CN112182643A - Data privacy protection method and device, electronic equipment and storage medium - Google Patents

Data privacy protection method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN112182643A
CN112182643A CN202010930485.XA CN202010930485A CN112182643A CN 112182643 A CN112182643 A CN 112182643A CN 202010930485 A CN202010930485 A CN 202010930485A CN 112182643 A CN112182643 A CN 112182643A
Authority
CN
China
Prior art keywords
information
privacy
data
maintenance
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010930485.XA
Other languages
Chinese (zh)
Inventor
袁香宇
林浩生
王博
吕沙沙
李爽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN202010930485.XA priority Critical patent/CN112182643A/en
Publication of CN112182643A publication Critical patent/CN112182643A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/20Administration of product repair or maintenance

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Human Resources & Organizations (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Economics (AREA)
  • Medical Informatics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to the technical field of data privacy protection, and particularly provides a data privacy protection method and device, electronic equipment and a storage medium. The data privacy protection method comprises the following steps: acquiring maintenance request information and determining maintenance personnel; wherein the repair request information includes: fault information and user privacy information of a product to be maintained; desensitizing the user privacy information, and sending maintenance order information to the maintenance personnel; wherein the repair order information comprises: fault information of products to be maintained and privacy information of users after desensitization processing. The invention can ensure the maintenance efficiency and the safety and privacy protection of data.

Description

Data privacy protection method and device, electronic equipment and storage medium
Technical Field
The present invention relates to the field of data privacy protection technologies, and in particular, to a data privacy protection method and apparatus, an electronic device, and a storage medium.
Background
Under the big data background, when the electrical apparatus is maintained, the intellectualization of the electrical apparatus and the advance perception of the fault can be carried out according to the user data, so that the time for the fault to be maintained is greatly reduced. For the situation that a large amount of user data is needed, a maintainer is required to perform home maintenance usually, and related data of a user needs to be acquired before home maintenance so as to preliminarily determine a fault and communicate with the user in advance according to user information.
Disclosure of Invention
In order to solve the problem of ensuring the maintenance efficiency and the safety and privacy protection of data, the invention provides a data privacy protection method and device, electronic equipment and a storage medium.
In a first aspect, the present invention provides a data privacy protection method, including:
acquiring maintenance request information and determining maintenance personnel; wherein the repair request information includes: fault information and user privacy information of a product to be maintained;
desensitizing the user privacy information, and sending maintenance order information to the maintenance personnel; wherein the repair order information comprises: fault information of products to be maintained and privacy information of users after desensitization processing.
Optionally, the data privacy protection method further includes:
acquiring operation information of the product to be maintained according to the product identification code of the product to be maintained; wherein, the operation information of the product to be maintained comprises: product operation data and operation privacy data;
desensitizing the operation privacy information, and sending product operation data and desensitized operation privacy data to the maintenance personnel.
Optionally, in the data privacy protection method, the operation privacy data includes at least one of a power-on/off time, a usage duration, and a usage frequency.
Optionally, the data privacy protection method further includes:
obtaining a viewing request aiming at the running privacy data;
and generating feedback information according to the response operation of the preset personnel to the viewing request.
Optionally, in the data privacy protection method, the generating feedback information according to a response operation of a preset person to the viewing request includes:
and if the response operation of the preset personnel to the viewing request is to allow viewing, decrypting the operation privacy data to generate feedback information, wherein the feedback information comprises the decrypted operation privacy data.
Optionally, in the data privacy protection method, the user privacy information includes a first phone number; desensitizing the user privacy information, comprising:
desensitizing the first telephone number to obtain a transit telephone number, so that the maintenance personnel can realize the communication with the user through the transit telephone number.
Optionally, the data privacy protection method further includes: and acquiring the call record of the maintenance personnel and the user through the transfer telephone number.
Optionally, in the above data privacy protection method, desensitizing the user privacy information includes:
and desensitizing the user privacy information by using an AES encryption algorithm.
Optionally, the data privacy protection method further includes: and acquiring the monitoring information of the maintenance process of the maintenance personnel in real time under the state that the monitoring function is started by the user.
In a second aspect, the present invention provides a data privacy protecting apparatus, including:
the determining module is used for acquiring maintenance request information and determining maintenance personnel; wherein the repair request information includes: fault information and user privacy information of a product to be maintained;
the processing module is used for desensitizing the user privacy information and sending maintenance order information to the maintenance personnel; wherein the repair order information comprises: fault information of products to be maintained and privacy information of users after desensitization processing.
In a third aspect, the present invention also provides an electronic device, including a memory and a processor, where the memory stores a computer program, and the computer program, when executed by the processor, implements the data privacy protection method according to the first aspect.
In a fourth aspect, the present invention also provides a storage medium having a computer program stored thereon, where the computer program is executed by one or more processors to implement the data privacy protection method according to the first aspect.
Compared with the prior art, one or more embodiments in the above scheme can have the following advantages or beneficial effects:
the data privacy protection method provided by the invention obtains maintenance request information and determines maintenance personnel; desensitizing the user privacy information in the maintenance request information, and sending maintenance order information containing fault information of a product to be maintained and desensitized user privacy information to the maintenance personnel; through desensitization before showing maintenance request information to the maintainer, can effectively protect user's data privacy, avoid revealing user privacy in the dispatch in-process of reporting for repair on the internet and the maintenance flow of visiting, guarantee the problem of the safe privacy protection of data when solving and guaranteeing maintenance efficiency.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
FIG. 1 is a flow chart of a data privacy protection method according to an embodiment of the present invention;
fig. 2a is a schematic diagram of an encryption process using an AES encryption algorithm according to an embodiment of the present invention;
FIG. 2b is a schematic diagram of a decryption process using an AES encryption algorithm according to an embodiment of the present invention;
fig. 3 is a block diagram of a data privacy protection apparatus according to a second embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
The data privacy protection method provided by the invention can be applied to the home appliance on-site maintenance process, and enterprises need to analyze, recommend or give an early warning according to behavior data of a plurality of users. In the aspect of household appliances, the intellectualization of the appliances and the advance perception of faults can be realized according to user data, so that the time for waiting for maintenance of the faults is greatly shortened. For the situation that a large amount of user data is needed, privacy protection is needed to be carried out on the user data, the collected data is screened, encryption processing is carried out on the data needing to be protected (such as user names, telephone numbers, addresses, operation starting and ending time of electric appliances and the like), and for alarm information sent by some sensors, operation logs of WARN grades and the like, maintenance workers can directly read the alarm information, errors are conveniently checked, and maintenance processes are convenient. The maintenance efficiency is guaranteed, and meanwhile the safety and privacy of the user are guaranteed.
Example one
Referring to fig. 1, the data privacy protection method provided in this embodiment may be applied to an electronic device, for example, a server, and includes steps S110 to S120:
and step S110, obtaining maintenance request information and determining maintenance personnel.
Wherein the maintenance request information includes: fault information of products to be maintained and user privacy information.
The product to be maintained may be a household appliance such as an air conditioner, a television, a washing machine, etc., the maintenance request information may be filled in through a repair system on a user terminal device (such as a mobile phone, a tablet computer, etc.), the fault information of the product to be maintained may be a relevant description performed by the user on a fault expression form of the product to be maintained, or may be a fixed fault option preset by the repair system, and the user selects a corresponding option according to the fault expression form of the product to be maintained, which is not limited in this embodiment.
The user privacy information includes personal information such as name, phone number, address, etc. When the maintenance request information is acquired, the maintenance personnel can be designated to perform the on-door maintenance according to the maintenance request information, optionally, the maintenance personnel who are good at maintaining the fault can be determined to be the maintenance personnel assigned by the maintenance request, the currently idle maintenance personnel can be determined to be the maintenance personnel assigned by the maintenance request according to the dispatching state of each maintenance personnel, or the maintenance request information can be pushed to each maintenance personnel, the maintenance personnel applies for dispatching, and the maintenance task is executed.
And step S120, desensitizing the user privacy information, and sending maintenance order information to maintenance personnel.
Wherein, the maintenance order information includes: fault information of products to be maintained and privacy information of users after desensitization processing.
Desensitizing user privacy information, comprising: desensitization processing is performed on user privacy information by using an Advanced Encryption Standard (AES) Encryption algorithm, the desensitized user privacy information is stored in a database, the information can be obtained as information plaintext only by holding a corresponding secret key, otherwise, the information is a complex ciphertext, and the Encryption and decryption processes by using the AES Encryption algorithm are schematically shown in fig. 2a and fig. 2 b. For example, after the name and the address in the user privacy information are desensitized by an AES encryption algorithm, a ciphertext with the name and the address hidden is obtained, the plaintext corresponding to the ciphertext can be restored by using a corresponding secret key, and through desensitization before maintenance request information is displayed to maintenance personnel, the data privacy of the user can be effectively protected, and the user privacy is prevented from being leaked in the dispatching process and the home maintenance process of on-line repair.
When a corresponding maintenance person is designated to process a corresponding maintenance order, the fault information of the product to be maintained and the privacy information of the user after desensitization processing are displayed to the maintenance person, and when the privacy information of the user includes a first telephone number, desensitization processing is performed on the privacy information of the user in step S120, including:
and step S120-1, desensitizing the first telephone number to obtain a transfer telephone number so that maintenance personnel can realize the communication with the user through the transfer telephone number.
For example, if the first phone number included in the user privacy information is 12345678987, after desensitization, a transit phone number 13579246801 of a third party is obtained, and when forwarding the service order information to the service person, the phone number is shown as the transit phone number, and the service person calls the user through the transit phone number to obtain more details, such as obtaining more fault information about the product to be serviced and related information of the user, such as an address. After the maintenance personnel and the user communicate, the maintenance personnel and the user carry the accessories which are possibly used to go to the address for maintenance after determining the door-to-door maintenance time, the door-to-door maintenance address and the fault information.
In order to further standardize and monitor the service behavior of the maintenance personnel, the method may further comprise:
and step S130, acquiring the call record of the maintenance personnel and the user through the transit telephone number.
Specifically, the call records can be opened and closed by the user at any time and uploaded to the server to monitor the service behavior of the maintenance personnel.
In order to maintain smoothly, more information about the product needs to be acquired during maintenance to accurately analyze and determine the product fault, and therefore, further, the method further comprises:
and step S140, acquiring the operation information of the product to be maintained according to the product identification code of the product to be maintained.
Wherein, the operation information of waiting to maintain the product includes: product operation data and operation privacy data; the operation privacy data includes at least one of on-off time, usage duration, and usage frequency.
The product identification code can be a unique product identification code in the form of a bar code, a two-dimensional code and the like, the product identification code can be a unique product identification code determined when the product leaves a factory, a maintenance worker can scan the product identification code through terminal equipment, can scan the product identification code through scanning equipment, can input the product identification code through a manual input mode, the server acquires the product identification code, searches and acquires the operation information of the product to be maintained corresponding to the product identification code according to the product identification code, the operation information not only comprises product operation data which can be directly disclosed so as to check errors and facilitate maintenance, for example, alarm information sent by a sensor of the product (the sensor in the product can send data to a database of the server in real time, and the data can be obtained through the product identification code) and a running log of the WARN grade, and run privacy data that is prone to reveal user privacy information, for example, run privacy data may include on/off time, length of use, and frequency of use.
And S150, desensitizing the operation privacy information, and sending the product operation data and the desensitized operation privacy data to maintenance personnel.
Because the operation information contains both product operation data and sensitive operation privacy data which is easy to reveal user privacy information, the product operation data can be sent to maintenance personnel by self, the operation privacy data still needs desensitization treatment, preferably, the AES encryption algorithm can be used for desensitization treatment of the operation privacy data, the desensitized operation privacy data are stored in a database, the information can be obtained by holding corresponding secret keys, and otherwise, the information is a pile of complex ciphertext.
Generally, product operation data are enough to be maintained and checked, but in case of some difficult faults or the problem that faults cannot be determined according to the product operation data, when the faults cannot be solved, more data are needed to provide data support to check the faults, at this time, operation privacy data may be needed, in order to ensure data privacy safety, maintenance personnel are needed to submit a check request aiming at the operation privacy data, and an administrator can approve the check request according to actual conditions to ensure that the user privacy is not revealed at will. Therefore, the method further comprises the steps of:
and step S160, obtaining a viewing request aiming at the running privacy data.
Specifically, the maintenance personnel can submit a viewing request for the operation privacy data through the terminal equipment.
And step S170, generating feedback information according to the response operation of the preset personnel to the viewing request.
The preset personnel can be a preset administrator or other personnel with the right to respond to the viewing request, and feedback information can be generated through the response operation of the preset personnel to the viewing request so as to display a result corresponding to the viewing request on the terminal equipment of the maintenance personnel.
Specifically, the step S170 of generating result feedback information according to the response operation of the preset person to the viewing request further includes the following sub-steps:
and S170-1, if the response operation of the preset personnel to the viewing request is to allow viewing, decrypting the operation privacy data and generating feedback information, wherein the feedback information comprises the decrypted operation privacy data. Maintenance personnel can accurately judge specific fault parts of the product according to the product operation data and operation privacy data allowed to be checked, targeted maintenance is carried out, maintenance and debugging time is saved, working efficiency is improved, protection is also carried out to a greater extent, and the privacy of a user is effectively guaranteed while the maintenance efficiency is improved in an intelligent home covered by big data.
In addition, for the checking request and the corresponding response operation, an approval record can be generated and stored in the database, and after the maintenance is completed, a maintenance record containing information of maintenance personnel, information of the maintenance request, the checking request aiming at the operation privacy data and the like can be generated, so that each link of the maintenance process can be traced, and which link is in error or the possibility of information leakage is determined.
And S170-2, if the response operation of the preset personnel to the viewing request is not allowed to be viewed, generating feedback information, wherein the feedback information comprises prompt information not allowed to be viewed.
In some cases, if the operation privacy data targeted by the check request of the maintenance personnel is preset data which is not allowed to be checked, or the operation privacy data is artificially displayed to the maintenance personnel after being audited by preset personnel (such as an administrator), if the operation privacy data is allowed to be checked, the privacy of the user can be seriously leaked, and privacy safety hazards are brought, response operation which is not allowed to be checked can be performed on the check request, so that the privacy of the operation privacy data is clarified.
In other cases, in order to standardize the work flow of the maintenance personnel, guarantee the rights and interests of users, and avoid some irregular behaviors or operations of the maintenance personnel in the maintenance process, the method can further comprise:
and step S180, acquiring monitoring information of a maintenance process of a maintenance worker in real time under the state that the user starts the monitoring function.
For example, a user can turn on or turn off a monitoring function through terminal equipment, after a maintenance person goes to the door, the user can turn on the monitoring function to monitor the maintenance process of the maintenance person in real time, monitoring information is uploaded to a server in real time so that a preset person can judge whether the operation of the maintenance person is standard or not, when the operation is not standard, the user can be reminded in time by sending a prompt message of improper operation to the terminal equipment of the user, if an illegal action exists in the maintenance process of the maintenance person, the user can be reminded in time to give an alarm by sending an alarm message to the terminal equipment of the user, or an administrator gives an alarm by himself to ensure the safety of the user, through the embodiment, on one hand, the safety of privacy data can be guaranteed in the maintenance process of the door, and on the.
According to the data privacy protection method provided by the embodiment, the privacy data (such as user privacy information and running privacy data) can be automatically detected without a third party role, the privacy data are protected, the protected data are not affected when being used, the problem of data leakage caused by artificial participation in a traditional encryption protection method is solved, and the privacy safety of a user is further ensured.
Example two
Referring to fig. 3, in accordance with an embodiment, the present embodiment provides a data privacy protection apparatus, including the following modules:
a determining module 210, configured to obtain maintenance request information and determine a maintenance worker; wherein the maintenance request information includes: fault information and user privacy information of a product to be maintained;
the processing module 220 is configured to perform desensitization processing on the user privacy information and send maintenance order information to maintenance staff; wherein, the maintenance order information includes: fault information of products to be maintained and privacy information of users after desensitization processing.
It is understood that the determining module 210 can be used to execute the step S110 in the first embodiment, and the processing module 220 can be used to execute the step S120 in the first embodiment.
Further, the data privacy protection apparatus may further include:
the obtaining module 230 is configured to obtain a call record of the maintenance staff and the user through the transit phone number; acquiring operation information of the product to be maintained according to the product identification code of the product to be maintained; obtaining a viewing request aiming at running private data; and acquiring monitoring information of the maintenance process of maintenance personnel in real time under the state that the monitoring function is started by the user.
The processing module 220 is further configured to: desensitizing the operation privacy information, and sending product operation data and desensitized operation privacy data to maintenance personnel; and generating feedback information according to the response operation of the preset personnel to the viewing request.
It is understood that the acquiring module can be used to execute steps S130 to S140, S160, and S180 in the first embodiment, and the processing module 220 is also used to execute steps S150 and S170 in the first embodiment.
For the implementation content of the specific step, please refer to the related content of the first embodiment, which is not described in detail in this embodiment.
EXAMPLE III
The embodiment provides an electronic device, which includes a memory and a processor, where the memory stores a computer program, and the computer program, when executed by the processor, implements the data privacy protection method of the first embodiment.
In this embodiment, the electronic Device may be a server, and the Processor may be an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a controller, a microcontroller, a microprocessor, or other electronic components, and is configured to execute the method in the foregoing embodiments. The method implemented when the computer program running on the processor is executed may refer to a specific embodiment of the method provided in the first embodiment of the present invention, and details thereof are not described here.
Example four
The present embodiment provides a storage medium, where a computer program is stored on the storage medium, and when the computer program is executed by one or more processors, the method for protecting data privacy of the first embodiment is implemented.
In this embodiment, the storage medium may be implemented by any type of volatile or nonvolatile storage device or combination thereof, such as a Static Random Access Memory (SRAM), an Electrically Erasable Programmable Read-Only Memory (EEPROM), an Erasable Programmable Read-Only Memory (EPROM), a Programmable Read-Only Memory (PROM), a Read-Only Memory (ROM), a magnetic Memory, a flash Memory, a magnetic disk, or an optical disk.
In the embodiments provided in the present invention, it should be understood that the disclosed system and method can be implemented in other ways. The system and method embodiments described above are merely illustrative.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Although the embodiments of the present invention have been described above, the above descriptions are only for the convenience of understanding the present invention, and are not intended to limit the present invention. It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (12)

1. A method for protecting data privacy, comprising:
acquiring maintenance request information and determining maintenance personnel; wherein the repair request information includes: fault information and user privacy information of a product to be maintained;
desensitizing the user privacy information, and sending maintenance order information to the maintenance personnel; wherein the repair order information comprises: fault information of products to be maintained and privacy information of users after desensitization processing.
2. The method of data privacy protection according to claim 1, further comprising:
acquiring operation information of the product to be maintained according to the product identification code of the product to be maintained; wherein, the operation information of the product to be maintained comprises: product operation data and operation privacy data;
desensitizing the operation privacy information, and sending product operation data and desensitized operation privacy data to the maintenance personnel.
3. The method of claim 2, wherein the operation privacy data comprises at least one of on/off time, duration of use, and frequency of use.
4. The method of data privacy protection according to claim 2, further comprising:
obtaining a viewing request aiming at the running privacy data;
and generating feedback information according to the response operation of the preset personnel to the viewing request.
5. The data privacy protection method according to claim 4, wherein the generating feedback information according to the response operation of the preset person to the viewing request includes:
and if the response operation of the preset personnel to the viewing request is to allow viewing, decrypting the operation privacy data to generate feedback information, wherein the feedback information comprises the decrypted operation privacy data.
6. The data privacy protection method of claim 1, wherein the user privacy information includes a first phone number; desensitizing the user privacy information, comprising:
desensitizing the first telephone number to obtain a transit telephone number, so that the maintenance personnel can realize the communication with the user through the transit telephone number.
7. The method of claim 6, wherein the method further comprises: and acquiring the call record of the maintenance personnel and the user through the transfer telephone number.
8. The data privacy protection method of claim 1, wherein desensitizing the user privacy information comprises:
and desensitizing the user privacy information by using an AES encryption algorithm.
9. The method of data privacy protection according to claim 1, further comprising: and acquiring the monitoring information of the maintenance process of the maintenance personnel in real time under the state that the monitoring function is started by the user.
10. A data privacy protection apparatus, comprising:
the determining module is used for acquiring maintenance request information and determining maintenance personnel; wherein the repair request information includes: fault information and user privacy information of a product to be maintained;
the processing module is used for desensitizing the user privacy information and sending maintenance order information to the maintenance personnel; wherein the repair order information comprises: fault information of products to be maintained and privacy information of users after desensitization processing.
11. An electronic device comprising a memory and a processor, the memory having stored thereon a computer program that, when executed by the processor, implements a method of data privacy protection as claimed in any one of claims 1 to 9.
12. A storage medium having stored thereon a computer program which, when executed by one or more processors, implements a method of data privacy protection as claimed in any one of claims 1 to 9.
CN202010930485.XA 2020-09-07 2020-09-07 Data privacy protection method and device, electronic equipment and storage medium Pending CN112182643A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010930485.XA CN112182643A (en) 2020-09-07 2020-09-07 Data privacy protection method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010930485.XA CN112182643A (en) 2020-09-07 2020-09-07 Data privacy protection method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112182643A true CN112182643A (en) 2021-01-05

Family

ID=73925414

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010930485.XA Pending CN112182643A (en) 2020-09-07 2020-09-07 Data privacy protection method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112182643A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112966297A (en) * 2021-02-04 2021-06-15 华为技术有限公司 Data protection method, system, medium and electronic device
CN113055930A (en) * 2021-03-09 2021-06-29 Oppo广东移动通信有限公司 Data processing method, communication device, server, and storage medium
CN113886880A (en) * 2021-10-09 2022-01-04 京东科技信息技术有限公司 Data protection method, system, device and storage medium
CN114201772A (en) * 2021-11-19 2022-03-18 广东航宇卫星科技有限公司 Stock data desensitization method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108664812A (en) * 2018-05-14 2018-10-16 阿里巴巴集团控股有限公司 Information desensitization method, apparatus and system
CN109523040A (en) * 2018-11-23 2019-03-26 南京荣链科技有限公司 A kind of user equipment that protecting privacy reports method, server, system and medium for repairment
CN109995950A (en) * 2017-12-30 2019-07-09 中国移动通信集团贵州有限公司 Method, system, equipment and the medium of telephone outbound call

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109995950A (en) * 2017-12-30 2019-07-09 中国移动通信集团贵州有限公司 Method, system, equipment and the medium of telephone outbound call
CN108664812A (en) * 2018-05-14 2018-10-16 阿里巴巴集团控股有限公司 Information desensitization method, apparatus and system
CN109523040A (en) * 2018-11-23 2019-03-26 南京荣链科技有限公司 A kind of user equipment that protecting privacy reports method, server, system and medium for repairment

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112966297A (en) * 2021-02-04 2021-06-15 华为技术有限公司 Data protection method, system, medium and electronic device
CN113055930A (en) * 2021-03-09 2021-06-29 Oppo广东移动通信有限公司 Data processing method, communication device, server, and storage medium
CN113886880A (en) * 2021-10-09 2022-01-04 京东科技信息技术有限公司 Data protection method, system, device and storage medium
CN114201772A (en) * 2021-11-19 2022-03-18 广东航宇卫星科技有限公司 Stock data desensitization method and device

Similar Documents

Publication Publication Date Title
CN112182643A (en) Data privacy protection method and device, electronic equipment and storage medium
US8508332B2 (en) Access control
CN104200155A (en) Monitoring device and method for protecting user privacy based on iPhone operating system (iOS)
CN109558261B (en) Method and system for acquiring abnormal log of wearable device
US8869133B2 (en) Method and system for use in facilitating patch change management of industrial control systems
CN111083107B (en) Block chain-based network security vulnerability collection processing method
CN103929307A (en) Password input method, intelligent secret key device and client device
CN101160787A (en) Method, apparatus and data download system for controlling the validity of the download transaction
CN103095457A (en) Login and verification method for application program
CN1988515A (en) Self-diagnosing information processing system of rice cooker
CN106228085B (en) The method for secret protection and mobile terminal of application program
CN107979467A (en) Verification method and device
JP2011527806A (en) A method of supplying data obtained from process instruments and safely prevented from being tampered with
CN103701596A (en) Document access method, system and equipment and document access request response method, system and equipment
CN109039812B (en) Port detection method, system and computer readable storage medium
CN106992859A (en) A kind of fort machine private key management method and device
CN110569993A (en) Intelligent maintenance and maintenance system based on big data
CN112365629A (en) Fault diagnosis method and device, server and vehicle
CN109298895B (en) APP management method and device on mobile equipment
CN112182546A (en) Account number protection method and device, terminal equipment and storage medium
JP2003070063A (en) Data protection apparatus of radio communication terminal, data protection method of radio communication terminal, and system for the method
JP5674991B1 (en) Personal information leak monitoring system, personal information leak monitoring method, and personal information leak monitoring program
CN106161373A (en) A kind of security protection information cuing method, safety monitoring device and system
CN111641584A (en) Camera weak password monitoring method and device
CN114120499B (en) Submission equipment unlocking method based on dynamic encryption and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination