CN111523138B - Method, device and system for protecting private data and electronic equipment - Google Patents

Method, device and system for protecting private data and electronic equipment Download PDF

Info

Publication number
CN111523138B
CN111523138B CN202010312991.2A CN202010312991A CN111523138B CN 111523138 B CN111523138 B CN 111523138B CN 202010312991 A CN202010312991 A CN 202010312991A CN 111523138 B CN111523138 B CN 111523138B
Authority
CN
China
Prior art keywords
target
target user
contract
user
resource
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010312991.2A
Other languages
Chinese (zh)
Other versions
CN111523138A (en
Inventor
彭际群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202010312991.2A priority Critical patent/CN111523138B/en
Publication of CN111523138A publication Critical patent/CN111523138A/en
Application granted granted Critical
Publication of CN111523138B publication Critical patent/CN111523138B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions

Abstract

The embodiment of the specification discloses a method, a device, a system and an electronic device for protecting private data, wherein the method comprises the following steps: responding to a target resource leasing request of a target merchant from a target user, and acquiring the authorization of the target user for the privacy data of the target user; creating a lease contract between the target user and the target merchant for the target resource based on the privacy data of the target user and the lease request for the target resource; monitoring the performance of the target user on the lease contract of the target resource; and if the target user is determined to violate the appointed condition agreed in the leasing contract of the target resource based on the fulfillment condition, sending the leasing contract of the target resource to the target merchant, wherein the leasing contract of the target resource comprises the privacy data of the target user.

Description

Method, device and system for protecting private data and electronic equipment
Technical Field
The present disclosure relates to the field of computer software technologies, and in particular, to a method, an apparatus, a system, and an electronic device for protecting private data.
Background
In a lease-free scene, a merchant generally requires a user to provide 3 elements of information, namely the identity number, name and mobile phone number of the user in the ordering process so as to compensate for loss to the user through legal action when the user overdue and does not return leased goods. At present, some third-party credit platforms or payment platforms record three-element information of a user and output the three-element information of the user to a merchant on the premise of obtaining user authorization, and the user does not need to manually fill the three-element information during leasing, so that the leasing experience of the user is greatly improved.
However, although the scheme of authorizing and outputting three-factor information to goods is authorized by the user, the technical capabilities and moral literacy of different merchants are different, and after the merchants take the three-factor information of the user, the user information may be unintentionally or intentionally revealed, thereby bringing a great threat to the privacy security of the user.
Disclosure of Invention
The embodiment of the application aims to provide a method, a device and a system for protecting privacy data and electronic equipment, which are used for solving the problem that in the prior art, in a leasehold-free rental scene, after a merchant acquires the privacy data of a user, the privacy data of the user may be revealed, so that the privacy security of the user is threatened.
In order to solve the above technical problem, the embodiment of the present application is implemented as follows:
in a first aspect, a method for protecting private data is provided, where the method is applied to a third-party application, and includes:
responding to a target resource leasing request of a target merchant from a target user, and acquiring the authorization of the target user for the privacy data of the target user;
creating a lease contract between the target user and the target merchant for the target resource based on the privacy data of the target user and the lease request for the target resource;
monitoring the performance of the target user on the lease contract of the target resource;
and if the target user is determined to violate the appointed condition agreed in the leasing contract of the target resource based on the fulfillment condition, sending the leasing contract of the target resource to the target merchant, wherein the leasing contract of the target resource comprises the privacy data of the target user.
In a second aspect, a third-party application for protection of private data is presented, comprising:
the authorization acquisition unit is used for responding to a target resource leasing request of a target merchant from a target user and acquiring the authorization of the target user for the privacy data of the target user;
a contract creating unit that creates a lease contract between the target user and the target merchant with respect to the target resource based on the privacy data of the target user and the lease request of the target resource;
the contract monitoring unit is used for monitoring the performance of the target user on the leasing contract of the target resource;
and the contract sending unit is used for sending the target resource leasing contract to the target merchant if the target user is determined to violate the appointed condition agreed in the target resource leasing contract based on the fulfillment condition, wherein the target resource leasing contract comprises the privacy data of the target user.
In a third aspect, an electronic device is provided, including:
a processor; and
a memory arranged to store computer executable instructions for a third party application, the executable instructions when executed causing the processor to:
responding to a target resource leasing request of a target merchant from a target user, and acquiring the authorization of the target user for the privacy data of the target user;
creating a lease contract between the target user and the target merchant for the target resource based on the privacy data of the target user and the lease request for the target resource;
monitoring the performance of the target user on the lease contract of the target resource;
and if the target user is determined to violate the appointed condition agreed in the leasing contract of the target resource based on the fulfillment condition, sending the leasing contract of the target resource to the target merchant, wherein the leasing contract of the target resource comprises the privacy data of the target user.
In a fourth aspect, a computer-readable storage medium is presented, the computer-readable storage medium storing one or more programs, the one or more programs being third-party applications, which when executed by an electronic device comprising a plurality of application programs, cause the electronic device to:
responding to a target resource leasing request of a target merchant from a target user, and acquiring the authorization of the target user for the privacy data of the target user;
creating a lease contract between the target user and the target merchant for the target resource based on the privacy data of the target user and the lease request for the target resource;
monitoring the performance of the target user on the lease contract of the target resource;
and if the target user is determined to violate the appointed condition agreed in the leasing contract of the target resource based on the fulfillment condition, sending the leasing contract of the target resource to the target merchant, wherein the leasing contract of the target resource comprises the privacy data of the target user.
As can be seen from the technical solutions provided in the embodiments of the present specification, the embodiments of the present specification have at least one of the following technical effects:
when a target user leases a target resource, the authorization of the target user for the privacy data of the target user can be obtained in response to a target user lease request for the target resource of a target merchant; based on the privacy data of the target user and the lease request of the target resource, a lease contract about the target resource between the target user and the target merchant can be established; monitoring the performance condition of the target user on the lease contract of the target resource; and if the target user is determined to violate the appointed condition agreed in the target resource leasing contract based on the performance condition, sending the target resource leasing contract to the target merchant, wherein the target resource leasing contract comprises the privacy data of the target user. That is to say, the leasing contract containing the privacy data of the target user is sent to the target merchant only when the target user violates the leasing contract, so that the target merchant can trace the legal responsibility of the users who do not fulfill the contract on one hand, and the privacy of most leasing users is also protected on the other hand.
Drawings
In order to more clearly illustrate the embodiments of the present specification or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the present specification, and for those skilled in the art, other drawings can be obtained according to the drawings without any creative effort.
Fig. 1 is a schematic flow chart of an implementation of a method for protecting private data according to an embodiment of the present specification.
Fig. 2 is a schematic flowchart of a method for protecting private data, provided by an embodiment of the present disclosure, applied in an actual scenario.
Fig. 3 is a schematic structural diagram of a device for protecting privacy data according to an embodiment of the present specification.
Fig. 4 is a schematic structural diagram of an electronic device provided in an embodiment of the specification.
Detailed Description
In order to make the purpose, technical solutions and advantages of this document more clear, the technical solutions of this specification will be clearly and completely described below with reference to specific embodiments of this specification and the accompanying drawings. It is to be understood that the embodiments described are only a few embodiments of the present disclosure, and not all embodiments. All other embodiments obtained by a person skilled in the art without making any inventive step based on the embodiments in this description belong to the protection scope of this document.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
In order to solve the problem that in a mortgage-free rental scene in the prior art, after a merchant acquires private data of a user, the private data of the user may be leaked, so that privacy security of the user is threatened, an embodiment of the present specification provides a method for protecting the private data, and when a target user rents a target resource, authorization of the target user for the private data of the target user can be acquired in response to a target user renting request for the target resource of the target merchant; based on the privacy data of the target user and the lease request of the target resource, a lease contract about the target resource between the target user and the target merchant can be established; monitoring the performance condition of the target user on the lease contract of the target resource; and if the target user is determined to violate the appointed condition agreed in the target resource leasing contract based on the performance condition, sending the target resource leasing contract to the target merchant, wherein the target resource leasing contract comprises the privacy data of the target user.
Because the leasing contract containing the privacy data of the target user is sent to the target merchant only when the target user violates the leasing contract, on one hand, the target merchant can trace the legal responsibility of the users who do not fulfill the contract conveniently, and on the other hand, the privacy of most leasing users is also protected.
The implementation subject of the method for protecting private data provided in the embodiments of the present disclosure, which may be but is not limited to a mobile phone, a tablet, a wearable device, and the like, can be configured to implement at least one of the user terminals of the method provided in the embodiments of the present disclosure, or the implementation subject of the method, which may also be a client (such as a payment application) itself that can implement the method.
For convenience of description, the following description will be made of an embodiment of the method taking as an example a payment application capable of executing the method an execution subject of the method. It is to be understood that the execution of the method by the payment application is merely an exemplary illustration and should not be construed as a limitation of the method.
Fig. 1 is a schematic flow chart of an implementation of a method for protecting private data according to one or more embodiments of the present specification, where the method includes:
s110, responding to a target resource leasing request of a target user to a target merchant, and obtaining the authorization of the target user for the privacy data of the target user.
It should be understood that in a scenario where the target user leases the target resource of the target merchant, in order to guarantee the rights and interests of the target merchant and avoid that the target user returns the target resource unscheduled or causes a certain damage to the target resource, the target user is usually required to provide a deposit with a value equivalent to the value of the target resource. With the rapid development of the mobile internet technology, most users can gradually accumulate personal credit values in the daily online consumption process, and many merchants gradually popularize the escort-free mode in order to rent resources for the users conveniently, that is, when the users rent the resources to the merchants, the users do not need to provide escort money with the same value as the leased resources, and the users can rent the resources without escort as long as the credit values or credit levels of the users meet the preset credit thresholds.
In the mortgage-free rental scenario, when the target user mortgages the target resource from the target merchant without mortgage, the target user does not pay the target merchant deposit, and if the target user has a default situation, for example, the rented target resource is not returned after an overdue period or the rented target resource is damaged intentionally or unintentionally, the target merchant still has a certain loss of interest. In this case, in order to guarantee the rights and interests of the target merchant and facilitate the target merchant to perform accountability on the target user after the target user violates the rules, three-factor information related to privacy is generally required to be provided to the target merchant when the target user requests to lease the target resource, including the identification number, name and phone number of the target user.
That is, the target user provides the three-factor information of the target user to a merchant as long as the target user leases the resources of the merchant, so that the target user continuously informs more and more merchants of the personal privacy data. Obviously, this would pose a significant threat to the privacy of the target user.
To solve this problem, the third-party platform may be a payment application, and may be configured to, in response to a request for renting a target resource of a target merchant from a target user, obtain authorization of the target user for the privacy data of the target user, where the authorization indicates that the target user is after a default, and the payment application may send the privacy data of the target user to the target merchant. It should be understood that in practice, most users will perform after renting resources provided by the merchants, and the rented resources are returned to the rented merchants on a scheduled and good basis, and only a few users may intentionally or unintentionally default. The embodiment of the specification protects the privacy of most users by means that the users authorize the private data to be sent to the target merchants after the users have defaulted.
In addition, in order to give the target user sufficient time to perform, in the embodiment of the present specification, the authorization of the target user for the privacy data of the target user may specifically indicate that the target user sends the privacy data of the target user to the target merchant after a preset time period after the default. For example, the payment application may authorize the target user to send the target user's private data to the target merchant after 30 days after the breach.
The target resource in the embodiments of the present specification may specifically be a resource available for rental on a bicycle, a small car, a mobile charging source, clothing, a book, a mobile phone, a tablet computer, and the like.
Optionally, to ensure that the privacy of the user is not acquired wantonly, before acquiring, in response to a lease request of a target user for a target resource of a target merchant, authorization of the target user for privacy data of the target user, the method provided in an embodiment of the present specification further includes:
a lease request is received in a trusted execution environment from a target user for a target resource.
The trusted execution environment is an execution environment that can sufficiently secure private data of a user, for example, the trusted execution environment may be a data storage environment constructed by a blockchain technology, and since the blockchain has a non-falsification characteristic, any data recorded in the blockchain is difficult to be falsified and has traceability, so that a lease request from a target user for a target resource can be received in the executable environment. It should be understood that, the trusted execution environment may pre-store the privacy data of the target user, such as the three-factor information of the target user, and after obtaining the authorization of the target user for the privacy data of the target user, the target user's privacy data may be obtained from the trusted execution environment, and a lease contract between the target user and the target merchant for the target resource may be created based on the privacy data of the target user and the target resource of the target merchant.
And S120, creating a leasing contract about the target resource between the target user and the target merchant based on the privacy data of the target user and the leasing request of the target resource.
Specifically, creating a lease contract between the target user and the target merchant about the target resource based on the private data of the target user and the lease request of the target resource includes:
obtaining privacy data of a target user from a trusted execution environment;
and creating a leasing contract between the target user and the target merchant about the target resource based on the private data of the target user and the leasing request of the target resource.
The lease request of the target resource carries the lease requirements of the target resource on the target resource, such as the identification, the number, the lease period and the like of the target resource. The method includes the steps of creating a lease contract between a target user and a target merchant about a target resource based on privacy data of the target user and a lease request of the target resource, and specifically creating the lease contract between the target user and the target merchant about the target resource based on a name, an identification number, a telephone number, a payment ID, a name of the target merchant, a name or an identification of the target resource, a payment ID of the target merchant, a date on which the target user should perform and violation pursuit terms, a date on which the target user requests lease and the like of the target user. The lease contract may also be stored in a trusted execution environment for security of the lease contract.
Wherein, the breach of accountability clause can stipulate that if the target user does not perform the contract on time within the appointed date to perform the contract, the breach of accountability can be performed to the target user.
It should be appreciated that after the creation of the lease contract for the target resource is completed, to facilitate locating the lease contract for the target resource, an identification of the lease contract (e.g., a contract number) may be assigned to the lease contract for the target resource to uniquely identify the lease contract. That is, the lease contract may be obtained from the trusted execution environment via the identification of the lease contract.
Optionally, in order to facilitate the target merchant to perform tracing on the target user after the target user violates the contract, in this embodiment of the specification, after creating a lease contract on the target resource between the target user and the target merchant based on the private data of the target user and the lease request for the target resource, an identifier of the contract, such as a contract number of the lease contract for the target resource, may also be sent to the target merchant. Specifically, after creating a lease contract between the target user and the target merchant for the target resource based on the private data of the target user and the lease request for the target resource, the method provided by the embodiment of the present specification further includes:
and sending the identifier of the leasing contract of the target resource to the target merchant.
And S130, monitoring the performance of the target user on the lease contract of the target resource.
In order to avoid the occurrence of serious default conditions of the target users, the fulfillment conditions of the lease contracts of the target users on the target resources can be monitored in real time, and the target users can be prompted to have default conditions in time when the default conditions of the target users occur, so that the credit level of the target users is prevented from being excessively influenced.
And S140, if the target user is determined to violate the appointed condition agreed in the target resource leasing contract based on the performance condition, sending the target resource leasing contract to the target merchant, wherein the target resource leasing contract comprises the privacy data of the target user.
The specified condition may be that the target user needs to return the target resource to the target merchant without damage within a preset time period agreed in the lease contract. If the target user does not return the target resource to the target merchant without damage within the preset time period agreed in the leasing contract, or certain damage is caused to the target resource, the target user can be confirmed to violate the appointed condition agreed in the leasing contract of the target resource. In this case, in order to facilitate the target merchant to blame the target user, a lease contract for the target resource containing the privacy data of the target user may be sent to the target merchant.
Optionally, the target merchant may also actively send an acquisition request of a lease contract for the target resource to the payment application, and in order to facilitate searching for the lease contract for the target resource, the acquisition request of the lease contract may carry an identifier of the lease contract. Specifically, if it is determined that the target user violates a specified condition agreed in a lease contract of the target resource based on the fulfillment status, the lease contract of the target resource is sent to the target merchant, and the lease contract of the target resource includes private data of the target user, including:
receiving an acquisition request of a target merchant for a leasing contract of a target resource, wherein the acquisition request of the leasing contract of the target resource carries an identifier of the leasing contract of the target resource;
responding to the acquisition request of the lease contract, and acquiring a behavior operation record of a target user for the target resource based on the identification of the lease contract of the target resource;
and if the behavior operation record of the target user for the target resource violates the specified condition, sending the lease contract of the target resource to the target merchant.
The behavior operation record of the target user for the target resource may specifically be a behavior operation record of the target user on the target resource from the date of creation of the lease contract, that is, from the date of taking effect of the lease contract, for example, whether the target resource is returned or not. If the target user returns the target resource, the state of the rental order corresponding to the rental contract can be updated to be 'completed', if the target user does not return the target resource after the date of returning the target resource, the state of the rental order corresponding to the rental contract can be updated to be 'overdue'.
Optionally, since the lease contract of the target resource includes the private data of the target user, the behavior operation record of the target user for the target resource may be further monitored from the behavior operation database of the user based on the private data of the target user in the lease contract of the target resource, that is, the identification (such as an identification number, a telephone number, a name, an identification of a payment application, and the like) of the target user. Specifically, in response to an acquisition request of a lease contract, acquiring a behavior operation record of a target user for a target resource based on an identifier of the lease contract of the target resource, including:
responding to the acquisition request of the lease contract, and acquiring privacy data of a target user in the lease contract of the target resource based on the identification of the lease contract of the target resource;
and acquiring the behavior operation record of the target user for the target resource based on the privacy data of the target user.
Optionally, in order to give the target user sufficient time to complete performing, if the target user violates a specified condition with respect to the behavioral operation record of the target resource, sending the lease contract of the target resource to the target merchant, including:
if the behavior operation record of the target user for the target resource violates the specified condition, determining whether the acquisition request of the lease contract is a first request;
if the acquisition request of the rental contract is determined to be a first request and the time period of the target user violating the specified condition is greater than or equal to a first preset time period threshold, the rental contract is sent to the target merchant;
and if the acquisition request of the leasing contract is determined to be a non-first request and the time period of the target user violating the specified condition after the first request is greater than or equal to a second preset time period threshold, sending the leasing contract of the target resource to the target merchant.
Specifically, if the target merchant requests to obtain the lease contract for the first time, the target user may be given a first preset time period threshold to process overdue, for example, the target user may be given a 24-hour time to process overdue, and if the target user performs within the 24 hours, the target merchant may not obtain the lease contract for the target resource, that is, may not obtain the privacy data of the target user. And if the target user does not process overdue after 24 hours, the leasing contract of the target resource can be sent to the target merchant. And if the target merchant requests to obtain the leasing contract for the second time within 24 hours, the target merchant does not send the leasing contract of the target resource.
If the target merchant is not the first request to obtain the leasing contract, determining whether the time interval between the target merchant and the last request to obtain the leasing contract reaches 24 hours, if the time interval reaches 24 hours, processing overdue for the target user by using a second preset time period threshold, for example, 12 hours, and if the time interval exceeds 12 hours, the target user still does not process the overdue, and sending the leasing contract of the target resource to the target merchant; and if the target user processes overdue in the time period, namely the target resource is returned, the leasing contract of the target resource is not sent to the target merchant any more.
Optionally, in order to provide sufficient fulfillment time for the target user, the method provided in the embodiment of the present specification further includes:
and if the acquisition request of the rental contract is determined to be the first request and the time period of the target user violating the specified condition is less than a first preset time period threshold, sending prompt information to the target user for indicating the target user to fulfill the specified condition.
The first time period threshold may be set to 15 days or 30 days, and the specific value of the time period threshold may be set according to actual situations. For example, when it is determined that the acquisition request of the rental contract is the first request and the time period during which the target user violates the specified condition is less than the set 15 days, a short message "your xx rental contract is overdue and please return the target resource by date" may be sent to the target user to prompt the target user to fulfill the execution condition.
Optionally, after sending the indication information to the target user, if the target user still fails to fulfill the specified condition agreed in the lease contract within a preset time period, for example, within 24 hours, the method provided in the embodiment of this specification further includes:
and if the target user does not fulfill the specified condition within the preset time period after receiving the prompt information, sending the lease contract of the target resource to the target merchant.
The following describes the method provided in the embodiment of the present specification in detail by taking a flow diagram of the method for protecting private data shown in fig. 2 applied to an actual scene as an example. In this scenario, the target resource is a bicycle, for example, a lease contract is signed between the target user and the target merchant through a third-party application, that is, a payment application, and private data of the target user, including three-factor information, is stored in a trusted execution environment in the payment application. As shown in fig. 2, the process of enabling a target user to lease a bicycle exempt from a target merchant through a payment application includes:
s21, the target user selects a bicycle merchant which wants to rent from the payment application, namely the target merchant, and sends a bicycle renting request of the exempt renting target merchant to the payment application;
s22, the payment application acquires the authorization of the target user for the private data of the target user, and the authorization is used for indicating that the target application can send the private data of the target user to the target merchant after the target user does not return the bicycle after 30 days;
s23, after the target user authorizes, the payment application creates a lease contract between the target user and the target merchant about the bicycle based on the name, the identification number, the telephone number, the payment ID, the name of the target merchant, the model of the bicycle, the payment ID of the target merchant, the date that the target user returns the bicycle and the violation accountability terms, the date that the target user requests the lease and the like of the target user;
s24, the payment application sends the identification of the bicycle rental contract to the target merchant;
s25, the payment application monitors the performance status of the target user;
s26, the target merchant requests the payment application to call the bicycle leasing contract for the first time based on the identity of the leasing contract;
s27, the payment application checks the performance condition of the target user, and executes S28 when the monitoring target user does not return the bicycle after 30 days;
s28, the payment application prompts the target user that the bike has not been returned within 30 days of expiration and prompts the target user to return the bike to the target merchant within 24 hours;
and S29, when the payment application monitors that the target user still does not return the bicycle to the target merchant within 24 hours, the payment application sends the bicycle leasing contract to the target merchant, so that the target merchant can trace the target user.
When a target user leases a target resource, the authorization of the target user for the privacy data of the target user can be obtained in response to a target user lease request for the target resource of a target merchant; based on the privacy data of the target user and the lease request of the target resource, a lease contract about the target resource between the target user and the target merchant can be established; monitoring the performance condition of the target user on the lease contract of the target resource; and if the target user is determined to violate the appointed condition agreed in the target resource leasing contract based on the performance condition, sending the target resource leasing contract to the target merchant, wherein the target resource leasing contract comprises the privacy data of the target user. That is to say, the leasing contract containing the privacy data of the target user is sent to the target merchant only when the target user violates the leasing contract, so that the target merchant can trace the legal responsibility of the users who do not fulfill the contract on one hand, and the privacy of most leasing users is also protected on the other hand.
Fig. 3 is a schematic structural diagram of a third-party application 300 for protecting private data according to one or more embodiments of the present specification, including:
an authorization obtaining unit 310, configured to obtain, in response to a target user's lease request for a target resource of a target merchant, authorization of the target user for private data of the target user;
a contract creating unit 320 that creates a lease contract between the target user and the target merchant regarding the target resource based on the privacy data of the target user and the lease request of the target resource;
a contract monitoring unit 330 for monitoring the performance of the lease contract of the target resource by the target user;
a contract sending unit 340, configured to send the lease contract of the target resource to the target merchant if it is determined that the target user violates the specified condition agreed in the lease contract of the target resource based on the performance condition, where the lease contract of the target resource includes the privacy data of the target user.
Optionally, in an embodiment, before the authorization obtaining unit 310 obtains the authorization of the target user for the privacy data of the target user in response to a target user lease request for a target resource of a target merchant, the apparatus further includes:
a request receiving unit 350, configured to receive a lease request for the target resource from the target user in a trusted execution environment.
Optionally, in an embodiment, after the contract creating unit 320 creates a lease contract between the target user and the target merchant for the target resource based on the privacy data of the target user and the lease request of the target resource, the apparatus further includes:
the identifier sending unit 360 sends the identifier of the lease contract of the target resource to the target merchant.
Optionally, in an embodiment, the contract sending unit 340 is configured to:
receiving an acquisition request of a lease contract of the target resource from the target merchant, wherein the acquisition request of the lease contract of the target resource carries an identifier of the lease contract of the target resource;
in response to the acquisition request of the lease contract, acquiring a behavior operation record of the target user for the target resource based on the identification of the lease contract of the target resource;
and if the behavior operation record of the target user for the target resource violates the specified condition, sending the lease contract of the target resource to the target merchant.
Optionally, in an embodiment, the contract sending unit 340 is configured to:
in response to the acquisition request of the lease contract, acquiring the privacy data of the target user in the lease contract of the target resource based on the identification of the lease contract of the target resource;
and acquiring the behavior operation record of the target user aiming at the target resource based on the privacy data of the target user.
Optionally, in an embodiment, the contract sending unit 340 is configured to:
if the behavior operation record of the target user for the target resource violates the specified condition, determining whether the acquisition request of the lease contract is a first request;
if the acquisition request of the rental contract is determined to be a first request and the time period of the target user violating the specified condition is greater than or equal to a first preset time period threshold, sending the rental contract to the target merchant;
and if the acquisition request of the lease contract is determined to be a non-primary request and the time period of the target user violating the specified condition after the primary request is greater than or equal to a second preset time period threshold, sending the lease contract of the target resource to the target merchant.
Optionally, in an embodiment, the apparatus further includes:
an information prompting unit 370, configured to send a prompting message to the target user to indicate that the target user fulfills the specified condition if it is determined that the obtaining request of the rental contract is a first request and the time period during which the target user violates the specified condition is less than the first preset time period threshold.
Optionally, in an embodiment, after sending the indication information to the target user, the contract sending unit 340 is configured to:
and if the target user does not fulfill the specified condition within a preset time period after receiving the prompt message, sending the lease contract of the target resource to the target merchant.
The third-party application 300 for protecting the private data can implement the method in the embodiment of the method shown in fig. 1 to 2, which specifically refers to the method for protecting the private data in the embodiment shown in fig. 1 to 2 and is not described again.
Fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure. Referring to fig. 4, at a hardware level, the electronic device includes a processor, and optionally further includes an internal bus, a network interface, and a memory. The Memory may include a Memory, such as a Random-Access Memory (RAM), and may further include a non-volatile Memory, such as at least 1 disk Memory. Of course, the electronic device may also include hardware required for other services.
The processor, the network interface, and the memory may be connected to each other via an internal bus, which may be an ISA (Industry Standard Architecture) bus, a PCI (Peripheral Component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 4, but that does not indicate only one bus or one type of bus.
And the memory is used for storing programs. In particular, the program may include program code comprising computer operating instructions. The memory may include both memory and non-volatile storage and provides instructions and data to the processor.
The processor reads the corresponding computer program from the nonvolatile memory into the memory and then runs the computer program, and forms a third-party application for protecting the private data on a logic level. The processor is used for executing the program stored in the memory and is specifically used for executing the following operations:
responding to a target resource leasing request of a target merchant from a target user, and acquiring the authorization of the target user for the privacy data of the target user;
creating a lease contract between the target user and the target merchant for the target resource based on the privacy data of the target user and the lease request for the target resource;
monitoring the performance of the target user on the lease contract of the target resource;
and if the target user is determined to violate the appointed condition agreed in the leasing contract of the target resource based on the fulfillment condition, sending the leasing contract of the target resource to the target merchant, wherein the leasing contract of the target resource comprises the privacy data of the target user.
When a target user leases a target resource, the authorization of the target user for the privacy data of the target user can be obtained in response to a target user lease request for the target resource of a target merchant; based on the privacy data of the target user and the lease request of the target resource, a lease contract about the target resource between the target user and the target merchant can be established; monitoring the performance condition of the target user on the lease contract of the target resource; and if the target user is determined to violate the appointed condition agreed in the target resource leasing contract based on the performance condition, sending the target resource leasing contract to the target merchant, wherein the target resource leasing contract comprises the privacy data of the target user. That is to say, the leasing contract containing the privacy data of the target user is sent to the target merchant only when the target user violates the leasing contract, so that the target merchant can trace the legal responsibility of the users who do not fulfill the contract on one hand, and the privacy of most leasing users is also protected on the other hand.
The method performed by the device for protecting private data disclosed in the embodiment of fig. 1 of the present application may be applied to a processor, or may be implemented by a processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
The electronic device may further execute the method in fig. 1, and implement the functions of the privacy data protection apparatus in the embodiment shown in fig. 1, which are not described herein again in this embodiment of the present application.
Of course, besides the software implementation, the electronic device of the present application does not exclude other implementations, such as a logic device or a combination of software and hardware, and the like, that is, the execution subject of the following processing flow is not limited to each logic unit, and may also be hardware or a logic device.
Embodiments of the present application also provide a computer-readable storage medium storing one or more programs, the one or more programs being third-party applications, the one or more programs including instructions, which when executed by a portable electronic device including a plurality of application programs, enable the portable electronic device to perform the method of the embodiment shown in fig. 3, and are specifically configured to:
responding to a target resource leasing request of a target merchant from a target user, and acquiring the authorization of the target user for the privacy data of the target user;
creating a lease contract between the target user and the target merchant for the target resource based on the privacy data of the target user and the lease request for the target resource;
monitoring the performance of the target user on the lease contract of the target resource;
and if the target user is determined to violate the appointed condition agreed in the leasing contract of the target resource based on the fulfillment condition, sending the leasing contract of the target resource to the target merchant, wherein the leasing contract of the target resource comprises the privacy data of the target user.
Of course, besides the software implementation, the electronic device in this specification does not exclude other implementations, such as logic devices or a combination of software and hardware, and the like, that is, the execution subject of the following processing flow is not limited to each logic unit, and may also be hardware or logic devices.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
In short, the above description is only a preferred embodiment of the present application, and is not intended to limit the scope of the present application. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.

Claims (11)

1. A method for protecting private data, which is applied to a third-party application, comprises the following steps:
responding to a target resource leasing request of a target merchant from a target user, and acquiring the authorization of the target user for the privacy data of the target user;
creating a lease contract between the target user and the target merchant for the target resource based on the privacy data of the target user and the lease request for the target resource; the target user and the target merchant sign the lease contract through the third-party application, and the privacy data of the target user is stored in a trusted execution environment in the third-party application;
monitoring the performance of the target user on the lease contract of the target resource;
and if the target user is determined to violate the appointed condition agreed in the leasing contract of the target resource based on the fulfillment condition, sending the leasing contract of the target resource to the target merchant, wherein the leasing contract of the target resource comprises the privacy data of the target user.
2. The method of claim 1, prior to obtaining authorization of a target user for private data of the target user in response to a target user's lease request for a target resource of a target merchant, the method further comprising:
receiving, in a trusted execution environment, a lease request for the target resource from the target user.
3. The method of claim 1 or 2, after creating a lease contract between the target user and the target merchant for the target resource based on the target user's private data and the target resource's lease request, the method further comprising:
and sending the identifier of the leasing contract of the target resource to the target merchant.
4. The method of claim 3, wherein sending the target resource lease contract to the target merchant if it is determined that the target user violates a specified condition agreed in the target resource lease contract based on the performance condition, comprises:
receiving an acquisition request of a lease contract of the target resource from the target merchant, wherein the acquisition request of the lease contract of the target resource carries an identifier of the lease contract of the target resource;
in response to the acquisition request of the lease contract, acquiring a behavior operation record of the target user for the target resource based on the identification of the lease contract of the target resource;
and if the behavior operation record of the target user for the target resource violates the specified condition, sending the lease contract of the target resource to the target merchant.
5. The method of claim 4, wherein retrieving, in response to the retrieval request for the lease contract, a behavioral operation record of the target user for the target resource based on the identification of the lease contract for the target resource comprises:
in response to the acquisition request of the lease contract, acquiring the privacy data of the target user in the lease contract of the target resource based on the identification of the lease contract of the target resource;
and acquiring the behavior operation record of the target user aiming at the target resource based on the privacy data of the target user.
6. The method of claim 5, wherein if the behavioral operation record of the target user for the target resource violates the specified condition, sending the lease contract for the target resource to the target merchant, comprises:
if the behavior operation record of the target user for the target resource violates the specified condition, determining whether the acquisition request of the lease contract is a first request;
if the acquisition request of the rental contract is determined to be a first request and the time period of the target user violating the specified condition is greater than or equal to a first preset time period threshold, sending the rental contract to the target merchant;
and if the acquisition request of the lease contract is determined to be a non-primary request and the time period of the target user violating the specified condition after the primary request is greater than or equal to a second preset time period threshold, sending the lease contract of the target resource to the target merchant.
7. The method of claim 6, further comprising:
and if the acquisition request of the lease contract is determined to be a first request and the time period of the target user violating the specified condition is less than the first preset time period threshold, sending prompt information to the target user for indicating the target user to fulfill the specified condition.
8. The method of claim 7, after sending the indication information to the target user, the method further comprising:
and if the target user does not fulfill the specified condition within a preset time period after receiving the prompt message, sending the lease contract of the target resource to the target merchant.
9. An apparatus for protecting private data, the apparatus being applied to a third-party application, comprising:
the authorization acquisition unit is used for responding to a target resource leasing request of a target merchant from a target user and acquiring the authorization of the target user for the privacy data of the target user;
a contract creating unit that creates a lease contract between the target user and the target merchant with respect to the target resource based on the privacy data of the target user and the lease request of the target resource; the target user and the target merchant sign the lease contract through the third-party application, and the privacy data of the target user is stored in a trusted execution environment in the third-party application;
the contract monitoring unit is used for monitoring the performance of the target user on the leasing contract of the target resource;
and the contract sending unit is used for sending the target resource leasing contract to the target merchant if the target user is determined to violate the appointed condition agreed in the target resource leasing contract based on the fulfillment condition, wherein the target resource leasing contract comprises the privacy data of the target user.
10. An electronic device, comprising:
a processor; and
a memory arranged to store computer executable instructions for a third party application, the executable instructions when executed causing the processor to:
responding to a target resource leasing request of a target merchant from a target user, and acquiring the authorization of the target user for the privacy data of the target user;
creating a lease contract between the target user and the target merchant for the target resource based on the privacy data of the target user and the lease request for the target resource; the target user and the target merchant sign the lease contract through the third-party application, and the privacy data of the target user is stored in a trusted execution environment in the third-party application;
monitoring the performance of the target user on the lease contract of the target resource;
and if the target user is determined to violate the appointed condition agreed in the leasing contract of the target resource based on the fulfillment condition, sending the leasing contract of the target resource to the target merchant, wherein the leasing contract of the target resource comprises the privacy data of the target user.
11. A computer readable storage medium storing one or more programs, the one or more programs being third party applications, which when executed by an electronic device including a plurality of application programs, cause the electronic device to perform operations comprising:
responding to a target resource leasing request of a target merchant from a target user, and acquiring the authorization of the target user for the privacy data of the target user;
creating a lease contract between the target user and the target merchant for the target resource based on the privacy data of the target user and the lease request for the target resource; the target user and the target merchant sign the lease contract through the third-party application, and the privacy data of the target user is stored in a trusted execution environment in the third-party application;
monitoring the performance of the target user on the lease contract of the target resource;
and if the target user is determined to violate the appointed condition agreed in the leasing contract of the target resource based on the fulfillment condition, sending the leasing contract of the target resource to the target merchant, wherein the leasing contract of the target resource comprises the privacy data of the target user.
CN202010312991.2A 2020-04-20 2020-04-20 Method, device and system for protecting private data and electronic equipment Active CN111523138B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010312991.2A CN111523138B (en) 2020-04-20 2020-04-20 Method, device and system for protecting private data and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010312991.2A CN111523138B (en) 2020-04-20 2020-04-20 Method, device and system for protecting private data and electronic equipment

Publications (2)

Publication Number Publication Date
CN111523138A CN111523138A (en) 2020-08-11
CN111523138B true CN111523138B (en) 2022-04-29

Family

ID=71901663

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010312991.2A Active CN111523138B (en) 2020-04-20 2020-04-20 Method, device and system for protecting private data and electronic equipment

Country Status (1)

Country Link
CN (1) CN111523138B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117350718A (en) * 2022-10-17 2024-01-05 刘文皓 Digital RMB (RMB) performance system and method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105303123A (en) * 2015-11-02 2016-02-03 山东大学 Blocking confusion based dynamic data privacy protection system and method
CN107944970A (en) * 2017-12-06 2018-04-20 阿里巴巴集团控股有限公司 The method that lease is realized based on credit
CN109034812A (en) * 2018-09-04 2018-12-18 深圳市百宝廊珠宝首饰有限公司 A kind of method of payment and device based on automobile leasing
CN109344602A (en) * 2018-10-17 2019-02-15 南京汽车集团有限公司 A kind of shared automobile information method for secret protection based on Hash One-Way Encryption
CN110009388A (en) * 2019-02-02 2019-07-12 阿里巴巴集团控股有限公司 Equipment leasing method, apparatus, equipment and storage medium
CN110990871A (en) * 2019-11-29 2020-04-10 腾讯云计算(北京)有限责任公司 Machine learning model training method, prediction method and device based on artificial intelligence

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8566464B2 (en) * 2009-04-27 2013-10-22 Larry R. Laycock Network based storage and accounts
CN110298471A (en) * 2019-03-14 2019-10-01 上海润廷电子科技有限公司 Based on holding space Optimal Configuration Method, terminal and the medium for robbing mono- turn of list

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105303123A (en) * 2015-11-02 2016-02-03 山东大学 Blocking confusion based dynamic data privacy protection system and method
CN107944970A (en) * 2017-12-06 2018-04-20 阿里巴巴集团控股有限公司 The method that lease is realized based on credit
CN109034812A (en) * 2018-09-04 2018-12-18 深圳市百宝廊珠宝首饰有限公司 A kind of method of payment and device based on automobile leasing
CN109344602A (en) * 2018-10-17 2019-02-15 南京汽车集团有限公司 A kind of shared automobile information method for secret protection based on Hash One-Way Encryption
CN110009388A (en) * 2019-02-02 2019-07-12 阿里巴巴集团控股有限公司 Equipment leasing method, apparatus, equipment and storage medium
CN110990871A (en) * 2019-11-29 2020-04-10 腾讯云计算(北京)有限责任公司 Machine learning model training method, prediction method and device based on artificial intelligence

Also Published As

Publication number Publication date
CN111523138A (en) 2020-08-11

Similar Documents

Publication Publication Date Title
CN110263583B (en) Method and device for infringement and evidence preservation based on block chain and electronic equipment
CN110032880B (en) Screen recording evidence obtaining method and system based on block chain and electronic equipment
CN113840012B (en) Block chain-based screen recording evidence obtaining method and system and electronic equipment
CN109086975B (en) Transaction risk identification method and device
CN110490773B (en) Block chain-based screen recording evidence obtaining method and device and electronic equipment
CN109298926B (en) Method and device for entering resource transfer party into resource transfer platform and electronic equipment
CN111415158B (en) Wind control method and system based on block chain
CN110955903B (en) Privacy resource authority control method, device and equipment based on intelligent graph calculation
CN110675213B (en) Method and device for putting credit service product and electronic equipment
CN110032846A (en) The anti-misuse method and device of identity data, electronic equipment
CN111523138B (en) Method, device and system for protecting private data and electronic equipment
CN111310137B (en) Block chain associated data evidence storing method and device and electronic equipment
CN109308573A (en) A kind of business risk control method, device and electronic equipment based on risk point
CN110443291B (en) Model training method, device and equipment
CN111259429A (en) Resource operation authority control method and device and electronic equipment
CN111079092A (en) Copyright transfer method and system based on block chain
CN109063967B (en) Processing method and device for wind control scene feature tensor and electronic equipment
CN112734349A (en) Interface generation method, data calling method, device and electronic equipment
CN112907359B (en) Bank loan business qualification auditing and risk control system and method
CN113761581A (en) Authority control method and device in block chain and electronic equipment
CN112487485B (en) Personal data processing method and device based on zero-knowledge proof and electronic equipment
CN111461730A (en) Wind control method, device and system and electronic equipment
CN109615465B (en) Service order processing method and device and electronic equipment
CN112907256A (en) Account verification method and device in online shopping scene
CN111309495A (en) Batch processing request initiating method and device, risk identification platform and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant