CN110278204A - Privacy of user date storage method and device in a kind of social application - Google Patents
Privacy of user date storage method and device in a kind of social application Download PDFInfo
- Publication number
- CN110278204A CN110278204A CN201910527422.7A CN201910527422A CN110278204A CN 110278204 A CN110278204 A CN 110278204A CN 201910527422 A CN201910527422 A CN 201910527422A CN 110278204 A CN110278204 A CN 110278204A
- Authority
- CN
- China
- Prior art keywords
- user
- privacy
- data
- social
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/52—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Information Transfer Between Computers (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses the privacy of user date storage method and device in a kind of social application, method includes: when detecting user using social application, to obtain the social data generated when using social application;The privacy of user data in social data are obtained, the client of the good friend into user client and the social application of user will be stored after the progress Hash processing of privacy of user data;Non- private data in the corresponding cryptographic Hash of acquisition privacy of user data and social data is uploaded to server and is stored.The embodiment of the present invention by using " distributed storage " by the personal information storage of user in associated terminal device, it is safer compared with centralised storage mode, do not allow easy to be lost, user information is to be stored in terminal after encrypting by Encryption Algorithm, even if leaking data is stolen without information is worried;Server does not store user data in plain text, privacy problem is also just not present, while realizing zero privacy of server, moreover it is possible to ensure that the business function of application can improve privacy of user safety with normal operation.
Description
Technical field
The present invention relates to the privacy of user data storage sides in technical field of data storage more particularly to a kind of social application
Method and device.
Background technique
Common with social application, user can generate huge data volume when using social application.In social networks
It often include the private data of some users, if do not protected private data, in network in the data of middle generation
It will cause the leakage of private data in propagation.
Current social application is to store the private data of user in the server, these data is easy to use to complete phase
The business or function answered protect the private data of user by reinforcing the security level of server.If but in the prior art
Leaking data occurs for server, and the private data of user is made troubles also with leakage for user.
Therefore, the existing technology needs to be improved and developed.
Summary of the invention
In view of above-mentioned deficiencies of the prior art, the purpose of the present invention is to provide the privacy of user numbers in a kind of social application
According to storage method and device, it is intended to which the private data for solving to generate in social application in the prior art is stored in server, works as clothes
Device be engaged in when leaking data occurs, the problem of private data of user is also revealed therewith, while realizing zero privacy of server, and also
It can ensure that the business function of application can be with normal operation.
Technical scheme is as follows:
A kind of privacy of user date storage method in social application, which comprises
When detecting user using social application, the social data generated when using social application is obtained;
The privacy of user data in social data are obtained, are stored after privacy of user data are carried out Hash processing to user visitor
The client of good friend in the social application of family end and user;
Obtain the non-private data in the corresponding cryptographic Hash of privacy of user data and social data be uploaded to server into
Row storage.
Optionally, social data when detecting user using social application, generated when obtaining using social application
Before, comprising:
The buddy list for binding social networks with user in social application is obtained in advance.
Optionally, the privacy of user data obtained in social data, after privacy of user data are carried out Hash processing
Store the client of the good friend into user client and the social application of user, comprising:
The privacy of user data in social data are obtained, privacy of user data are subjected to Hash processing and generate cryptographic Hash, are obtained
Private key and cryptographic Hash are issued the good friend's in user client and the social application of user by HTTPS by the private key for taking encryption
Client;
User client and the client of the good friend in the social application of user carry out privacy of user data according to private key
Ciphertext is generated after encryption, and ciphertext and cryptographic Hash are stored to local data base.
Optionally, the privacy of user data obtained in social data, after privacy of user data are carried out Hash processing
Store the client of the good friend into user client and the social application of user, comprising:
The privacy of user data in social data are obtained, judge that privacy of user data are lteral data or picture data;
If privacy of user data are lteral datas, after privacy of user data are carried out Hash processing, by privacy of user number
The client of all good friends into user client and the social application of user is stored according to corresponding ciphertext and cryptographic Hash;
If privacy of user data are picture datas, after privacy of user data are carried out Hash processing, by privacy of user number
The visitor that meets the good friend of predetermined condition is stored according to corresponding ciphertext and cryptographic Hash into user client and the social application of user
Family end.
Optionally, the predetermined condition is that line duration is more than scheduled duration or is more than predetermined with the frequency that contacts of user
Frequency threshold.
Optionally, the non-private data obtained in the corresponding cryptographic Hash of privacy of user data and social data uploads
After being stored to server, further includes:
The privacy of user data search instruction for detecting user client, then search privacy of user data pair in the server
The cryptographic Hash answered;
If being matched to the corresponding cryptographic Hash of privacy of user data in the server, acquisition is stored with notice and is stored with Hash
The privacy of user data of request are transmitted to the user client for initiating search instruction by the client of value.
Optionally, the privacy of user data obtained in social data, after privacy of user data are carried out Hash processing
After the client for storing the good friend into user client and the social application of user, further includes:
When detecting that privacy of user data update, in the social application of current online user client and user
It is synchronous that the client of good friend carries out data.
Further embodiment of this invention additionally provides the privacy of user data storage device in a kind of social application, described device
Including at least one processor;And
The memory being connect at least one described processor communication;Wherein,
The memory is stored with the instruction that can be executed by least one described processor, and described instruction is by described at least one
A processor executes, so that at least one described processor is able to carry out the storage of the privacy of user data in above-mentioned social application
Method.
Another embodiment of the present invention additionally provides a kind of non-volatile computer readable storage medium storing program for executing, described non-volatile
Computer-readable recording medium storage has computer executable instructions, and the computer executable instructions are by one or more processors
When execution, one or more of processors may make to execute the privacy of user date storage method in above-mentioned social application.
Another embodiment of the invention provides a kind of computer program product, and the computer program product includes depositing
The computer program on non-volatile computer readable storage medium storing program for executing is stored up, the computer program includes program instruction, works as institute
When stating program instruction and being executed by processor, the processor is made to execute the privacy of user data storage side in above-mentioned social application
Method.
The utility model has the advantages that being compared the invention discloses privacy of user date storage method and device in a kind of social application
In the prior art, the embodiment of the present invention by using " distributed storage " by the personal information storage of user in associated terminal
It is safer compared with centralised storage mode in equipment, it is not easy to lose, user information is stored in after being encrypted by Encryption Algorithm
Terminal, even if leaking data is stolen without information is worried;Server does not store user data, and also just there is no privacy to ask
Topic, and while realizing zero privacy of server, moreover it is possible to ensure that the business function of application can improve user with normal operation
Personal secrets when using social application.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
Fig. 1 is the flow chart of the privacy of user date storage method preferred embodiment in a kind of social application of the present invention;
Fig. 2 is that the hardware configuration of the privacy of user data storage device preferred embodiment in a kind of social application of the present invention shows
It is intended to.
Specific embodiment
To make the purpose of the present invention, technical solution and effect clearer, clear and definite, below to the present invention further specifically
It is bright.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.Below
The embodiment of the present invention is introduced in conjunction with attached drawing.
Referring to Fig. 1, Fig. 1 is the privacy of user date storage method preferred embodiment in a kind of social application of the present invention
Flow chart.As shown in Figure 1, itself comprising steps of
Step S100, when detecting user using social application, the social data generated when using social application is obtained;
Step S200, the privacy of user data in social data are obtained, are deposited after privacy of user data are carried out Hash processing
Store up the client of the good friend into user client and the social application of user;
Step S300, the non-private data obtained in the corresponding cryptographic Hash of privacy of user data and social data is uploaded to
Server is stored.
When it is implemented, the privacy of user data in the embodiment of the present invention include but is not limited to user's Real Name, phone
The data of the personal information class such as number, E-mail address, work, address.
For user when being chatted using social application, the mass data that can be generated when the later period being facilitated to inquire, detects use
When family uses social application, privacy of user data are obtained, by privacy of user data by way of " distributed storage ", by adding
Close storage such as in social application, stores data into the client of its all good friend into terminal device associated with the user
Other logging devices of end and user.
In the client by private data of user such as Real Name, telephone number, E-mail address, work, address etc.
The data of people's info class carry out Hash (Hash) processing, the cryptographic Hash of generation are uploaded to server, and social application is used
When the non-private data that generates be uploaded to server.Since hash algorithm is irreversible, the corresponding cryptographic Hash of the private data of user
It can not be reduced into server-side in plain text, so being equivalent to the private data that server does not have user.By using " distributed
Storage " by the personal information storage of user in associated terminal device, it is safer compared with centralised storage mode, it is not easy to
It loses.User information is to be stored in terminal after encrypting by Encryption Algorithm, even if leaking data is stolen without information is worried.
Server does not store user data, and privacy problem is also just not present.
Client is just sent to service after user data necessary to supporting business (such as search, matching etc.) is carried out Hash
End storage, client itself also store a for being associated with prime information.Ensure that server-side will not reveal user's with this
Private data is completed at the same time business function, while realizing zero privacy of server, moreover it is possible to ensure that the business function of application can be with
Normal operation.
In further carrying out example, when detecting user using social application, generated when obtaining using social application
Before social data, comprising:
The buddy list for binding social networks with user in social application is obtained in advance.
When it is implemented, user when using social application, obtains in social application in advance, social networks are bound with user
Buddy list.If there is other side in the buddy list of user, but the buddy list of other side does not have active user, then explanation should
Good friend does not bind social networks with user.
Further, the privacy of user data in social data are obtained, are deposited after privacy of user data are carried out Hash processing
Store up the client of the good friend into user client and the social application of user, comprising:
The privacy of user data in social data are obtained, privacy of user data are subjected to Hash processing and generate cryptographic Hash, are obtained
Private key and cryptographic Hash are issued the good friend's in user client and the social application of user by HTTPS by the private key for taking encryption
Client;
User client and the client of the good friend in the social application of user carry out privacy of user data according to private key
Ciphertext is generated after encryption, and ciphertext and cryptographic Hash are stored to local data base.
When it is implemented, client cipher mode: by HTTPS by Private key distribution to terminal, then terminal passes through private key
Data are subjected to encryption and are stored to local data base.Even if someone takes the data of the local data base of terminal, due to not corresponding
Public key go to decrypt, data are exactly safe.Wherein ciphertext refers to privacy of user data original text is encrypted after obtain it is close
Text.
Further, the privacy of user data in social data are obtained, are deposited after privacy of user data are carried out Hash processing
Store up the client of the good friend into user client and the social application of user, comprising:
The privacy of user data in social data are obtained, judge that privacy of user data are lteral data or picture data;
If privacy of user data are lteral datas, after privacy of user data are carried out Hash processing, by privacy of user number
The client of all good friends into user client and the social application of user is stored according to corresponding ciphertext and cryptographic Hash;
If privacy of user data are picture datas, after privacy of user data are carried out Hash processing, by privacy of user number
The visitor that meets the good friend of predetermined condition is stored according to corresponding ciphertext and cryptographic Hash into user client and the social application of user
Family end.
When it is implemented, predetermined condition is that line duration is more than scheduled duration or is more than predetermined with the frequency that contacts of user
Frequency threshold.Preferably scheduled duration is settable is set to 5 hours, and preset frequency threshold value may be configured as 1 times/day.Or according to need
It is configured.
The private data of user is defined as the data of personal information class, such as name, phone, work, address and identity
Certificate class, the data of bank card class.It accounts for device memory to the information of text class, can be neglected after being compressed, and
The picture data of certificate class, in the client that all good friends can't be stored, but select 50-100 it is often online or
Connection is than more frequently good friend, citing, it is assumed that (certificate quantity itself just compares to be had the photo of 1 user's 20 certificate class of storage
Limit), be compressed to 1,000,000/(being compressed to the size for not influencing to check), then 50-100 good friend user will occupy 1G to 2G it
Between device memory space, this numerical value is still easy to connect for mainstream cell phone apparatus (fuselage memory 64G) at present on the market
It receives.
Further, the non-private data obtained in the corresponding cryptographic Hash of privacy of user data and social data is uploaded to
After server is stored, further includes:
The privacy of user data search instruction for detecting user client, then search privacy of user data pair in the server
The cryptographic Hash answered;
If being matched to the corresponding cryptographic Hash of privacy of user data in the server, acquisition is stored with notice and is stored with Hash
The privacy of user data of request are transmitted to the user client for initiating search instruction by the client of value.
When it is implemented, client by the private data of user as Real Name, telephone number, E-mail address, work,
The data of the personal information class such as location generate corresponding cryptographic Hash after carrying out Hash (Hash) processing, and client only uploads cryptographic Hash
It is stored into server.
Further, in certain business functions for needing privacy of user data, such as human connection search aspect, search out duty
When position is the user of " XXX ", user inputs search content in client, and server-side will search for the cryptographic Hash of content in the database
Search is compared, after obtaining search result (cryptographic Hash to match), those is notified to have search result ciphertext data
Its data is transferred to the client for initiating the user of search by client, and user can obtain bright after the decryption of client
The search result of text.
Further, the privacy of user data in social data are obtained, are deposited after privacy of user data are carried out Hash processing
After the client for storing up the good friend into user client and the social application of user, comprising:
When detecting that privacy of user data update, in the social application of current online user client and user
It is synchronous that the client of good friend carries out data.
When it is implemented, the private data of user be stored in oneself client device and all good friends client
In, when the private data of user updates, will all be carried out with the client of other current online equipment and good friend
Data are synchronous, and when the data in some equipment are not latest datas, also will contain setting online for latest data with other
Standby carry out data is synchronous.
Implemented by above method it is found that the embodiment of the invention provides the privacy of user data storages in a kind of social application
The storage point of method, userspersonal information is in the equipment of oneself and the equipment of good friend.Usually normal use, Ke Yizhi
Receiving asks in oneself equipment storage to data, if installing again after unloading, then restoring data can only be by logging in oneself its
His equipment, or the equipment on-line for having good friend is waited, allow other equipment that data are synchronized to new equipment.If all good friends do not exist
Line, user is online in addition to waiting good friend, good friend can also be allowed to log in by allowing software application to send message informing to certain good friends
Using;Or the acquaintance good friend in oneself connection reality is online;These restore data supplementary means in social application not
Hardly possible is realized.
Another embodiment of the present invention provides the privacy of user data storage devices in a kind of social application, as shown in Fig. 2, dress
Setting 10 includes:
One or more processors 110 and memory 120 are introduced in Fig. 2 by taking a processor 110 as an example, are located
Reason device 110 can be connected with memory 120 by bus or other modes, in Fig. 2 for being connected by bus.
Processor 110 is used for the various control logics of finishing device 10, can be general processor, Digital Signal Processing
Device (DSP), specific integrated circuit (ASIC), field programmable gate array (FPGA), single-chip microcontroller, ARM (Acorn RISC
) or other programmable logic device, discrete gate or transistor logic, discrete hardware component or these components Machine
Any combination.In addition, processor 110 can also be any conventional processors, microprocessor or state machine.Processor 110 can also
To be implemented as calculating the combination of equipment, for example, the combination of DSP and microprocessor, multi-microprocessor, one or more micro- places
Manage device combination DSP core or any other this configuration.
Memory 120 is used as a kind of non-volatile computer readable storage medium storing program for executing, can be used for storing non-volatile software journey
Sequence, non-volatile computer executable program and module, such as the privacy of user number in the social application in the embodiment of the present invention
According to the corresponding program instruction of storage method.The non-volatile software journey that processor 110 is stored in memory 120 by operation
Sequence, instruction and unit, thereby executing the various function application and data processing of device 10, i.e. realization above method embodiment
In social application in privacy of user date storage method.
Memory 120 may include storing program area and storage data area, wherein storing program area can store operation dress
It sets, application program required at least one function;Storage data area, which can be stored, uses created data etc. according to device 10.
It can also include nonvolatile memory in addition, memory 120 may include high-speed random access memory, for example, at least one
A disk memory, flush memory device or other non-volatile solid state memory parts.In some embodiments, memory 120 can
Choosing includes the memory remotely located relative to processor 110, these remote memories can pass through network connection to device 10.
The example of above-mentioned network includes but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
One or more unit is stored in memory 120, when being executed by one or more processor 110, is held
The privacy of user date storage method in social application in the above-mentioned any means embodiment of row, for example, executing described above
Method and step S100 to step S300 in Fig. 1.
The embodiment of the invention provides a kind of non-volatile computer readable storage medium storing program for executing, computer readable storage medium is deposited
Computer executable instructions are contained, which is executed by one or more processors, for example, executing above retouch
Method and step S100 to step S300 in the Fig. 1 stated.
As an example, non-volatile memory medium can include that read-only memory (ROM), programming ROM (PROM), electricity can
Programming ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory can include as external high speed
The random access memory (RAM) of buffer memory.By explanation not limit, RAM can with such as synchronous random access memory (SRAM),
Dynamic ram, (DRAM), synchronous dram (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM
(ESDRAM), many forms of Synchlink DRAM (SLDRAM) and directly Rambus (Lan Basi) RAM (DRRAM) etc
It obtains.The disclosed memory assembly or memory of operating environment described herein be intended to include these and/or it is any
Other are suitble to one or more of the memory of type.
Another embodiment of the invention provides a kind of computer program product, and computer program product includes being stored in
Computer program on non-volatile computer readable storage medium storing program for executing, computer program include program instruction, when program instruction quilt
When processor executes, the processor is made to execute the privacy of user data storage side in the social application of above method embodiment
Method.For example, executing the method and step S100 to step S300 in Fig. 1 described above.
Embodiments described above is only schematical, wherein as illustrated by the separation member unit can be or
It may not be and be physically separated, component shown as a unit may or may not be physical unit, it can
It is in one place, or may be distributed over multiple network units.Can select according to actual needs part therein or
Person's whole module achieves the purpose of the solution of this embodiment.
By the description of above embodiment, those skilled in the art can be understood that each embodiment can be by
Software adds the mode of general hardware platform to realize, naturally it is also possible to pass through hardware realization.Based on this understanding, above-mentioned technology
Scheme substantially in other words can be embodied in the form of software products the part that the relevant technologies contribute, the computer
Software product can reside in computer readable storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions to
So that a computer electronic equipment (can be personal computer, server or network electronic devices etc.) executes each reality
The method for applying certain parts of example or embodiment.
Among other things, such as " can ', " energy ", " possibility " or " can be with " etc conditional statement unless in addition specific
Ground is stated or is otherwise understood in context as used, is otherwise generally intended to convey particular implementation energy
Including (however other embodiments do not include) special characteristic, element and/or operation.Therefore, such conditional statement is generally
It is not intended to imply that feature, element and/or operation are all needed one or more embodiments or one anyway
Or multiple embodiments must include for determining these features, element in the case where being with or without student's input or prompt
And/or the logic whether operation is included or will be performed in any particular implementation.
The content described in the present description and drawings herein includes the user being capable of providing in social application
The example of private data storage method and device.Certainly, it can not be described for the purpose of the various features of the description disclosure
The combination that each of element and/or method are envisioned that, it can be appreciated that, many other combinations of disclosed feature
It is possible with displacement., it will thus be apparent that without departing from the scope or spirit of the present disclosure can be to this public affairs
It opens and makes various modifications.In addition, or in alternative solution, the considerations of other embodiments of the disclosure are to the specification and drawings
It and in the practice of the disclosure as presented herein may be obvious.It is intended that institute in the specification and drawings
The example of proposition is considered illustrative and not restrictive in all respects.Although using specific term herein,
But they are used and are not used in the purpose of limitation in general and descriptive sense.
Claims (10)
1. the privacy of user date storage method in a kind of social application, it is characterised in that, the described method includes:
When detecting user using social application, the social data generated when using social application is obtained;
The privacy of user data in social data are obtained, are stored after privacy of user data are carried out Hash processing to user client
And the client of the good friend in the social application of user;
Non- private data in the corresponding cryptographic Hash of acquisition privacy of user data and social data is uploaded to server and is deposited
Storage.
2. the privacy of user date storage method in social application according to claim 1, which is characterized in that the detection
When using social application to user, before the social data generated when obtaining using social application, comprising:
The buddy list for binding social networks with user in social application is obtained in advance.
3. the privacy of user date storage method in social application according to claim 1, which is characterized in that the acquisition
Privacy of user data in social data store after privacy of user data are carried out Hash processing to user client and user
The client of good friend in social application, comprising:
Privacy of user data are carried out Hash processing and generate cryptographic Hash, obtained and add by the privacy of user data in acquisition social data
Private key and cryptographic Hash are issued the client of the good friend in user client and the social application of user by HTTPS by close private key
End;
User client and the client of the good friend in the social application of user encrypt privacy of user data according to private key
After generate ciphertext, ciphertext and cryptographic Hash are stored to local data base.
4. the privacy of user date storage method in social application according to claim 1, which is characterized in that the acquisition society
Privacy of user data of the intersection number in will store the society to user client and user after the progress Hash processing of privacy of user data
Hand over the client of the good friend in application, comprising:
The privacy of user data in social data are obtained, judge that privacy of user data are lteral data or picture data;
If privacy of user data are lteral datas, after privacy of user data are carried out Hash processing, by privacy of user data pair
The ciphertext and cryptographic Hash answered store the client of all good friends into user client and the social application of user;
If privacy of user data are picture datas, after privacy of user data are carried out Hash processing, by privacy of user data pair
The ciphertext and cryptographic Hash answered store into user client and the social application of user the client for meeting the good friend of predetermined condition.
5. according to right want 4 described in privacy of user date storage method in social application, which is characterized in that the predetermined item
Part is that line duration is more than scheduled duration or contacts frequency more than preset frequency threshold value with user.
6. the privacy of user date storage method in social application according to claim 4, which is characterized in that the acquisition
Non- private data in the corresponding cryptographic Hash of privacy of user data and social data is uploaded to after server stored, and is also wrapped
It includes:
It detects the privacy of user data search instruction of user client, then it is corresponding to search privacy of user data in the server
Cryptographic Hash;
If being matched to the corresponding cryptographic Hash of privacy of user data in the server, acquisition is stored with notice and is stored with cryptographic Hash
The privacy of user data of request are transmitted to the user client for initiating search instruction by client.
7. the privacy of user date storage method in social application according to claim 1, which is characterized in that the acquisition
Privacy of user data in social data store after privacy of user data are carried out Hash processing to user client and user
After after the client of good friend in social application, comprising:
When detecting that privacy of user data update, to the good friend in the social application of current online user client and user
Client to carry out data synchronous.
8. the privacy of user data storage device in a kind of social application, which is characterized in that described device includes at least one
Manage device;And
The memory being connect at least one described processor communication;Wherein,
The memory is stored with the instruction that can be executed by least one described processor, and described instruction is by described at least one
It manages device to execute, so that at least one described processor is able to carry out the use in the described in any item social applications of claim 1-7
Family private data storage method.
9. a kind of non-volatile computer readable storage medium storing program for executing, which is characterized in that the non-volatile computer readable storage medium
Matter is stored with computer executable instructions, when which is executed by one or more processors, may make institute
State the privacy of user data storage side in the one or more processors perform claim requirement described in any item social applications of 1-7
Method.
10. a kind of computer program product, which is characterized in that the computer program product includes being stored in non-volatile calculating
Computer program on machine readable storage medium storing program for executing, the computer program include program instruction, when described program instruction is processed
When device executes, the processor perform claim is made to require the privacy of user data storage in the described in any item social applications of 1-7
Method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910527422.7A CN110278204B (en) | 2019-06-18 | 2019-06-18 | User privacy data storage method and device in social application |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910527422.7A CN110278204B (en) | 2019-06-18 | 2019-06-18 | User privacy data storage method and device in social application |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110278204A true CN110278204A (en) | 2019-09-24 |
CN110278204B CN110278204B (en) | 2022-05-17 |
Family
ID=67961093
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910527422.7A Active CN110278204B (en) | 2019-06-18 | 2019-06-18 | User privacy data storage method and device in social application |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110278204B (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102640128A (en) * | 2009-12-08 | 2012-08-15 | 夏普株式会社 | Network system, communication method, communication terminal, and communication server |
CN104683961A (en) * | 2013-11-29 | 2015-06-03 | 腾讯科技(深圳)有限公司 | Name card interaction method and device and terminal |
CN105429846A (en) * | 2014-09-18 | 2016-03-23 | 中兴通讯股份有限公司 | Instant chat tool chat record synchronization methods and terminal equipment |
CN105518644A (en) * | 2013-08-09 | 2016-04-20 | 杨绍峰 | Method for processing and displaying real-time social data on map |
US20160224157A1 (en) * | 2014-06-19 | 2016-08-04 | Boe Technology Group Co., Ltd. | Pixel circuit, driving method thereof and display device |
CN106096435A (en) * | 2016-05-31 | 2016-11-09 | 北京联合大学 | Help each other the smart mobile phone sensitive data protection system of mode and method based on good friend |
CN107733656A (en) * | 2017-10-23 | 2018-02-23 | 北京深思数盾科技股份有限公司 | A kind of cipher authentication method and device |
CN107846450A (en) * | 2017-09-29 | 2018-03-27 | 珂伯特机器人(天津)有限公司 | A kind of synchronous method of chat data |
CN107888375A (en) * | 2017-11-08 | 2018-04-06 | 深圳市携网科技有限公司 | A kind of electronic evidence safety system and method based on block chain technology |
CN109254872A (en) * | 2018-08-14 | 2019-01-22 | 贵州仰望星空科技有限公司 | A kind of security access system for education big data |
CN109768987A (en) * | 2019-02-26 | 2019-05-17 | 重庆邮电大学 | A kind of storage of data file security privacy and sharing method based on block chain |
-
2019
- 2019-06-18 CN CN201910527422.7A patent/CN110278204B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102640128A (en) * | 2009-12-08 | 2012-08-15 | 夏普株式会社 | Network system, communication method, communication terminal, and communication server |
CN105518644A (en) * | 2013-08-09 | 2016-04-20 | 杨绍峰 | Method for processing and displaying real-time social data on map |
CN104683961A (en) * | 2013-11-29 | 2015-06-03 | 腾讯科技(深圳)有限公司 | Name card interaction method and device and terminal |
US20160224157A1 (en) * | 2014-06-19 | 2016-08-04 | Boe Technology Group Co., Ltd. | Pixel circuit, driving method thereof and display device |
CN105429846A (en) * | 2014-09-18 | 2016-03-23 | 中兴通讯股份有限公司 | Instant chat tool chat record synchronization methods and terminal equipment |
CN106096435A (en) * | 2016-05-31 | 2016-11-09 | 北京联合大学 | Help each other the smart mobile phone sensitive data protection system of mode and method based on good friend |
CN107846450A (en) * | 2017-09-29 | 2018-03-27 | 珂伯特机器人(天津)有限公司 | A kind of synchronous method of chat data |
CN107733656A (en) * | 2017-10-23 | 2018-02-23 | 北京深思数盾科技股份有限公司 | A kind of cipher authentication method and device |
CN107888375A (en) * | 2017-11-08 | 2018-04-06 | 深圳市携网科技有限公司 | A kind of electronic evidence safety system and method based on block chain technology |
CN109254872A (en) * | 2018-08-14 | 2019-01-22 | 贵州仰望星空科技有限公司 | A kind of security access system for education big data |
CN109768987A (en) * | 2019-02-26 | 2019-05-17 | 重庆邮电大学 | A kind of storage of data file security privacy and sharing method based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN110278204B (en) | 2022-05-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI293529B (en) | User authentication by linking randomly-generated authentication secret with personalized secret and medium | |
US9767299B2 (en) | Secure cloud data sharing | |
JP4818639B2 (en) | Data backup system | |
JP4895378B2 (en) | Secret information delivery system and secret information delivery method | |
CN104239764B (en) | The management-control method and device of terminal device and its systemic-function | |
CN105432056B (en) | Safe mixed file shared system | |
CN109314635A (en) | Resource management based on block chain | |
US9866591B1 (en) | Enterprise messaging platform | |
CN105610845B (en) | A kind of data routing method based on cloud service, apparatus and system | |
CN106664202A (en) | Methods, systems and computer program product for providing encryption on a plurality of devices | |
CN104035891B (en) | Android mobile terminal data security protection system | |
US9372987B1 (en) | Apparatus and method for masking a real user controlling synthetic identities | |
CN106709280A (en) | Method, client and server for processing information | |
CN107845165A (en) | A kind of server cabinet door control method, device and terminal | |
CN108833265B (en) | Message processing method, device, server and storage medium | |
EP2894829A1 (en) | Method for secure transmission of a data object | |
WO2022142112A1 (en) | Blockchain-based mail processing method, and mail sending end, mail receiving end and device | |
CN108337210A (en) | Equipment configuration method and device, system | |
EP1815660A1 (en) | Provision of personal data in a data communcations network | |
CN110351304A (en) | A kind of one key switching between not homologous ray logs in implementation method and device | |
CN106664308A (en) | Device verification prior to registration | |
CN108280369A (en) | Cloud document offline access system, intelligent terminal and method | |
CN114500069A (en) | Method and system for storing and sharing electronic contract | |
US10489251B2 (en) | Network backup | |
CN104660568B (en) | A kind of guard method of address list information and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |