CN110278204B - User privacy data storage method and device in social application - Google Patents

User privacy data storage method and device in social application Download PDF

Info

Publication number
CN110278204B
CN110278204B CN201910527422.7A CN201910527422A CN110278204B CN 110278204 B CN110278204 B CN 110278204B CN 201910527422 A CN201910527422 A CN 201910527422A CN 110278204 B CN110278204 B CN 110278204B
Authority
CN
China
Prior art keywords
user
data
privacy data
social
user privacy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910527422.7A
Other languages
Chinese (zh)
Other versions
CN110278204A (en
Inventor
于洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Reliability Network Technology Co ltd
Original Assignee
Shenzhen Reliability Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Reliability Network Technology Co ltd filed Critical Shenzhen Reliability Network Technology Co ltd
Priority to CN201910527422.7A priority Critical patent/CN110278204B/en
Publication of CN110278204A publication Critical patent/CN110278204A/en
Application granted granted Critical
Publication of CN110278204B publication Critical patent/CN110278204B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Abstract

The invention discloses a method and a device for storing user privacy data in social application, wherein the method comprises the following steps: when the user is detected to use the social application, acquiring social data generated when the user uses the social application; obtaining user privacy data in the social data, and storing the user privacy data after carrying out hash processing on the user privacy data to a user client and a client of a friend in the social application of the user; and obtaining a hash value corresponding to the user privacy data and non-privacy data in the social data, and uploading the hash value and the non-privacy data to a server for storage. The embodiment of the invention stores the personal information of the user in the associated terminal equipment by adopting distributed storage, is safer than a centralized storage mode and is not easy to lose, the user information is stored in the terminal after being encrypted by an encryption algorithm, and the information is not worried about being stolen even if the data is leaked; the server does not store the user data plaintext, so that the privacy problem does not exist, zero privacy of the server is realized, the normal operation of the applied service function can be guaranteed, and the privacy security of the user is improved.

Description

User privacy data storage method and device in social application
Technical Field
The invention relates to the technical field of data storage, in particular to a method and a device for storing user privacy data in social application.
Background
With the common use of social applications, users can generate a huge amount of data when using social applications. Data generated in a social network often contain private data of some users, and if the private data is not protected, the private data can be leaked in network propagation.
The current social application is to store the private data of the user in the server, so as to facilitate the use of the data to complete the corresponding service or function, and protect the private data of the user by enhancing the security level of the server. However, in the prior art, if data leakage occurs in the server, the private data of the user is also leaked, which brings inconvenience to the user.
Accordingly, the prior art is yet to be improved and developed.
Disclosure of Invention
In view of the above deficiencies of the prior art, an object of the present invention is to provide a method and an apparatus for storing user privacy data in a social application, which aims to solve the problem that in the prior art, privacy data generated in the social application is stored in a server, and when data leakage occurs in the server, the privacy data of the user is also leaked, and ensure that the service function of the application can operate normally while zero privacy of the server is achieved.
The technical scheme of the invention is as follows:
a method of user privacy data storage in a social application, the method comprising:
when the user is detected to use the social application, acquiring social data generated when the user uses the social application;
obtaining user privacy data in the social data, and storing the user privacy data after carrying out hash processing on the user privacy data to a user client and a client of a friend in the social application of the user;
and obtaining a hash value corresponding to the user privacy data and non-privacy data in the social data, and uploading the hash value and the non-privacy data to a server for storage.
Optionally, when it is detected that the user uses the social application, before obtaining the social data generated when the user uses the social application, the method includes:
and a friend list of a social relation bound with the user in the social application is obtained in advance.
Optionally, the obtaining user privacy data in the social data, performing hash processing on the user privacy data, and storing the hash processing result to the user client and the client of the friend in the social application of the user includes:
the method comprises the steps of obtaining user privacy data in social data, conducting hash processing on the user privacy data to generate a hash value, obtaining an encrypted private key, and sending the private key and the hash value to a user client and a client of a friend in social application of a user through HTTPS;
and the user client and the client of a friend in the social application of the user encrypt the user privacy data according to the private key to generate a ciphertext, and the ciphertext and the hash value are stored in a local database.
Optionally, the obtaining user privacy data in the social data, performing hash processing on the user privacy data, and storing the hash processing result to the user client and the client of the friend in the social application of the user includes:
acquiring user privacy data in the social data, and judging whether the user privacy data is text data or photo data;
if the user privacy data are character data, after the hash processing is carried out on the user privacy data, a ciphertext and a hash value corresponding to the user privacy data are stored to the user client and the client of all friends in the social application of the user;
and if the user privacy data is photo data, after the hash processing is carried out on the user privacy data, storing the ciphertext and the hash value corresponding to the user privacy data to the user client and the client of the friend meeting the preset conditions in the social application of the user.
Optionally, the predetermined condition is that the online time exceeds a predetermined time or the contact frequency with the user exceeds a predetermined frequency threshold.
Optionally, after the hash value corresponding to the obtained user privacy data and the non-privacy data in the social data are uploaded to a server for storage, the method further includes:
when a user privacy data search instruction of a user client is detected, searching a hash value corresponding to the user privacy data in a server;
and if the hash value corresponding to the user privacy data is matched in the server, acquiring the client which is stored with the hash value and informs that the hash value is stored, and transmitting the requested user privacy data to the user client which initiates the search instruction.
Optionally, the obtaining the user privacy data in the social data, performing hash processing on the user privacy data, and storing the hash processing result in the user client and the clients of the friends in the social application of the user further includes:
and when the update of the user privacy data is detected, performing data synchronization on the current online user client and the clients of friends in the social application of the user.
Yet another embodiment of the present invention also provides a user privacy data storage apparatus in a social application, the apparatus comprising at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the user privacy data storage method in a social application described above.
Yet another embodiment of the present invention provides a non-transitory computer-readable storage medium storing computer-executable instructions that, when executed by one or more processors, cause the one or more processors to perform the user privacy data storage method in a social application described above.
Another embodiment of the invention provides a computer program product comprising a computer program stored on a non-volatile computer readable storage medium, the computer program comprising program instructions which, when executed by a processor, cause the processor to carry out the user privacy data storage method in a social application as described above.
Has the advantages that: compared with the prior art, the embodiment of the invention stores the personal information of the user in the associated terminal equipment by adopting distributed storage, is safer and not easy to lose compared with a centralized storage mode, stores the user information in the terminal after being encrypted by an encryption algorithm, and does not worry about the information being stolen even if the data is leaked; the server does not store user data, privacy problems do not exist, zero privacy of the server is achieved, meanwhile, the applied business function can be guaranteed to operate normally, and privacy safety of the user when the user uses social application is improved.
Drawings
The invention will be further described with reference to the accompanying drawings and examples, in which:
FIG. 1 is a flow chart of a preferred embodiment of a method for storing user privacy data in a social application according to the present invention;
fig. 2 is a schematic hardware structure diagram of a user privacy data storage device in a social application according to a preferred embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and effects of the present invention clearer and clearer, the present invention is described in further detail below. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. Embodiments of the present invention will be described below with reference to the accompanying drawings.
Referring to fig. 1, fig. 1 is a flowchart illustrating a method for storing user privacy data in a social application according to a preferred embodiment of the present invention. As shown in fig. 1, it includes the steps of:
s100, when the fact that a user uses the social application is detected, social data generated when the user uses the social application are obtained;
s200, obtaining user privacy data in the social data, and storing the user privacy data after carrying out hash processing on the user privacy data to a user client and a client of a friend in the social application of the user;
step 300, obtaining a hash value corresponding to the user privacy data and non-privacy data in the social data, and uploading the hash value and the non-privacy data to a server for storage.
In specific implementation, the user privacy data in the embodiment of the present invention includes, but is not limited to, data of personal information such as a user's real name, a phone number, an email, a job, an address, and the like.
When the user uses the social application to chat, a large amount of data can be generated, when the later inquiry is facilitated and the user uses the social application, the user privacy data is obtained, the user privacy data is stored in terminal equipment associated with the user in a distributed storage mode through encryption, and if in the social application, the data is stored in clients of all friends of the user and other login equipment of the user.
The method comprises the steps of carrying out Hash (Hash) processing on private data of a user, such as data of personal information, such as real names, telephone numbers, electronic mailboxes, jobs and addresses, in a client, uploading generated Hash values to a server, and uploading non-private data generated when a social application is used to the server. Since the hash algorithm is irreversible, the hash value corresponding to the private data of the user cannot be restored to a plaintext in the server, which is equivalent to that the server does not store the private data of the user. By adopting distributed storage, the personal information of the user is stored in the associated terminal equipment, so that the method is safer and is not easy to lose compared with a centralized storage mode. The user information is encrypted through an encryption algorithm and then stored in the terminal, and even if data is leaked, the user does not need to worry about the information being stolen. The server does not store the user data, and privacy problems do not exist.
The client sends the hash of the necessary user data for supporting the service (such as searching, matching and the like) to the server for storage, and the client stores a copy for associating with the original information. Therefore, the server side can not reveal privacy data of the user, the service function is completed at the same time, and the service function of the application can be ensured to be normally operated while zero privacy of the server is realized.
In a further embodiment, when detecting that the user uses the social application, before obtaining the social data generated when using the social application, the method includes:
and a friend list of a social relation bound with the user in the social application is obtained in advance.
In specific implementation, when the user uses the social application, a friend list of the social relationship bound with the user in the social application is obtained in advance. If the friend list of the user has the opposite party but the friend list of the opposite party does not have the current user, the friend does not have the social relationship with the user.
Further, obtaining user privacy data in the social data, and storing the user privacy data after performing hash processing on the user privacy data to the user client and the client of the friend in the social application of the user, includes:
the method comprises the steps of obtaining user privacy data in social data, conducting hash processing on the user privacy data to generate a hash value, obtaining an encrypted private key, and sending the private key and the hash value to a user client and a client of a friend in social application of a user through HTTPS;
and the user client and the client of a friend in the social application of the user encrypt the user privacy data according to the private key to generate a ciphertext, and the ciphertext and the hash value are stored in a local database.
In specific implementation, the encryption mode of the client side is as follows: and distributing the private key to the terminal through the HTTPS, and then encrypting and storing the data to a local database through the private key by the terminal. Even if someone takes the data of the local database of the terminal, the data is secure since there is no corresponding public key to decrypt. The ciphertext is obtained by encrypting the user privacy data original text.
Further, obtaining user privacy data in the social data, and storing the user privacy data after performing hash processing on the user privacy data to the user client and the client of the friend in the social application of the user, includes:
obtaining user privacy data in the social data, and judging whether the user privacy data is text data or photo data;
if the user privacy data are character data, after the hash processing is carried out on the user privacy data, a ciphertext and a hash value corresponding to the user privacy data are stored to the user client and the client of all friends in the social application of the user;
and if the user privacy data is photo data, after the hash processing is carried out on the user privacy data, storing the ciphertext and the hash value corresponding to the user privacy data to the user client and the client of the friend meeting the preset conditions in the social application of the user.
In specific implementation, the predetermined condition is that the online time exceeds a predetermined time or the contact frequency with the user exceeds a predetermined frequency threshold. The preferred predetermined time period may be set to 5 hours and the predetermined frequency threshold may be set to 1 time/day. Or set as desired.
The private data of the user is defined as data of personal information class, such as name, telephone, work, address and the like, and data of identity document class and bank card class. The information of the text class occupies the storage space of the device, and can be ignored after being compressed, and the photo data of the certificate class is not stored in the client of all friends, but 50-100 friends who are often online or frequently contacted are selected, for example, if 1 user stores 20 photos of the certificate class (the number of the certificate itself is relatively limited) and is compressed to 1 million per photo (the compression is to a size that does not affect the viewing), then 50-100 friend users will occupy the device memory space between 1G and 2G, and the number is still acceptable for the mainstream mobile phone device (the body memory 64G) in the current market.
Further, after obtaining the hash value corresponding to the user privacy data and the non-privacy data in the social data and uploading the hash value and the non-privacy data to the server for storage, the method further includes:
when a user privacy data search instruction of a user client is detected, searching a hash value corresponding to the user privacy data in a server;
and if the hash value corresponding to the user privacy data is matched in the server, acquiring the client which is stored with the hash value and informs that the hash value is stored, and transmitting the requested user privacy data to the user client which initiates the search instruction.
In specific implementation, the client performs Hash (Hash) processing on private data of the user, such as personal information data of real names, telephone numbers, electronic mailboxes, jobs, addresses and the like, to generate a corresponding Hash value, and the client only uploads the Hash value to the server for storage.
Further, in some business functions requiring user privacy data, for example, in the context of human context search, when a user whose position is "XXX" is searched, the user inputs search content at the client, the server performs comparison search on the hash value of the search content in the database to obtain a search result (i.e., a matched hash value), and then notifies the clients storing search result ciphertext data, transmits the data to the client of the user initiating the search, and the user can obtain a plaintext search result after decryption by the client.
Further, obtaining user privacy data in the social data, performing hash processing on the user privacy data, and storing the hash processing result to the user client and the clients of the friends in the social application of the user, includes:
and when the update of the user privacy data is detected, performing data synchronization on the current online user client and the clients of friends in the social application of the user.
In specific implementation, the private data of the user is stored in the client device of the user and the clients of all friends, when the private data of the user is updated, the data of the user is synchronized with other current online devices and the clients of friends, and when the data of some devices is not the latest data, the data of some devices is also synchronized with other online devices containing the latest data.
The method for storing the user privacy data in the social application is implemented, and the storage point of the user personal information is in the device of the user and the devices of friends. The method is normally used at ordinary times, the data stored in the device can be directly accessed, and if the data is installed after being unloaded, the recovered data can be synchronized to the new device by other devices only by logging in other devices of the device or waiting for the devices with friends to be online. If all friends are not online, a user can wait for the friends to be online, and can also send a message notification to some friends through software application to enable the friends to log in the application; or contacting friends and friends of acquaintances in reality to be online; these aids to recover data are not difficult to implement in social applications.
Another embodiment of the present invention provides an apparatus for storing user privacy data in a social application, as shown in fig. 2, the apparatus 10 includes:
one or more processors 110 and a memory 120, where one processor 110 is illustrated in fig. 2, the processor 110 and the memory 120 may be connected by a bus or other means, and the connection by the bus is illustrated in fig. 2.
The processor 110 is used to implement various control logic for the device 10, which may be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA), a single chip, an ARM (Acorn RISC machine) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination of these components. Also, the processor 110 may be any conventional processor, microprocessor, or state machine. Processor 110 may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
The memory 120 is a non-volatile computer-readable storage medium, and can be used to store non-volatile software programs, non-volatile computer-executable programs, and modules, such as program instructions corresponding to the user privacy data storage method in the social application in the embodiment of the present invention. The processor 110 executes various functional applications and data processing of the apparatus 10 by executing the nonvolatile software programs, instructions and units stored in the memory 120, that is, implements the user privacy data storage method in the social application in the above method embodiment.
The memory 120 may include a storage program area and a storage data area, wherein the storage program area may store an application program required for operating the device, at least one function; the storage data area may store data created according to the use of the device 10, and the like. Further, the memory 120 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, memory 120 optionally includes memory located remotely from processor 110, which may be connected to device 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
One or more units are stored in the memory 120, which when executed by the one or more processors 110, perform the user privacy data storage method in the social application in any of the above-described method embodiments, e.g., perform the above-described method steps S100 to S300 in fig. 1.
Embodiments of the present invention provide a non-transitory computer-readable storage medium storing computer-executable instructions for execution by one or more processors, for example, to perform method steps S100-S300 of fig. 1 described above.
By way of example, non-volatile storage media can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in many forms such as Synchronous RAM (SRAM), dynamic RAM, (DRAM), Synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The disclosed memory components or memory of the operating environment described herein are intended to comprise one or more of these and/or any other suitable types of memory.
Another embodiment of the invention provides a computer program product comprising a computer program stored on a non-volatile computer readable storage medium, the computer program comprising program instructions which, when executed by a processor, cause the processor to perform the user privacy data storage method in a social application of the above method embodiment. For example, the method steps S100 to S300 in fig. 1 described above are performed.
The above-described embodiments are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the embodiment.
Through the above description of the embodiments, those skilled in the art will clearly understand that the embodiments may be implemented by software plus a general hardware platform, and may also be implemented by hardware. With this in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer electronic device (which may be a personal computer, a server, or a network electronic device, etc.) to execute the methods of the various embodiments or some parts of the embodiments.
Conditional language such as "can," "might," or "may" is generally intended to convey that a particular embodiment can include (yet other embodiments do not include) particular features, elements, and/or operations, among others, unless specifically stated otherwise or otherwise understood within the context as used. Thus, such conditional language is not generally intended to imply that features, elements, and/or operations are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without student input or prompting, whether such features, elements, and/or operations are included or are to be performed in any particular embodiment.
What has been described herein in the specification and drawings includes examples that can provide a user privacy data storage method and apparatus in social applications. It will, of course, not be possible to describe every conceivable combination of components and/or methodologies for purposes of describing the various features of the disclosure, but it can be appreciated that many further combinations and permutations of the disclosed features are possible. It is therefore evident that various modifications can be made to the disclosure without departing from the scope or spirit thereof. In addition, or in the alternative, other embodiments of the disclosure may be apparent from consideration of the specification and drawings and from practice of the disclosure as presented herein. It is intended that the examples set forth in this specification and the drawings be considered in all respects as illustrative and not restrictive. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.

Claims (8)

1. A method of user privacy data storage in social applications, the method comprising:
when the user is detected to use the social application, acquiring social data generated when the user uses the social application;
obtaining user privacy data in the social data, and storing the user privacy data after carrying out hash processing on the user privacy data to a user client and a client of a friend in the social application of the user;
obtaining a hash value corresponding to user privacy data and non-privacy data in social data, and uploading the hash value and the non-privacy data to a server for storage;
the acquiring of the user privacy data in the social data, and the storing of the user privacy data after the hash processing to the user client and the client of the friend in the social application of the user, includes:
obtaining user privacy data in the social data, and judging whether the user privacy data is text data or photo data;
if the user privacy data are character data, after carrying out hash processing on the user privacy data, storing ciphertexts and hash values corresponding to the user privacy data to the user client and clients of all friends in the social application of the user;
if the user privacy data is photo data, after the user privacy data is subjected to hash processing, storing a ciphertext and a hash value corresponding to the user privacy data to a user client and a client of a friend meeting a preset condition in social application of the user;
the preset condition is that the online time exceeds a preset time or the contact frequency with the user exceeds a preset frequency threshold.
2. The method for storing the user privacy data in the social application according to claim 1, wherein before the step of acquiring the social data generated when the user uses the social application is detected, the method comprises the following steps:
and a friend list of a social relation bound with the user in the social application is obtained in advance.
3. The method for storing the user privacy data in the social application according to claim 1, wherein the steps of obtaining the user privacy data in the social data, hashing the user privacy data, and storing the hashed user privacy data to the user client and the clients of the friends in the social application of the user comprise:
the method comprises the steps of obtaining user privacy data in social data, conducting hash processing on the user privacy data to generate a hash value, obtaining an encrypted private key, and sending the private key and the hash value to a user client and a client of a friend in social application of a user through HTTPS;
and the user client and the client of a friend in the social application of the user encrypt the user privacy data according to the private key to generate a ciphertext, and the ciphertext and the hash value are stored in a local database.
4. The method for storing the user privacy data in the social application according to claim 1, wherein after the hash value corresponding to the obtained user privacy data and the non-privacy data in the social data are uploaded to a server for storage, the method further comprises:
when a user privacy data search instruction of a user client is detected, searching a hash value corresponding to the user privacy data in a server;
and if the hash value corresponding to the user privacy data is matched in the server, acquiring the client which is stored with the hash value and informs that the hash value is stored, and transmitting the requested user privacy data to the user client which initiates the search instruction.
5. The method for storing the user privacy data in the social application according to claim 1, wherein the step of obtaining the user privacy data in the social data, performing hash processing on the user privacy data, and storing the hash result to the user client and the clients of the friends in the social application of the user comprises:
and when the update of the user privacy data is detected, performing data synchronization on the current online user client and the clients of friends in the social application of the user.
6. An apparatus for user privacy data storage in social applications, the apparatus comprising at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of user privacy data storage in a social application of any one of claims 1-5.
7. A non-transitory computer-readable storage medium storing computer-executable instructions that, when executed by one or more processors, cause the one or more processors to perform the method of user privacy data storage in a social application of any one of claims 1-5.
8. A computer program product, characterized in that the computer program product comprises a computer program stored on a non-volatile computer-readable storage medium, the computer program comprising program instructions which, when executed by a processor, cause the processor to carry out the user privacy data storage method in a social application of any one of claims 1-5.
CN201910527422.7A 2019-06-18 2019-06-18 User privacy data storage method and device in social application Active CN110278204B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910527422.7A CN110278204B (en) 2019-06-18 2019-06-18 User privacy data storage method and device in social application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910527422.7A CN110278204B (en) 2019-06-18 2019-06-18 User privacy data storage method and device in social application

Publications (2)

Publication Number Publication Date
CN110278204A CN110278204A (en) 2019-09-24
CN110278204B true CN110278204B (en) 2022-05-17

Family

ID=67961093

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910527422.7A Active CN110278204B (en) 2019-06-18 2019-06-18 User privacy data storage method and device in social application

Country Status (1)

Country Link
CN (1) CN110278204B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102640128A (en) * 2009-12-08 2012-08-15 夏普株式会社 Network system, communication method, communication terminal, and communication server
CN104683961A (en) * 2013-11-29 2015-06-03 腾讯科技(深圳)有限公司 Name card interaction method and device and terminal
CN105429846A (en) * 2014-09-18 2016-03-23 中兴通讯股份有限公司 Instant chat tool chat record synchronization methods and terminal equipment
CN105518644A (en) * 2013-08-09 2016-04-20 杨绍峰 Method for processing and displaying real-time social data on map
CN107846450A (en) * 2017-09-29 2018-03-27 珂伯特机器人(天津)有限公司 A kind of synchronous method of chat data
CN107888375A (en) * 2017-11-08 2018-04-06 深圳市携网科技有限公司 A kind of electronic evidence safety system and method based on block chain technology

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104091559B (en) * 2014-06-19 2016-09-14 京东方科技集团股份有限公司 Image element circuit and driving method, display device
CN106096435A (en) * 2016-05-31 2016-11-09 北京联合大学 Help each other the smart mobile phone sensitive data protection system of mode and method based on good friend
CN107733656A (en) * 2017-10-23 2018-02-23 北京深思数盾科技股份有限公司 A kind of cipher authentication method and device
CN109254872A (en) * 2018-08-14 2019-01-22 贵州仰望星空科技有限公司 A kind of security access system for education big data
CN109768987B (en) * 2019-02-26 2022-01-28 重庆邮电大学 Block chain-based data file safe and private storage and sharing method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102640128A (en) * 2009-12-08 2012-08-15 夏普株式会社 Network system, communication method, communication terminal, and communication server
CN105518644A (en) * 2013-08-09 2016-04-20 杨绍峰 Method for processing and displaying real-time social data on map
CN104683961A (en) * 2013-11-29 2015-06-03 腾讯科技(深圳)有限公司 Name card interaction method and device and terminal
CN105429846A (en) * 2014-09-18 2016-03-23 中兴通讯股份有限公司 Instant chat tool chat record synchronization methods and terminal equipment
CN107846450A (en) * 2017-09-29 2018-03-27 珂伯特机器人(天津)有限公司 A kind of synchronous method of chat data
CN107888375A (en) * 2017-11-08 2018-04-06 深圳市携网科技有限公司 A kind of electronic evidence safety system and method based on block chain technology

Also Published As

Publication number Publication date
CN110278204A (en) 2019-09-24

Similar Documents

Publication Publication Date Title
CN109471844B (en) File sharing method and device, computer equipment and storage medium
US9767299B2 (en) Secure cloud data sharing
US10237706B2 (en) Method and apparatus for establishing communication between mobile terminals, incoming communication control and outgoing communication control and system by use thereof
US10025811B2 (en) Method and apparatus for deduplicating encrypted data
US11394543B2 (en) System and method for secure sensitive data storage and recovery
CN108432179B (en) System and method for preventing data loss while preserving privacy
US10887085B2 (en) System and method for controlling usage of cryptographic keys
US10567357B2 (en) Secure transmission system with upgraded encryption strength
WO2016003802A1 (en) Dual channel identity authentication
WO2022142112A1 (en) Blockchain-based mail processing method, and mail sending end, mail receiving end and device
US20170054789A1 (en) System and method for sending electronic files in response to inbound file requests
US20200342121A1 (en) Encrypted storage of data
CN110771190A (en) Controlling access to data
EP3282670B1 (en) Maintaining data security in a network device
CN111147235B (en) Object access method and device, electronic equipment and machine-readable storage medium
KR20150100602A (en) Data storing and reading methods, apparatuses and devices
CN110278204B (en) User privacy data storage method and device in social application
US11425122B2 (en) System and method for providing a configuration file to client devices
JP2018073064A (en) File division and combination system and method thereof
US11451388B2 (en) Data extraction system, data extraction method, registration apparatus, and program
CN112565156B (en) Information registration method, device and system
US20200053145A1 (en) System and Method for Providing a Configuration File to Client Devices
JP7406777B1 (en) Network storage that processes encrypted files while keeping the private key hidden on the key terminal
US9560022B1 (en) Avoiding collection of biometric data without consent
CN114048454A (en) Digital certificate transmission method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant