CN112883416A - Travel tracking data privacy protection method and device - Google Patents

Travel tracking data privacy protection method and device Download PDF

Info

Publication number
CN112883416A
CN112883416A CN202110132580.XA CN202110132580A CN112883416A CN 112883416 A CN112883416 A CN 112883416A CN 202110132580 A CN202110132580 A CN 202110132580A CN 112883416 A CN112883416 A CN 112883416A
Authority
CN
China
Prior art keywords
client software
server
password
travel path
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110132580.XA
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huaihang
Original Assignee
Huaihang
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huaihang filed Critical Huaihang
Priority to CN202110132580.XA priority Critical patent/CN112883416A/en
Publication of CN112883416A publication Critical patent/CN112883416A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H50/00ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics
    • G16H50/80ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for detecting, monitoring or modelling epidemics or pandemics, e.g. flu

Abstract

The application discloses a method and a device for protecting travel tracking data privacy, wherein the method comprises the following steps: the first client software acquires health information of the first user and changes the health information into a warning; the first client software responds to the warning and acquires a first travel path within a preset time period of the first user; the first client software sends the first travel path to the server; the server sends the first travel path to second client software; the second client software acquires the password from the password server and obtains the decrypted first travel path information according to the acquired password; and the second client software acquires a second travel path which is locally stored within a preset time period, and changes the health information of the second user into a warning under the condition that the first travel path and the second travel path have an intersection. The method and the device solve the balance problem between stream modulation and individual privacy protection, and improve the individual privacy protection on the basis of ensuring the stream modulation effect.

Description

Travel tracking data privacy protection method and device
Technical Field
The application relates to the field of data privacy protection, in particular to a method and a device for protecting travel tracking data privacy.
Background
Epidemiological investigation (abbreviated as epidemiological investigation) refers to the investigation and research conducted by the epidemiological method. Mainly used for studying the distribution of disease, health and hygiene events and their determinants. Reasonable preventive care countermeasures and health service measures will be proposed through these studies, and the effects of these countermeasures and measures will be evaluated.
Epidemiological investigation is an important work carried out according to law and regulations, such as the infectious disease prevention and treatment law of the people's republic of China and the emergency regulations of public health incidents.
The purpose of the flow modulation is to understand: in the past, the action tracks of key groups, the persons encountered and the events happened. The exposure, contact, motion track and medical condition are clarified for the health of the case or the people in close contact with the case. The spider silk traces related to the infection source and the transmission path are searched, the transmission chain is cleared, and a basis is provided for judging close contacts, taking isolation measures and defining a disinfection range. Therefore, the circulation is also to protect other people from infection and to control the spread of epidemic.
After the stream is adjusted, the track information of the adjusted person is generally published through a public network, which causes the privacy of the adjusted person to be revealed, and how to balance the stream and the privacy becomes an important problem at present, for which, no suitable solution is provided in the prior art.
Disclosure of Invention
The embodiment of the application provides a method and a device for protecting the privacy of travel tracking data, so as to at least solve the balance problem between flow regulation and personal privacy protection.
According to one aspect of the application, a travel tracking data privacy protection method is provided, and comprises the following steps: the method comprises the steps that first client software acquires health information of a first user to become an alarm, wherein the alarm is used for indicating that the first user contacts an infection source of a preset type of infectious diseases, and the first user is a user logged in the first client software; the first client software responds to the warning and acquires a first travel path within a preset time period of the first user, wherein the first travel path is acquired from a first mobile terminal used by the first user, the first travel path is only stored on the first mobile terminal before being acquired, and the first client software is installed on the first mobile terminal; the first client software sends the first travel path to a server; the server sends the first travel path to the second client software, wherein the first travel path information is encrypted and then sent to the second client software; the second client software acquires a password from a password server and obtains the decrypted first travel path information according to the acquired password; and the second client software acquires a second travel path which is locally stored within the preset time period, and changes the health information of a second user into a warning when the first travel path and the second travel path have an intersection, wherein the second client software is installed on a second mobile terminal, and the second user is a user logged in the second client software.
Further, before the first client software acquires the first travel path within the predetermined time period of the first user, the method further includes: the first client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; the first client software receives the value of the preset time period sent by the server; before the second client software acquires a second travel path within the predetermined time period saved locally, the method further includes: the second client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; and the second client software receives the value of the preset time period sent by the server.
Further, the server sending the first travel path to the second client software includes: the server sends a message of requesting the password to the password server; the password server acquires a password from pre-stored passwords according to the password requesting message, and sends the password and the identification information of the password to the server; the server encrypts the first travel path using the password; and the server sends the encrypted first path to the second client software.
Further, the second client software obtaining the password from the password server includes: the second client software acquires the identification information of the password from the server; the second client software sends the identification information of the password to the password server; and the second client software receives the password corresponding to the identification information sent by the password server.
According to another aspect of the present application, there is also provided a travel tracking data privacy protecting apparatus, including: the system comprises first client software, second client software, a server and a password server, wherein the first client software acquires health information of a first user and changes the health information into an alarm, the alarm is used for indicating that the first user contacts an infection source of a preset type of infectious diseases, and the first user is a user logged in the first client software; the first client software responds to the warning and acquires a first travel path within a preset time period of the first user, wherein the first travel path is acquired from a first mobile terminal used by the first user, the first travel path is only stored on the first mobile terminal before being acquired, and the first client software is installed on the first mobile terminal; the first client software sends the first travel path to a server; the server sends the first travel path to the second client software, wherein the first travel path information is encrypted and then sent to the second client software; the second client software acquires a password from a password server and obtains the decrypted first travel path information according to the acquired password; and the second client software acquires a second travel path which is locally stored within the preset time period, and changes the health information of a second user into a warning when the first travel path and the second travel path have an intersection, wherein the second client software is installed on a second mobile terminal, and the second user is a user logged in the second client software.
Further, before the first client software acquires the first travel path within the predetermined time period of the first user, the method further includes: the first client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; the first client software receives the value of the preset time period sent by the server; before the second client software acquires a second travel path within the predetermined time period saved locally, the method further includes: the second client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; and the second client software receives the value of the preset time period sent by the server.
Further, the server sending the first travel path to the second client software includes: the server sends a message of requesting the password to the password server; the password server acquires a password from pre-stored passwords according to the password requesting message, and sends the password and the identification information of the password to the server; the server encrypts the first travel path using the password; and the server sends the encrypted first path to the second client software.
Further, the second client software obtaining the password from the password server includes: the second client software acquires the identification information of the password from the server; the second client software sends the identification information of the password to the password server; and the second client software receives the password corresponding to the identification information sent by the password server.
According to another aspect of the present application, there is also provided a memory for storing software for performing the above method.
According to another aspect of the present application, there is also provided a processor for executing software, wherein the software is configured to perform the above method.
In the embodiment of the application, the first client software is adopted to acquire the health information of the first user and change the health information into an alarm, wherein the alarm is used for indicating that the first user contacts an infection source of a preset type of infectious diseases, and the first user is a user logged in the first client software; the first client software responds to the warning and acquires a first travel path within a preset time period of the first user, wherein the first travel path is acquired from a first mobile terminal used by the first user, the first travel path is only stored on the first mobile terminal before being acquired, and the first client software is installed on the first mobile terminal; the first client software sends the first travel path to a server; the server sends the first travel path to the second client software, wherein the first travel path information is encrypted and then sent to the second client software; the second client software acquires a password from a password server and obtains the decrypted first travel path information according to the acquired password; and the second client software acquires a second travel path which is locally stored within the preset time period, and changes the health information of a second user into a warning when the first travel path and the second travel path have an intersection, wherein the second client software is installed on a second mobile terminal, and the second user is a user logged in the second client software. The method and the device solve the balance problem between stream modulation and individual privacy protection, and improve the individual privacy protection on the basis of ensuring the stream modulation effect.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate embodiments of the application and, together with the description, serve to explain the application and are not intended to limit the application. In the drawings:
fig. 1 is a flow chart of a trip tracking data privacy protection method according to an embodiment of the application.
Detailed Description
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In this embodiment, an electronic device is provided, comprising a memory in which a computer program is stored and a processor arranged to run the computer program to perform the method in the following embodiments.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
In this embodiment, a method for protecting privacy of travel tracking data is provided, and fig. 1 is a flowchart of a method for protecting privacy of travel tracking data according to an embodiment of the present invention, as shown in fig. 1, the method includes the following steps:
step S102, acquiring health information of a first user by first client software to become an alarm, wherein the alarm is used for indicating that the first user contacts an infection source of a preset type of infectious disease, and the first user is a user logged in the first client software;
step S104, the first client software responds to the warning and acquires a first travel path within a preset time period of the first user, wherein the first travel path is acquired from a first mobile terminal used by the first user, the first travel path is only stored on the first mobile terminal before being acquired, and the first client software is installed on the first mobile terminal;
step S106, the first client software sends the first travel path to a server;
step S108, the server sends the first travel path to the second client software, wherein the first travel path information is sent to the second client software after being encrypted;
as an optional implementation manner that can be added, the second client software receives a selection of a second user, where the selection is used to instruct the second client software to report the path information of the second user to the server, and the reporting time is in units of days. The server acquires the path information of the second user and records that the second user is a preset user, the server marks the path information of the second user as a first grade, and the server also marks the path information of the user with the health information as a warning as a second grade; and after receiving the first travel path, the server sends the first travel path to all the preset users. And the path information of the user with the health information as the warning is forcibly reported to the server. And when the second user does not select to report the second path information to the server, sending indication information to the second client software every time the server receives second-level path information, wherein the indication information is used for indicating that a risk path is received, and the second client software performs path comparison. And the server sends the indication information at preset time intervals, and then sends the first travel path to the second client software.
By the processing mode, the first journey paths can be sent in batches, so that the stress of the server is relieved.
Step S110, the second client software acquires a password from a password server and obtains the decrypted first travel path information according to the acquired password;
step S112, the second client software obtains a second travel route stored locally within the predetermined time period, and changes the health information of a second user into an alert when the first travel route and the second travel route have an intersection, where the second client software is installed on a second mobile terminal, and the second user is a user logged in to the second client software.
As an optional implementation manner, the second travel path information acquired by the second client software includes the longitude and latitude of each path information point and the time of the path time point, and the second client software draws the longitude and latitude information into a second path line according to a predetermined ratio. The first travel path information acquired by the second client software comprises the longitude and latitude of each path point and the time of the path time point, the second client software connects the longitude and latitude according to a preset proportion and draws the first travel path information into a first path line, wherein the proportion and the mode of drawing the first path line and the second path line are the same, the first path line and the second path line are prevented from being on a map with the same preset proportion, the coincident point in the first path line and the second path line is found, the first time of the coincident point in the first travel path information and the second time of the coincident point in the second travel path information are determined, and if the difference between the first time and the second time is smaller than a threshold value, the coincident point is determined to be the intersection point.
As another optional implementation manner that can be added, the threshold value corresponds to an epidemic category for performing streaming, an existing cross-infection case of the epidemic category is obtained, a known time of cross-infection is obtained, and a first model is trained by using a neural network machine learning manner, wherein the first model is obtained by using multiple sets of training data, each set of training data includes first input data and first output data, the first input data is a symptom corresponding to the epidemic, and the first output data is a cross-infection time corresponding to the symptom. After the first model is trained, symptoms of another epidemic are input into the first model, which outputs a time to cross-infection. The threshold value is determined after the cross-infection time is reduced by a predetermined percentage. The predetermined percentage of reduction is determined by the number of people already infected, and if the number of infected people in a region exceeds 1% of the total number of people in the region, the cross-infection time is reduced by 1% as the threshold.
As another optional implementation manner that may be added, a related user preset by the second user is obtained, where the related user is a user in the same residence or the same work place as the second user, and the second client software sends information to the related user, where the information is used to indicate that the health information of the second user becomes an alert. The software client of the associated user changes the health information of the associated user to be associated with the user whose health information is an alert.
Through the steps, the flow-adjusted path information is published from a public channel, the flow-adjusted path information is changed into software of the mobile terminal to be compared by self, when the comparison is successful, the health information of the second user is changed into a warning, the second user knows that the second user has infection risks, but does not disclose the intersection point of the first travel path and the second travel path, namely the first travel path, the second travel path and the intersection point are not disclosed on any client software. Therefore, the balance problem between the flow regulation and the personal privacy protection is solved, and the personal privacy protection is improved on the basis of ensuring the flow regulation effect.
Preferably, before the first client software acquires the first travel path within the predetermined time period of the first user, the method further includes: the first client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; the first client software receives the value of the preset time period sent by the server; before the second client software acquires a second travel path within the predetermined time period saved locally, the method further includes: the second client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; and the second client software receives the value of the preset time period sent by the server.
Preferably, the server sending the first travel path to the second client software includes: the server sends a message of requesting the password to the password server; the password server acquires a password from pre-stored passwords according to the password requesting message, and sends the password and the identification information of the password to the server; the server encrypts the first travel path using the password; and the server sends the encrypted first path to the second client software.
Preferably, the second client software obtaining the password from the password server includes: the second client software acquires the identification information of the password from the server; the second client software sends the identification information of the password to the password server; and the second client software receives the password corresponding to the identification information sent by the password server.
In this embodiment, a device for protecting privacy of trip tracking data is further provided, where the device corresponds to the steps in the above method, and the description has been made in the method, and is not repeated herein, and the device includes: the system comprises first client software, second client software, a server and a password server, wherein the first client software acquires health information of a first user and changes the health information into an alarm, the alarm is used for indicating that the first user contacts an infection source of a preset type of infectious diseases, and the first user is a user logged in the first client software; the first client software responds to the warning and acquires a first travel path within a preset time period of the first user, wherein the first travel path is acquired from a first mobile terminal used by the first user, the first travel path is only stored on the first mobile terminal before being acquired, and the first client software is installed on the first mobile terminal; the first client software sends the first travel path to a server; the server sends the first travel path to the second client software, wherein the first travel path information is encrypted and then sent to the second client software; the second client software acquires a password from a password server and obtains the decrypted first travel path information according to the acquired password; and the second client software acquires a second travel path which is locally stored within the preset time period, and changes the health information of a second user into a warning when the first travel path and the second travel path have an intersection, wherein the second client software is installed on a second mobile terminal, and the second user is a user logged in the second client software.
Preferably, before the first client software acquires the first travel path within the predetermined time period of the first user, the method further includes: the first client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; the first client software receives the value of the preset time period sent by the server; before the second client software acquires a second travel path within the predetermined time period saved locally, the method further includes: the second client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; and the second client software receives the value of the preset time period sent by the server.
Preferably, the server sending the first travel path to the second client software includes: the server sends a message of requesting the password to the password server; the password server acquires a password from pre-stored passwords according to the password requesting message, and sends the password and the identification information of the password to the server; the server encrypts the first travel path using the password; and the server sends the encrypted first path to the second client software.
Preferably, the second client software obtaining the password from the password server includes: the second client software acquires the identification information of the password from the server; the second client software sends the identification information of the password to the password server; and the second client software receives the password corresponding to the identification information sent by the password server.
There is also provided in this embodiment a memory for storing software for performing the above method.
There is also provided in this embodiment a processor for executing software for performing the above method.
The embodiment of the application provides a storage medium, on which a program or software is stored, and the program realizes the method when being executed by a processor. The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A method for protecting travel tracking data privacy, comprising:
the method comprises the steps that first client software acquires health information of a first user to become an alarm, wherein the alarm is used for indicating that the first user contacts an infection source of a preset type of infectious diseases, and the first user is a user logged in the first client software;
the first client software responds to the warning and acquires a first travel path within a preset time period of the first user, wherein the first travel path is acquired from a first mobile terminal used by the first user, the first travel path is only stored on the first mobile terminal before being acquired, and the first client software is installed on the first mobile terminal;
the first client software sends the first travel path to a server;
the server sends the first travel path to the second client software, wherein the first travel path information is encrypted and then sent to the second client software;
the second client software acquires a password from a password server and obtains the decrypted first travel path information according to the acquired password;
and the second client software acquires a second travel path which is locally stored within the preset time period, and changes the health information of a second user into a warning when the first travel path and the second travel path have an intersection, wherein the second client software is installed on a second mobile terminal, and the second user is a user logged in the second client software.
2. The method of claim 1,
before the first client software acquires the first travel path within the predetermined time period of the first user, the method further includes: the first client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; the first client software receives the value of the preset time period sent by the server;
before the second client software acquires a second travel path within the predetermined time period saved locally, the method further includes: the second client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; and the second client software receives the value of the preset time period sent by the server.
3. The method of claim 1 or 2, wherein the server sending the first travel path to the second client software comprises:
the server sends a message of requesting the password to the password server;
the password server acquires a password from pre-stored passwords according to the password requesting message, and sends the password and the identification information of the password to the server;
the server encrypts the first travel path using the password;
and the server sends the encrypted first path to the second client software.
4. The method of any of claims 1 to 3, wherein the second client software obtaining the password from the password server comprises:
the second client software acquires the identification information of the password from the server;
the second client software sends the identification information of the password to the password server;
and the second client software receives the password corresponding to the identification information sent by the password server.
5. A travel tracking data privacy preserving apparatus, comprising: a first client software, a second client software, a server and a password server, wherein,
the first client software acquires health information of a first user and changes the health information into an alarm, wherein the alarm is used for indicating that the first user contacts an infection source of a preset type of infectious diseases, and the first user is a user logged in the first client software;
the first client software responds to the warning and acquires a first travel path within a preset time period of the first user, wherein the first travel path is acquired from a first mobile terminal used by the first user, the first travel path is only stored on the first mobile terminal before being acquired, and the first client software is installed on the first mobile terminal;
the first client software sends the first travel path to a server;
the server sends the first travel path to the second client software, wherein the first travel path information is encrypted and then sent to the second client software;
the second client software acquires a password from a password server and obtains the decrypted first travel path information according to the acquired password;
and the second client software acquires a second travel path which is locally stored within the preset time period, and changes the health information of a second user into a warning when the first travel path and the second travel path have an intersection, wherein the second client software is installed on a second mobile terminal, and the second user is a user logged in the second client software.
6. The apparatus of claim 5,
before the first client software acquires the first travel path within the predetermined time period of the first user, the method further includes: the first client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; the first client software receives the value of the preset time period sent by the server;
before the second client software acquires a second travel path within the predetermined time period saved locally, the method further includes: the second client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; and the second client software receives the value of the preset time period sent by the server.
7. The apparatus of claim 5 or 6, wherein the server sending the first travel path to the second client software comprises:
the server sends a message of requesting the password to the password server;
the password server acquires a password from pre-stored passwords according to the password requesting message, and sends the password and the identification information of the password to the server;
the server encrypts the first travel path using the password;
and the server sends the encrypted first path to the second client software.
8. The apparatus of any of claims 5 to 7, wherein the second client software obtaining the password from the password server comprises:
the second client software acquires the identification information of the password from the server;
the second client software sends the identification information of the password to the password server;
and the second client software receives the password corresponding to the identification information sent by the password server.
9. A memory for storing software, wherein the software is configured to perform the method of any one of claims 1 to 4.
10. A processor configured to execute software, wherein the software is configured to perform the method of any one of claims 1 to 4.
CN202110132580.XA 2021-01-31 2021-01-31 Travel tracking data privacy protection method and device Pending CN112883416A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110132580.XA CN112883416A (en) 2021-01-31 2021-01-31 Travel tracking data privacy protection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110132580.XA CN112883416A (en) 2021-01-31 2021-01-31 Travel tracking data privacy protection method and device

Publications (1)

Publication Number Publication Date
CN112883416A true CN112883416A (en) 2021-06-01

Family

ID=76052053

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110132580.XA Pending CN112883416A (en) 2021-01-31 2021-01-31 Travel tracking data privacy protection method and device

Country Status (1)

Country Link
CN (1) CN112883416A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070106775A1 (en) * 2005-03-01 2007-05-10 Wong Chon M System and method for creating a proximity map of plurality of living beings and objects
CN105740615A (en) * 2016-01-28 2016-07-06 中山大学 Method for tracking infection sources and predicting trends of infectious diseases by utilizing mobile phone tracks
CN108986921A (en) * 2018-07-04 2018-12-11 泰康保险集团股份有限公司 Disease forecasting method, apparatus, medium and electronic equipment
CN111446006A (en) * 2020-04-08 2020-07-24 陈恬慧 Method for tracking close contact person in epidemic situation of infectious disease
CN111586586A (en) * 2020-05-14 2020-08-25 深圳力维智联技术有限公司 Tracking method and system
CN111629340A (en) * 2020-07-30 2020-09-04 北京大学第三医院(北京大学第三临床医学院) Personnel contact condition tracking method and system capable of protecting privacy
CN111812688A (en) * 2020-06-05 2020-10-23 中南大学湘雅二医院 GPS-based tracking method for potential carrier of respiratory infectious disease
CN111954151A (en) * 2020-07-28 2020-11-17 捷德(中国)科技有限公司 Target object determination method, device, system and storage medium
CN111984992A (en) * 2020-07-31 2020-11-24 鹏城实验室 Infectious disease tracking method and system for preventing user leakage and terminal equipment
CN112153575A (en) * 2020-09-27 2020-12-29 深圳前海微众银行股份有限公司 Method, device and equipment for tracking contact person and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070106775A1 (en) * 2005-03-01 2007-05-10 Wong Chon M System and method for creating a proximity map of plurality of living beings and objects
CN105740615A (en) * 2016-01-28 2016-07-06 中山大学 Method for tracking infection sources and predicting trends of infectious diseases by utilizing mobile phone tracks
CN108986921A (en) * 2018-07-04 2018-12-11 泰康保险集团股份有限公司 Disease forecasting method, apparatus, medium and electronic equipment
CN111446006A (en) * 2020-04-08 2020-07-24 陈恬慧 Method for tracking close contact person in epidemic situation of infectious disease
CN111586586A (en) * 2020-05-14 2020-08-25 深圳力维智联技术有限公司 Tracking method and system
CN111812688A (en) * 2020-06-05 2020-10-23 中南大学湘雅二医院 GPS-based tracking method for potential carrier of respiratory infectious disease
CN111954151A (en) * 2020-07-28 2020-11-17 捷德(中国)科技有限公司 Target object determination method, device, system and storage medium
CN111629340A (en) * 2020-07-30 2020-09-04 北京大学第三医院(北京大学第三临床医学院) Personnel contact condition tracking method and system capable of protecting privacy
CN111984992A (en) * 2020-07-31 2020-11-24 鹏城实验室 Infectious disease tracking method and system for preventing user leakage and terminal equipment
CN112153575A (en) * 2020-09-27 2020-12-29 深圳前海微众银行股份有限公司 Method, device and equipment for tracking contact person and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
网易首页: "各国新冠密切接触者追踪器哪家强?我们做了个研究", pages 2, Retrieved from the Internet <URL:https://www.163.com/dy/article/FABJGQRL05129QAF.html> *

Similar Documents

Publication Publication Date Title
Conyon et al. Lockdowns and COVID-19 deaths in Scandinavia
Ram et al. Mass surveillance in the age of COVID-19
Whitaker et al. Investigating the assumptions of the self‐controlled case series method
Kuhn et al. Covid notions: Towards formal definitions–and documented understanding–of privacy goals and claimed protection in proximity-tracing services
Shukla et al. Privacy guidelines for contact tracing applications
Wang et al. Privacy risk and preservation in contact tracing of COVID‐19
Von Arx et al. Slowing the Spread of Infectious Diseases Using Crowdsourced Data.
Jhanwar et al. Phyct: Privacy preserving hybrid contact tracing
Da et al. React: Real-time contact tracing and risk monitoring via privacy-enhanced mobile tracking
CN112883416A (en) Travel tracking data privacy protection method and device
Wang et al. Privacy risk and preservation for COVID-19 contact tracing apps
Mohsen et al. Countering intrusiveness using new security-centric ranking algorithm built on top of elasticsearch
Gamboa et al. Measures to assess a warning vaccination level in a stochastic SIV model with imperfect vaccine
Ali et al. A study on contact tracing apps for Covid-19: Privacy and security perspective.
CN114491631B (en) Nursing sensitive index information interaction method and monitoring device
CN116663026A (en) Block chain-based data processing method and device, electronic equipment and medium
Jones A fatal flaw in mortality based disease surveillance
Trestian et al. Privatt-a closer look at people’s data privacy attitudes in times of covid-19
Kurian et al. Utilization of mobility data in the fight against COVID-19
Hussein et al. Trust concerns in health apps collecting personally identifiable information during COVID-19-like zoonosis
CN110852517B (en) Abnormal behavior early warning method and device, data processing equipment and storage medium
CN112989382A (en) Block chain-based population epidemic prevention method, equipment and storage medium
Willis et al. 1209. The evolving nature of syndromic surveillance during the COVID-19 pandemic in Massachusetts
US10769304B2 (en) Apparatus and method for transmitting personal information in individually unidentifiable way
CN112287397B (en) System and method for improving and guaranteeing safety of patient information transmission

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination