CN109697368A - Method, equipment and system that user information data safety uses, storage medium - Google Patents

Method, equipment and system that user information data safety uses, storage medium Download PDF

Info

Publication number
CN109697368A
CN109697368A CN201710983616.9A CN201710983616A CN109697368A CN 109697368 A CN109697368 A CN 109697368A CN 201710983616 A CN201710983616 A CN 201710983616A CN 109697368 A CN109697368 A CN 109697368A
Authority
CN
China
Prior art keywords
data
service platform
user
information
desensitization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710983616.9A
Other languages
Chinese (zh)
Other versions
CN109697368B (en
Inventor
陈华
沈淼奇
高琳
夏蔚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Gongshi Technology Co.,Ltd.
Original Assignee
Beijing Proximity Win Win Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Proximity Win Win Information Technology Co Ltd filed Critical Beijing Proximity Win Win Information Technology Co Ltd
Priority to CN201710983616.9A priority Critical patent/CN109697368B/en
Publication of CN109697368A publication Critical patent/CN109697368A/en
Application granted granted Critical
Publication of CN109697368B publication Critical patent/CN109697368B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The present invention provides a kind of method that user information data safety uses, equipment and system, storage medium, wherein method includes: to send data to data service platform to use solicited message;The desensitization user data for using solicited message to generate according to the data is received from the data service platform, wherein the data service platform generates the desensitization user data according to users personal data.The present invention makes full use of users personal data while protecting individual subscriber privacy, allows the maximizing the benefits of users personal data.

Description

Method, equipment and system that user information data safety uses, storage medium
Technical field
The present invention relates to the guard methods of technical field of the computer network more particularly to user privacy information, specifically Exactly a kind of method that user information data safety uses, equipment and system, storage medium.
Background technique
With the fast development of the network information technology, the combination in daily life and the virtual network world is more and more tighter Close, many contents in people's daily life, work are by carriers such as computer, server, network service platforms with data information Mode write come, these data informations are dispersed in electric business platform, financial institution, search engine, geo-location service quotient's hand In.Some Internet service companies utilize illegal technological means, collect the personal data information of user without restraint, and according to collection Personal data information analyzes the privacy information that user takes pains protection;With the expansion of internet financing service, Ge Biegong Department signs User Agreement with user, and using the carelessness of user and ignorant, any privacy information collected and share user will be used The affairs such as the privacy information at family is used for credit evaluation, promise breaking is called to account, are abused so as to cause user information;What is more, some Internet company even sells user information in the unwitting situation of user and obtains economic interests, these user informations become mutual The information source of networking swindle case.
The personal data information of user should belong to user, and user possesses ownership to the personal data information of oneself and makes With power.Then, different user is different to the attention rate of personal data privacy, and personal privacy protection structure of the law is not good for also at home In the case where complete, many people form risk prevention consciousness to the personal data information of oneself not yet, how to protect this kind of crowd Legitimate rights and interests do not encroached on, prevent personal data information from illegally being abused, be the task of top priority of those skilled in the art.
Personal data information itself has preferable society and economic benefit, such as: a large amount of trip data of user helps In helping government department to formulate more accurately traffic administration scheme;A large amount of medical data is for disease treatment and drug invention With practice significance.Therefore, either social level or enterprise level, user data all have good society and economy Benefit.In addition, enterprise analyzes hobby, consumption habit of user etc., or even pass through user's according to the historical behavior data of user Historical behavior data are the credit rating of user, allow the user having a good credit to obtain under the scenes such as loan more preferential, reduce enterprise While the operation management cost of industry, more cheap, efficient, quality services can be provided for family of keeping promise, people will The credit record of oneself is treasured, so that the Credit Environment of entire society is improved.
Therefore, how while protecting users personal data information not abused illegally, guarantee users personal data letter Breath can fairly be utilized, and given full play to the social benefit and economic benefit of users personal data information, be this field The technical issues of technical staff's urgent need to resolve.
Summary of the invention
In view of this, the technical problem to be solved in the present invention is that providing a kind of side that user information data safety uses Method, equipment and system, storage medium, solving the prior art cannot be considered in terms of personal data information protection and personal data information benefit The problem of using.
In order to solve the above-mentioned technical problem, a specific embodiment of the invention provides a kind of user information data safety use Method, comprising: to data service platform send data use solicited message;It is received according to from the data service platform The desensitization user data that data use solicited message to generate, wherein the data service platform is generated according to users personal data The desensitization user data.
A specific embodiment of the invention also provides a kind of data that user information data safety uses and uses method, apparatus, wraps Include: transmission unit uses solicited message for sending data to data service platform;Receiving unit, for being taken from the data Business platform receives the desensitization user data for using solicited message to generate according to the data, wherein the data service platform root The desensitization user data is generated according to users personal data.
A specific embodiment of the invention also provides a kind of method that user information data safety uses, comprising: from data Data, which are received, using method, apparatus uses solicited message;Using solicited message users personal data is processed into according to the data de- Quick user data.
A specific embodiment of the invention also provides a kind of data service platform that user information data safety uses, packet Include: receiving unit uses solicited message for receiving data using method, apparatus from data;Processing unit, for according to the number According to using solicited message that users personal data is processed into desensitization user data.
A specific embodiment of the invention also provides a kind of method that user information data safety uses, comprising: to data Service platform sends data and illustrates information;Data are received using method, apparatus according to the data explanation from the data service platform The business algorithm of message composition;The business algorithm is authenticated, is utilized to authenticate by the rear data service platform The users personal data is generated desensitization user data by the business algorithm.
A specific embodiment of the invention also provides a kind of data providing equipment that user information data safety uses, packet Include: transmission unit illustrates information for sending data to data service platform;Receiving unit, for flat from the data service Platform receives the business algorithm that data illustrate message composition using method, apparatus according to the data;Authentication unit, for the industry Business algorithm is authenticated, and utilizes the business algorithm by the individual subscriber number by the rear data service platform to authenticate According to generation desensitization user data.
A specific embodiment of the invention also provides a kind of method that user information data safety uses, comprising: from data Service platform receives data and uses authorization requests information;It is flat to the data service using authorization requests information according to the data Platform feeds back license confirmation information, so that the data service platform is passed to data using method, apparatus according to the license confirmation information Send desensitization user data.
A specific embodiment of the invention also provides a kind of subscriber terminal equipment that user information data safety uses, packet Include: receiving unit uses authorization requests information for receiving data from data service platform;Transmission unit, for according to Data feed back license confirmation information to the data service platform using authorization requests information, so as to the data service platform root Method, apparatus transmission desensitization user data is used to data according to the license confirmation information.
A specific embodiment of the invention also provides a kind of system that user information data safety uses, comprising: multiple numbers According to using method, apparatus, data service platform, multiple data providing equipment and multiple subscriber terminal equipments.Wherein, Duo Gesuo State data using method, apparatus, multiple data providing equipment and multiple subscriber terminal equipments with the data service Platform connection;The data are used to illustrate message composition industry according to the data that the data providing equipment provides using method, apparatus Business algorithm, and use the desensitization user data on the data service platform;The data service platform is used to utilize the industry Users personal data is generated the desensitization user data by business algorithm, and will be described de- after the subscriber terminal equipment authorization Quick user data sends the data to and uses method, apparatus;The data providing equipment to the data service platform for mentioning For the users personal data, and authenticate the business algorithm that the data are write using method, apparatus;The user terminal is set It is ready for use on the authorization data and uses legal use of the method, apparatus to the users personal data.
A specific embodiment of the invention also provides a kind of computer storage medium comprising computer executed instructions, described When computer executed instructions are handled by data processing equipment, the data processing equipment executes user information data safety and uses Method.
Above-mentioned specific embodiment according to the present invention it is found that user information data safety use method, equipment and be System, storage medium at least have the advantages that data user oneself defines the business processing algorithm of users personal data, Data providing authenticates the business processing algorithm;If data user needs obtaining the user using users personal data In the case where authorization, (individual subscriber number is not being influenced using the users personal data by the business processing algorithm process of certification Under the premise of according to normal use, desensitization process is carried out to users personal data), by treated, users personal data is sent to number According to user, (privacy of user or initial data are not exposed) while protecting individual subscriber privacy, does not influence individual subscriber The normal use of data makes the maximizing the benefits of users personal data.
It is to be understood that above-mentioned general description and following specific embodiments are merely illustrative and illustrative, not The range of the invention to be advocated can be limited.
Detailed description of the invention
Following appended attached drawing is part of specification of the invention, depicts example embodiments of the present invention, institute Attached drawing is used to illustrate the principle of the present invention together with the description of specification.
Fig. 1 is a kind of embodiment one for method that user information data safety uses that the specific embodiment of the invention provides Flow chart.
Fig. 2 is a kind of embodiment two for method that user information data safety uses that the specific embodiment of the invention provides Flow chart.
Fig. 3 is that a kind of data that user information data safety uses that the specific embodiment of the invention provides use method, apparatus Embodiment one structural schematic diagram.
Fig. 4 is that a kind of data that user information data safety uses that the specific embodiment of the invention provides use method, apparatus Embodiment two structural schematic diagram.
Fig. 5 is a kind of embodiment three for method that user information data safety uses that the specific embodiment of the invention provides Flow chart.
Fig. 6 is a kind of example IV for method that user information data safety uses that the specific embodiment of the invention provides Flow chart.
Fig. 7 is a kind of embodiment five for method that user information data safety uses that the specific embodiment of the invention provides Flow chart.
Fig. 8 is a kind of data service platform that user information data safety uses that the specific embodiment of the invention provides The structural schematic diagram of embodiment one.
Fig. 9 is a kind of data service platform that user information data safety uses that the specific embodiment of the invention provides The structural schematic diagram of embodiment two.
Figure 10 is a kind of embodiment for method that user information data safety uses that the specific embodiment of the invention provides Six flow chart.
Figure 11 is a kind of embodiment for method that user information data safety uses that the specific embodiment of the invention provides Seven flow chart.
Figure 12 is that a kind of data providing that user information data safety uses that the specific embodiment of the invention provides is set Standby structural schematic diagram.
Figure 13 is a kind of embodiment for method that user information data safety uses that the specific embodiment of the invention provides Eight flow chart.
Figure 14 is a kind of subscriber terminal equipment that user information data safety uses that the specific embodiment of the invention provides Structural schematic diagram.
Figure 15 is that a kind of composition for system that user information data safety uses that the specific embodiment of the invention provides shows It is intended to.
When Figure 16 is a kind of work for system that user information data safety uses that the specific embodiment of the invention provides Sequence figure.
Specific embodiment
Understand in order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below will with attached drawing and in detail Narration clearly illustrates the spirit of disclosed content, and any skilled artisan is understanding the content of present invention After embodiment, when the technology that can be taught by the content of present invention, it is changed and modifies, without departing from the essence of the content of present invention Mind and range.
The illustrative embodiments of the present invention and their descriptions are used to explain the present invention, but not as a limitation of the invention. In addition, in the drawings and embodiments the use of element/component of same or like label is for representing same or like portion Point.
About " first " used herein, " second " ... etc., not especially censure the meaning of order or cis-position, It is non-to limit the present invention, only for distinguish with same technique term description element or operation.
About direction term used herein, such as: upper and lower, left and right, front or rear etc. are only the sides with reference to attached drawing To.Therefore, the direction term used is intended to be illustrative and not intended to limit this creation.
It is open term, i.e., about "comprising" used herein, " comprising ", " having ", " containing " etc. Mean including but not limited to.
About it is used herein " and/or ", including any of the things or all combination.
It include " two " and " two or more " about " multiple " herein;It include " two groups " about " multiple groups " herein And " more than two ".
About term used herein " substantially ", " about " etc., to modify it is any can be with the quantity or mistake of microvariations Difference, but this slight variations or error can't change its essence.In general, microvariations that such term is modified or error Range in some embodiments can be 20%, in some embodiments can be 10%, can be in some embodiments 5% or its His numerical value.It will be understood by those skilled in the art that the aforementioned numerical value referred to can be adjusted according to actual demand, it is not limited thereto.
It is certain to describe the word of the application by lower or discuss in the other places of this specification, to provide art technology Personnel's guidance additional in relation to the description of the present application.
Fig. 1 is a kind of embodiment one for method that user information data safety uses that the specific embodiment of the invention provides Flow chart, as shown in Figure 1, data using method, apparatus to data service platform send data use solicited message, data service The data that platform is sent according to data using method, apparatus generate desensitization user data using solicited message.
In the specific embodiment shown in the drawings, the method that user information data safety uses includes:
Step 101: sending data to data service platform and use solicited message.In specific embodiments of the present invention, data Service platform can be network server, cloud server, server cluster etc..
Step 102: the desensitization user for using solicited message to generate according to the data is received from the data service platform Data, wherein the data service platform generates the desensitization user data according to users personal data.Specific reality of the invention It applies in example, is not in that subscriber phone number, ID card No., account, password etc. are sensitive or privacy is believed in the user data that desensitizes Breath.
Referring to Fig. 1, data are desensitized by sending data to data service platform using solicited message using method, apparatus User data while making full use of users personal data, is effectively protected the individual privacy of user.
Fig. 2 is a kind of embodiment two for method that user information data safety uses that the specific embodiment of the invention provides Flow chart, as shown in Fig. 2, data using method, apparatus by data service platform obtain data providing equipment offer data say Bright information, and illustrate message composition business algorithm according to data, then data to are sent business algorithm by data service platform Method, apparatus is provided to be authenticated.
In the specific embodiment shown in the drawings, step 101 this method further include:
Step 098: receiving data from the data service platform and illustrate information.In specific embodiments of the present invention, data Method, apparatus is provided and illustrates that information, data illustrate that information includes data content, data type, number to data service platform offer data According to provider's device id, use the information such as field, acquisition modes.
Step 099: illustrating message composition business algorithm according to the data.In specific embodiments of the present invention, data make The business algorithm for meeting specific transactions is write according to the demand of itself with method, apparatus, for example, bank calculates user credit collection point Algorithm, insurance company calculate the algorithm of user's motor vehicle Green Travel.In addition, data can also be in data service using method, apparatus The algorithmic system that an isolation is established on platform, writes business algorithm in the algorithmic system of foundation.
Step 100: the data service platform sends the business algorithm to data providing equipment and authenticates, with Just the users personal data is generated the desensitization using the business algorithm by the rear data service platform and used by certification User data.In specific embodiments of the present invention, the business algorithm that data are write using method, apparatus needs to set by data providing After standby certification, users personal data could be generated desensitization user data using the business algorithm by data service platform.
Referring to fig. 2, data providing equipment offer data illustrate that information, data illustrate information according to data using method, apparatus Write business algorithm, the business algorithm that data are write using method, apparatus reauthentication data using method, apparatus can be with after certification passes through Users personal data is generated into desensitization user data using the business algorithm, data user can be according to itself practical need It asks, the data that combined data provider provides rationally write business algorithm, under the premise of not encroaching on individual subscriber privacy, realize The maximization that users personal data utilizes.
Fig. 3 is that a kind of data that user information data safety uses that the specific embodiment of the invention provides use method, apparatus Embodiment one structural schematic diagram, equipment as shown in Figure 3 can be applied to Fig. 1, in method shown in Fig. 2, and data use Method, apparatus sends data to data service platform and uses solicited message, and data service platform is sent according to data using method, apparatus Data generate desensitization user data using solicited message.
In the specific embodiment shown in the drawings, it includes hair that the data that user information data safety uses, which use method, apparatus, Send unit 11 and receiving unit 12.Wherein, transmission unit 11, which is used to send data to data service platform, uses solicited message;It connects Unit 12 is received to be used to receive the desensitization user data for using solicited message to generate according to the data from the data service platform, Wherein, the data service platform generates the desensitization user data according to users personal data.
Referring to Fig. 3, data are desensitized by sending data to data service platform using solicited message using method, apparatus User data while making full use of users personal data, is effectively protected the individual privacy of user.
Fig. 4 is that a kind of data that user information data safety uses that the specific embodiment of the invention provides use method, apparatus Embodiment two structural schematic diagram, as shown in figure 4, data obtain data providing by data service platform using method, apparatus Equipment provides data and illustrates information, and illustrates message composition business algorithm according to data, then pass through data service platform for business Algorithm sends data providing equipment to and is authenticated.
In the specific embodiment shown in the drawings, the receiving unit 12 is also used to receive from the data service platform Data illustrate information.The data further include arranging unit 13 using method, apparatus.Wherein, arranging unit 13 is used for according to the data Illustrate message composition business algorithm;The transmission unit 11 is also used to pass the business algorithm by the data service platform It gives data providing equipment to be authenticated, utilizes the business algorithm by institute by the rear data service platform to authenticate It states users personal data and generates the desensitization user data.
Referring to fig. 4, data providing equipment offer data illustrate that information, data illustrate information according to data using method, apparatus Write business algorithm, the business algorithm that data are write using method, apparatus reauthentication data using method, apparatus can be with after certification passes through Users personal data is generated into desensitization user data using the business algorithm, data user can be according to itself practical need It asks, the data that combined data provider provides rationally write business algorithm, under the premise of not encroaching on individual subscriber privacy, realize The maximization that users personal data utilizes.
Fig. 5 is a kind of embodiment three for method that user information data safety uses that the specific embodiment of the invention provides Flow chart, as shown in figure 5, the data that are provided according to data using method, apparatus of data service platform are using solicited message by user Personal data are processed into desensitization user data.
In the specific embodiment shown in the drawings, the method that user information data safety uses includes:
Step 211: receiving data using method, apparatus from data and use solicited message.In specific embodiments of the present invention, number Data, which are received, using method, apparatus from data according to service platform uses solicited message.Data specifically included using solicited message be intended to using The information such as data object, data user device id, business algorithm title, submission time, abstract.Data service platform is by data Use solicited message write-in block chain (the standard block chain service that third party provides).
Step 212: users personal data being processed into desensitization user data using solicited message according to the data.This hair In bright specific embodiment, users personal data is processed into desensitization user using solicited message according to data by data service platform Data are used for data using method, apparatus.
Referring to Fig. 5, users personal data is processed into desensitization user data, while using users personal data, no The individual privacy that user can be exposed protects the legitimate rights and interests of user not encroached on, and has good social and economic benefit.
Fig. 6 is a kind of example IV for method that user information data safety uses that the specific embodiment of the invention provides Flow chart, as shown in fig. 6, data service platform receives data using before solicited message using method, apparatus from data, data Service platform sends data using method, apparatus to data and illustrates that information, data illustrate message composition industry according to data using method, apparatus Business algorithm.
In the specific embodiment shown in the drawings, before step 211, this method further include:
Step 209: Xiang Suoshu data send data using method, apparatus and illustrate information.In specific embodiments of the present invention, number Data, which are sent, using method, apparatus to data according to service platform illustrates information,.
Step 210: the business algorithm that the data illustrate message composition using method, apparatus according to the data is received, so as to The users personal data is generated into the desensitization user data using the business algorithm.In specific embodiments of the present invention, If data use data using the request of method, apparatus later period, users personal data is generated desensitization number of users by data service platform According to.
As shown in fig. 6, data providing equipment sends data explanation using method, apparatus to data by data service platform Information, data illustrate message composition business algorithm according to data using method, apparatus, and the business algorithm write both had met data use The requirement of side, but it is highly relevant with the data of data providing equipment offer, thus making full use of the same of users personal data When, protect the individual privacy of user to be inviolable.
Fig. 7 is a kind of embodiment five for method that user information data safety uses that the specific embodiment of the invention provides Flow chart, as shown in fig. 7, data service platform, which sends data to subscriber terminal equipment, uses authorization requests information, user is whole End equipment receives data using after authorization requests information, deciding whether that data is allowed to use users personal data using method, apparatus.
In the specific embodiment shown in the drawings, after step 212, this method further include:
Step 213: sending data to subscriber terminal equipment and use authorization requests information.In specific embodiments of the present invention, Data service platform sends data to subscriber terminal equipment and uses authorization requests information.Data include industry using authorization requests information The information such as business algorithm title, data user device id, data providing device id, abstract.
Step 214: receiving the subscriber terminal equipment from the subscriber terminal equipment and asked according to the data using authorization The license confirmation information for asking information to feed back.In specific embodiments of the present invention, subscriber terminal equipment is asked according to data using authorization Information is asked to feed back license confirmation information, for example, user's input handset identifying code and additional identity on corresponding authorization interface is broken Piece information (latter 4 of such as ID card No.) clicks authorization, i.e., feeds back license confirmation information to data service platform.
Step 215: the desensitization user data is transmitted using method, apparatus to the data according to the license confirmation information. In specific embodiments of the present invention, data service platform uses method, apparatus transmission desensitization user to data according to license confirmation information Data.
Referring to Fig. 7, data service platform sends data to subscriber terminal equipment and uses authorization requests information, and user terminal is set Standby to feed back license confirmation information to data service platform using authorization requests information according to data, data service platform is according to authorization Confirmation message uses method, apparatus transmission desensitization user data to data.
In specific embodiments of the present invention, users personal data can be processed into desensitization number of users by data service platform According to later, data are sent to subscriber terminal equipment and use authorization requests information (as shown in Figure 7), it can also be by individual subscriber number According to before being processed into desensitization user data, data are sent to subscriber terminal equipment and use authorization requests information.Before step 212, This method further include: send data to subscriber terminal equipment and use authorization requests information;Institute is received from the subscriber terminal equipment State the license confirmation information that subscriber terminal equipment is fed back according to the data using authorization requests information.
Fig. 8 is a kind of data service platform that user information data safety uses that the specific embodiment of the invention provides The structural schematic diagram of embodiment one, data service platform as shown in Figure 8 can be applied in Fig. 5~method shown in Fig. 7, number Users personal data is processed into desensitization using solicited message and used by the data provided according to data using method, apparatus according to service platform User data.
In the specific embodiment shown in the drawings, the data service platform that user information data safety uses includes receiving Unit 21 and processing unit 22.Wherein, receiving unit 21, which is used to receive data using method, apparatus from data, uses solicited message;Place Reason unit 22 is used to that users personal data to be processed into desensitization user data using solicited message according to the data.
Referring to Fig. 8, users personal data is processed into desensitization user data, while using users personal data, no The individual privacy that user can be exposed protects the legitimate rights and interests of user not encroached on, and has good social and economic benefit.
Fig. 9 is a kind of data service platform that user information data safety uses that the specific embodiment of the invention provides The structural schematic diagram of embodiment two, as shown in figure 9, data service platform, which receives data using method, apparatus from data, uses request letter Before breath, data service platform sends data using method, apparatus to data and illustrates that information, data are said using method, apparatus according to data Bright message composition business algorithm.
In the specific embodiment shown in the drawings, the data service platform that user information data safety uses further includes hair Send unit 23.Wherein, transmission unit 23, which is used to send data using method, apparatus to the data, illustrates information;The receiving unit 21 are also used to receive the business algorithm that the data illustrate message composition using method, apparatus according to the data, described in utilizing The users personal data is generated the desensitization user data by business algorithm.
As shown in figure 9, data providing equipment sends data explanation using method, apparatus to data by data service platform Information, data illustrate message composition business algorithm according to data using method, apparatus, and the business algorithm write both had met data use The requirement of side, but it is highly relevant with the data of data providing equipment offer, thus making full use of the same of users personal data When, protect the individual privacy of user to be inviolable.
In another embodiment of the present invention, the data service platform that user information data safety uses further includes hair Send unit 23.Wherein, transmission unit 23, which is used to send data to subscriber terminal equipment, uses authorization requests information.The reception is single Member 21, which is also used to receive the subscriber terminal equipment from the subscriber terminal equipment, uses authorization requests information according to the data The license confirmation information of feedback;The transmission unit 23 is also used to be set according to the license confirmation information to the data user It is standby to transmit the desensitization user data.Data service platform sends data to subscriber terminal equipment and uses authorization requests information, uses Family terminal device feeds back license confirmation information, data service platform to data service platform using authorization requests information according to data Method, apparatus transmission desensitization user data is used to data according to license confirmation information.
Figure 10 is a kind of embodiment for method that user information data safety uses that the specific embodiment of the invention provides Six flow chart, as shown in Figure 10, data providing equipment send data to data service platform and illustrate information, data user Equipment illustrates message composition business algorithm according to data, and business algorithm is sent to data providing by data service platform Equipment certification.
In the specific embodiment shown in the drawings, the method that user information data safety uses includes:
Step 311: sending data to data service platform and illustrate information.In specific embodiments of the present invention, data are provided Method, apparatus sends data to data service platform and illustrates information, i.e. data providing illustrates that information describes oneself and possesses by data The attribute of data, for example, data type, data fields, data generation time, data acquiring mode etc..
Step 312: receiving data from the data service platform and illustrate message composition according to the data using method, apparatus Business algorithm.In specific embodiments of the present invention, data illustrate message composition business algorithm according to data using method, apparatus, and The business algorithm write is sent to data service platform.
Step 313: the business algorithm being authenticated, to authenticate by described in the rear data service platform utilization The users personal data is generated desensitization user data by business algorithm.In specific embodiments of the present invention, data service platform Business algorithm is sent to data providing equipment to authenticate, after certification passes through, data service platform will using business algorithm Users personal data generates desensitization user data.
Referring to Figure 10, data illustrate that information and the demand of itself write business algorithm according to data using method, apparatus, make Before users personal data, using the business algorithm process users personal data write, desensitization user data is being allowed to meet spy Determine business demand, and individual subscriber privacy will not be revealed.For example, business algorithm is user if data user is bank Credit score algorithm;If data user is insurance company, business algorithm is motor vehicle Green Travel algorithm.
Figure 11 is a kind of embodiment for method that user information data safety uses that the specific embodiment of the invention provides Seven flow chart, as shown in figure 11, after subscriber terminal equipment authorization, desensitization user data is just sent to by data service platform Data use method, apparatus.
In the specific embodiment shown in the drawings, after step 313, the method that user information data safety uses also is wrapped It includes:
Step 314: receiving the desensitization user data from the data service platform after subscriber terminal equipment authorization.This In the specific embodiment of invention, after subscriber terminal equipment authorization, data could be received using method, apparatus from data service platform Desensitize user data.
Referring to Figure 11, after user authorizes, desensitization user data could be used by data user, be further improved The safety of individual subscriber privacy ensures that the individual privacy of user is not leaked.
Figure 12 is that a kind of data providing that user information data safety uses that the specific embodiment of the invention provides is set Standby structural schematic diagram, equipment as shown in figure 12 can be applied in method shown in Figure 10, Figure 11, data providing equipment Data, which are sent, to data service platform illustrates that information, data illustrate message composition business algorithm according to data using method, apparatus, and Business algorithm is sent to the certification of data providing equipment by data service platform;And after subscriber terminal equipment authorization, Desensitization user data is just sent to data and uses method, apparatus by data service platform.
In the specific embodiment shown in the drawings, the data providing equipment that user information data safety uses includes hair Send unit 31, receiving unit 32 and authentication unit 33.Wherein, transmission unit 31 is used to send data explanation to data service platform Information;Receiving unit 32 is used to receive data from the data service platform and illustrates that information is compiled according to the data using method, apparatus The business algorithm write;Authentication unit 33 is for authenticating the business algorithm, to authenticate through the rear data service The users personal data is generated desensitization user data using the business algorithm by platform.The receiving unit 32 is also used to The desensitization user data is received from the data service platform after subscriber terminal equipment authorization.
Referring to Figure 12, data illustrate that information and the demand of itself write business algorithm according to data using method, apparatus, make Before users personal data, using the business algorithm process users personal data write, desensitization user data is being allowed to meet spy Determine business demand, and individual subscriber privacy will not be revealed;After user authorizes, desensitization user data could be used by data Side uses, and further improves the safety of individual subscriber privacy, ensures that the individual privacy of user is not leaked.
Figure 13 is a kind of embodiment for method that user information data safety uses that the specific embodiment of the invention provides Eight flow chart, as shown in figure 13, subscriber terminal equipment receive data from data service platform and use authorization requests information, and root Decide whether that authorization data uses using authorization requests information according to data.
In the specific embodiment shown in the drawings, the method that user information data safety uses includes:
Step 411: receiving data from data service platform and use authorization requests information.In specific embodiments of the present invention, Subscriber terminal equipment receives data from data service platform and uses authorization requests information.
Step 412: being believed using authorization requests information to data service platform feedback license confirmation according to the data Breath, so that the data service platform uses method, apparatus transmission desensitization user data to data according to the license confirmation information. In specific embodiments of the present invention, user decides whether to authorize by the authorization interface of subscriber terminal equipment, for example, user is awarding Interface input identifying code and ID card No. are weighed, use of the authorization data user to users personal data is used after user's authorization Family terminal device feeds back license confirmation information from trend data service platform.
Referring to Figure 13, subscriber terminal equipment receives data from data service platform and uses authorization requests information, and according to number According to using authorization requests information to decide whether to allow data that method, apparatus is used whether to be able to use desensitization user data, user can be with The users personal data for effectively supervising oneself prevents individual subscriber privacy leakage, the legitimate rights and interests of effective protection user.
Figure 14 is a kind of subscriber terminal equipment that user information data safety uses that the specific embodiment of the invention provides Structural schematic diagram, equipment as shown in figure 14 can be applied in method shown in Figure 13, and subscriber terminal equipment takes from data Platform reception data of being engaged in use authorization requests information, and decide whether that authorization data makes using authorization requests information according to data With.
In the specific embodiment shown in the drawings, the subscriber terminal equipment that user information data safety uses includes receiving Unit 41 and transmission unit 42.Wherein, receiving unit 41, which is used to receive data from data service platform, uses authorization requests information; Transmission unit 42 is used to feed back license confirmation information to the data service platform using authorization requests information according to the data, So that the data service platform uses method, apparatus transmission desensitization user data to data according to the license confirmation information.
Referring to Figure 14, subscriber terminal equipment receives data from data service platform and uses authorization requests information, and according to number According to using authorization requests information to decide whether to allow data that method, apparatus is used whether to be able to use desensitization user data, user can be with The users personal data for effectively supervising oneself prevents individual subscriber privacy leakage, the legitimate rights and interests of effective protection user.
Figure 15 is that a kind of composition for system that user information data safety uses that the specific embodiment of the invention provides shows It is intended to, as shown in figure 15, the system that user information data safety uses includes: that multiple data use method, apparatus 100, data service Platform 200, multiple data providing equipment 300 and multiple subscriber terminal equipments 400.Wherein, the data use method, apparatus 100, the data providing equipment 300 and the subscriber terminal equipment 400 are connect with the data service platform 200.Institute Data are stated to be used to illustrate that message composition business is calculated according to the data that the data providing equipment 300 provides using method, apparatus 100 Method, and use the desensitization user data on the data service platform 200;The data service platform 200 is for described in utilization Users personal data is generated the desensitization user data by business algorithm, and will after the subscriber terminal equipment 400 authorization The desensitization user data sends the data to and uses method, apparatus 100;The data providing equipment 300 is used for the number The users personal data is provided according to service platform 200, and authenticates the data and is calculated using the business that method, apparatus 100 is write Method;The subscriber terminal equipment 400 is for authorizing the data to make using method, apparatus 100 to the legal of the users personal data With.
The specific embodiment of the invention also provides a kind of computer storage medium comprising computer executed instructions, the meter Calculation machine executes instruction when handling by data processing equipment, the data processing equipment execute Fig. 1, Fig. 2, Fig. 5~Fig. 7, Figure 10, The method that user information data safety in Figure 11 or Figure 13 uses.
When Figure 16 is a kind of work for system that user information data safety uses that the specific embodiment of the invention provides Sequence figure, as shown in figure 16, data providing equipment 300 illustrate that information is sent to for data are sent by data service platform 200 Data use method, apparatus 100;Data illustrate message composition business algorithm according to data using method, apparatus 100, and are taken by data Business platform 200 transmits business algorithm to data providing equipment 300 and subscriber terminal equipment 400;Data providing equipment 300 is recognized Card business algorithm, and authenticate-acknowledge message is fed back to data service platform 200, data service platform 200 is set to data user Authenticate-acknowledge message is transmitted for 100 and subscriber terminal equipment 400;Data are sent using method, apparatus 100 to data service platform 200 Data use solicited message;Data service platform 200 sends data to subscriber terminal equipment 400 and uses authorization requests information, and Receive the license confirmation message that subscriber terminal equipment 400 is fed back;Users personal data is generated desensitization and used by data service platform 200 It is sent to data after user data and uses method, apparatus 100.
The specific embodiment of the invention provides a kind of method that user information data safety uses, equipment and system, storage is situated between Matter, data user oneself define the business processing algorithm of users personal data, and data providing authenticates the business processing algorithm; If data user needs, in the case where obtaining user authorization, to use the industry by certification using users personal data Business Processing Algorithm handles the users personal data (under the premise of not influencing users personal data normal use, to individual subscriber Data carry out desensitization process), by treated, users personal data is sent to data user, in protection individual subscriber privacy It (does not expose privacy of user or initial data) simultaneously, does not influence the normal use of users personal data;Using block chain technology, Guarantee that data exchange process and algorithm implementing result can be traced, can not be distorted, guarantees the authenticity and validity of process.
The above-mentioned embodiment of the present invention can be implemented in various hardware, Software Coding or both combination.For example, this hair Bright embodiment can also be the execution above method in data signal processor (Digital Signal Processor, DSP) Program code.The present invention can also refer to computer processor, digital signal processor, microprocessor or field-programmable gate array Arrange the multiple functions that (Field Programmable GateArray, FPGA) is executed.Above-mentioned processing can be configured according to the present invention Device executes particular task, and machine-readable software code or the firmware generation of the ad hoc approach that the present invention discloses are defined by executing Code is completed.Software code or firmware code can be developed as different program languages and different formats or form.Can also be Different target platform composing software codes.However, executing software code and the other types configuration generation of task according to the present invention Different code pattern, type and the language of code do not depart from spirit and scope of the invention.
The foregoing is merely the schematical specific embodiments of the present invention, before not departing from conceptions and principles of the invention It puts, the equivalent changes and modifications that any those skilled in the art is made should belong to the scope of protection of the invention.

Claims (19)

1. a kind of method that user information data safety uses, which is characterized in that this method comprises:
Data, which are sent, to data service platform uses solicited message;
The desensitization user data for using solicited message to generate according to the data is received from the data service platform, wherein institute It states data service platform and the desensitization user data is generated according to users personal data.
2. the method that user information data safety as described in claim 1 uses, which is characterized in that sent out to data service platform Before the step of sending data to use solicited message, this method further include:
Data, which are received, from the data service platform illustrates information;
Illustrate message composition business algorithm according to the data;And
The business algorithm is sent to data providing equipment by the data service platform to authenticate, it is logical to authenticate Later the users personal data is generated the desensitization user data using the business algorithm by the data service platform.
3. a kind of data that user information data safety uses use method, apparatus, which is characterized in that the data use method, apparatus packet It includes:
Transmission unit uses solicited message for sending data to data service platform;And
Receiving unit, for receiving the desensitization user for using solicited message to generate according to the data from the data service platform Data, wherein the data service platform generates the desensitization user data according to users personal data.
4. the data that user information data safety as claimed in claim 3 uses use method, apparatus, which is characterized in that described to connect It receives unit and is also used to receive data from the data service platform and illustrate information, which uses method, apparatus further include:
Arranging unit, for illustrating message composition business algorithm according to the data,
The transmission unit is also used to send the business algorithm to data providing equipment by the data service platform It is authenticated, is generated the users personal data using the business algorithm by the rear data service platform to authenticate The desensitization user data.
5. a kind of method that user information data safety uses, which is characterized in that this method comprises:
Data, which are received, using method, apparatus from data uses solicited message;And
Users personal data is processed into desensitization user data using solicited message according to the data.
6. the method that user information data safety as claimed in claim 5 uses, which is characterized in that use method, apparatus from data Before receiving the step of data use solicited message, this method further include:
Data, which are sent, using method, apparatus to the data illustrates information;And
The business algorithm that the data illustrate message composition using method, apparatus according to the data is received, to utilize the business The users personal data is generated the desensitization user data by algorithm.
7. the method that user information data safety as claimed in claim 5 uses, which is characterized in that used according to the data After the step of users personal data is processed into desensitization user data by solicited message, this method further include:
Data, which are sent, to subscriber terminal equipment uses authorization requests information;
Receive what the subscriber terminal equipment was fed back according to the data using authorization requests information from the subscriber terminal equipment License confirmation information;And
The desensitization user data is transmitted using method, apparatus to the data according to the license confirmation information.
8. the method that user information data safety as claimed in claim 5 uses, which is characterized in that used according to the data Before the step of users personal data is processed into desensitization user data by solicited message, this method further include:
Data, which are sent, to subscriber terminal equipment uses authorization requests information;And
Receive what the subscriber terminal equipment was fed back according to the data using authorization requests information from the subscriber terminal equipment License confirmation information.
9. a kind of data service platform that user information data safety uses, which is characterized in that the data service platform includes:
Receiving unit uses solicited message for receiving data using method, apparatus from data;And
Processing unit, for users personal data to be processed into desensitization user data using solicited message according to the data.
10. the data service platform that user information data safety as claimed in claim 9 uses, which is characterized in that the data Service platform further include:
Transmission unit illustrates information for sending data using method, apparatus to the data,
The receiving unit is also used to receive the data and illustrates that the business of message composition is calculated according to the data using method, apparatus Method, so that the users personal data is generated the desensitization user data using the business algorithm.
11. the data service platform that user information data safety as claimed in claim 9 uses, which is characterized in that the data Service platform further include:
Transmission unit uses authorization requests information for sending data to subscriber terminal equipment,
The receiving unit is also used to receive the subscriber terminal equipment from the subscriber terminal equipment and be used according to the data The license confirmation information of authorization requests information feedback;
The transmission unit is also used to transmit the desensitization using method, apparatus to the data according to the license confirmation information and use User data.
12. a kind of method that user information data safety uses, which is characterized in that this method comprises:
Data, which are sent, to data service platform illustrates information;
Illustrate the business algorithm of message composition according to the data using method, apparatus from data service platform reception data;With And
The business algorithm is authenticated, utilizes the business algorithm by institute by the rear data service platform to authenticate It states users personal data and generates desensitization user data.
13. the method that user information data safety as claimed in claim 12 uses, which is characterized in that this method further include:
The desensitization user data is received from the data service platform after subscriber terminal equipment authorization.
14. a kind of data providing equipment that user information data safety uses, which is characterized in that the data providing equipment packet It includes:
Transmission unit illustrates information for sending data to data service platform;
Receiving unit illustrates message composition according to the data using method, apparatus for receiving data from the data service platform Business algorithm;And
Authentication unit utilizes institute by the rear data service platform to authenticate for authenticating to the business algorithm It states business algorithm and the users personal data is generated into desensitization user data.
15. the data providing equipment that user information data safety as claimed in claim 14 uses, which is characterized in that described Receiving unit is also used to after subscriber terminal equipment authorization receive the desensitization user data from the data service platform.
16. a kind of method that user information data safety uses, which is characterized in that this method comprises:
Data, which are received, from data service platform uses authorization requests information;And
License confirmation information is fed back to the data service platform using authorization requests information according to the data, so as to the number Method, apparatus transmission desensitization user data is used to data according to the license confirmation information according to service platform.
17. a kind of subscriber terminal equipment that user information data safety uses, which is characterized in that the subscriber terminal equipment includes:
Receiving unit uses authorization requests information for receiving data from data service platform;And
Transmission unit, for being believed using authorization requests information to data service platform feedback license confirmation according to the data Breath, so that the data service platform uses method, apparatus transmission desensitization user data to data according to the license confirmation information.
18. a kind of system that user information data safety uses, which is characterized in that the system includes: multiple claims 3 or 4 The data use method, apparatus, any data service platform of claim 9~11, multiple claims 14 or 15 institute Subscriber terminal equipment described in the data providing equipment and multiple claims 17 stated, wherein the data user sets Standby, the described data providing equipment and the subscriber terminal equipment are connect with the data service platform,
The data are used to illustrate that message composition business is calculated according to the data that the data providing equipment provides using method, apparatus Method, and use the desensitization user data on the data service platform;
The data service platform is used to that users personal data to be generated the desensitization user data using the business algorithm, and The desensitization user data is sent to the data after the subscriber terminal equipment authorization uses method, apparatus;
The data providing equipment is used to provide the users personal data to the data service platform, and authenticates the number According to the business algorithm for using method, apparatus to write;
The subscriber terminal equipment is for authorizing the data to use legal use of the method, apparatus to the users personal data.
19. a kind of computer storage medium comprising computer executed instructions, which is characterized in that the computer executed instructions warp When crossing data processing equipment processing, the data processing equipment perform claim requirement 1~2,5~8,12~13,16 is any described Method.
CN201710983616.9A 2017-10-20 2017-10-20 Method, device and system for safe use of user information data and storage medium Active CN109697368B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710983616.9A CN109697368B (en) 2017-10-20 2017-10-20 Method, device and system for safe use of user information data and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710983616.9A CN109697368B (en) 2017-10-20 2017-10-20 Method, device and system for safe use of user information data and storage medium

Publications (2)

Publication Number Publication Date
CN109697368A true CN109697368A (en) 2019-04-30
CN109697368B CN109697368B (en) 2021-02-02

Family

ID=66225323

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710983616.9A Active CN109697368B (en) 2017-10-20 2017-10-20 Method, device and system for safe use of user information data and storage medium

Country Status (1)

Country Link
CN (1) CN109697368B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110290125A (en) * 2019-06-17 2019-09-27 西安纸贵互联网科技有限公司 Data security system and data safety processing method based on block chain
CN113206758A (en) * 2021-04-27 2021-08-03 北京极智数仓科技有限公司 Cross-cloud-platform terminal data service method and system
CN113472757A (en) * 2021-06-18 2021-10-01 上汽通用五菱汽车股份有限公司 Vehicle data processing method, processing platform and readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150039901A1 (en) * 2013-07-30 2015-02-05 International Business Machines Corporation Field level database encryption using a transient key
CN105515963A (en) * 2015-12-03 2016-04-20 中国联合网络通信集团有限公司 Data gateway device and big data system
CN106530002A (en) * 2016-10-28 2017-03-22 国信优易数据有限公司 Personal information processing system and method thereof
CN106599713A (en) * 2016-11-11 2017-04-26 中国电子科技网络信息安全有限公司 Database masking system and method based on big data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150039901A1 (en) * 2013-07-30 2015-02-05 International Business Machines Corporation Field level database encryption using a transient key
CN105515963A (en) * 2015-12-03 2016-04-20 中国联合网络通信集团有限公司 Data gateway device and big data system
CN106530002A (en) * 2016-10-28 2017-03-22 国信优易数据有限公司 Personal information processing system and method thereof
CN106599713A (en) * 2016-11-11 2017-04-26 中国电子科技网络信息安全有限公司 Database masking system and method based on big data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
明朝万达: "明朝万达:区块链技术助力大数据安全共享与交易", 《搜狐》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110290125A (en) * 2019-06-17 2019-09-27 西安纸贵互联网科技有限公司 Data security system and data safety processing method based on block chain
CN110290125B (en) * 2019-06-17 2021-12-28 西安纸贵互联网科技有限公司 Data security system based on block chain and data security processing method
CN113206758A (en) * 2021-04-27 2021-08-03 北京极智数仓科技有限公司 Cross-cloud-platform terminal data service method and system
CN113472757A (en) * 2021-06-18 2021-10-01 上汽通用五菱汽车股份有限公司 Vehicle data processing method, processing platform and readable storage medium
CN113472757B (en) * 2021-06-18 2022-06-24 上汽通用五菱汽车股份有限公司 Vehicle data processing method, processing platform and readable storage medium

Also Published As

Publication number Publication date
CN109697368B (en) 2021-02-02

Similar Documents

Publication Publication Date Title
Winn Open Systems, Free Markets, and Regulation of Internet Commerce
CN111316278A (en) Secure identity and archive management system
US20020023054A1 (en) Method and system for protecting credit card transactions
AU2023223007A1 (en) Secure online access control to prevent identification information misuse
JP2002504731A (en) Computer-based method and transaction support system
CN103353973B (en) Banking transaction authentication method and system based on audio authentication
CN109858911A (en) Qualification verification method, device, system, equipment and readable storage medium storing program for executing
CN111460525A (en) Data processing method and device based on block chain and storage medium
CN109933987A (en) For the key generation method of block chain network, endorsement method, storage medium, calculate equipment
CN109741800A (en) The method for security protection of medical data intranet and extranet interaction based on block chain technology
CN109697368A (en) Method, equipment and system that user information data safety uses, storage medium
Fasli On agent technology for e-commerce: trust, security and legal issues
Azmi et al. INTERNATIONAL NORMS IN REGULATING ECOMMERCE: THE ELECTRONIC COMMERCE CHAPTER OF THE COMPREHENSIVE TRANS-PACIFIC PARTNERSHIP AGREEMENT.
Allen et al. Design choices for central bank digital currency
Weiss et al. Auditing IT infrastructures for compliance
Zhou et al. Leveraging zero knowledge proofs for blockchain-based identity sharing: A survey of advancements, challenges and opportunities
CN112433985A (en) Controlling the composition of information submitted to a computing system
KR101360843B1 (en) Next Generation Financial System
CN113783690A (en) Tender inviting method and device based on authentication
Arnold et al. Zero-knowledge proofs do not solve the privacy-trust problem of attribute-based credentials: What if alice is evil?
Lu et al. DIFCS: a secure cloud data sharing approach based on decentralized information flow control
CN106534047A (en) Information transmitting method and apparatus based on Trust application
Camp Identity management's misaligned incentives
Kumbhare et al. Blockchain's Data Integrity and Reliability
CN111062833A (en) Signature authentication method of contract data and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20210129

Address after: 102488 511, 4th floor, building 16, courtyard 1, Tianxing street, Fangshan District, Beijing

Patentee after: Beijing Gongshi Technology Co.,Ltd.

Address before: 100192 room 201c, A-1 / F, Dongsheng Science Park, 66 xixiaokou, Haidian District, Beijing

Patentee before: BEIJING BELINK TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right