CN110795759A - Privacy protection method and system - Google Patents

Privacy protection method and system Download PDF

Info

Publication number
CN110795759A
CN110795759A CN201911017994.7A CN201911017994A CN110795759A CN 110795759 A CN110795759 A CN 110795759A CN 201911017994 A CN201911017994 A CN 201911017994A CN 110795759 A CN110795759 A CN 110795759A
Authority
CN
China
Prior art keywords
user
information
privacy
privacy protection
receiving
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911017994.7A
Other languages
Chinese (zh)
Inventor
徐涌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Xinyuxinban Internet Information Service Co Ltd
Original Assignee
Guangzhou Xinyuxinban Internet Information Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Xinyuxinban Internet Information Service Co Ltd filed Critical Guangzhou Xinyuxinban Internet Information Service Co Ltd
Priority to CN201911017994.7A priority Critical patent/CN110795759A/en
Publication of CN110795759A publication Critical patent/CN110795759A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

The invention provides a privacy protection method and a system thereof, wherein the privacy protection method comprises the following steps: receiving first data of a first user and establishing a first user account, wherein the first data comprises: the first user information, the first user material, the first privacy operation information and the second privacy operation information; receiving second user information of a second user and establishing a second user account; when the first privacy operation information is received, setting part or all of content in the first user information as privacy protection; and when the first privacy operation information is matched with the second user information, setting the first user material as privacy protection. By adopting the method and the device thereof, the user can not display the related content according to the will of the user after shielding the related information according to the will of the user.

Description

Privacy protection method and system
Technical Field
The invention belongs to the technical field of software security, and particularly relates to a privacy protection method and a privacy protection system.
Background
With the development of network technology, network data security is increasingly emphasized, the requirements on data and privacy protection are more and more obvious, any behavior generated through the network is marked and recorded, and a user achieves the goal through a series of operations on the network, so that behavior data is inevitably left, and personal information or more private information is sometimes required to be disclosed. Especially, after the teaching or work of the psychological consulting industry is online, the privacy protection is the basis of the industry networking.
In the prior art, a privacy protection means is mainly used for signing a privacy agreement on line and controlling the number of participators, the participators need to pass real-name authentication and qualification authentication, the users can be restricted only from morality through the means, but the privacy can not be substantially protected, privacy disclosure events frequently occur, and huge psychological burden is brought to the participators.
Disclosure of Invention
In order to overcome the technical defects, the invention provides a privacy protection method which can carry out all-around protection on the privacy of a software user.
In order to solve the problems, the invention is realized according to the following technical scheme:
a privacy protection method comprising the steps of:
receiving first data of a first user and establishing a first user account, wherein the first data comprises: the first user information, the first user material, the first privacy operation information and the second privacy operation information;
receiving second user information of a second user and establishing a second user account;
when the first privacy operation information is received, setting part or all of content in the first user information as privacy protection;
and when the first privacy operation information is matched with the second user information, setting the first user material as privacy protection.
As a further refinement of the invention, the first user material comprises: text information, video information, audio information, the first data further comprising: third privacy operational information; the privacy protection method further comprises the following steps:
and when the third privacy operation information is received, performing sound changing processing on the video information and the audio information.
As a further improvement of the invention, the invention also comprises the following steps:
and when the earphone access signal is not received, the video information and the audio information are forbidden to be played.
As a further improvement of the invention, the invention also comprises the following steps:
when a screen projection or recording action is detected, fuzzifying the first user material;
or when the first user account is judged to send the screen capturing action, freezing the first user account;
or when the second user account is judged to send the screen capturing action, the second user account is frozen.
As a further improvement of the invention, the invention also comprises the following steps:
receiving setting data of a third user and establishing a third user account, wherein the setting data comprises: a time range and a content range;
when the time for the second user to view the first user material is not within the time range, inhibiting the second user's view of the first user material;
when the time for the second user to view the first user material is not within the content range, the second user is prohibited from viewing content of the first user material that is not within the content range.
As a further improvement of the invention, the method also comprises the following steps:
and after the second user starts to view the first user material, when the waiting time is less than the freezing time, the viewing of the first user material is forbidden.
As a further improvement of the present invention, receiving second user information of a second user and establishing a second user account specifically includes:
and receiving name information, identity card photos and real-time photo information of the second user, and calling a third party authentication system to perform real-name authentication on the second user.
As a further improvement of the present invention, after the real-name authentication is performed on the second user, the method further includes the following steps:
receiving the professional qualification information of the second user, and transmitting the professional qualification information to a background;
and after receiving the background verification passing information and the signed agreement information, establishing the second user account.
As a further improvement of the present invention, after receiving the first data, the first user information and the first user material are encrypted and stored in a fragmentation manner;
and when the second user information is received, carrying out encryption processing and fragmentation mode storage on the second user information.
Compared with the prior art, the invention has the beneficial effects that: after the user can shield and set the related information according to own will, the related content can not be displayed according to the user's will.
The invention also provides a privacy protection system, comprising:
the account management device is used for receiving first data of a first user and establishing a first user account; the account management device is also used for receiving second user information of a second user and establishing a second user account; the account management device is also used for receiving the setting data of a third user and establishing a third user account;
the data processing device is used for setting part or all of content in the first user information as privacy protection when the first privacy operation information is received; the data processing device is further used for setting the first user material as privacy protection when the first privacy operation information is matched with the second user information.
Compared with the prior art, the invention has the beneficial effects that: after the user can shield and set the related information according to own will, the related content can not be displayed according to the user's will.
Drawings
Embodiments of the invention are described in further detail below with reference to the attached drawing figures, wherein:
FIG. 1 is a flowchart of a first embodiment.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
Example one
The embodiment discloses a privacy protection method, which is mainly applied to the psychological consultation industry and can be applied to a mobile terminal, and the privacy protection method comprises the following steps:
s1, receiving the personal case presentation data of the personal case presentation newspaper and establishing a personal case presentation account, wherein the personal case presentation data comprises: the personal case submitting person information, the personal case submitting person material, the privacy operation information of the personal case submitting person information and the privacy operation information of the shielded person name, wherein the privacy operation information of the personal case submitting person information is as follows: the individual case presenter can selectively shield the individual case presenter information without showing the individual case presenter information, wherein the individual case presenter information comprises sex, age, school calendar and the like.
S2, receiving student information of a student and establishing a student account, wherein the privacy operation information of the name of the masked student refers to: the individual case presenter can be shielded according to the name of the student.
S3, if the case-showing person sets the sex and age as the mask, the sex and age of the case-showing person will be set as privacy protection and not be shown.
And S4, if the case-presenting person sets the name of the student A as the mask, the student A can not participate in the teaching activity of the case-presenting person.
After the personal report can shield and set the related information according to the will of the personal report, the related content can not be displayed according to the will of the personal report.
In the above embodiment, the material of the individual case-showing newspaper includes text information, video information, and audio information, and the individual case-showing newspaper can report the individual case through an editing case report text, and also can present the individual case in a form of uploading a consultation session record, and the embodiment further includes the following steps: after the newspaper for individual case carries out secret setting on the individual case, the voice change processing is carried out on the video information and the audio information of the individual case, and the student cannot identify the real voice of all people speaking in the audio or the video.
In order to avoid the leakage of privacy caused by the student playing out the video information and the audio information during the learning process and being heard by the surrounding people, the method further includes the following steps: by monitoring the background of the mobile terminal, when the earphone access signal is not received, the playing of the video information and the audio information is forbidden, and the mobile terminal can play the video information and the audio information only after the earphone is connected.
In order to prevent the trainee from revealing the privacy by means of screen capturing or video recording, the above embodiment further includes the following steps: by monitoring the background of the mobile terminal, when the screen capture or video recording process is detected, the video information is automatically fuzzified, and meanwhile, the use of the user can be limited by freezing the account number, so that the psychology and the operation cost of the user who steals the information are greatly improved.
In the above embodiment, the method further includes the following steps:
receiving setting data of an administrator and establishing an administrator account, wherein the setting data comprises: a time range and a content range; the time range is a time period, and when the time period does not reach, the students cannot check the materials uploaded by the individual case presenters, or the students cannot check the materials uploaded by the individual case presenters beyond the time period; the content range may be: special information or/and consultation session content, and the like, if the administrator sets the content range as the consultation session content, the student cannot view the consultation session content.
In the above embodiment, the method further includes the following steps:
the freezing time is set by default of the system, and if the freezing time is 2 hours, once the student starts to check the case presentation newspaper material, the freezing time is calculated, the case presentation newspaper material is burnt and cannot be checked again within 2 hours, and the risk of large-scale disclosure of the private content is reduced through the time limitation.
In order to protect the privacy of the user in all directions, the registration of the student should be standardized, and the method specifically includes the following steps:
before establishing a student account, the student needs to be authenticated in real name, the student needs to fill in relevant information, upload an identity card photo, acquire the student's photo in real time, and call a third-party authentication system to authenticate each student in real name.
In the above embodiment, after the real-name authentication is completed, the method further includes the following steps:
acquiring professional qualification photos uploaded by students, transmitting the professional qualification photos to a background, submitting the photos to the background personnel for manual examination, wherein the students need to sign an online supervision protocol chain which comprises use terms, privacy protocols, supervision protocols and informed consent, and all signed protocols are reserved in products; and after the background audit is passed and the agreement is confirmed to be signed, the student user account can be established.
In order to prevent third party from stealing data, in this embodiment, the method further includes the following steps:
after the information of the individual case presenter and the material of the individual case presenter are obtained, the text related content can be sliced and encrypted according to fields and stored in the server out of order, the audio related content can be sliced and encrypted according to the pause of each sentence and stored in the server out of order, when the information is stolen, only the messy codes can be seen, and the complete content cannot be obtained.
In addition, plaintext watermarks can be marked on the text information, the video information and the audio information, when the content is leaked, the content can be traced, the ID of the user can be automatically played every time the video and the audio are played for a period of time, and the leakage source can be tracked through the ID.
By adopting the method, the user can be comprehensively protected in the psychological consultation industry, the case presenter can independently set shielding information to ensure that the information of the case presenter is not leaked, a part of risks of privacy leakage are filtered through sound changing processing, or a certain student can not see the case of the case presenter to be used for on-line teaching, all videos and audios on the line are prevented from being recorded by the student through a mobile phone, the information and data of the case presenter are well protected, the case presenter can present the case in more detail, and the case presenter can learn more favorably, limit the user by a manager and protect the privacy of the user more favorably.
Example two
The embodiment discloses a privacy protection system, including: the system comprises an account management device 1 and a data processing device 2, wherein the account management device is used for receiving first data of a first user and establishing a first user account; the account management device is also used for receiving second user information of a second user and establishing a second user account; the account management device is also used for receiving the setting data of a third user and establishing a third user account; the data processing device is used for setting part or all of content in the first user information as privacy protection when the first privacy operation information is received; the data processing device is further used for setting the first user material as privacy protection when the first privacy operation information is matched with the second user information.
In the above embodiment, the data processing apparatus 2 is further configured to: and when the third privacy operation information is received, performing sound change processing on the video information and the audio information.
In the above embodiment, the data processing apparatus 2 is further configured to: and when the earphone access signal is not received, video information and audio information are forbidden to be played.
In the above embodiment, the data processing apparatus 2 is further configured to perform blurring processing on the first user material when detecting a screen projection or screen recording action; or freezing the first user account when judging that the first user account sends the screen capturing action; or when the second user account sends the screen capturing action, the second user account is frozen.
In the above embodiment, the data processing apparatus 2 is further configured to: when the time for the second user to view the first user material is not within the time range, inhibiting the second user from viewing the first user material; and when the time for the second user to view the first user material is not within the content range, inhibiting the second user from viewing content of the first user material that is not within the content range.
In the above embodiment, the data processing apparatus 2 is further configured to: and after the second user starts to view the first user material, when the waiting time is less than the freezing time, the second user forbids to view the first user material.
Specifically, the account management device 1 includes: an authentication module 11 and a verification module 12, wherein the authentication module is configured to: calling a third party authentication system to perform real-name authentication on the second user according to the received name information, the identity card photo and the real-time photo information of the second user; the verification module 12 is configured to transmit the professional qualification information to the background and to sign an online supervision protocol chain after receiving the professional qualification information of the second user.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the present invention in any way, so that any modification, equivalent change and modification made to the above embodiment according to the technical spirit of the present invention are within the scope of the technical solution of the present invention.

Claims (10)

1. A privacy preserving method, comprising the steps of:
receiving first data of a first user and establishing a first user account, wherein the first data comprises: the first user information, the first user material, the first privacy operation information and the second privacy operation information;
receiving second user information of a second user and establishing a second user account;
when the first privacy operation information is received, setting part or all of content in the first user information as privacy protection;
and when the first privacy operation information is matched with the second user information, setting the first user material as privacy protection.
2. The privacy preserving method of claim 1, wherein the first user material comprises: text information, video information, audio information, the first data further comprising: third privacy operational information; the privacy protection method further comprises the following steps:
and when the third privacy operation information is received, performing sound changing processing on the video information and the audio information.
3. The privacy protection method according to claim 2, further comprising the steps of:
and when the earphone access signal is not received, the video information and the audio information are forbidden to be played.
4. The privacy protection method according to claim 1, further comprising the steps of:
when a screen projection or recording action is detected, fuzzifying the first user material;
or when the first user account is judged to send the screen capturing action, freezing the first user account;
or when the second user account is judged to send the screen capturing action, the second user account is frozen.
5. The privacy protection method according to claim 1, further comprising the steps of:
receiving setting data of a third user and establishing a third user account, wherein the setting data comprises: a time range and a content range;
when the time for the second user to view the first user material is not within the time range, inhibiting the second user's view of the first user material;
when the time for the second user to view the first user material is not within the content range, the second user is prohibited from viewing content of the first user material that is not within the content range.
6. The privacy protection method according to claim 1, further comprising the steps of:
and after the second user starts to view the first user material, when the waiting time is less than the freezing time, the viewing of the first user material is forbidden.
7. The privacy protection method according to claim 1, wherein receiving second user information of a second user and establishing a second user account, specifically:
and receiving name information, identity card photos and real-time photo information of the second user, and calling a third party authentication system to perform real-name authentication on the second user.
8. The privacy protection method according to claim 7, further comprising, after the real-name authentication of the second user, the steps of:
receiving the professional qualification information of the second user, and transmitting the professional qualification information to a background;
and after receiving the background verification passing information and the signed agreement information, establishing the second user account.
9. The privacy protection method according to claim 1, wherein after receiving the first data, the first user information and the first user material are stored in an encrypted and fragmented manner;
and when the second user information is received, carrying out encryption processing and fragmentation mode storage on the second user information.
10. A privacy protection system, comprising:
the account management device is used for receiving first data of a first user and establishing a first user account; the account management device is also used for receiving second user information of a second user and establishing a second user account; the account management device is also used for receiving the setting data of a third user and establishing a third user account;
the data processing device is used for setting part or all of content in the first user information as privacy protection when the first privacy operation information is received; the data processing device is further used for setting the first user material as privacy protection when the first privacy operation information is matched with the second user information.
CN201911017994.7A 2019-10-24 2019-10-24 Privacy protection method and system Pending CN110795759A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911017994.7A CN110795759A (en) 2019-10-24 2019-10-24 Privacy protection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911017994.7A CN110795759A (en) 2019-10-24 2019-10-24 Privacy protection method and system

Publications (1)

Publication Number Publication Date
CN110795759A true CN110795759A (en) 2020-02-14

Family

ID=69441149

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911017994.7A Pending CN110795759A (en) 2019-10-24 2019-10-24 Privacy protection method and system

Country Status (1)

Country Link
CN (1) CN110795759A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113282364A (en) * 2021-06-07 2021-08-20 维沃移动通信(杭州)有限公司 Display method, display device and electronic equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104317962A (en) * 2014-11-14 2015-01-28 云南电网公司普洱供电局 Enterprise file library show method based on hotness recommendation
CN105187207A (en) * 2014-06-20 2015-12-23 北京新媒传信科技有限公司 Authority authentication method and device
CN105404822A (en) * 2015-10-23 2016-03-16 刘奇 Access permission management method and access permission management system
CN106487663A (en) * 2016-11-14 2017-03-08 雄商网络科技(上海)有限公司 A kind of safe social platform
CN107315633A (en) * 2017-06-28 2017-11-03 广东欧珀移动通信有限公司 Mobile payment means of defence, device and mobile terminal
CN108038396A (en) * 2017-12-05 2018-05-15 广东欧珀移动通信有限公司 Record screen method, apparatus and terminal
CN109885703A (en) * 2019-02-01 2019-06-14 艾春艳 Listen attentively to platform

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105187207A (en) * 2014-06-20 2015-12-23 北京新媒传信科技有限公司 Authority authentication method and device
CN104317962A (en) * 2014-11-14 2015-01-28 云南电网公司普洱供电局 Enterprise file library show method based on hotness recommendation
CN105404822A (en) * 2015-10-23 2016-03-16 刘奇 Access permission management method and access permission management system
CN106487663A (en) * 2016-11-14 2017-03-08 雄商网络科技(上海)有限公司 A kind of safe social platform
CN107315633A (en) * 2017-06-28 2017-11-03 广东欧珀移动通信有限公司 Mobile payment means of defence, device and mobile terminal
CN108038396A (en) * 2017-12-05 2018-05-15 广东欧珀移动通信有限公司 Record screen method, apparatus and terminal
CN109885703A (en) * 2019-02-01 2019-06-14 艾春艳 Listen attentively to platform

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113282364A (en) * 2021-06-07 2021-08-20 维沃移动通信(杭州)有限公司 Display method, display device and electronic equipment
CN113282364B (en) * 2021-06-07 2023-10-10 维沃移动通信(杭州)有限公司 Display method, display device and electronic equipment

Similar Documents

Publication Publication Date Title
CN104580151B (en) The method and terminal for preventing secrecy conferencing information from revealing
Solove Reconstructing electronic surveillance law
US10536278B1 (en) Signed call recording
JP7014313B2 (en) Face recognition system, face recognition method, biometric authentication system, biometric authentication method and recording medium
US20150213722A1 (en) System and method for mobile and reliable testing, voting, and/or learning
CN105162757A (en) External network log-in method for multi-authentication government virtual office platform
US10553125B2 (en) Evidence based digital training portfolio
Çubukçu et al. The rise of distance education during Covid-19 Pandemic and the related data threats: A study about Zoom
Pandey et al. E-parakh: Unsupervised online examination system
US10057256B1 (en) Method and system for visually authenticating the identity of a caller using a video relay service
CN108989736B (en) Multimedia resource encryption method, device, system, storage medium and processor
CN116527314A (en) Image and video secure transmission method, device, medium and equipment
CN110795759A (en) Privacy protection method and system
Wilson et al. The best and worst of times: The paradox of social media and Ethiopian politics
CN111798101A (en) Staff secrecy training system
Streiff et al. Who's watching your child? exploring home security risks with smart toy bears
WO2021017277A1 (en) Image capture method and apparatus, and computer storage medium
Obada-Obieh et al. Challenges and threats of mass telecommuting: a qualitative study of workers
US11922825B2 (en) System and method for privacy-preserving online proctoring
CN114666133B (en) Remote inquiry evidence obtaining system and method based on original handwriting signature
JP6670016B2 (en) Report management device
Shonola et al. Mobile learning security concerns from university students' perspectives
CN107332935A (en) A kind of senate meeting system and its implementation based on APP
CN111586491B (en) Method and system for preventing disclosure and tracing of WeChat public number video
Dugan Security awareness training in a corporate setting

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200214