CN109684865A - A kind of personalization method for secret protection and device - Google Patents
A kind of personalization method for secret protection and device Download PDFInfo
- Publication number
- CN109684865A CN109684865A CN201811368178.6A CN201811368178A CN109684865A CN 109684865 A CN109684865 A CN 109684865A CN 201811368178 A CN201811368178 A CN 201811368178A CN 109684865 A CN109684865 A CN 109684865A
- Authority
- CN
- China
- Prior art keywords
- decision
- objective
- privacy protection
- protection policy
- privacy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Abstract
The embodiment of the present invention provides a kind of personalized method for secret protection and device, this method comprises: obtaining the subjective and objective demand information and current state information of user;The evaluation index of each privacy protection policy is obtained according to the subjective and objective demand information and the current state information;Optimal privacy protection policy is obtained according to the evaluation index, to protect to privacy of user.The embodiment of the present invention passes through the subjective demand and objective environment of user; in conjunction with user terminal current state information; decision has gone out the privacy protection policy of relationship between privacy protection policy, secret protection effect and resource consumption balanced; to provide dynamic personalized secret protection for user; the effect for improving secret protection, more efficiently protects privacy of user.
Description
Technical field
The present embodiments relate to mobile internet technical field more particularly to a kind of personalized method for secret protection and dress
It sets.
Background technique
The combination of mobile Internet and traditional social networks produces mobile social networking (Mobile Social
Networks, abbreviation MSNs).User in MSNs not only available related service data, for example, searching nearby dining room and doctor
Institute etc. can also be with friend's share photos etc. it has also been found that the good friend of surrounding, can register in some semantic locations.
This application model provides the social platform of virtual-real combination for user.Therefore, MSNs is rapidly developed,
Component part important in people's daily life is had become, provides service and experience abundant for user.However, a large amount of true
Information converges the also hurried risk for increasing privacy leakage.Reason for that is that user is next in order to enjoy these service bands
Convenience, need to service provider submit associated personal information, for example, personal identifier, specific service content and position letter
Breath etc..But due to economic interests stimulation etc., service provider is based on these information, may be tracked to user,
And the personal portrait of user is depicted, these information are even sold to third party.Therefore, concern privacy of user is MSNs development
Unavoidable core and problem in the process.
In order to protect privacy of user, academia and industry have all done many correlative studys, and propose a variety of for protecting
Protect the mechanism of privacy of user.These mechanism can be divided into following classification: encryption method, anonymity side according to used technology
Method and perturbation motion method etc..Every kind of Privacy Preservation Mechanism can realize the equal of secret protection and resource consumption to a certain extent
Weighing apparatus.Different mechanism can realize different equilibriums, if different equilibriums also may be implemented using different parameters for identical mechanism.
However, mostly there is this feature of immobilization, as user terminal in the designed Privacy Preservation Mechanism out of the prior art
Various adjustable parameters are provided the user with, user is allowed to adjust given parameter according to their own needs, personalization is realized with this
Secret protection.But this scheme is for a user and unfriendly, user need to fully understand the meaning of various parameters, value model
It encloses, and its influence to protecting effect and expense etc., and is only capable of providing preset privacy protection policy or scheme for user, it can not
Meet the secret protection demand of user individual.Therefore, need to design a kind of personalized method for secret protection and device to solve
The above problem.
Summary of the invention
In view of the problems of the existing technology, the embodiment of the present invention provides a kind of personalized method for secret protection and device.
In a first aspect, the embodiment of the present invention provides a kind of personalized method for secret protection, comprising:
Obtain the subjective and objective demand information and current state information of user;
Referred to according to the assessment that the subjective and objective demand information and the current state information obtain each privacy protection policy
Mark;
Optimal privacy protection policy is obtained according to the evaluation index, to protect to privacy of user.
Second aspect, the embodiment of the invention provides a kind of personalized privacy protection devices, comprising:
Module is obtained, for obtaining the subjective and objective demand information and current state information of user;
Processing module, for obtaining every secret protection plan according to the subjective and objective demand information and the current state information
Evaluation index slightly;
Privacy policy confirmation module, for obtaining optimal privacy protection policy according to the evaluation index, with hidden to user
Private is protected.
The third aspect, the embodiment of the present invention provides a kind of electronic equipment, including memory, processor and is stored in memory
Computer program that is upper and can running on a processor, is realized when the processor executes described program as first aspect provides
Method the step of.
Fourth aspect, the embodiment of the present invention provide a kind of non-transient computer readable storage medium, are stored thereon with calculating
Machine program is realized as provided by first aspect when the computer program is executed by processor the step of method.
A kind of personalized method for secret protection and device provided in an embodiment of the present invention, pass through the subjective demand of user and visitor
Environment is seen, in conjunction with user terminal current state information, decision goes out equilibrium privacy protection policy, secret protection effect and resource and disappears
The privacy protection policy of relationship between consumption improves secret protection to provide dynamic personalized secret protection for user
Effect more efficiently protects privacy of user.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair
Bright some embodiments for those of ordinary skill in the art without creative efforts, can be with root
Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the flow diagram of personalized method for secret protection provided in an embodiment of the present invention;
Fig. 2 is the structural schematic diagram of personalized privacy protection device provided in an embodiment of the present invention;
Fig. 3 is electronic devices structure schematic diagram provided in an embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
In the Privacy Protection research process of mobile Internet, it is usually required mainly for consider following three aspects: privacy is protected
Protect effect, service quality and resource consumption.How to realize that triangular equilibrium is problem mostly important in secret protection.It is based on
Above-mentioned problem, the target of work on hand are mostly to design one kind to can be realized secret protection effect, service quality and resource
Consume balanced Privacy Preservation Mechanism between this three.However, it can be found that every kind of mechanism can all have its advantage and disadvantage by research, with
And certain special scenes being applicable in.Mostly there is this feature of immobilization as the mechanism gone out designed by target, it is so-called
Immobilization can be described from two angles: first is that scene is fixed, work on hand is all based on specific scene greatly to design certain
Privacy Preservation Mechanism, i.e. these mechanism can not be simply transplanted in other application scenarios;Second is that state is fixed, the state refers to
Be user subjective demand and objective environment, work on hand do not consider the change of user's state in different environments mostly, i.e.,
Personalized secret protection can not be provided to it according to the actual demand of user.
Therefore, when scene or user demand change, designed Privacy Preservation Mechanism is likely to will be no longer suitable
With.In order to avoid described problem generation, the embodiment of the present invention passes through the current user state and subjective and objective demand of user terminal,
Decision goes out an optimal privacy protection policy for current state in available Privacy Preservation Mechanism.Wherein, subjective and objective need
It asks including subjective demand and user rs environment, current user state includes the remaining capacity of user's device therefor, required processing data
Size and the privacy requirements of user etc..Privacy protection policy refers to the Privacy Preservation Mechanism that parameter value determines, and optimal body
The present embodiment of the present invention can be realized equal between secret protection effect and resource consumption according to subjective demand and objective environment
Weighing apparatus.
Fig. 1 is the flow diagram of personalized method for secret protection provided in an embodiment of the present invention, as shown in Figure 1, this hair
Bright embodiment provides a kind of personalized method for secret protection, comprising:
Step 101, the subjective and objective demand information and current state information of user are obtained;
Step 102, each privacy protection policy is obtained according to the subjective and objective demand information and the current state information
Evaluation index;
Step 103, optimal privacy protection policy is obtained according to the evaluation index, to protect to privacy of user.
In embodiments of the present invention, the subjective and objective demand information and current state letter of user are obtained by step 101 first
Breath, subjective and objective demand information include subjective demand information and objective environment information, wherein subjective demand information includes the hidden of user
Private preference etc., objective environment information includes remaining capacity, charged state or the network connection state etc. of user terminal, and current shape
State information includes size and privacy requirements of the currently processed data of user terminal etc..
Then, by step 102, each privacy is obtained according to the subjective and objective demand information and the current state information
The evaluation index of Preservation tactics, in embodiments of the present invention, according to subjective and objective demand information obtain decision objective set, influence because
Element set and privacy protection policy set, by decision objective set and influence factor set, fitting obtains decision objective and shadow
The function expression of relationship between the factor of sound;Then, each decision mesh in decision objective set is obtained according to current state information
Target decision-making power weight values, by each in the function expression and decision objective set of relationship between decision objective and influence factor
The decision-making power weight values of decision objective, obtain the evaluation index of each privacy protection policy in privacy protection policy set.
Finally, obtain optimal privacy protection policy according to the evaluation index by step 103, with to privacy of user into
Row protection.In embodiments of the present invention, evaluation index can be set according to the actual situation, for example, evaluation index is set as
Privacy protection policy and optimizing decision weighted value distance difference and privacy protection policy and worst decision-making power weight values distance difference it
Between ratio, according between the two ratio and preset threshold compare, if meeting preset threshold, generate optimal privacy
Preservation tactics, to be protected to privacy of user.
A kind of personalized method for secret protection provided in an embodiment of the present invention, subjective demand and objective ring by user
Border, in conjunction with user terminal current state information, decision gone out privacy protection policy, secret protection effect and resource consumption balanced it
Between the privacy protection policy of relationship improve the effect of secret protection to provide dynamic personalized secret protection for user,
More efficiently protect privacy of user.
On the basis of the above embodiments, it is described obtained according to subjective and objective demand information and the current state information it is each
The evaluation index of privacy protection policy, comprising:
Decision objective set, influence factor set and privacy protection policy collection are obtained according to the subjective and objective demand information
It closes;
Relationship between decision objective and influence factor is obtained according to the decision objective set and the influence factor set
Function expression;
The decision-making power weight values of each decision objective in the decision objective set are obtained according to the current state information;
According to the function expression and the decision-making power weight values, each privacy in the privacy protection policy set is obtained
The evaluation index of Preservation tactics.
In embodiments of the present invention, decision objective set, influence factor set and hidden are obtained by subjective and objective demand information
Private Preservation tactics set, wherein include user terminal electric quantity consumption situation, bandwidth consumption situation and privacy in decision objective set
Demand etc., various factors will affect the decision objective that can privacy protection policy reach required in influence factor set, and these
Influence factor can be remaining capacity and network connection situation of user terminal etc., and what privacy protection policy set included is parameter
It is worth fixed Privacy Preservation Mechanism.After determining decision objective set, influence factor set and privacy protection policy set,
The function expression of relationship between decision objective and influence factor is obtained according to decision objective set and influence factor set.
It is determining between decision objective and influence factor after the function expression of relationship, is being obtained according to current state information
The decision-making power weight values of each decision objective in decision objective set, in embodiments of the present invention, the current state letter that will acquire
Breath is weighted processing to decision objective by subjective weighting method or objective weighted model, wherein level can be used in subjective weighting method
Principal Component Analysis or multi-objective programming method etc. can be used in analytic approach or binomial coefficient method etc., objective weighted model.Then, according to working as
The value and function expression of preceding influence factor generate the decision square for indicating privacy protection policy Yu decision objective relationship
Battle array.Then, optimizing decision weighted value and worst decision-making power weight values in decision objective are selected according to decision matrix, to be formed optimal
Two vectors of decision-making power weight values and worst decision-making power weight values, then calculate every kind of privacy protection policy and optimizing decision weighted value
The distance between worst decision-making power weight values difference, finally, being referred to according to the assessment that distance difference obtains each privacy protection policy
Mark, to generate optimal privacy protection policy.
On the basis of the above embodiments, described to be determined according to the decision objective set and the influence factor set
The function expression of relationship between plan target and influence factor, comprising:
According to the relationship between the decision objective set and the influence factor set, judge to whether there is between set
Theoretic direct relation directly obtains the function expression if presence is known in judgement;
If judgement knows that there is no theoretic direct relations between set, by the decision objective set and the shadow
It rings sets of factors and is fitted processing, obtain the function expression.
In embodiments of the present invention, it according to theory relation existing between influence factor and decision objective, directly generates and is used for
The function expression of its relationship is described, if between the two be not present theoretic direct relation, according to collected influence because
The data of element and decision objective, by being fitted to these data, for example, spline-fit and neural network etc., to generate
Corresponding function expression.
On the basis of the above embodiments, described to be obtained in the decision objective set often according to the current state information
The decision-making power weight values of a decision objective, comprising:
Based on the current state information, the decision objective set is carried out by subjective weighting method or objective weighted model
Weighting processing, obtains the decision-making power weight values of each decision objective in the decision objective set.
In embodiments of the present invention, by the current state information of user terminal by subjective weighting method, such as such as, level point
Analysis method or binomial coefficient method etc.;Or objective weighted model, for example, Principal Component Analysis or multi-objective programming method etc., to be decision
Each decision objective is weighted processing in target collection, obtains the decision-making power weight values of each decision objective.
On the basis of the above embodiments, described according to the function expression and the decision-making power weight values, it obtains described
The evaluation index of each privacy protection policy in privacy protection policy set, comprising:
The decision matrix based on relationship between privacy protection policy and decision objective is obtained, the decision matrix is according to
The value of influence factor set and the function expression obtain;
The optimizing decision weighted value in the decision matrix and worst decision-making power weight values are obtained, according to each secret protection plan
Slightly with the distance between optimizing decision weighted value difference and each privacy protection policy and the worst decision-making power weight values
The distance between difference, the evaluation index of each privacy protection policy in the privacy protection policy set is obtained, if institute's commentary
Estimate index and meets preset condition, then using the corresponding privacy protection policy of the evaluation index as optimal privacy protection policy, with
Privacy is carried out to privacy of user.
Fig. 2 is the structural schematic diagram of personalized privacy protection device provided in an embodiment of the present invention, as shown in Fig. 2, this hair
Bright embodiment provides a kind of personalized privacy protection device, comprising: it is true to obtain module 201, processing module 202 and privacy policy
Cover half block 203, wherein obtain subjective and objective demand information and current state information that module 201 is used to obtain user;Processing module
202 for obtaining the evaluation index of every privacy protection policy according to the subjective and objective demand information and the current state information;
Privacy policy confirmation module 203 is used to obtain optimal privacy protection policy according to the evaluation index, to carry out to privacy of user
Protection.
A kind of personalized privacy protection device provided in an embodiment of the present invention, subjective demand and objective ring by user
Border, in conjunction with user terminal current state information, decision gone out privacy protection policy, secret protection effect and resource consumption balanced it
Between the privacy protection policy of relationship improve the effect of secret protection to provide dynamic personalized secret protection for user,
More efficiently protect privacy of user.
On the basis of the above embodiments, the processing module 202 includes: subjective and objective demand information processing unit, function
Expression formula structural unit, weight calculation unit and assessment unit, wherein subjective and objective demand information unit is used for according to the host and guest
It sees demand information and obtains decision objective set, influence factor set and privacy protection policy set;Function expression structural unit
For obtaining the letter of relationship between decision objective and influence factor according to the decision objective set and the influence factor set
Number expression formula;Weight calculation unit is used to obtain each decision mesh in the decision objective set according to the current state information
Target decision-making power weight values;Assessment unit is used to obtain the privacy according to the function expression and the decision-making power weight values and protect
Protect the evaluation index of each privacy protection policy in strategy set.
On the basis of the above embodiments, the privacy policy determining module 203 includes: that decision matrix unit and assessment refer to
Mark unit, wherein decision matrix unit is used to obtain the decision matrix based on relationship between privacy protection policy and decision objective,
The decision matrix is obtained according to the value and the function expression of the influence factor set;Evaluation index unit is for obtaining
Take the optimizing decision weighted value in the decision matrix and worst decision-making power weight values, according to each privacy protection policy and it is described most
The distance between excellent decision-making power weight values difference and the distance between each privacy protection policy and the worst decision-making power weight values
Difference obtains the evaluation index of each privacy protection policy in the privacy protection policy set, if the evaluation index meets
Preset condition, then using the corresponding privacy protection policy of the evaluation index as optimal privacy protection policy, to privacy of user
It is protected.
Device provided in an embodiment of the present invention is for executing above-mentioned each method embodiment, detailed process and detailed content
Above-described embodiment is please referred to, details are not described herein again.
Fig. 3 is electronic devices structure schematic diagram provided in an embodiment of the present invention, as shown in figure 3, the electronic equipment can wrap
It includes: processor (processor) 301, communication interface (Communications Interface) 302, memory (memory)
303 and communication bus 304, wherein processor 301, communication interface 302, memory 303 are completed mutually by communication bus 304
Between communication.Processor 301 can call the logical order in memory 303, to execute following method: obtaining the host and guest of user
See demand information and current state information;Each privacy is obtained according to the subjective and objective demand information and the current state information
The evaluation index of Preservation tactics;Optimal privacy protection policy is obtained according to the evaluation index, to protect to privacy of user.
In addition, the logical order in above-mentioned memory 303 can be realized by way of SFU software functional unit and conduct
Independent product when selling or using, can store in a computer readable storage medium.Based on this understanding, originally
Substantially the part of the part that contributes to existing technology or the technical solution can be in other words for the technical solution of invention
The form of software product embodies, which is stored in a storage medium, including some instructions to
So that a computer equipment (can be personal computer, server or the network equipment etc.) executes each implementation of the present invention
The all or part of the steps of example the method.And storage medium above-mentioned include: USB flash disk, mobile hard disk, read-only memory (ROM,
Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. it is various
It can store the medium of program code.
The embodiment of the present invention discloses a kind of computer program product, and the computer program product is non-transient including being stored in
Computer program on computer readable storage medium, the computer program include program instruction, when described program instructs quilt
When computer executes, computer is able to carry out method provided by above-mentioned each method embodiment, for example, obtains the master of user
Objective demand information and current state information;It is obtained according to the subjective and objective demand information and the current state information each hidden
The evaluation index of private Preservation tactics;Optimal privacy protection policy is obtained according to the evaluation index, to protect to privacy of user
Shield.
The embodiment of the present invention provides a kind of non-transient computer readable storage medium, the non-transient computer readable storage medium
The instruction of matter storage server, the computer instruction make computer execute personalization secret protection side provided by above-described embodiment
Method, for example, obtain the subjective and objective demand information and current state information of user;According to the subjective and objective demand information and institute
It states current state information and obtains the evaluation index of each privacy protection policy;Optimal secret protection is obtained according to the evaluation index
Strategy, to be protected to privacy of user.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although
Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it still may be used
To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features;
And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution spirit and
Range.
Claims (10)
1. a kind of personalization method for secret protection characterized by comprising
Obtain the subjective and objective demand information and current state information of user;
The evaluation index of each privacy protection policy is obtained according to the subjective and objective demand information and the current state information;
Optimal privacy protection policy is obtained according to the evaluation index, to protect to privacy of user.
2. the method according to claim 1, wherein described according to subjective and objective demand information and the current state
Information obtains the evaluation index of each privacy protection policy, comprising:
Decision objective set, influence factor set and privacy protection policy set are obtained according to the subjective and objective demand information;
The letter of relationship between decision objective and influence factor is obtained according to the decision objective set and the influence factor set
Number expression formula;
The decision-making power weight values of each decision objective in the decision objective set are obtained according to the current state information;
According to the function expression and the decision-making power weight values, each secret protection in the privacy protection policy set is obtained
The evaluation index of strategy.
3. according to the method described in claim 2, it is characterized in that, it is described according to the decision objective set and the influence because
Element set obtains the function expression of relationship between decision objective and influence factor, comprising:
According to the relationship between the decision objective set and the influence factor set, judge between set with the presence or absence of theory
On direct relation, if judgement know presence, directly obtain the function expression;
If judgement is known between set there is no theoretic direct relation, by the decision objective set and the influence because
Element set is fitted processing, obtains the function expression.
4. according to the method described in claim 2, it is characterized in that, described obtain the decision according to the current state information
The decision-making power weight values of each decision objective in target collection, comprising:
Based on the current state information, the decision objective set is weighted by subjective weighting method or objective weighted model
Processing, obtains the decision-making power weight values of each decision objective in the decision objective set.
5. according to the method described in claim 2, it is characterized in that, described according to the function expression and the decision weights
Value, obtains the evaluation index of each privacy protection policy in the privacy protection policy set, comprising:
The decision matrix based on relationship between privacy protection policy and decision objective is obtained, the decision matrix is according to the influence
The value of sets of factors and the function expression obtain;
Obtain the optimizing decision weighted value in the decision matrix and worst decision-making power weight values, according to each privacy protection policy with
Between the distance between optimizing decision weighted value difference and each privacy protection policy and the worst decision-making power weight values
Distance difference, obtain the evaluation index of each privacy protection policy in the privacy protection policy set, if it is described assessment refer to
Mark meets preset condition, then using the corresponding privacy protection policy of the evaluation index as optimal privacy protection policy, with to
Family privacy is protected.
6. a kind of personalization privacy protection device characterized by comprising
Module is obtained, for obtaining the subjective and objective demand information and current state information of user;
Processing module, for obtaining every privacy protection policy according to the subjective and objective demand information and the current state information
Evaluation index;
Privacy policy confirmation module, for obtaining optimal privacy protection policy according to the evaluation index, with to privacy of user into
Row protection.
7. device according to claim 6, which is characterized in that the processing module includes:
Subjective and objective demand information processing unit, for according to the subjective and objective demand information obtain decision objective set, influence because
Element set and privacy protection policy set;
Function expression structural unit, for obtaining decision objective according to the decision objective set and the influence factor set
The function expression of relationship between influence factor;
Weight calculation unit, for obtaining each decision objective in the decision objective set according to the current state information
Decision-making power weight values;
Assessment unit, for obtaining the privacy protection policy set according to the function expression and the decision-making power weight values
In each privacy protection policy evaluation index.
8. device according to claim 7, which is characterized in that the privacy policy determining module includes:
Decision matrix unit, it is described to determine for obtaining the decision matrix based on relationship between privacy protection policy and decision objective
Plan matrix is obtained according to the value and the function expression of the influence factor set;
Evaluation index unit, for obtaining optimizing decision weighted value and worst decision-making power weight values in the decision matrix, according to
The distance between each privacy protection policy and the optimizing decision weighted value difference and each privacy protection policy with it is described
The distance between worst decision-making power weight values difference, obtains the assessment of each privacy protection policy in the privacy protection policy set
Index, if the evaluation index meets preset condition, using the corresponding privacy protection policy of the evaluation index as optimal hidden
Private Preservation tactics, to be protected to privacy of user.
9. a kind of electronic equipment including memory, processor and stores the calculating that can be run on a memory and on a processor
Machine program, which is characterized in that the processor is realized when executing described program such as any one of claim 1 to 5 the method
Step.
10. a kind of non-transient computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer
It is realized when program is executed by processor such as the step of any one of claim 1 to 5 the method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811368178.6A CN109684865B (en) | 2018-11-16 | 2018-11-16 | Personalized privacy protection method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811368178.6A CN109684865B (en) | 2018-11-16 | 2018-11-16 | Personalized privacy protection method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109684865A true CN109684865A (en) | 2019-04-26 |
CN109684865B CN109684865B (en) | 2020-06-16 |
Family
ID=66184759
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811368178.6A Active CN109684865B (en) | 2018-11-16 | 2018-11-16 | Personalized privacy protection method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109684865B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113645187A (en) * | 2021-07-06 | 2021-11-12 | 暨南大学 | Privacy measurement and protection policy selection method, device, server and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101493874A (en) * | 2009-01-08 | 2009-07-29 | 西安交通大学 | Personal context information privacy protection policy automatic generating method |
CN103049704A (en) * | 2012-12-07 | 2013-04-17 | 哈尔滨工业大学深圳研究生院 | Self-adaptive privacy protection method and device for mobile terminal |
EP2827277A1 (en) * | 2013-07-16 | 2015-01-21 | Alcatel Lucent | Privacy protection in personalisation services |
CN106650485A (en) * | 2016-09-18 | 2017-05-10 | 山东大学 | Personalized environmental perception privacy protection method based on Android |
CN108416227A (en) * | 2018-03-01 | 2018-08-17 | 山东大学 | Big data platform secret protection evaluation method and device based on Dare Information Entropy |
-
2018
- 2018-11-16 CN CN201811368178.6A patent/CN109684865B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101493874A (en) * | 2009-01-08 | 2009-07-29 | 西安交通大学 | Personal context information privacy protection policy automatic generating method |
CN103049704A (en) * | 2012-12-07 | 2013-04-17 | 哈尔滨工业大学深圳研究生院 | Self-adaptive privacy protection method and device for mobile terminal |
EP2827277A1 (en) * | 2013-07-16 | 2015-01-21 | Alcatel Lucent | Privacy protection in personalisation services |
CN106650485A (en) * | 2016-09-18 | 2017-05-10 | 山东大学 | Personalized environmental perception privacy protection method based on Android |
CN108416227A (en) * | 2018-03-01 | 2018-08-17 | 山东大学 | Big data platform secret protection evaluation method and device based on Dare Information Entropy |
Non-Patent Citations (2)
Title |
---|
李凤华等: "隐私计算研究范畴及发展趋势", 《通信学报》 * |
牛犇等: "移动网络中场景关联的隐私保护机制研究", 《网络与信息安全学报》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113645187A (en) * | 2021-07-06 | 2021-11-12 | 暨南大学 | Privacy measurement and protection policy selection method, device, server and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109684865B (en) | 2020-06-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | Privacy-preserving quality prediction for edge-based IoT services | |
Olejnik et al. | Smarper: Context-aware and automatic runtime-permissions for mobile devices | |
CN110647921B (en) | User behavior prediction method, device, equipment and storage medium | |
AU2015213817B2 (en) | Systems, apparatuses and methods for communication flow modification | |
RU2607621C2 (en) | Method, system and computer-readable data medium for grouping in social networks | |
US20170153917A1 (en) | Account activity level based-system resource allocating method and device | |
Wang et al. | Infedge: A blockchain-based incentive mechanism in hierarchical federated learning for end-edge-cloud communications | |
WO2020211247A1 (en) | Account information login method and device, computer device and computer storage medium | |
CN106910057A (en) | The safety certifying method and device of mobile terminal and mobile terminal side | |
CN103049704A (en) | Self-adaptive privacy protection method and device for mobile terminal | |
TWI701932B (en) | Identity authentication method, server and client equipment | |
CN109661671B (en) | Improvement of image classification using boundary bitmaps | |
CN106789947B (en) | Internet of things node trust value evaluation and task delegation method based on environment | |
CN109684865A (en) | A kind of personalization method for secret protection and device | |
CN109753873A (en) | Image processing method and relevant apparatus | |
Xu et al. | Cooperative swarm learning for distributed cyclic edge intelligent computing | |
US10621417B2 (en) | Systems and methods for generating content | |
CN108921798A (en) | The method, apparatus and electronic equipment of image procossing | |
Zou et al. | ST-EUA: Spatio-temporal edge user allocation with task decomposition | |
CN110909189A (en) | Method and device for processing face picture | |
CN116091844A (en) | Image data processing method and system based on edge calculation | |
Atov et al. | Data science and artificial intelligence for communications | |
Macedo et al. | An evolutionary spatial game-based approach for the self-regulation of social exchanges in MAS | |
CN115170390A (en) | File stylization method, device, equipment and storage medium | |
Sun et al. | Optimal defense strategy model based on differential game in edge computing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |