改隐私保护算法步骤、隐私保护算法步骤间的组合关系、隐私保护算法的参数中的一个或多个的任意组合,继续执行所述按照隐私保护算法步骤间的组合关系对所述的隐私保护算法步骤和隐私保护算法的参数进行组合生成隐私保护算法的步骤,使得隐私保护算法各项指标更加优化,再修改所述隐私保护算法组合方案,继续执行所述根据所述隐私保护算法的组合方案对所述的隐私保护算法进行组合生成隐私保护方案的步骤,使得新的隐私保护方案通过隐私保护方案的评估。When the privacy protection algorithm has passed the evaluation, but the new privacy protection solution has not passed the evaluation after modifying the combination scheme of the privacy protection algorithm many times, the privacy protection algorithm steps, the combination relationship between the privacy protection algorithm steps, and the privacy protection algorithm can also be modified. Arbitrary combination of one or more of the parameters, continue to perform the step of combining the privacy-preserving algorithm steps and the parameters of the privacy-preserving algorithm to generate the privacy-preserving algorithm according to the combination relationship between the privacy-preserving algorithm steps, so that the privacy The indicators of the protection algorithm are more optimized, then modify the privacy protection algorithm combination scheme, and continue to perform the steps of combining the privacy protection algorithms to generate the privacy protection scheme according to the privacy protection algorithm combination scheme, so that a new privacy protection scheme is generated. The privacy protection scheme passes the evaluation of the privacy protection scheme.

示例Example

步骤300、获取隐私信息的隐私信息特征。Step 300: Acquire private information features of the private information.

本步骤中,例如,当用户请求基于位置的服务时,用户输入的请求为“寻找周围一公里以内的餐馆”,利用语义分析技术,得到隐私信息特征。In this step, for example, when a user requests a location-based service, the user's input request is "find restaurants within one kilometer around", and semantic analysis technology is used to obtain privacy information features.

其中,隐私信息特征中的隐私信息类型为文本类型的请求隐私数据,隐私信息内容包括:用户身份、时间戳、位置信息、查询内容。The privacy information type in the privacy information feature is text-type request privacy data, and the privacy information content includes: user identity, timestamp, location information, and query content.

步骤301、根据场景信息和隐私信息特征中的至少一个生成隐私保护需求。Step 301: Generate a privacy protection requirement according to at least one of the scene information and the privacy information feature.

本步骤中,场景信息是基于位置服务场景下的请求服务信息。In this step, the scene information is the request service information under the location service scene.

本步骤中,隐私保护需求中的隐私保护方案隐私保护效果需求为每一个所选取的位置单元的查询概率和用户当前位置查询概率相同。In this step, the privacy protection effect requirement of the privacy protection scheme in the privacy protection requirements is that the query probability of each selected location unit is the same as the query probability of the user's current location.

步骤302、根据场景信息、隐私信息特征、隐私保护需求中的一个或多个任意组合确定隐私保护算法的需求。Step 302: Determine the requirements of the privacy protection algorithm according to any combination of one or more of the scene information, privacy information features, and privacy protection requirements.

本步骤中,根据场景信息、隐私信息特征、隐私保护需求,确定隐私保护算法的性能需求中运行的环境为无线移动网络,软件资源为百度/谷歌地图,硬件资源为移动智能终端(具有定位和导航功能)。In this step, according to the scene information, privacy information characteristics, and privacy protection requirements, it is determined that the operating environment in the performance requirements of the privacy protection algorithm is a wireless mobile network, the software resources are Baidu/Google maps, and the hardware resources are mobile intelligent terminals (with positioning and navigation function).

步骤303、根据场景信息、隐私信息特征、隐私保护需求、隐私保护算法的需求中的一个或多个的任意组合确定以下至少之一:隐私保护算法的类型和隐私保护算法的理论基础。Step 303: Determine at least one of the following according to any combination of one or more of scene information, privacy information features, privacy protection requirements, and privacy protection algorithm requirements: the type of privacy protection algorithm and the theoretical basis of the privacy protection algorithm.

本步骤中,确定针对所述的隐私信息的隐私保护算法为基于混淆的隐私保护算法。In this step, it is determined that the privacy protection algorithm for the privacy information is an obfuscation-based privacy protection algorithm.

步骤304、根据场景信息、隐私信息特征、隐私保护需求、隐私保护算法的需求、隐私保护算法的类型、隐私保护算法的理论基础中的一个或多个的任意组合给出隐私保护算法步骤及隐私保护算法步骤间的组合关系;Step 304, according to any combination of one or more of the scene information, privacy information features, privacy protection requirements, privacy protection algorithm requirements, types of privacy protection algorithms, and theoretical foundations of privacy protection algorithms, provide privacy protection algorithm steps and privacy protection algorithms. Protect the combination of algorithm steps;

本步骤中,选择的步骤如下:In this step, the selected steps are as follows:

1、对地图进行划分。1. Divide the map.

2、计算得到地图每一个位置信息的历史查询概率;2. Calculate the historical query probability of each location information of the map;

3、比较和用户当前位置信息的查询概率进行比较,选择具有相同查询概率位置信息作为匿名位置信息;3. Compare with the query probability of the user's current location information, and select the location information with the same query probability as the anonymous location information;

4、根据步骤3中选择的匿名位置信息中,计算彼此之间的距离,并选取k-1距离用户位置的距离大于D的位置信息,其中D为一个数值来限定距离的长短;4. According to the anonymous location information selected in step 3, calculate the distance between each other, and select the location information whose k-1 distance from the user's location is greater than D, where D is a numerical value to limit the length of the distance;

5、随机选取l-1个伪查询内容,作为每一个位置信息的查询内容。5. Randomly select l-1 pseudo query contents as the query contents of each location information.

6、构造请求信息,将k-1个匿名位置信息、l-1个伪查询内容、用户真实的位置信息和查询内容发送给服务提供商。6. Construct request information, and send k-1 anonymous location information, l-1 pseudo query content, user's real location information and query content to the service provider.

k匿名和l多样性隐私保护算法采用的是基于概率的隐私保护技术,即其中,位置信息的概率可以通过两种方法获得,第一种设置接入点,定期采集位置上的发送信息的数目,第二种是通过谷歌地图的应用程序编程接口(API,Application ProgrammingInterface)可以直接从第三方获取该位置信息发送的数目。通过以上任意一种方法得到该区域在一段时间内的信息发送数目,通过比值计算得到所需位置信息的概率,地图中位置loci的概率计算如下:The k-anonymity and l-diversity privacy protection algorithms use probability-based privacy protection technology, that is, the probability of location information can be obtained in two ways. The first is to set an access point and periodically collect the number of sent information at the location. , the second is through the Google Maps application programming interface (API, Application Programming Interface) can directly obtain the number of location information sent from a third party. Use any of the above methods to obtain the number of information sent in the area within a period of time, and calculate the probability of the required location information through the ratio calculation. The probability of the location loc i in the map is calculated as follows:

Figure BDA0001846336630000241
Figure BDA0001846336630000241

其中,M为获取到某个地图的信息发送数目,在该地图中位置loci的信息发送数目为miAmong them, M is the number of information sent to obtain a certain map, and the number of information sent at the location loc i in the map is m i .

步骤305、根据场景信息、隐私保护需求、隐私保护算法性能需求、隐私保护算法步骤中的一个或多个的任意组合选择隐私保护算法的参数。Step 305: Select parameters of the privacy protection algorithm according to any combination of one or more of the scene information, privacy protection requirements, performance requirements of the privacy protection algorithm, and privacy protection algorithm steps.

本步骤中,参数匹配函数对参数k和l分别规定范围,其中k匿名和l多样性的隐私保护算法中k的取值范围为[5,50],l的取值范围为[2,20]。In this step, the parameter matching function specifies the ranges for the parameters k and l respectively, where the value range of k in the privacy protection algorithm of k anonymity and l diversity is [5, 50], and the value range of l is [2, 20] ].

步骤306、按照隐私保护算法步骤间的组合关系对所述的隐私保护算法步骤和隐私保护算法的参数进行组合生成隐私保护算法。Step 306 , combine the steps of the privacy protection algorithm and the parameters of the privacy protection algorithm according to the combination relationship between the steps of the privacy protection algorithm to generate a privacy protection algorithm.

本示例中,采用步骤301-306生成了k匿名隐私保护算法和l多样性隐私保护算法。In this example, steps 301-306 are used to generate k anonymity privacy protection algorithm and l diversity privacy protection algorithm.

步骤307、根据场景信息、隐私信息特征、隐私保护需求、隐私保护算法中的一个或者多个的任意组合确定隐私保护算法的组合方案。Step 307: Determine a combination scheme of privacy protection algorithms according to any combination of one or more of the scene information, privacy information features, privacy protection requirements, and privacy protection algorithms.

步骤308、根据所述的隐私保护算法的组合方案对所述的隐私保护算法进行组合生成隐私保护方案。Step 308 , combine the privacy protection algorithms according to the combination scheme of the privacy protection algorithms to generate a privacy protection scheme.

本示例中,对k匿名隐私保护算法和l多样性隐私保护算法进行组合,利用k匿名隐私保护算法来保护用户的位置隐私,l多样性隐私保护算法来保护用户的查询内容隐私。In this example, the k-anonymity privacy protection algorithm and the l diversity privacy protection algorithm are combined, the k anonymity privacy protection algorithm is used to protect the user's location privacy, and the l diversity privacy protection algorithm is used to protect the privacy of the user's query content.

步骤309、对生成的隐私保护算法和隐私保护方案进行评估。Step 309: Evaluate the generated privacy protection algorithm and privacy protection scheme.

本步骤中,对隐私保护算法进行评估包括:对隐私保护算法的隐私保护效果和隐私保护算法的复杂度进行评估。In this step, evaluating the privacy protection algorithm includes: evaluating the privacy protection effect of the privacy protection algorithm and the complexity of the privacy protection algorithm.

其中,隐私保护算法的隐私保护效果利用攻击者推测出所述隐私保护算法处理前隐私信息的概率来评估。Wherein, the privacy protection effect of the privacy protection algorithm is evaluated by using the probability that the attacker infers the privacy information before processing by the privacy protection algorithm.

本步骤中,对隐私保护方案进行评估包括:对隐私保护方案的隐私保护效果和隐私保护方案的复杂度进行评估。In this step, evaluating the privacy protection scheme includes: evaluating the privacy protection effect of the privacy protection scheme and the complexity of the privacy protection scheme.

其中,隐私保护方案的隐私保护效果利用攻击者推测出所述隐私保护方案处理前隐私信息的概率来评估。Wherein, the privacy protection effect of the privacy protection scheme is evaluated by using the probability that the attacker infers the private information before processing by the privacy protection scheme.

其中,对隐私保护方案的复杂度进行评估是指隐私保护方案的时间复杂度和空间复杂度进行评估。Among them, evaluating the complexity of the privacy protection scheme refers to evaluating the time complexity and space complexity of the privacy protection scheme.

参见图3,本发明另一个实施例提出了一种隐私信息保护装置,包括以下模块至少之一:Referring to FIG. 3, another embodiment of the present invention provides a privacy information protection device, including at least one of the following modules:

隐私信息特征获取模块301,用于获取隐私信息的隐私信息特征;A privacy information feature acquisition module 301, configured to acquire privacy information features of the privacy information;

隐私保护方案决策模块302,用于根据场景信息和隐私信息特征中的至少一个确定隐私保护方案。The privacy protection scheme decision module 302 is configured to determine the privacy protection scheme according to at least one of the scene information and the characteristics of the privacy information.

在本发明另一个实施例中,还包括:In another embodiment of the present invention, it also includes:

隐私保护方案评估模块303,用于对所述隐私保护方案和隐私保护方案中的隐私保护算法中的至少一个进行评估。The privacy protection scheme evaluation module 303 is configured to evaluate at least one of the privacy protection scheme and the privacy protection algorithm in the privacy protection scheme.

在本发明实施例中,参见图4,隐私保护方案决策模块302包括:In this embodiment of the present invention, referring to FIG. 4 , the privacy protection scheme decision module 302 includes:

隐私保护需求生成单元401,用于根据场景信息和隐私信息特征中的至少一个生成隐私保护需求;a privacy protection requirement generating unit 401, configured to generate a privacy protection requirement according to at least one of scene information and privacy information features;

隐私保护算法需求生成单元402,用于根据场景信息、隐私信息特征、隐私保护需求中的一个或多个任意组合确定隐私保护算法的需求;A privacy protection algorithm requirement generating unit 402, configured to determine the requirement of the privacy protection algorithm according to any combination of one or more of the scene information, the privacy information feature, and the privacy protection requirement;

隐私保护算法类型或理论基础确定单元403,用于根据场景信息、隐私信息特征、隐私保护需求、隐私保护算法的需求中的一个或多个的任意组合确定以下至少之一:隐私保护算法的类型和隐私保护算法的理论基础;The privacy protection algorithm type or theoretical basis determining unit 403 is configured to determine at least one of the following according to any combination of one or more of scene information, privacy information features, privacy protection requirements, and privacy protection algorithm requirements: type of privacy protection algorithm and the theoretical basis of privacy-preserving algorithms;

隐私保护算法步骤之间组合单元404,用于根据场景信息、隐私信息特征、隐私保护需求、隐私保护算法的需求、隐私保护算法的类型、隐私保护算法的理论基础中的一个或多个的任意组合给出隐私保护算法步骤及隐私保护算法步骤间的组合关系;The combining unit 404 between the steps of the privacy protection algorithm is used to arbitrarily select one or more of the scene information, privacy information characteristics, privacy protection requirements, requirements of the privacy protection algorithm, types of the privacy protection algorithm, and theoretical basis of the privacy protection algorithm. The combination gives the privacy protection algorithm steps and the combination relationship between the privacy protection algorithm steps;

参数设计单元405,用于根据场景信息、隐私保护需求、隐私保护算法的需求、隐私保护算法步骤中的一个或多个的任意组合选择隐私保护算法的参数;The parameter design unit 405 is used to select the parameters of the privacy protection algorithm according to any combination of one or more of the scene information, privacy protection requirements, privacy protection algorithm requirements, and privacy protection algorithm steps;

隐私保护算法与隐私保护算法之间组合单元406,用于按照隐私保护算法步骤间的组合关系对所述的隐私保护算法步骤和隐私保护算法的参数进行组合生成隐私保护算法;A combining unit 406 between the privacy protection algorithm and the privacy protection algorithm is used to combine the privacy protection algorithm steps and the parameters of the privacy protection algorithm to generate the privacy protection algorithm according to the combination relationship between the privacy protection algorithm steps;

根据场景信息、隐私信息特征、隐私保护需求、隐私保护算法中的一个或多个的任意组合确定隐私保护算法的组合方案;Determine the combination scheme of the privacy protection algorithm according to any combination of one or more of the scene information, privacy information features, privacy protection requirements, and privacy protection algorithms;

隐私保护方案生成单元407,用于根据所述隐私保护算法的组合方案对所述的隐私保护算法进行组合生成隐私保护方案。The privacy protection scheme generating unit 407 is configured to combine the privacy protection algorithms according to the combination scheme of the privacy protection algorithms to generate a privacy protection scheme.

上述隐私信息保护装置中各个模块或单元的具体实现过程与前述实施例隐私信息保护方法的具体实现过程相同,这里不再赘述。The specific implementation process of each module or unit in the above-mentioned privacy information protection device is the same as the specific implementation process of the privacy information protection method in the foregoing embodiment, and will not be repeated here.

本发明另一个实施例提出了一种隐私信息保护装置,包括处理器和计算机可读存储介质,所述计算机可读存储介质中存储有指令,当所述指令被所述处理器执行时,实现上述任一种隐私信息保护方法。Another embodiment of the present invention provides an apparatus for protecting privacy information, including a processor and a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when the instructions are executed by the processor, the Any of the above privacy information protection methods.

本发明另一个实施例提出了一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现上述任一种隐私信息保护方法的步骤。Another embodiment of the present invention provides a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, implements the steps of any of the above methods for protecting privacy information.

本发明另一个实施例提出了一种隐私信息保护系统,包括:Another embodiment of the present invention provides a privacy information protection system, including:

隐私信息特征获取模块301,用于获取隐私信息的隐私信息特征;A privacy information feature acquisition module 301, configured to acquire privacy information features of the privacy information;

隐私保护方案决策模块302,用于根据场景信息和隐私信息特征中的至少一个确定隐私保护方案;a privacy protection scheme decision module 302, configured to determine a privacy protection scheme according to at least one of the scene information and the characteristics of the privacy information;

其中,隐私信息特征获取模块301和隐私保护方案决策模块302设置在不同的设备中。Wherein, the privacy information feature acquisition module 301 and the privacy protection scheme decision module 302 are set in different devices.

在本发明另一个实施例中,还包括:In another embodiment of the present invention, it also includes:

隐私保护方案评估模块303,用于对所述隐私保护方案进行评估;a privacy protection scheme evaluation module 303, configured to evaluate the privacy protection scheme;

其中,隐私保护方案评估模块303、隐私信息特征获取模块301和隐私保护方案决策模块302中至少两个模块设置在不同的设备中。Among them, at least two modules among the privacy protection scheme evaluation module 303 , the privacy information feature acquisition module 301 and the privacy protection scheme decision module 302 are set in different devices.

在本发明实施例中,参见图4,隐私保护方案决策模块302包括:In this embodiment of the present invention, referring to FIG. 4 , the privacy protection scheme decision module 302 includes:

隐私保护需求生成单元401,用于根据场景信息和隐私信息特征中的至少一个生成隐私保护需求;a privacy protection requirement generating unit 401, configured to generate a privacy protection requirement according to at least one of scene information and privacy information features;

隐私保护算法需求生成单元402,用于根据场景信息、隐私信息特征、隐私保护需求中的一个或多个任意组合确定隐私保护算法的需求;A privacy protection algorithm requirement generating unit 402, configured to determine the requirement of the privacy protection algorithm according to any combination of one or more of the scene information, the privacy information feature, and the privacy protection requirement;

隐私保护算法类型或理论基础确定单元403,用于根据场景信息、隐私信息特征、隐私保护需求、隐私保护算法的需求中的一个或多个的任意组合确定以下至少之一:隐私保护算法的类型和隐私保护算法的理论基础;The privacy protection algorithm type or theoretical basis determining unit 403 is configured to determine at least one of the following according to any combination of one or more of scene information, privacy information features, privacy protection requirements, and privacy protection algorithm requirements: type of privacy protection algorithm and the theoretical basis of privacy-preserving algorithms;

隐私保护算法步骤之间组合单元404,用于根据场景信息、隐私信息特征、隐私保护需求、隐私保护算法的需求、隐私保护算法的类型、隐私保护算法的理论基础中的一个或多个的任意组合给出隐私保护算法步骤及隐私保护算法步骤间的组合关系;The combining unit 404 between the steps of the privacy protection algorithm is used to arbitrarily select one or more of the scene information, privacy information characteristics, privacy protection requirements, requirements of the privacy protection algorithm, types of the privacy protection algorithm, and theoretical basis of the privacy protection algorithm. The combination gives the privacy protection algorithm steps and the combination relationship between the privacy protection algorithm steps;

参数设计单元405,用于根据场景信息、隐私保护需求、隐私保护算法的需求、隐私保护算法步骤中的一个或多个的任意组合选择隐私保护算法的参数;The parameter design unit 405 is used to select the parameters of the privacy protection algorithm according to any combination of one or more of the scene information, privacy protection requirements, privacy protection algorithm requirements, and privacy protection algorithm steps;

隐私保护算法与隐私保护算法之间组合单元406,用于按照隐私保护算法步骤间的组合关系对所述的隐私保护算法步骤和隐私保护算法的参数进行组合生成隐私保护算法;A combining unit 406 between the privacy protection algorithm and the privacy protection algorithm is used to combine the privacy protection algorithm steps and the parameters of the privacy protection algorithm to generate the privacy protection algorithm according to the combination relationship between the privacy protection algorithm steps;

根据场景信息、隐私信息特征、隐私保护需求、隐私保护算法中的一个或多个的任意组合确定隐私保护算法的组合方案;Determine the combination scheme of the privacy protection algorithm according to any combination of one or more of the scene information, privacy information features, privacy protection requirements, and privacy protection algorithms;

隐私保护方案生成单元407,用于根据所述隐私保护算法的组合方案对所述的隐私保护算法进行组合生成隐私保护方案;a privacy protection scheme generating unit 407, configured to combine the privacy protection algorithms according to the combination scheme of the privacy protection algorithms to generate a privacy protection scheme;

其中,上述至少两个单元设置在不同的设备中。Wherein, the above at least two units are arranged in different devices.

上述隐私信息保护系统中各个模块或单元的具体实现过程与前述实施例隐私信息保护方法的具体实现过程相同,这里不再赘述。The specific implementation process of each module or unit in the above-mentioned privacy information protection system is the same as the specific implementation process of the privacy information protection method in the foregoing embodiment, and will not be repeated here.

本领域普通技术人员可以理解,上文中所公开方法中的全部或某些步骤、系统、装置中的功能模块/单元可以被实施为软件、固件、硬件及其适当的组合。在硬件实施方式中,在以上描述中提及的功能模块/单元之间的划分不一定对应于物理组件的划分;例如,一个物理组件可以具有多个功能,或者一个功能或步骤可以由若干物理组件合作执行。某些组件或所有组件可以被实施为由处理器,如数字信号处理器或微处理器执行的软件,或者被实施为硬件,或者被实施为集成电路,如专用集成电路。这样的软件可以分布在计算机可读介质上,计算机可读介质可以包括计算机存储介质(或非暂时性介质)和通信介质(或暂时性介质)。如本领域普通技术人员公知的,术语计算机存储介质包括在用于存储信息(诸如计算机可读指令、数据结构、程序模块或其他数据)的任何方法或技术中实施的易失性和非易失性、可移除和不可移除介质。计算机存储介质包括但不限于RAM、ROM、EEPROM、闪存或其他存储器技术、CD-ROM、数字多功能盘(DVD)或其他光盘存储、磁盒、磁带、磁盘存储或其他磁存储装置、或者可以用于存储期望的信息并且可以被计算机访问的任何其他的介质。此外,本领域普通技术人员公知的是,通信介质通常包含计算机可读指令、数据结构、程序模块或者诸如载波或其他传输机制之类的调制数据信号中的其他数据,并且可包括任何信息递送介质。Those of ordinary skill in the art can understand that all or some of the steps in the methods disclosed above, functional modules/units in the systems, and devices can be implemented as software, firmware, hardware, and appropriate combinations thereof. In a hardware implementation, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be composed of several physical components Components execute cooperatively. Some or all of the components may be implemented as software executed by a processor, such as a digital signal processor or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer-readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). As known to those of ordinary skill in the art, the term computer storage media includes both volatile and nonvolatile implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules or other data flexible, removable and non-removable media. Computer storage media include, but are not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical disk storage, magnetic cartridges, magnetic tape, magnetic disk storage or other magnetic storage devices, or may Any other medium used to store desired information and which can be accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism, and can include any information delivery media, as is well known to those of ordinary skill in the art .

虽然本发明实施例所揭露的实施方式如上,但所述的内容仅为便于理解本发明实施例而采用的实施方式,并非用以限定本发明实施例。任何本发明实施例所属领域内的技术人员,在不脱离本发明实施例所揭露的精神和范围的前提下,可以在实施的形式及细节上进行任何的修改与变化,但本发明实施例的专利保护范围,仍须以所附的权利要求书所界定的范围为准。Although the implementation manners disclosed in the embodiments of the present invention are as above, the content described is only an implementation manner adopted to facilitate understanding of the embodiments of the present invention, and is not intended to limit the embodiments of the present invention. Any person skilled in the art to which the embodiments of the present invention belong, without departing from the spirit and scope disclosed by the embodiments of the present invention, can make any modifications and changes in the form and details of the implementation. The scope of patent protection is still subject to the scope defined by the appended claims.

Claims (28)

1.一种隐私信息保护方法,包括:1. A privacy information protection method, comprising: 获取隐私信息的隐私信息特征;Obtain private information characteristics of private information; 根据场景信息和隐私信息特征中的至少一个确定隐私保护方案;Determine a privacy protection scheme according to at least one of scene information and privacy information features; 对所述隐私保护方案和隐私保护方案中的隐私保护算法中的至少之一进行评估;Evaluate at least one of the privacy protection scheme and the privacy protection algorithm in the privacy protection scheme; 其中,对所述隐私保护方案进行评估包括以下至少之一:Wherein, evaluating the privacy protection scheme includes at least one of the following: 对隐私保护方案的隐私保护效果进行评估;Evaluate the privacy protection effect of the privacy protection scheme; 对隐私保护方案的复杂度进行评估;Evaluate the complexity of the privacy protection scheme; 对所述隐私保护方案中的隐私保护算法进行评估包括以下至少之一:Evaluating the privacy protection algorithm in the privacy protection scheme includes at least one of the following: 对隐私保护方案中的隐私保护算法的隐私保护效果进行评估;Evaluate the privacy protection effect of the privacy protection algorithm in the privacy protection scheme; 对隐私保护方案中的隐私保护算法的复杂度进行评估。Evaluate the complexity of privacy-preserving algorithms in privacy-preserving schemes. 2.根据权利要求1所述的隐私信息保护方法,其特征在于,所述对隐私保护方案中的隐私保护算法的隐私保护效果进行评估包括:2. The method for protecting privacy information according to claim 1, wherein the evaluating the privacy protection effect of the privacy protection algorithm in the privacy protection scheme comprises: 计算所述隐私保护算法的隐私保护效果值;Calculate the privacy protection effect value of the privacy protection algorithm; 当所述隐私保护算法的隐私保护效果值大于或等于所述的隐私保护算法的需求中的隐私保护效果期望值,判断出所述隐私保护算法通过隐私保护算法的隐私保护效果评估;When the privacy protection effect value of the privacy protection algorithm is greater than or equal to the expected value of the privacy protection effect in the requirements of the privacy protection algorithm, it is judged that the privacy protection algorithm passes the privacy protection effect evaluation of the privacy protection algorithm; 当所述隐私保护算法的隐私保护效果值小于所述的隐私保护算法的需求中的隐私保护效果期望值,判断出所述隐私保护算法没有通过隐私保护算法的隐私保护效果评估。When the privacy protection effect value of the privacy protection algorithm is less than the privacy protection effect expectation value in the requirements of the privacy protection algorithm, it is determined that the privacy protection algorithm has not passed the privacy protection effect evaluation of the privacy protection algorithm. 3.根据权利要求2所述的隐私信息保护方法,其特征在于,所述隐私保护算法的隐私保护效果值包括以下一种或多种的任意组合:3. The privacy information protection method according to claim 2, wherein the privacy protection effect value of the privacy protection algorithm comprises any combination of one or more of the following: 采用所述隐私保护算法处理后的隐私信息与处理前的隐私信息之间的偏差量、采用所述隐私保护算法处理后的隐私信息与处理前的隐私信息之间的损失比、攻击者推测出所述隐私保护算法处理前隐私信息的概率。The amount of deviation between the private information processed by using the privacy protection algorithm and the private information before processing, the loss ratio between the private information processed by using the privacy protection algorithm and the private information before processing, the attacker's guess The probability of private information before being processed by the privacy-preserving algorithm. 4.根据权利要求1所述的隐私信息保护方法,其特征在于,所述隐私保护算法的复杂度包括以下一种或多种的任意组合:时间复杂度、空间复杂度;4. The privacy information protection method according to claim 1, wherein the complexity of the privacy protection algorithm comprises any combination of one or more of the following: time complexity, space complexity; 所述对隐私保护方案中的隐私保护算法的复杂度进行评估包括以下一种或多种的任意组合:The evaluation of the complexity of the privacy protection algorithm in the privacy protection scheme includes any combination of one or more of the following: 对所述隐私保护算法的时间复杂度进行评估;Evaluate the time complexity of the privacy protection algorithm; 对所述隐私保护算法的空间复杂度进行评估。Evaluate the space complexity of the privacy-preserving algorithm. 5.根据权利要求4所述的隐私信息保护方法,其特征在于,所述对隐私保护算法的时间复杂度进行评估包括:5. The privacy information protection method according to claim 4, wherein the evaluating the time complexity of the privacy protection algorithm comprises: 判断隐私保护算法的运行速度是否满足所述的隐私保护算法的需求中的最低运行速度;Determine whether the running speed of the privacy protection algorithm meets the minimum running speed in the requirements of the privacy protection algorithm; 当隐私保护算法的运行速度大于或等于隐私保护算法的需求中的最低运行速度时,判断出隐私保护算法通过隐私保护算法的时间复杂度评估;When the running speed of the privacy protection algorithm is greater than or equal to the minimum running speed in the requirements of the privacy protection algorithm, it is determined that the privacy protection algorithm passes the time complexity evaluation of the privacy protection algorithm; 当隐私保护算法的运行速度小于隐私保护算法的需求中的最低运行速度时,判断出隐私保护算法没有通过隐私保护算法的时间复杂度评估。When the running speed of the privacy-preserving algorithm is less than the minimum running speed in the requirements of the privacy-preserving algorithm, it is determined that the privacy-preserving algorithm has not passed the time complexity evaluation of the privacy-preserving algorithm. 6.根据权利要求4所述的隐私信息保护方法,其特征在于,所述对隐私保护算法的空间复杂度进行评估包括以下一种或多种的任意组合:6. The privacy information protection method according to claim 4, wherein the evaluation of the space complexity of the privacy protection algorithm comprises any combination of one or more of the following: 判断所述隐私保护算法运行占用的软件资源是否满足隐私保护算法的需求中的需要的软件资源;Determine whether the software resources occupied by the operation of the privacy protection algorithm meet the required software resources in the requirements of the privacy protection algorithm; 当所述隐私保护算法运行占用的软件资源小于或等于隐私保护算法的需求中的需要的软件资源时,判断出所述隐私保护算法通过隐私保护算法的空间复杂度评估中的软件资源评估;When the software resources occupied by the operation of the privacy protection algorithm are less than or equal to the required software resources in the requirements of the privacy protection algorithm, it is determined that the privacy protection algorithm passes the software resource evaluation in the space complexity evaluation of the privacy protection algorithm; 当所述隐私保护算法运行占用的软件资源大于所述隐私保护算法的需求中的需要的软件资源时,判断出所述隐私保护算法没有通过所述隐私保护算法的空间复杂度评估中的软件资源评估;When the software resources occupied by the operation of the privacy protection algorithm are greater than the required software resources in the requirements of the privacy protection algorithm, it is determined that the privacy protection algorithm does not pass the software resources in the space complexity evaluation of the privacy protection algorithm Evaluate; 判断所述隐私保护算法的运行占用的硬件资源是否满足所述隐私保护算法的需求中需要的硬件资源;Determine whether the hardware resources occupied by the operation of the privacy protection algorithm meet the hardware resources required in the requirements of the privacy protection algorithm; 当所述隐私保护算法运行占用的硬件资源小于或等于所述隐私保护算法的需求中的需要的硬件资源时,判断出所述隐私保护算法通过所述隐私保护算法的空间复杂度评估中硬件资源评估;When the hardware resources occupied by the operation of the privacy protection algorithm are less than or equal to the required hardware resources in the requirements of the privacy protection algorithm, it is determined that the privacy protection algorithm passes the hardware resources in the space complexity evaluation of the privacy protection algorithm Evaluate; 当所述隐私保护算法运行占用的硬件资源大于所述隐私保护算法的需求中的硬件资源时,判断出所述隐私保护算法没有通过所述隐私保护算法的空间复杂度评估中硬件资源评估。When the hardware resources occupied by the operation of the privacy protection algorithm are greater than the hardware resources required by the privacy protection algorithm, it is determined that the privacy protection algorithm has not passed the hardware resource evaluation in the space complexity evaluation of the privacy protection algorithm. 7.根据权利要求1所述的隐私信息保护方法,其特征在于,所述对隐私保护方案的隐私保护效果进行评估包括:7. The method for protecting privacy information according to claim 1, wherein the evaluating the privacy protection effect of the privacy protection scheme comprises: 计算所述隐私保护方案的隐私保护效果值;calculating the privacy protection effect value of the privacy protection scheme; 当所述隐私保护方案的隐私保护效果值大于或等于隐私保护需求中的隐私保护效果期望值时,判断出所述隐私保护方案通过隐私保护方案的隐私保护效果评估;When the privacy protection effect value of the privacy protection scheme is greater than or equal to the expected value of the privacy protection effect in the privacy protection requirement, it is determined that the privacy protection scheme passes the privacy protection effect evaluation of the privacy protection scheme; 当所述隐私保护方案的隐私保护效果值小于隐私保护需求中的隐私保护效果期望值时,判断出所述隐私保护方案没有通过隐私保护方案的隐私保护效果评估。When the privacy protection effect value of the privacy protection scheme is smaller than the privacy protection effect expectation value in the privacy protection requirement, it is determined that the privacy protection scheme has not passed the privacy protection effect evaluation of the privacy protection scheme. 8.根据权利要求7所述的隐私信息保护方法,其特征在于,所述隐私保护方案的隐私保护效果值包括以下一种或多种的任意组合:8. The privacy information protection method according to claim 7, wherein the privacy protection effect value of the privacy protection scheme comprises any combination of one or more of the following: 采用所述隐私保护方案处理后的隐私信息与处理前的隐私信息之间的偏差量、采用所述隐私保护方案处理后的隐私信息与处理前的隐私信息之间的损失比、攻击者推测出所述隐私保护方案处理前隐私信息的概率。The amount of deviation between the private information processed by the privacy protection scheme and the private information before processing, the loss ratio between the private information processed by the privacy protection scheme and the private information before processing, the attacker's guess The privacy protection scheme deals with the probability of private information before processing. 9.根据权利要求1所述的隐私信息保护方法,其特征在于,所述隐私保护方案的复杂度包括以下一种或多种的任意组合:时间复杂度、空间复杂度;9. The privacy information protection method according to claim 1, wherein the complexity of the privacy protection scheme comprises any combination of one or more of the following: time complexity and space complexity; 所述对隐私保护方案的复杂度进行评估包括以下一种或多种的任意组合:The evaluation of the complexity of the privacy protection scheme includes any combination of one or more of the following: 对所述隐私保护方案的时间复杂度进行评估;Evaluate the time complexity of the privacy protection scheme; 对所述隐私保护方案的空间复杂度进行评估。The space complexity of the privacy protection scheme is evaluated. 10.根据权利要求9所述的隐私信息保护方法,其特征在于,所述对隐私保护方案的时间复杂度进行评估包括:10. The privacy information protection method according to claim 9, wherein the evaluating the time complexity of the privacy protection scheme comprises: 判断隐私保护方案的运行速度是否满足隐私保护需求中的最低运行速度;Determine whether the operating speed of the privacy protection scheme meets the minimum operating speed in the privacy protection requirements; 当隐私保护方案的运行速度大于或等于隐私保护需求中的最低运行速度时,判断出隐私保护方案通过隐私保护方案的时间复杂度评估;When the running speed of the privacy protection scheme is greater than or equal to the minimum running speed in the privacy protection requirement, it is judged that the privacy protection scheme passes the time complexity evaluation of the privacy protection scheme; 当隐私保护方案的运行速度小于隐私保护需求中的最低运行速度时,判断出隐私保护方案没有通过隐私保护方案的时间复杂度评估。When the running speed of the privacy protection scheme is less than the minimum running speed in the privacy protection requirement, it is determined that the privacy protection scheme has not passed the time complexity evaluation of the privacy protection scheme. 11.根据权利要求9所述的隐私信息保护方法,其特征在于,所述对隐私保护方案的空间复杂度进行评估包括以下一种或多种的任意组合:11. The privacy information protection method according to claim 9, wherein the evaluation of the space complexity of the privacy protection scheme comprises any combination of one or more of the following: 判断所述隐私保护方案运行占用的软件资源是否满足隐私保护需求中的需要的软件资源;Determine whether the software resources occupied by the operation of the privacy protection scheme meet the required software resources in the privacy protection requirements; 当所述隐私保护方案运行占用的软件资源小于或等于隐私保护需求中的需要的软件资源时,判断出所述隐私保护方案通过隐私保护方案的空间复杂度评估中的软件资源评估;When the software resources occupied by the operation of the privacy protection scheme are less than or equal to the required software resources in the privacy protection requirements, it is determined that the privacy protection scheme passes the software resource evaluation in the space complexity evaluation of the privacy protection scheme; 当所述隐私保护方案运行占用的软件资源大于所述隐私保护需求中的需要的软件资源时,判断出所述隐私保护方案没有通过所述隐私保护方案的空间复杂度评估中的软件资源评估;When the software resources occupied by the operation of the privacy protection scheme are greater than the required software resources in the privacy protection requirements, it is determined that the privacy protection scheme has not passed the software resource evaluation in the space complexity evaluation of the privacy protection scheme; 判断所述隐私保护方案运行占用的硬件资源是否满足所述隐私保护需求中需要的硬件资源;Determine whether the hardware resources occupied by the operation of the privacy protection scheme meet the hardware resources required in the privacy protection requirement; 当所述隐私保护方案运行占用的硬件资源小于或等于所述隐私保护需求中的需要的硬件资源时,判断出所述隐私保护方案通过所述隐私保护方案的空间复杂度评估中硬件资源评估;When the hardware resources occupied by the operation of the privacy protection scheme are less than or equal to the hardware resources required in the privacy protection requirement, it is determined that the privacy protection scheme passes the hardware resource evaluation in the space complexity evaluation of the privacy protection scheme; 当所述隐私保护方案运行占用的硬件资源大于所述隐私保护需求中的硬件资源时,判断出所述隐私保护方案没有通过所述隐私保护方案的空间复杂度评估中硬件资源评估。When the hardware resources occupied by the operation of the privacy protection scheme are greater than the hardware resources in the privacy protection requirement, it is determined that the privacy protection scheme fails the hardware resource evaluation in the space complexity evaluation of the privacy protection scheme. 12.根据权利要求1所述的隐私信息保护方法,其特征在于,所述根据场景信息和隐私信息特征中的至少一个确定隐私保护方案包括以下步骤一个或多个任意组合:12. The privacy information protection method according to claim 1, wherein the determining the privacy protection scheme according to at least one of the scene information and the privacy information feature comprises any combination of one or more of the following steps: 根据场景信息和隐私信息特征中的至少一个生成隐私保护需求;Generate privacy protection requirements according to at least one of scene information and privacy information features; 根据场景信息、隐私信息特征、隐私保护需求中的一个或多个任意组合确定隐私保护算法的需求;Determine the requirements of the privacy protection algorithm according to any combination of one or more of scene information, privacy information characteristics, and privacy protection requirements; 根据场景信息、隐私信息特征、隐私保护需求、隐私保护算法的需求中的一个或多个的任意组合确定以下至少之一:隐私保护算法的类型和隐私保护算法的理论基础;Determine at least one of the following according to any combination of one or more of scene information, privacy information features, privacy protection requirements, and privacy protection algorithm requirements: the type of privacy protection algorithm and the theoretical basis of the privacy protection algorithm; 根据场景信息、隐私信息特征、隐私保护需求、隐私保护算法的需求、隐私保护算法的类型、隐私保护算法的理论基础中的一个或多个的任意组合给出隐私保护算法步骤及隐私保护算法步骤间的组合关系;According to any combination of one or more of scene information, privacy information characteristics, privacy protection requirements, privacy protection algorithm requirements, types of privacy protection algorithms, and theoretical foundations of privacy protection algorithms, privacy protection algorithm steps and privacy protection algorithm steps are given. Combination relationship between; 根据场景信息、隐私保护需求、隐私保护算法的需求、隐私保护算法步骤中的一个或多个的任意组合选择隐私保护算法的参数;Select the parameters of the privacy protection algorithm according to any combination of one or more of the scene information, privacy protection requirements, privacy protection algorithm requirements, and privacy protection algorithm steps; 按照隐私保护算法步骤间的组合关系对所述的隐私保护算法步骤和隐私保护算法的参数进行组合生成隐私保护算法;According to the combination relationship between the steps of the privacy protection algorithm, the privacy protection algorithm steps and the parameters of the privacy protection algorithm are combined to generate the privacy protection algorithm; 根据场景信息、隐私信息特征、隐私保护需求、隐私保护算法中的一个或多个的任意组合确定隐私保护算法的组合方案;Determine the combination scheme of the privacy protection algorithm according to any combination of one or more of the scene information, privacy information features, privacy protection requirements, and privacy protection algorithms; 根据所述隐私保护算法的组合方案对所述的隐私保护算法进行组合生成隐私保护方案。The privacy protection algorithm is combined according to the combination solution of the privacy protection algorithm to generate a privacy protection solution. 13.根据权利要求12所述的隐私信息保护方法,其特征在于,还包括:13. The method for protecting privacy information according to claim 12, further comprising: 对所述隐私保护方案和隐私保护方案中的隐私保护算法中的至少之一进行评估,执行以下至少之一:Evaluate at least one of the privacy protection scheme and the privacy protection algorithm in the privacy protection scheme, and perform at least one of the following: 当所述隐私保护算法没有通过评估时,根据评估结果修改隐私保护算法步骤、隐私保护算法步骤间的组合关系、隐私保护算法的参数中的一个或多个的任意组合,继续执行所述按照隐私保护算法步骤间的组合关系对所述的隐私保护算法步骤和隐私保护算法的参数进行组合生成隐私保护算法的步骤;When the privacy-preserving algorithm fails the evaluation, modify any combination of one or more of the privacy-preserving algorithm steps, the combination relationship between the privacy-preserving algorithm steps, and the parameters of the privacy-preserving algorithm according to the evaluation result, and continue to execute the privacy-preserving algorithm. The combination relationship between the protection algorithm steps is a step of combining the privacy protection algorithm steps and the parameters of the privacy protection algorithm to generate the privacy protection algorithm; 当所述隐私保护算法已经通过评估,且所述隐私保护方案没有通过评估时,修改隐私保护算法组合方案,继续执行所述根据所述隐私保护算法的组合方案对所述的隐私保护算法进行组合生成隐私保护方案的步骤;When the privacy protection algorithm has passed the evaluation and the privacy protection scheme has not passed the evaluation, modify the privacy protection algorithm combination scheme, and continue to perform the combination of the privacy protection algorithms according to the privacy protection algorithm combination scheme Steps to generate a privacy protection scheme; 当隐私保护算法已经通过评估,但通过多次修改隐私保护算法组合方案,新的隐私保护方案还是没有通过评估时,修改隐私保护算法步骤、隐私保护算法步骤间的组合关系、隐私保护算法的参数中的一个或多个的任意组合,继续执行所述按照隐私保护算法步骤间的组合关系对所述的隐私保护算法步骤和隐私保护算法的参数进行组合生成隐私保护算法的步骤,再修改所述隐私保护算法组合方案,继续执行所述根据所述隐私保护算法的组合方案对所述的隐私保护算法进行组合生成隐私保护方案的步骤。When the privacy protection algorithm has passed the evaluation, but the new privacy protection solution fails to pass the evaluation after modifying the combination scheme of the privacy protection algorithm many times, modify the privacy protection algorithm steps, the combination relationship between the privacy protection algorithm steps, and the parameters of the privacy protection algorithm. Arbitrary combination of one or more of the above, continue to perform the described step of combining the privacy-preserving algorithm steps and the parameters of the privacy-preserving algorithm to generate a privacy-preserving algorithm according to the combination relationship between the privacy-preserving algorithm steps, and then modify the described privacy-preserving algorithm steps. For the privacy protection algorithm combination scheme, continue to perform the step of combining the privacy protection algorithms according to the privacy protection algorithm combination scheme to generate the privacy protection scheme. 14.根据权利要求12或13所述的隐私信息保护方法,其特征在于,所述隐私保护需求包括以下一种或多种的任意组合:14. The privacy information protection method according to claim 12 or 13, wherein the privacy protection requirement comprises any combination of one or more of the following: 隐私保护方案的隐私保护效果期望值、隐私保护方案的性能需求、隐私操作、约束条件、隐私操作和约束条件之间的对应关系;The expected value of the privacy protection effect of the privacy protection scheme, the performance requirements of the privacy protection scheme, the privacy operation, the constraints, the corresponding relationship between the privacy operation and the constraints; 其中,约束条件用于描述进行隐私操作需要满足的条件,包括:操作实体属性、操作环境;Among them, the constraints are used to describe the conditions that need to be met for privacy operations, including: operating entity attributes, operating environment; 所述操作环境包括:时间、空间位置、网络、设备。The operating environment includes: time, spatial location, network, and equipment. 15.根据权利要求14所述的隐私信息保护方法,其特征在于,所述隐私保护方案的性能需求不限于包括以下一种或多种的任意组合:15. The privacy information protection method according to claim 14, wherein the performance requirements of the privacy protection scheme are not limited to any combination comprising one or more of the following: 运行的环境、最低运行速度、需要的软件资源、需要的硬件资源。Operating environment, minimum operating speed, required software resources, required hardware resources. 16.根据权利要求12或13所述的隐私信息保护方法,其特征在于,所述隐私保护算法的需求包括以下至少之一:隐私保护算法的隐私保护效果期望值和性能需求;16. The privacy information protection method according to claim 12 or 13, wherein the requirements of the privacy protection algorithm include at least one of the following: privacy protection effect expectation value and performance requirements of the privacy protection algorithm; 所述隐私保护算法的性能需求不限于包括以下一种或多种的任意组合:The performance requirements of the privacy protection algorithm are not limited to include any combination of one or more of the following: 运行的环境、最低运行速度、需要的软件资源、需要的硬件资源。Operating environment, minimum operating speed, required software resources, required hardware resources. 17.根据权利要求12或13所述的隐私信息保护方法,其特征在于,所述隐私保护算法的类型包括以下一种或多种的任意组合:17. The privacy information protection method according to claim 12 or 13, wherein the type of the privacy protection algorithm comprises any combination of one or more of the following: 基于密码学的隐私保护算法、基于扰乱的隐私保护算法、基于混淆的隐私保护算法、基于泛化的隐私保护算法、基于访问控制的隐私保护算法。Cryptography-based privacy protection algorithm, scrambling-based privacy protection algorithm, obfuscation-based privacy protection algorithm, generalization-based privacy protection algorithm, and access control-based privacy protection algorithm. 18.根据权利要求12或13所述的隐私信息保护方法,其特征在于,所述隐私保护算法的理论基础包括以下一种或多种的任意组合:18. The privacy information protection method according to claim 12 or 13, wherein the theoretical basis of the privacy protection algorithm comprises any combination of one or more of the following: 基于密码学的隐私保护技术、基于概率的隐私保护技术、基于博弈的隐私保护技术。Cryptography-based privacy protection technology, probability-based privacy protection technology, and game-based privacy protection technology. 19.根据权利要求12或13所述的隐私信息保护方法,其特征在于,所述隐私保护算法步骤包括以下一种或多种的任意组合:19. The privacy information protection method according to claim 12 or 13, wherein the privacy protection algorithm step comprises any combination of one or more of the following: S变化、P置换、密钥扩展、初始化、设定记忆、线性反馈移位寄存器、非线性反馈移位寄存器、确定扰乱粒度、添加噪声、设定信息权重、筛选满足条件的混淆信息、选取混淆信息、结合真实信息构成请求信息、确定模糊粒度、设定模糊范围、构造请求信息。S change, P replacement, key expansion, initialization, setting memory, linear feedback shift register, nonlinear feedback shift register, determining the disturbance granularity, adding noise, setting information weight, filtering the obfuscated information that meets the conditions, selecting obfuscation information, combined with real information to form request information, determine fuzzy granularity, set fuzzy scope, and construct request information. 20.根据权利要求12或13所述的隐私信息保护方法,其特征在于,所述隐私保护算法的参数包括以下一种或多种的任意组合:20. The privacy information protection method according to claim 12 or 13, wherein the parameters of the privacy protection algorithm comprise any combination of one or more of the following: 密钥长度、匿名集合大小、隐私预算、敏感度、偏移度、分组长度、加密轮数、S盒、多项式参数、MDS码、P置换表。Key length, anonymous set size, privacy budget, sensitivity, offset, block length, number of encryption rounds, S-box, polynomial parameters, MDS code, P permutation table. 21.根据权利要求1所述的隐私信息保护方法,其特征在于,所述隐私信息特征包括以下一个或多个的任意组合:21. The privacy information protection method according to claim 1, wherein the privacy information feature comprises any combination of one or more of the following: 隐私信息类型、隐私信息内容、数据取值范围、数据分布特征、隐私信息的敏感度、可执行的隐私操作、隐私操作次数的期望值、隐私操作结果的社会经验值。Types of privacy information, content of privacy information, data value range, data distribution characteristics, sensitivity of privacy information, executable privacy operations, expected value of privacy operation times, and social experience value of privacy operation results. 22.根据权利要求21所述的隐私信息保护方法,其特征在于,所述隐私信息的敏感度为用于衡量信息敏感程度的值,通过概率、数学期望、数学方差中一个或多个的任意组合计算获得。22. The method for protecting privacy information according to claim 21, wherein the sensitivity of the privacy information is a value used to measure the sensitivity of the information, and is determined by one or more arbitrary values in probability, mathematical expectation, and mathematical variance. Combination calculation is obtained. 23.根据权利要求21所述的隐私信息保护方法,其特征在于,所述可执行的隐私操作包括以下一种或多种的任意组合:23. The privacy information protection method according to claim 21, wherein the executable privacy operation comprises any combination of one or more of the following: 读、写、加密、模糊、泛化、加噪、匿名、签名、验签、计算摘要、加密、保存、复制、粘贴、转发、剪切、修改、删除。Read, write, encrypt, obfuscate, generalize, add noise, anonymize, sign, verify, calculate digest, encrypt, save, copy, paste, forward, cut, modify, delete. 24.根据权利要求1所述的隐私信息保护方法,其特征在于,所述场景信息包括以下一种或多种的任意组合:24. The privacy information protection method according to claim 1, wherein the scene information comprises any combination of one or more of the following: 时间、空间位置、设备、设备性能、交互对象、交互途径、请求类型、服务类型。Time, space location, device, device performance, interaction object, interaction approach, request type, service type. 25.一种隐私信息保护装置,包括:25. A privacy information protection device, comprising: 隐私信息特征获取模块,用于获取隐私信息的隐私信息特征;The private information feature acquisition module is used to obtain the private information features of the private information; 隐私保护方案决策模块,用于根据场景信息和隐私信息特征中的至少一个确定隐私保护方案;a privacy protection scheme decision module, configured to determine a privacy protection scheme according to at least one of the scene information and the characteristics of the privacy information; 隐私保护方案评估模块,用于对所述隐私保护方案和隐私保护方案中的隐私保护算法中的至少一个进行评估;a privacy protection scheme evaluation module, configured to evaluate at least one of the privacy protection scheme and the privacy protection algorithm in the privacy protection scheme; 其中,对所述隐私保护方案进行评估包括以下至少之一:Wherein, evaluating the privacy protection scheme includes at least one of the following: 对隐私保护方案的隐私保护效果进行评估;Evaluate the privacy protection effect of the privacy protection scheme; 对隐私保护方案的复杂度进行评估;Evaluate the complexity of the privacy protection scheme; 对所述隐私保护方案中的隐私保护算法进行评估包括以下至少之一:Evaluating the privacy protection algorithm in the privacy protection scheme includes at least one of the following: 对隐私保护方案中的隐私保护算法的隐私保护效果进行评估;Evaluate the privacy protection effect of the privacy protection algorithm in the privacy protection scheme; 对隐私保护方案中的隐私保护算法的复杂度进行评估。Evaluate the complexity of privacy-preserving algorithms in privacy-preserving schemes. 26.一种隐私信息保护装置,包括处理器和计算机可读存储介质,所述计算机可读存储介质中存储有指令,其特征在于,当所述指令被所述处理器执行时,实现如权利要求1-24任一项所述的隐私信息保护方法。26. An apparatus for protecting privacy information, comprising a processor and a computer-readable storage medium, wherein instructions are stored in the computer-readable storage medium, wherein when the instructions are executed by the processor, the rights The privacy information protection method described in any one of requirements 1-24. 27.一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现如权利要求1-24任一项所述的隐私信息保护方法的步骤。27. A computer-readable storage medium on which a computer program is stored, wherein when the computer program is executed by a processor, the steps of the method for protecting private information according to any one of claims 1-24 are implemented. 28.一种隐私信息保护系统,包括:28. A privacy information protection system, comprising: 隐私信息特征获取模块,用于获取隐私信息的隐私信息特征;The private information feature acquisition module is used to obtain the private information features of the private information; 隐私保护方案决策模块,用于根据场景信息和隐私信息特征中的至少一个确定隐私保护方案;a privacy protection scheme decision module, configured to determine a privacy protection scheme according to at least one of the scene information and the characteristics of the privacy information; 隐私保护方案评估模块,用于对所述隐私保护方案和隐私保护方案中的隐私保护算法中的至少一个进行评估;a privacy protection scheme evaluation module, configured to evaluate at least one of the privacy protection scheme and the privacy protection algorithm in the privacy protection scheme; 其中,所述隐私保护方案评估模块、隐私信息特征获取模块和隐私保护方案决策模块中的至少两个模块设置在不同的设备;Wherein, at least two modules in the privacy protection scheme evaluation module, the privacy information feature acquisition module and the privacy protection scheme decision module are set in different devices; 对所述隐私保护方案进行评估包括以下至少之一:Evaluating the privacy protection scheme includes at least one of the following: 对隐私保护方案的隐私保护效果进行评估;Evaluate the privacy protection effect of the privacy protection scheme; 对隐私保护方案的复杂度进行评估;Evaluate the complexity of the privacy protection scheme; 对所述隐私保护方案中的隐私保护算法进行评估包括以下至少之一:Evaluating the privacy protection algorithm in the privacy protection scheme includes at least one of the following: 对隐私保护方案中的隐私保护算法的隐私保护效果进行评估;Evaluate the privacy protection effect of the privacy protection algorithm in the privacy protection scheme; 对隐私保护方案中的隐私保护算法的复杂度进行评估。Evaluate the complexity of privacy-preserving algorithms in privacy-preserving schemes.
CN201811272603.1A 2018-10-30 2018-10-30 Privacy information protection method, device and system Active CN109583227B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811272603.1A CN109583227B (en) 2018-10-30 2018-10-30 Privacy information protection method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811272603.1A CN109583227B (en) 2018-10-30 2018-10-30 Privacy information protection method, device and system

Publications (2)

Publication Number Publication Date
CN109583227A CN109583227A (en) 2019-04-05
CN109583227B true CN109583227B (en) 2020-08-07

Family

ID=65921270

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811272603.1A Active CN109583227B (en) 2018-10-30 2018-10-30 Privacy information protection method, device and system

Country Status (1)

Country Link
CN (1) CN109583227B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109583228B (en) * 2018-10-30 2021-05-07 中国科学院信息工程研究所 A kind of privacy information management method, device and system
CN111178203B (en) * 2019-12-20 2021-01-29 江苏常熟农村商业银行股份有限公司 Signature verification method and device, computer equipment and storage medium
CN112269987B (en) * 2020-09-27 2023-01-24 西安电子科技大学 Intelligent model information leakage degree evaluation method, system, medium and equipment
CN112231750B (en) * 2020-10-14 2021-10-08 海南大学 Multimodal Privacy Protection Approach
CN112818390A (en) * 2021-01-26 2021-05-18 支付宝(杭州)信息技术有限公司 Data information publishing method, device and equipment based on privacy protection
CN115720144A (en) * 2021-08-24 2023-02-28 花瓣云科技有限公司 Application detection method, device and equipment
CN116127511A (en) * 2023-01-29 2023-05-16 中国银联股份有限公司 Privacy calculation method, device, equipment and medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105574437A (en) * 2015-12-31 2016-05-11 北京金山安全软件有限公司 Method and device for protecting privacy information and electronic equipment
CN106650485A (en) * 2016-09-18 2017-05-10 山东大学 Personalized environmental perception privacy protection method based on Android
CN107944299A (en) * 2017-12-29 2018-04-20 西安电子科技大学 A kind of processing method of privacy information, apparatus and system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102196431B (en) * 2011-05-13 2014-10-22 南京邮电大学 Internet of things application scene-based protection method of privacy query and private identity verification
US20150339493A1 (en) * 2013-08-07 2015-11-26 Thomson Licensing Privacy protection against curious recommenders
CN108563962A (en) * 2018-05-03 2018-09-21 桂林电子科技大学 A kind of difference method for secret protection based on spatial position service

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105574437A (en) * 2015-12-31 2016-05-11 北京金山安全软件有限公司 Method and device for protecting privacy information and electronic equipment
CN106650485A (en) * 2016-09-18 2017-05-10 山东大学 Personalized environmental perception privacy protection method based on Android
CN107944299A (en) * 2017-12-29 2018-04-20 西安电子科技大学 A kind of processing method of privacy information, apparatus and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
移动网络中场景关联的隐私保护机制研究;牛犇,李凤华,华佳烽,何媛媛;《网络与信息安全学报》;20151231;正文第2.3、4.2-4.3节,图3 *

Also Published As

Publication number Publication date
CN109583227A (en) 2019-04-05

Similar Documents

Publication Publication Date Title
CN109583227B (en) Privacy information protection method, device and system
CN113557512B (en) Secure multi-party arrival frequency and frequency estimation
WO2020087879A1 (en) Method, device, and system for protecting private information
Chen et al. Measuring query privacy in location-based services
US20110258430A1 (en) Method and apparatus for applying execution context criteria for execution context sharing
Javaid A secure and efficient trust model for wireless sensor IoTs using blockchain
Xiong et al. Reward-based spatial crowdsourcing with differential privacy preservation
Pradeep et al. A matrix translation and elliptic curve based cryptosystem for secured data communications in WSNs
Sethi et al. Group security using ECC
Singh et al. Privacy preserving techniques in social networks data publishing-a review
Rong‐na et al. Provenance‐based data flow control mechanism for Internet of things
Hu et al. Differential privacy protection method based on published trajectory cross-correlation constraint
Jung et al. Collaborative caching techniques for privacy-preserving location-based services in peer-to-peer environments
Lin et al. Protecting location privacy and query privacy: a combined clustering approach
CN115310125A (en) Encrypted data retrieval system, method, computer equipment and storage medium
Jaithunbi et al. Preservation of data integrity in public cloud using enhanced vigenere cipher based obfuscation
Zhang et al. LPPS‐AGC: Location Privacy Protection Strategy Based on Alt‐Geohash Coding in Location‐Based Services
Xu et al. FedG2L: a privacy-preserving federated learning scheme base on “G2L” against poisoning attack
CN109347845B (en) Information transfer method, device and system
Wang et al. D2D Big Data Privacy‐Preserving Framework Based on (a, k)‐Anonymity Model
CN114969832B (en) Private data management method and system based on server-free architecture
Gheid et al. An efficient and privacy-preserving similarity evaluation for big data analytics
Lu et al. A novel method for location privacy protection in LBS applications
Zhang et al. Entropy-driven differential privacy protection scheme based on social graphlet attributes
Wang et al. Secret sharing scheme with dynamic size of shares for distributed storage system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant