CN110278204A - Privacy of user date storage method and device in a kind of social application - Google Patents

Privacy of user date storage method and device in a kind of social application Download PDF

Info

Publication number
CN110278204A
CN110278204A CN201910527422.7A CN201910527422A CN110278204A CN 110278204 A CN110278204 A CN 110278204A CN 201910527422 A CN201910527422 A CN 201910527422A CN 110278204 A CN110278204 A CN 110278204A
Authority
CN
China
Prior art keywords
user
privacy
data
social
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910527422.7A
Other languages
Chinese (zh)
Other versions
CN110278204B (en
Inventor
于洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Reliability Network Technology Co Ltd
Original Assignee
Shenzhen Reliability Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Reliability Network Technology Co Ltd filed Critical Shenzhen Reliability Network Technology Co Ltd
Priority to CN201910527422.7A priority Critical patent/CN110278204B/en
Publication of CN110278204A publication Critical patent/CN110278204A/en
Application granted granted Critical
Publication of CN110278204B publication Critical patent/CN110278204B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Information Transfer Between Computers (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses the privacy of user date storage method and device in a kind of social application, method includes: when detecting user using social application, to obtain the social data generated when using social application;The privacy of user data in social data are obtained, the client of the good friend into user client and the social application of user will be stored after the progress Hash processing of privacy of user data;Non- private data in the corresponding cryptographic Hash of acquisition privacy of user data and social data is uploaded to server and is stored.The embodiment of the present invention by using " distributed storage " by the personal information storage of user in associated terminal device, it is safer compared with centralised storage mode, do not allow easy to be lost, user information is to be stored in terminal after encrypting by Encryption Algorithm, even if leaking data is stolen without information is worried;Server does not store user data in plain text, privacy problem is also just not present, while realizing zero privacy of server, moreover it is possible to ensure that the business function of application can improve privacy of user safety with normal operation.

Description

Privacy of user date storage method and device in a kind of social application
Technical field
The present invention relates to the privacy of user data storage sides in technical field of data storage more particularly to a kind of social application Method and device.
Background technique
Common with social application, user can generate huge data volume when using social application.In social networks It often include the private data of some users, if do not protected private data, in network in the data of middle generation It will cause the leakage of private data in propagation.
Current social application is to store the private data of user in the server, these data is easy to use to complete phase The business or function answered protect the private data of user by reinforcing the security level of server.If but in the prior art Leaking data occurs for server, and the private data of user is made troubles also with leakage for user.
Therefore, the existing technology needs to be improved and developed.
Summary of the invention
In view of above-mentioned deficiencies of the prior art, the purpose of the present invention is to provide the privacy of user numbers in a kind of social application According to storage method and device, it is intended to which the private data for solving to generate in social application in the prior art is stored in server, works as clothes Device be engaged in when leaking data occurs, the problem of private data of user is also revealed therewith, while realizing zero privacy of server, and also It can ensure that the business function of application can be with normal operation.
Technical scheme is as follows:
A kind of privacy of user date storage method in social application, which comprises
When detecting user using social application, the social data generated when using social application is obtained;
The privacy of user data in social data are obtained, are stored after privacy of user data are carried out Hash processing to user visitor The client of good friend in the social application of family end and user;
Obtain the non-private data in the corresponding cryptographic Hash of privacy of user data and social data be uploaded to server into Row storage.
Optionally, social data when detecting user using social application, generated when obtaining using social application Before, comprising:
The buddy list for binding social networks with user in social application is obtained in advance.
Optionally, the privacy of user data obtained in social data, after privacy of user data are carried out Hash processing Store the client of the good friend into user client and the social application of user, comprising:
The privacy of user data in social data are obtained, privacy of user data are subjected to Hash processing and generate cryptographic Hash, are obtained Private key and cryptographic Hash are issued the good friend's in user client and the social application of user by HTTPS by the private key for taking encryption Client;
User client and the client of the good friend in the social application of user carry out privacy of user data according to private key Ciphertext is generated after encryption, and ciphertext and cryptographic Hash are stored to local data base.
Optionally, the privacy of user data obtained in social data, after privacy of user data are carried out Hash processing Store the client of the good friend into user client and the social application of user, comprising:
The privacy of user data in social data are obtained, judge that privacy of user data are lteral data or picture data;
If privacy of user data are lteral datas, after privacy of user data are carried out Hash processing, by privacy of user number The client of all good friends into user client and the social application of user is stored according to corresponding ciphertext and cryptographic Hash;
If privacy of user data are picture datas, after privacy of user data are carried out Hash processing, by privacy of user number The visitor that meets the good friend of predetermined condition is stored according to corresponding ciphertext and cryptographic Hash into user client and the social application of user Family end.
Optionally, the predetermined condition is that line duration is more than scheduled duration or is more than predetermined with the frequency that contacts of user Frequency threshold.
Optionally, the non-private data obtained in the corresponding cryptographic Hash of privacy of user data and social data uploads After being stored to server, further includes:
The privacy of user data search instruction for detecting user client, then search privacy of user data pair in the server The cryptographic Hash answered;
If being matched to the corresponding cryptographic Hash of privacy of user data in the server, acquisition is stored with notice and is stored with Hash The privacy of user data of request are transmitted to the user client for initiating search instruction by the client of value.
Optionally, the privacy of user data obtained in social data, after privacy of user data are carried out Hash processing After the client for storing the good friend into user client and the social application of user, further includes:
When detecting that privacy of user data update, in the social application of current online user client and user It is synchronous that the client of good friend carries out data.
Further embodiment of this invention additionally provides the privacy of user data storage device in a kind of social application, described device Including at least one processor;And
The memory being connect at least one described processor communication;Wherein,
The memory is stored with the instruction that can be executed by least one described processor, and described instruction is by described at least one A processor executes, so that at least one described processor is able to carry out the storage of the privacy of user data in above-mentioned social application Method.
Another embodiment of the present invention additionally provides a kind of non-volatile computer readable storage medium storing program for executing, described non-volatile Computer-readable recording medium storage has computer executable instructions, and the computer executable instructions are by one or more processors When execution, one or more of processors may make to execute the privacy of user date storage method in above-mentioned social application.
Another embodiment of the invention provides a kind of computer program product, and the computer program product includes depositing The computer program on non-volatile computer readable storage medium storing program for executing is stored up, the computer program includes program instruction, works as institute When stating program instruction and being executed by processor, the processor is made to execute the privacy of user data storage side in above-mentioned social application Method.
The utility model has the advantages that being compared the invention discloses privacy of user date storage method and device in a kind of social application In the prior art, the embodiment of the present invention by using " distributed storage " by the personal information storage of user in associated terminal It is safer compared with centralised storage mode in equipment, it is not easy to lose, user information is stored in after being encrypted by Encryption Algorithm Terminal, even if leaking data is stolen without information is worried;Server does not store user data, and also just there is no privacy to ask Topic, and while realizing zero privacy of server, moreover it is possible to ensure that the business function of application can improve user with normal operation Personal secrets when using social application.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
Fig. 1 is the flow chart of the privacy of user date storage method preferred embodiment in a kind of social application of the present invention;
Fig. 2 is that the hardware configuration of the privacy of user data storage device preferred embodiment in a kind of social application of the present invention shows It is intended to.
Specific embodiment
To make the purpose of the present invention, technical solution and effect clearer, clear and definite, below to the present invention further specifically It is bright.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.Below The embodiment of the present invention is introduced in conjunction with attached drawing.
Referring to Fig. 1, Fig. 1 is the privacy of user date storage method preferred embodiment in a kind of social application of the present invention Flow chart.As shown in Figure 1, itself comprising steps of
Step S100, when detecting user using social application, the social data generated when using social application is obtained;
Step S200, the privacy of user data in social data are obtained, are deposited after privacy of user data are carried out Hash processing Store up the client of the good friend into user client and the social application of user;
Step S300, the non-private data obtained in the corresponding cryptographic Hash of privacy of user data and social data is uploaded to Server is stored.
When it is implemented, the privacy of user data in the embodiment of the present invention include but is not limited to user's Real Name, phone The data of the personal information class such as number, E-mail address, work, address.
For user when being chatted using social application, the mass data that can be generated when the later period being facilitated to inquire, detects use When family uses social application, privacy of user data are obtained, by privacy of user data by way of " distributed storage ", by adding Close storage such as in social application, stores data into the client of its all good friend into terminal device associated with the user Other logging devices of end and user.
In the client by private data of user such as Real Name, telephone number, E-mail address, work, address etc. The data of people's info class carry out Hash (Hash) processing, the cryptographic Hash of generation are uploaded to server, and social application is used When the non-private data that generates be uploaded to server.Since hash algorithm is irreversible, the corresponding cryptographic Hash of the private data of user It can not be reduced into server-side in plain text, so being equivalent to the private data that server does not have user.By using " distributed Storage " by the personal information storage of user in associated terminal device, it is safer compared with centralised storage mode, it is not easy to It loses.User information is to be stored in terminal after encrypting by Encryption Algorithm, even if leaking data is stolen without information is worried. Server does not store user data, and privacy problem is also just not present.
Client is just sent to service after user data necessary to supporting business (such as search, matching etc.) is carried out Hash End storage, client itself also store a for being associated with prime information.Ensure that server-side will not reveal user's with this Private data is completed at the same time business function, while realizing zero privacy of server, moreover it is possible to ensure that the business function of application can be with Normal operation.
In further carrying out example, when detecting user using social application, generated when obtaining using social application Before social data, comprising:
The buddy list for binding social networks with user in social application is obtained in advance.
When it is implemented, user when using social application, obtains in social application in advance, social networks are bound with user Buddy list.If there is other side in the buddy list of user, but the buddy list of other side does not have active user, then explanation should Good friend does not bind social networks with user.
Further, the privacy of user data in social data are obtained, are deposited after privacy of user data are carried out Hash processing Store up the client of the good friend into user client and the social application of user, comprising:
The privacy of user data in social data are obtained, privacy of user data are subjected to Hash processing and generate cryptographic Hash, are obtained Private key and cryptographic Hash are issued the good friend's in user client and the social application of user by HTTPS by the private key for taking encryption Client;
User client and the client of the good friend in the social application of user carry out privacy of user data according to private key Ciphertext is generated after encryption, and ciphertext and cryptographic Hash are stored to local data base.
When it is implemented, client cipher mode: by HTTPS by Private key distribution to terminal, then terminal passes through private key Data are subjected to encryption and are stored to local data base.Even if someone takes the data of the local data base of terminal, due to not corresponding Public key go to decrypt, data are exactly safe.Wherein ciphertext refers to privacy of user data original text is encrypted after obtain it is close Text.
Further, the privacy of user data in social data are obtained, are deposited after privacy of user data are carried out Hash processing Store up the client of the good friend into user client and the social application of user, comprising:
The privacy of user data in social data are obtained, judge that privacy of user data are lteral data or picture data;
If privacy of user data are lteral datas, after privacy of user data are carried out Hash processing, by privacy of user number The client of all good friends into user client and the social application of user is stored according to corresponding ciphertext and cryptographic Hash;
If privacy of user data are picture datas, after privacy of user data are carried out Hash processing, by privacy of user number The visitor that meets the good friend of predetermined condition is stored according to corresponding ciphertext and cryptographic Hash into user client and the social application of user Family end.
When it is implemented, predetermined condition is that line duration is more than scheduled duration or is more than predetermined with the frequency that contacts of user Frequency threshold.Preferably scheduled duration is settable is set to 5 hours, and preset frequency threshold value may be configured as 1 times/day.Or according to need It is configured.
The private data of user is defined as the data of personal information class, such as name, phone, work, address and identity Certificate class, the data of bank card class.It accounts for device memory to the information of text class, can be neglected after being compressed, and The picture data of certificate class, in the client that all good friends can't be stored, but select 50-100 it is often online or Connection is than more frequently good friend, citing, it is assumed that (certificate quantity itself just compares to be had the photo of 1 user's 20 certificate class of storage Limit), be compressed to 1,000,000/(being compressed to the size for not influencing to check), then 50-100 good friend user will occupy 1G to 2G it Between device memory space, this numerical value is still easy to connect for mainstream cell phone apparatus (fuselage memory 64G) at present on the market It receives.
Further, the non-private data obtained in the corresponding cryptographic Hash of privacy of user data and social data is uploaded to After server is stored, further includes:
The privacy of user data search instruction for detecting user client, then search privacy of user data pair in the server The cryptographic Hash answered;
If being matched to the corresponding cryptographic Hash of privacy of user data in the server, acquisition is stored with notice and is stored with Hash The privacy of user data of request are transmitted to the user client for initiating search instruction by the client of value.
When it is implemented, client by the private data of user as Real Name, telephone number, E-mail address, work, The data of the personal information class such as location generate corresponding cryptographic Hash after carrying out Hash (Hash) processing, and client only uploads cryptographic Hash It is stored into server.
Further, in certain business functions for needing privacy of user data, such as human connection search aspect, search out duty When position is the user of " XXX ", user inputs search content in client, and server-side will search for the cryptographic Hash of content in the database Search is compared, after obtaining search result (cryptographic Hash to match), those is notified to have search result ciphertext data Its data is transferred to the client for initiating the user of search by client, and user can obtain bright after the decryption of client The search result of text.
Further, the privacy of user data in social data are obtained, are deposited after privacy of user data are carried out Hash processing After the client for storing up the good friend into user client and the social application of user, comprising:
When detecting that privacy of user data update, in the social application of current online user client and user It is synchronous that the client of good friend carries out data.
When it is implemented, the private data of user be stored in oneself client device and all good friends client In, when the private data of user updates, will all be carried out with the client of other current online equipment and good friend Data are synchronous, and when the data in some equipment are not latest datas, also will contain setting online for latest data with other Standby carry out data is synchronous.
Implemented by above method it is found that the embodiment of the invention provides the privacy of user data storages in a kind of social application The storage point of method, userspersonal information is in the equipment of oneself and the equipment of good friend.Usually normal use, Ke Yizhi Receiving asks in oneself equipment storage to data, if installing again after unloading, then restoring data can only be by logging in oneself its His equipment, or the equipment on-line for having good friend is waited, allow other equipment that data are synchronized to new equipment.If all good friends do not exist Line, user is online in addition to waiting good friend, good friend can also be allowed to log in by allowing software application to send message informing to certain good friends Using;Or the acquaintance good friend in oneself connection reality is online;These restore data supplementary means in social application not Hardly possible is realized.
Another embodiment of the present invention provides the privacy of user data storage devices in a kind of social application, as shown in Fig. 2, dress Setting 10 includes:
One or more processors 110 and memory 120 are introduced in Fig. 2 by taking a processor 110 as an example, are located Reason device 110 can be connected with memory 120 by bus or other modes, in Fig. 2 for being connected by bus.
Processor 110 is used for the various control logics of finishing device 10, can be general processor, Digital Signal Processing Device (DSP), specific integrated circuit (ASIC), field programmable gate array (FPGA), single-chip microcontroller, ARM (Acorn RISC ) or other programmable logic device, discrete gate or transistor logic, discrete hardware component or these components Machine Any combination.In addition, processor 110 can also be any conventional processors, microprocessor or state machine.Processor 110 can also To be implemented as calculating the combination of equipment, for example, the combination of DSP and microprocessor, multi-microprocessor, one or more micro- places Manage device combination DSP core or any other this configuration.
Memory 120 is used as a kind of non-volatile computer readable storage medium storing program for executing, can be used for storing non-volatile software journey Sequence, non-volatile computer executable program and module, such as the privacy of user number in the social application in the embodiment of the present invention According to the corresponding program instruction of storage method.The non-volatile software journey that processor 110 is stored in memory 120 by operation Sequence, instruction and unit, thereby executing the various function application and data processing of device 10, i.e. realization above method embodiment In social application in privacy of user date storage method.
Memory 120 may include storing program area and storage data area, wherein storing program area can store operation dress It sets, application program required at least one function;Storage data area, which can be stored, uses created data etc. according to device 10. It can also include nonvolatile memory in addition, memory 120 may include high-speed random access memory, for example, at least one A disk memory, flush memory device or other non-volatile solid state memory parts.In some embodiments, memory 120 can Choosing includes the memory remotely located relative to processor 110, these remote memories can pass through network connection to device 10. The example of above-mentioned network includes but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
One or more unit is stored in memory 120, when being executed by one or more processor 110, is held The privacy of user date storage method in social application in the above-mentioned any means embodiment of row, for example, executing described above Method and step S100 to step S300 in Fig. 1.
The embodiment of the invention provides a kind of non-volatile computer readable storage medium storing program for executing, computer readable storage medium is deposited Computer executable instructions are contained, which is executed by one or more processors, for example, executing above retouch Method and step S100 to step S300 in the Fig. 1 stated.
As an example, non-volatile memory medium can include that read-only memory (ROM), programming ROM (PROM), electricity can Programming ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory can include as external high speed The random access memory (RAM) of buffer memory.By explanation not limit, RAM can with such as synchronous random access memory (SRAM), Dynamic ram, (DRAM), synchronous dram (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), many forms of Synchlink DRAM (SLDRAM) and directly Rambus (Lan Basi) RAM (DRRAM) etc It obtains.The disclosed memory assembly or memory of operating environment described herein be intended to include these and/or it is any Other are suitble to one or more of the memory of type.
Another embodiment of the invention provides a kind of computer program product, and computer program product includes being stored in Computer program on non-volatile computer readable storage medium storing program for executing, computer program include program instruction, when program instruction quilt When processor executes, the processor is made to execute the privacy of user data storage side in the social application of above method embodiment Method.For example, executing the method and step S100 to step S300 in Fig. 1 described above.
Embodiments described above is only schematical, wherein as illustrated by the separation member unit can be or It may not be and be physically separated, component shown as a unit may or may not be physical unit, it can It is in one place, or may be distributed over multiple network units.Can select according to actual needs part therein or Person's whole module achieves the purpose of the solution of this embodiment.
By the description of above embodiment, those skilled in the art can be understood that each embodiment can be by Software adds the mode of general hardware platform to realize, naturally it is also possible to pass through hardware realization.Based on this understanding, above-mentioned technology Scheme substantially in other words can be embodied in the form of software products the part that the relevant technologies contribute, the computer Software product can reside in computer readable storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions to So that a computer electronic equipment (can be personal computer, server or network electronic devices etc.) executes each reality The method for applying certain parts of example or embodiment.
Among other things, such as " can ', " energy ", " possibility " or " can be with " etc conditional statement unless in addition specific Ground is stated or is otherwise understood in context as used, is otherwise generally intended to convey particular implementation energy Including (however other embodiments do not include) special characteristic, element and/or operation.Therefore, such conditional statement is generally It is not intended to imply that feature, element and/or operation are all needed one or more embodiments or one anyway Or multiple embodiments must include for determining these features, element in the case where being with or without student's input or prompt And/or the logic whether operation is included or will be performed in any particular implementation.
The content described in the present description and drawings herein includes the user being capable of providing in social application The example of private data storage method and device.Certainly, it can not be described for the purpose of the various features of the description disclosure The combination that each of element and/or method are envisioned that, it can be appreciated that, many other combinations of disclosed feature It is possible with displacement., it will thus be apparent that without departing from the scope or spirit of the present disclosure can be to this public affairs It opens and makes various modifications.In addition, or in alternative solution, the considerations of other embodiments of the disclosure are to the specification and drawings It and in the practice of the disclosure as presented herein may be obvious.It is intended that institute in the specification and drawings The example of proposition is considered illustrative and not restrictive in all respects.Although using specific term herein, But they are used and are not used in the purpose of limitation in general and descriptive sense.

Claims (10)

1. the privacy of user date storage method in a kind of social application, it is characterised in that, the described method includes:
When detecting user using social application, the social data generated when using social application is obtained;
The privacy of user data in social data are obtained, are stored after privacy of user data are carried out Hash processing to user client And the client of the good friend in the social application of user;
Non- private data in the corresponding cryptographic Hash of acquisition privacy of user data and social data is uploaded to server and is deposited Storage.
2. the privacy of user date storage method in social application according to claim 1, which is characterized in that the detection When using social application to user, before the social data generated when obtaining using social application, comprising:
The buddy list for binding social networks with user in social application is obtained in advance.
3. the privacy of user date storage method in social application according to claim 1, which is characterized in that the acquisition Privacy of user data in social data store after privacy of user data are carried out Hash processing to user client and user The client of good friend in social application, comprising:
Privacy of user data are carried out Hash processing and generate cryptographic Hash, obtained and add by the privacy of user data in acquisition social data Private key and cryptographic Hash are issued the client of the good friend in user client and the social application of user by HTTPS by close private key End;
User client and the client of the good friend in the social application of user encrypt privacy of user data according to private key After generate ciphertext, ciphertext and cryptographic Hash are stored to local data base.
4. the privacy of user date storage method in social application according to claim 1, which is characterized in that the acquisition society Privacy of user data of the intersection number in will store the society to user client and user after the progress Hash processing of privacy of user data Hand over the client of the good friend in application, comprising:
The privacy of user data in social data are obtained, judge that privacy of user data are lteral data or picture data;
If privacy of user data are lteral datas, after privacy of user data are carried out Hash processing, by privacy of user data pair The ciphertext and cryptographic Hash answered store the client of all good friends into user client and the social application of user;
If privacy of user data are picture datas, after privacy of user data are carried out Hash processing, by privacy of user data pair The ciphertext and cryptographic Hash answered store into user client and the social application of user the client for meeting the good friend of predetermined condition.
5. according to right want 4 described in privacy of user date storage method in social application, which is characterized in that the predetermined item Part is that line duration is more than scheduled duration or contacts frequency more than preset frequency threshold value with user.
6. the privacy of user date storage method in social application according to claim 4, which is characterized in that the acquisition Non- private data in the corresponding cryptographic Hash of privacy of user data and social data is uploaded to after server stored, and is also wrapped It includes:
It detects the privacy of user data search instruction of user client, then it is corresponding to search privacy of user data in the server Cryptographic Hash;
If being matched to the corresponding cryptographic Hash of privacy of user data in the server, acquisition is stored with notice and is stored with cryptographic Hash The privacy of user data of request are transmitted to the user client for initiating search instruction by client.
7. the privacy of user date storage method in social application according to claim 1, which is characterized in that the acquisition Privacy of user data in social data store after privacy of user data are carried out Hash processing to user client and user After after the client of good friend in social application, comprising:
When detecting that privacy of user data update, to the good friend in the social application of current online user client and user Client to carry out data synchronous.
8. the privacy of user data storage device in a kind of social application, which is characterized in that described device includes at least one Manage device;And
The memory being connect at least one described processor communication;Wherein,
The memory is stored with the instruction that can be executed by least one described processor, and described instruction is by described at least one It manages device to execute, so that at least one described processor is able to carry out the use in the described in any item social applications of claim 1-7 Family private data storage method.
9. a kind of non-volatile computer readable storage medium storing program for executing, which is characterized in that the non-volatile computer readable storage medium Matter is stored with computer executable instructions, when which is executed by one or more processors, may make institute State the privacy of user data storage side in the one or more processors perform claim requirement described in any item social applications of 1-7 Method.
10. a kind of computer program product, which is characterized in that the computer program product includes being stored in non-volatile calculating Computer program on machine readable storage medium storing program for executing, the computer program include program instruction, when described program instruction is processed When device executes, the processor perform claim is made to require the privacy of user data storage in the described in any item social applications of 1-7 Method.
CN201910527422.7A 2019-06-18 2019-06-18 User privacy data storage method and device in social application Active CN110278204B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910527422.7A CN110278204B (en) 2019-06-18 2019-06-18 User privacy data storage method and device in social application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910527422.7A CN110278204B (en) 2019-06-18 2019-06-18 User privacy data storage method and device in social application

Publications (2)

Publication Number Publication Date
CN110278204A true CN110278204A (en) 2019-09-24
CN110278204B CN110278204B (en) 2022-05-17

Family

ID=67961093

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910527422.7A Active CN110278204B (en) 2019-06-18 2019-06-18 User privacy data storage method and device in social application

Country Status (1)

Country Link
CN (1) CN110278204B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102640128A (en) * 2009-12-08 2012-08-15 夏普株式会社 Network system, communication method, communication terminal, and communication server
CN104683961A (en) * 2013-11-29 2015-06-03 腾讯科技(深圳)有限公司 Name card interaction method and device and terminal
CN105429846A (en) * 2014-09-18 2016-03-23 中兴通讯股份有限公司 Instant chat tool chat record synchronization methods and terminal equipment
CN105518644A (en) * 2013-08-09 2016-04-20 杨绍峰 Method for processing and displaying real-time social data on map
US20160224157A1 (en) * 2014-06-19 2016-08-04 Boe Technology Group Co., Ltd. Pixel circuit, driving method thereof and display device
CN106096435A (en) * 2016-05-31 2016-11-09 北京联合大学 Help each other the smart mobile phone sensitive data protection system of mode and method based on good friend
CN107733656A (en) * 2017-10-23 2018-02-23 北京深思数盾科技股份有限公司 A kind of cipher authentication method and device
CN107846450A (en) * 2017-09-29 2018-03-27 珂伯特机器人(天津)有限公司 A kind of synchronous method of chat data
CN107888375A (en) * 2017-11-08 2018-04-06 深圳市携网科技有限公司 A kind of electronic evidence safety system and method based on block chain technology
CN109254872A (en) * 2018-08-14 2019-01-22 贵州仰望星空科技有限公司 A kind of security access system for education big data
CN109768987A (en) * 2019-02-26 2019-05-17 重庆邮电大学 A kind of storage of data file security privacy and sharing method based on block chain

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102640128A (en) * 2009-12-08 2012-08-15 夏普株式会社 Network system, communication method, communication terminal, and communication server
CN105518644A (en) * 2013-08-09 2016-04-20 杨绍峰 Method for processing and displaying real-time social data on map
CN104683961A (en) * 2013-11-29 2015-06-03 腾讯科技(深圳)有限公司 Name card interaction method and device and terminal
US20160224157A1 (en) * 2014-06-19 2016-08-04 Boe Technology Group Co., Ltd. Pixel circuit, driving method thereof and display device
CN105429846A (en) * 2014-09-18 2016-03-23 中兴通讯股份有限公司 Instant chat tool chat record synchronization methods and terminal equipment
CN106096435A (en) * 2016-05-31 2016-11-09 北京联合大学 Help each other the smart mobile phone sensitive data protection system of mode and method based on good friend
CN107846450A (en) * 2017-09-29 2018-03-27 珂伯特机器人(天津)有限公司 A kind of synchronous method of chat data
CN107733656A (en) * 2017-10-23 2018-02-23 北京深思数盾科技股份有限公司 A kind of cipher authentication method and device
CN107888375A (en) * 2017-11-08 2018-04-06 深圳市携网科技有限公司 A kind of electronic evidence safety system and method based on block chain technology
CN109254872A (en) * 2018-08-14 2019-01-22 贵州仰望星空科技有限公司 A kind of security access system for education big data
CN109768987A (en) * 2019-02-26 2019-05-17 重庆邮电大学 A kind of storage of data file security privacy and sharing method based on block chain

Also Published As

Publication number Publication date
CN110278204B (en) 2022-05-17

Similar Documents

Publication Publication Date Title
TWI293529B (en) User authentication by linking randomly-generated authentication secret with personalized secret and medium
US9767299B2 (en) Secure cloud data sharing
JP4818639B2 (en) Data backup system
JP4895378B2 (en) Secret information delivery system and secret information delivery method
CN104239764B (en) The management-control method and device of terminal device and its systemic-function
CN105432056B (en) Safe mixed file shared system
CN109314635A (en) Resource management based on block chain
US9866591B1 (en) Enterprise messaging platform
CN105610845B (en) A kind of data routing method based on cloud service, apparatus and system
CN106664202A (en) Methods, systems and computer program product for providing encryption on a plurality of devices
CN104035891B (en) Android mobile terminal data security protection system
US9372987B1 (en) Apparatus and method for masking a real user controlling synthetic identities
CN106709280A (en) Method, client and server for processing information
CN107845165A (en) A kind of server cabinet door control method, device and terminal
CN108833265B (en) Message processing method, device, server and storage medium
EP2894829A1 (en) Method for secure transmission of a data object
WO2022142112A1 (en) Blockchain-based mail processing method, and mail sending end, mail receiving end and device
CN108337210A (en) Equipment configuration method and device, system
EP1815660A1 (en) Provision of personal data in a data communcations network
CN110351304A (en) A kind of one key switching between not homologous ray logs in implementation method and device
CN106664308A (en) Device verification prior to registration
CN108280369A (en) Cloud document offline access system, intelligent terminal and method
CN114500069A (en) Method and system for storing and sharing electronic contract
US10489251B2 (en) Network backup
CN104660568B (en) A kind of guard method of address list information and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant