CN112948675B - Data processing method and device, electronic equipment and storage medium - Google Patents

Data processing method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN112948675B
CN112948675B CN202110220400.3A CN202110220400A CN112948675B CN 112948675 B CN112948675 B CN 112948675B CN 202110220400 A CN202110220400 A CN 202110220400A CN 112948675 B CN112948675 B CN 112948675B
Authority
CN
China
Prior art keywords
information
user
key
user terminal
evaluation result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110220400.3A
Other languages
Chinese (zh)
Other versions
CN112948675A (en
Inventor
李纯懿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuo Erzhi Lian Wuhan Research Institute Co Ltd
Original Assignee
Zhuo Erzhi Lian Wuhan Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuo Erzhi Lian Wuhan Research Institute Co Ltd filed Critical Zhuo Erzhi Lian Wuhan Research Institute Co Ltd
Priority to CN202110220400.3A priority Critical patent/CN112948675B/en
Publication of CN112948675A publication Critical patent/CN112948675A/en
Application granted granted Critical
Publication of CN112948675B publication Critical patent/CN112948675B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9535Search customisation based on user profiles and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9536Search customisation based on social or collaborative filtering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • Computing Systems (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Medical Informatics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application discloses a data processing method, a data processing device, electronic equipment and a storage medium. The method is applied to a server and comprises the following steps: sending the first key and the first information to at least one second user end; the first secret key is generated by the first user terminal based on a first set algorithm; the first information represents encrypted user information of the first user terminal; receiving second information returned by each second user terminal in the at least one second user terminal; the second user end corresponding to the second information representation performs homomorphic operation on the first information based on the first secret key to obtain an evaluation result of the first user end on a target project; determining third information according to the received second information and a first weight coefficient corresponding to the second user end; the third information represents the predicted evaluation result of the first user terminal on the target item; and sending the third information to the first user.

Description

Data processing method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of data mining technologies, and in particular, to a data processing method and apparatus, an electronic device, and a storage medium.
Background
In the related art, information which is interested by a user can be recommended to the user according to the preference and the use habit of the user, and accurate recommendation requires obtaining of a large amount of information of the user, so that the privacy of the user is threatened.
Disclosure of Invention
In view of this, embodiments of the present application provide a data processing method, an apparatus, an electronic device, and a storage medium, so as to solve at least the problems of reduced security of private information and inaccurate recommendation result in the related art.
The technical scheme of the embodiment of the application is realized as follows:
the embodiment of the application provides a data processing method, which is applied to a server and comprises the following steps:
sending the first key and the first information to at least one second user end; the first secret key is generated by the first user terminal based on a first set algorithm; the first information represents encrypted user information of the first user terminal;
receiving second information returned by each second user terminal in the at least one second user terminal; the second user end corresponding to the second information representation performs homomorphic operation on the first information based on the first secret key to obtain an evaluation result of the first user end on a target project;
determining third information according to the received second information and a first weight coefficient corresponding to the second user end; the third information represents the predicted evaluation result of the first user terminal on the target item;
and sending the third information to the first user.
In the foregoing solution, when determining the third information according to the received second information and the weight coefficient corresponding to the second ue, the method further includes:
and determining a corresponding first weight coefficient based on the user category of the corresponding second user terminal.
In the above solution, the user category includes a first category or a second category; wherein, the first and the second end of the pipe are connected with each other,
the first category represents a user side with a friend relationship with the first user side; the second category represents a user terminal that does not have a friendly relationship with the first user terminal.
The embodiment of the present application further provides another data processing method, where the method is applied to a first user end, and the method includes:
sending the first key and the first information to a server so that the server sends the first key and the first information to at least one second user end; the first key is generated based on a first set algorithm; the first information represents encrypted user information of the first user terminal;
receiving third information; the third information represents the predicted evaluation result of the first user terminal on the target item; the third information is determined by the server according to the received second information and the corresponding weight coefficient of the second user terminal; and the second information represents an evaluation result of the first user end on the target project, which is obtained by homomorphic operation of the second user end corresponding to the second information based on the first key and the first information.
In the above scheme, the method further comprises:
decrypting the third information based on a second key, and obtaining fourth information according to a decryption result; the fourth information represents recommendation information matched with the predicted evaluation result of the first user end on the target item; the second secret key is a private key matched with the first secret key.
The embodiment of the present application further provides a data processing method, where the method is applied to a second user end, and the method includes:
receiving a first key and first information sent by a server; the first secret key is generated by the first user terminal based on a first set algorithm; the first information represents encrypted user information of the first user terminal;
generating second information; the second information represents the evaluation result of the first user end on the target item, which is obtained by homomorphic operation of the first secret key and the first information;
sending the second information to the server, so that the server determines third information according to the received second information sent by at least one second user end and the weight coefficient corresponding to the corresponding second user end; and the third information represents the predicted evaluation result of the first user end on the target item.
In the foregoing solution, the generating the second information includes:
determining a second weight coefficient; the second weight coefficient represents the importance degree of fifth information in the process of generating the second information; the fifth information represents the evaluation result of the second user on the target project;
and inputting the first key, the first information, the fifth information and the second weight coefficient to a third set algorithm to generate the second information.
An embodiment of the present application further provides a data processing apparatus, including:
the first sending unit is used for sending the first secret key and the first information to at least one second user end; the first secret key is generated by the first user terminal based on a first set algorithm; the first information represents encrypted user information of the first user terminal;
a first receiving unit, configured to receive second information returned by each second user equipment in the at least one second user equipment; the second information represents an evaluation result of the first user end on the target project, which is obtained by homomorphic operation of the second user end corresponding to the second information based on the first secret key and the first information;
the first determining unit is used for determining third information according to the received second information and a first weight coefficient corresponding to the corresponding second user terminal; the third information represents the predicted evaluation result of the first user terminal on the target item;
and the second sending unit is used for sending the third information to the first user.
An embodiment of the present application further provides another data processing apparatus, including:
the first sending unit is used for sending the first key and the first information to a server so as to enable the server to send the first key and the first information to at least one second user end; the first key is generated based on a first set algorithm; the first information represents encrypted user information of the first user terminal;
a first receiving unit for receiving third information; the third information represents the predicted evaluation result of the first user terminal on the target item; the third information is determined by the server according to the received second information and the corresponding weight coefficient of the second user terminal; and the second information represents an evaluation result of the first user end on the target project, which is obtained by homomorphic operation of the second user end corresponding to the second information based on the first key and the first information.
An embodiment of the present application further provides a data processing apparatus, including:
the first receiving unit is used for receiving a first key and first information sent by the server; the first secret key is generated by the first user terminal based on a first set algorithm; the first information represents encrypted user information of the first user terminal;
a first generation unit configured to generate second information; the second information represents the evaluation result of the first user end on the target item, which is obtained by homomorphic operation of the first secret key and the first information;
the first sending unit is used for sending the second information to the server so that the server determines third information according to the received second information sent by at least one second user end and the weight coefficient corresponding to the corresponding second user end; and the third information represents the predicted evaluation result of the first user terminal to the target item.
In the embodiment of the application, a server sends a first key and first information to at least one second user end, the first key is generated by the first user end based on a first set algorithm, the first information represents user information encrypted by the first user end, second information returned by each second user end in the at least one second user end is received, the second information represents an evaluation result of the corresponding second user end on a target project, the evaluation result is obtained by the corresponding second user end through homomorphic operation based on the first key and the first information, third information is determined according to the received second information and a first weight coefficient corresponding to the corresponding second user end, the third information represents a predicted evaluation result of the first user end on the target project, the third information is sent to the first user, data processing can be carried out under the condition of user information encryption, and therefore accurate recommendation results can be output to the user in combination with the processing result of the user information on the basis of protecting the privacy of the user.
Drawings
Fig. 1 is a schematic flow chart illustrating an implementation of a data processing method according to an embodiment of the present application;
fig. 2 is a schematic flow chart illustrating an implementation of a data processing method according to another embodiment of the present application;
fig. 3 is a schematic flowchart illustrating an implementation of a data processing method according to another embodiment of the present application;
fig. 4 is a schematic flowchart illustrating an implementation of a data processing method according to another embodiment of the present application;
fig. 5 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a data processing apparatus according to yet another embodiment of the present application;
fig. 7 is a schematic structural diagram of a data processing apparatus according to yet another embodiment of the present application;
fig. 8 is a schematic diagram of a hardware component structure of an electronic device according to an embodiment of the present disclosure.
Detailed Description
The present application will be described in further detail with reference to the following drawings and specific embodiments.
In the following description, for purposes of explanation and not limitation, specific details are set forth such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
The technical means described in the embodiments of the present application may be arbitrarily combined without conflict.
In addition, in the embodiments of the present application, "first", "second", and the like are used for distinguishing similar objects, and are not necessarily used for describing a specific order or a sequential order.
An embodiment of the present application provides a data processing method, and fig. 1 is a schematic flow chart of the data processing method according to the embodiment of the present application. As shown in fig. 1, the method is applied to a server, and the method includes:
s101: sending the first key and the first information to at least one second user end; the first secret key is generated by the first user terminal based on a first set algorithm; the first information represents encrypted user information of the first user terminal.
Here, the first secret key and the first information are sent to at least one second user end, the first secret key is generated by the first user end based on a first set algorithm, in practical application, the first secret key may be a public key generated by the first user end based on a paillier encryption algorithm, the first information represents user information encrypted by the first user end, and in practical application, the first information may also be generated by the first user end based on the paillier encryption algorithm, so that the first information can also be applicable to the corresponding first secret key. In practical applications, the user information of the first user end may be in the form of a binary vector, and the corresponding first information is a binary vector encrypted bit by bit.
S102: receiving second information returned by each second user terminal in the at least one second user terminal; and the second information represents an evaluation result of the first user end on the target project, which is obtained by homomorphic operation of the second user end corresponding to the second information based on the first key and the first information.
Here, after the first secret key and the first information are sent to the at least one second user side, the second user side can perform corresponding data processing according to the first secret key and the first information, so that the server can receive second information returned by each user side of the at least one second user side, the second information represents an evaluation result of the corresponding second user side on the target project, which is obtained by the corresponding second user side through homomorphic operation based on the first secret key and the first information, in practical application, the second information is generated by the second user side through homomorphic operation on the basis of not decrypting the first information, and the generated second information can be simultaneously encrypted by the first secret key.
S103: determining third information according to the received second information and a first weight coefficient corresponding to a second user end; and the third information represents the predicted evaluation result of the first user terminal on the target item.
Here, the server can receive second information returned by different second users, and the third information can be obtained only by processing the different second information, and represents the predicted evaluation result of the first user on the target project. In practical application, different weighting coefficients are given to the second information corresponding to different second user terminals according to different second user terminals, the first weighting coefficient can represent the importance degree of the corresponding second information, and the finally output third information tends to the second information corresponding to the first weighting coefficient with a larger value. In practical applications, the first weighting coefficients are constructed using integers, since homomorphic encryption is generally more suitable for handling arithmetic processing between integers.
In an embodiment, when determining the third information according to the received second information and the weight coefficient corresponding to the second user equipment, the method further includes:
and determining a corresponding first weight coefficient based on the user category of the corresponding second user terminal.
Here, the corresponding first weight coefficient is determined based on the user category of the corresponding second user, the first weight coefficients set by different types of the second user are different, in practical application, the accuracy of the evaluation result of the first user on the target project can be improved by obtaining the second information returned by the second user of different user types, the user type of the second user can determine the corresponding user type according to the relationship between the second user and the first user, and can also be distinguished according to the interested field of the second user, for example, when the target project belongs to the photographing field, the user type of the second user can be distinguished as the second user interested in the photographing field and the second user not interested in the photographing field, so that the first weight coefficient is given to the second user of different user types. In practical applications, the second information is generated by combining the first information of the first user side on the basis of the scoring result of the target item by the different second user sides, and the relationship between the different second user sides and the first user side affects the referential property of the corresponding second information, for example, it is generally considered that the second user side having an affinity with the first user side and the item of interest of the first user side have similarity, so in the process of determining the third information, when the second information generated based on the second user side having an affinity with the first user side has a higher reference value than the second information generated based on the second user side not having an affinity with the first user side, correspondingly, the first weighting factor corresponding to the second user having an affinity with the first user side is given to be greater than the first weighting factors corresponding to the other second user sides, so that the second information of the different second user sides can be integrated to determine the third information.
In the embodiment, the corresponding first weight coefficient is determined based on the user category of the corresponding second user side, and different weight coefficients can be set for different user types, so that the scoring result of the user on the target item can be determined by integrating the prediction information generated by different user types and the corresponding weight coefficients, the accuracy of the generated scoring result of the user on the target item is improved, and more accurate recommendation information can be generated for the user.
In an embodiment, the user categories include a first category or a second category; wherein the content of the first and second substances,
the first category represents a user side with a friend relationship with the first user side; the second category represents user terminals that are not in a friendly relationship with the first user terminal.
Here, the user category of the second user end can be determined according to the relationship between the user end and the first user end, wherein the first category represents the user equipment with the first user endIn practical applications, whether the category of the user side belongs to the first category may be determined by the social relationship of the first user side, for example, the user side concerned by the first user side is determined as the user side of the first category, and further, the user side concerned by the first user side may be determined as the user side of the first category. The second category represents the user terminals that have no friendly relationship with the first user terminal, and exemplarily, the user terminals other than the user terminals concerned by the first user terminal are determined as the user terminals of the second category. In practical applications, in the case that the user category includes a first category or a second category, the third information may be determined according to different types of corresponding weight coefficients, and the algorithm expression for generating the third information is, for example:
Figure BDA0002954572850000081
wherein p is t,b The third information is represented by a third information,
Figure BDA0002954572850000082
a first weighting factor corresponding to a second user terminal of the first category,
Figure BDA0002954572850000083
second information representing a second user output of the first category,
Figure BDA0002954572850000084
a first weighting factor corresponding to a second subscriber of the second category,
Figure BDA0002954572850000085
and second information output by the second user terminals of the second category is represented, so that the third information can be determined based on the second information of the second user terminals of different user types and corresponding weight coefficients.
In the above embodiment, the user types include a first category or a second category, where the first category represents a user side having a friend relationship with the first user side, and the second category represents a user side not having a friend relationship with the first user side, and categories of different users can be distinguished according to a social relationship of the users, so that an evaluation result can be determined based on two different types of user sides, and accuracy of the evaluation result is improved.
The ue of the first category corresponds to a first weighting factor, the ue of the second category corresponds to a weighting factor,
s104: and sending the third information to the first user.
Here, the third information is sent to the first user, since the server does not decrypt the required data in the process of generating the third information, the generated third information is also in an encrypted state, and a private key capable of decrypting the encrypted third information is retained by the first user, and the server cannot directly decrypt the third information, so that the third information is sent to the first user, the first user can decrypt the third information, the evaluation result of the first user on the target item can be obtained, and the privacy information of the user can be well protected.
In the embodiment, the server sends a first key and first information to at least one second user side, the first key is generated by the first user side based on a first set algorithm, the first information represents user information encrypted by the first user side, second information returned by each user side of the at least one second user side is received, the second information represents an evaluation result of the corresponding second user side on a target item, obtained by homomorphic operation of the corresponding second user side based on the first key and the first information, of the first user side, third information is determined according to the received second information and a first weight coefficient corresponding to the corresponding second user side, the third information represents an evaluation result of the target item predicted by the first user side, and the third information is sent to the first user, so that the target item which is not scored by the user can be predicted based on other different users on the basis of protecting personal privacy of the user, and information with high accuracy can be recommended to the user according to the evaluation result of the target item predicted by the user.
An embodiment of the present application further provides another data processing method, as shown in fig. 2, where the method is applied to a first user end, and the method includes:
s201: sending the first key and the first information to a server so that the server sends the first key and the first information to at least one second user end; the first key is generated based on a first set algorithm; the first information represents encrypted user information of the first user terminal.
In practical application, when determining a scoring result of a target item by a first user, the first user is required to provide user information, in order to protect privacy of the first user, the information of the first user needs to be encrypted, and the first key generated in the encryption process of the first user is sent to the server, so that the server can ensure the safety of personal information of the first user in a subsequent data processing process through data encrypted by the first key. In practical application, the first user terminal may generate a first key by using a paillier encryption algorithm, and send the first key to the server. Specifically, two prime numbers p and q with larger values are selected firstly, wherein the two prime numbers satisfy gcd (pq, (p-1) (q-1) =1, n is determined based on the product between the two prime numbers, and the calculation of lambda = lcm [ (p-1), (q-1) according to the Kamichael theorem]On the basis, L (x) = (x-1)/n is defined, and one smaller than n is randomly selected 2 And there is μ = (L (g) λ mod n 2 )) -1 mod n, then the public key can be obtained, i.e. the first key is (n, g), PKt can be used to represent the first key, and correspondingly the private key paired with the public key can also be obtained as (λ, μ). When information is encrypted based on the first key, specifically, the plaintext m is a positive integer greater than or equal to 0 and less than n, and r is randomly selected to satisfy 0<r<n and r ∈
Figure BDA0002954572850000101
Wherein the content of the first and second substances,
Figure BDA0002954572850000102
means r is at n 2 Has a multiplicative inverse, according to Enc = g m r n mod n 2 According to the process of generating the ciphertext, in practical application, the first user end can represent the user information of the first user end through a binary vector Ib, a paillier encryption algorithm is adopted, and the Ib is encrypted bit by bit so as to obtain [ Ib ]]t=Enc(PKt,It)=([Ib]t(1),[Ib]t(2),……,[Ib]t (M)), wherein [ Ib]t represents first information of the first user terminal.
S202: receiving third information; the third information represents a predicted evaluation result of the first user terminal on the target item; the third information is determined by the server according to the received second information and the corresponding weight coefficient of the second user terminal; and the second information represents the evaluation result of the target project by the first user end, which is obtained by the homomorphic operation of the second user end corresponding to the second information based on the first secret key and the first information.
In practical application, the third information needs to be generated according to the second information fed back by a plurality of second users, and the weight coefficients corresponding to different second users are different, so that the second information of different second users has different referential properties in the process of determining the third information. And the second information is generated by the second user terminal performing homomorphic operation on the first information and the first key, and the second information represents the evaluation result of the first user terminal on the target item. In practical applications, the second user side is a second user side of a different user type, for example, the second user side may be a user side having a friend relationship with the first user side, and the second user side may also be a user side not having a relationship with the first user side.
In the above embodiment, a first user sends a first key and first information to a server, so that the server sends the first key and the first information to at least one second user, the first key is generated based on a first setting algorithm, the first information represents user information encrypted by the first user, and third information is received, the third information represents a predicted evaluation result of the first user on a target item, the third information is determined by the server according to the received second information and a corresponding weight coefficient of the second user, the first information represents an evaluation result of the second user on the target item obtained by homomorphic operation of the second user based on the first key and the first information, a scoring result of the user on the target item can be obtained based on the encrypted user information, and the second user can determine the scoring result of the target item by the first user according to different weight coefficients in a process of determining the scoring result of the user on the target item, so that the accuracy of the scoring result is improved, and thus the generation of the result is beneficial to generate the result of the recommendation of the target item.
In an embodiment, the method further comprises:
decrypting the third information based on a second key, and obtaining fourth information according to a decryption result; the fourth information represents recommendation information matched with the predicted evaluation result of the first user side on the target item; the second secret key is a private key matched with the first secret key.
Here, after receiving the third information, the first user side can decrypt the third information based on the second key, so that fourth information can be obtained according to a decryption result, where the fourth information represents recommendation information that matches the predicted evaluation result of the first user side on the target item, and the second key is a private key associated with the first key. In practical application, when a first user terminal generates a first key according to a set encryption algorithm, a second key matched with the first key is also generated, wherein the second key can decrypt data encrypted by the first key, and in the process of generating third information, data processing is performed in a data encryption state based on homomorphic operation, so that the generated third information is in an encryption state, the first user terminal can obtain an evaluation result of the first user terminal on a target item after decrypting the third information by using the second key, and after obtaining a specific evaluation result of the first user terminal on the target item, fourth information can be output to the first user terminal, so that recommendation information meeting requirements is output to the first user terminal.
In the above embodiment, the third information is decrypted based on the second key, and fourth information is obtained according to a decryption result, where the fourth information represents a recommendation result that matches the predicted evaluation result of the first user terminal on the target item, the second key is a private key that is associated with the first key, and can decrypt a corresponding evaluation result on the user terminal that has the private key, and the user terminal and the server cannot decrypt encrypted data, so that the security of the data can be ensured, and recommendation information that meets the user requirements can be output to the user terminal.
An embodiment of the present application further provides another data processing method, which is applied to a second user end, and as shown in fig. 3, the method includes:
s301: receiving a first key and first information sent by a server; the first secret key is generated by the first user terminal based on a first set algorithm; the first information represents encrypted user information of the first user terminal.
Here, the second user receives a first secret key and first information sent by the server, where the first secret key is generated by the first user based on a first setting algorithm, and the first information represents user information encrypted by the first user, and in practical applications, the second user is responsible for performing data processing on the first information and can encrypt a result generated after the data processing by using the first secret key, thereby ensuring the security of data and protecting the privacy information of the first user.
S302: generating second information; the second information is represented by an evaluation result of the first user end on a target item, which is obtained by homomorphic operation of the first secret key and the first information.
Here, the second user side performs homomorphic operation on the first secret key and the first information to generate second information, wherein the second information represents the evaluation result of the first user side on the target item. In practical applications, the second user terminals may be of different user types, and for example, according to a relationship between the first user terminal and the second user terminal, the second user terminal may be divided into a second user terminal having a friend relationship with the first user terminal and a second user terminal not having a friend relationship with the first user terminal. In practical application, the second information can be generated for second users of different user types, so that evaluation results of the first user on the target project can be determined by combining different factors. In practical application, homomorphic operation is performed according to the first secret key and the first information, and corresponding data processing can be performed under the condition that the first information is not required to be decrypted, so that the data security of the first information can be ensured, the first information is not easy to leak, and the privacy protection of the first user side is facilitated.
S303: sending the second information to the server, so that the server determines third information according to the received second information sent by at least one second user end and the weight coefficient corresponding to the corresponding second user end; and the third information represents the predicted evaluation result of the first user terminal to the target item.
In practical application, different second user ends can send the generated second information to the server, so that the server can receive the second information sent by at least one second user end, and third information can be determined according to the second information of the different second user ends and the weight coefficient corresponding to the second user end, wherein the third information represents the predicted evaluation result of the first user end on the target item. In practical application, the second user end may be divided into different user types, the user types are generally divided into two types according to a relationship between the second user end and the first user end, and the referential properties of the second information generated by the second user ends of different user types are different, so that the weight coefficient corresponding to the second user end may be determined according to the user type of the second user end.
In the above embodiment, the second user receives a first key and first information sent by the server, where the first key is generated by the first user based on a first setting algorithm, the first information represents user information encrypted by the first user, and generates second information, the second information represents an evaluation result of the first user on a target item, obtained by homomorphic operation performed on the first key and the first information, and sends the second information to the server, so that the server determines third information according to the received second information sent by at least one second user and a weight coefficient corresponding to the second user, and the third information represents a predicted evaluation result of the first user on the target item, and can perform data processing according to the received encrypted information of the user, where other users can perform data processing without decrypting the encrypted information of the user, so as to protect information of the user.
In an embodiment, as shown in fig. 4, the generating the second information includes:
s401: determining a second weight coefficient; the second weight coefficient represents the importance degree of fifth information in the process of generating the second information; and the fifth information represents the evaluation result of the second user on the target project.
When determining the second information according to the first information, it is necessary to refer to the evaluation result of the second user end for the target item,in order to avoid directly using the evaluation result of the second user for the target item, a second weight coefficient may be determined, where the second weight coefficient represents an importance degree of the fifth information in the process of generating the second information, and the fifth information represents the evaluation result of the second user for the target item, and for example, when a value of the second weight coefficient is larger, the reference degree of the fifth information is larger in the process of generating the second information. In practical application, the second weight coefficient may be generated according to a PageRank algorithm, and a specific algorithm expression is
Figure BDA0002954572850000141
In practical application, the value of the damping coefficient d is generally 0.85, pmn represents history information of the second user side, when the history information does not exist at the second user side, the value of Pmn is 0, PR (i) represents a PageRank value of the target item i, and L (i) represents the out-link number of the target item i.
S402: and inputting the first key, the first information, the fifth information and the second weight coefficient to a third set algorithm to generate the second information.
Here, the second information can be generated by inputting the first key, the first information, the fifth information, and the second weight coefficient to the third setting algorithm, and a specific operation procedure is as follows:
[PR(v)*q v,b ] t =∑Eval(*,Enc(PKt,PR(v)*q v,b ),[Ib]t),
[Rv*Ib] t =∑Eval(*,Enc(PKt,Rv*Ib),[Ib]t)[q v,b *(Rv*Ib-mean(rv)]t
=∑Eval(*,[q v,b ]t,Enc(+,[Rt*Ib]t, enc (PKt, -mean (Rv))), in the above operation, rv represents the fifth information of the second user, PKt is the first key, [ Ib ], and]t is first information, PR (v) is a second weight coefficient, q v,b Indicating whether the second user tagged an item, mean (rv) indicates the average rating of the second user. After the above operation, the second information is the final operation result. In practical application, the second information is sent to the serverThe server can then combine the second information and generate an expression for a predictive algorithm for the second information
Figure BDA0002954572850000142
Figure BDA0002954572850000143
Thereby obtaining the final third information
Figure BDA0002954572850000144
Figure BDA0002954572850000145
In the above embodiment, a second weight coefficient is determined, where the second weight coefficient represents an importance degree of fifth information in a process of generating the second information, and the fifth information represents an evaluation result of the second user on the target item, the first key, the first information, the fifth information, and the second weight coefficient are output to a third setting algorithm to generate the second information, and a weight coefficient corresponding to another user side can be determined, so that an evaluation result of the user side on the target item can be further determined by reasonably referring to an evaluation result of the other user side on the target item, and thus, accuracy of a data processing result can be improved.
In order to implement the method according to the embodiment of the present application, an embodiment of the present application further provides a data processing apparatus, as shown in fig. 5, the apparatus includes:
a first sending unit 501, configured to send the first key and the first information to at least one second user end; the first secret key is generated by the first user terminal based on a first set algorithm; the first information represents encrypted user information of the first user terminal;
a first receiving unit 502, configured to receive second information returned by each second ue in the at least one second ue; the second information represents an evaluation result of the first user end on the target project, which is obtained by homomorphic operation of the second user end corresponding to the second information based on the first secret key and the first information;
a first determining unit 503, configured to determine third information according to the received second information and a first weight coefficient corresponding to a corresponding second user end; the third information represents the predicted evaluation result of the first user terminal on the target item;
a second sending unit 504, configured to send the third information to the first user.
In an embodiment, when the first determining unit 503 determines the third information according to the received second information and the weight coefficient corresponding to the second user end, the first determining unit 503 further includes:
and determining a corresponding first weight coefficient based on the user category of the corresponding second user terminal.
In an embodiment, the first determining unit 503 determines the corresponding first weighting factor based on a user category of the corresponding second user terminal, where the user category includes a first category or a second category; wherein, the first and the second end of the pipe are connected with each other,
the first category represents a user side with a friend relationship with the first user side; the second category represents user terminals that are not in a friendly relationship with the first user terminal.
In practical applications, the first sending unit 501, the first receiving unit 502, and the first determining unit 503 may be implemented by a processor in the data processing apparatus. Of course, the processor needs to run the program stored in the memory to implement the functions of the above-described program modules.
It should be noted that, when the data processing apparatus provided in the embodiment of fig. 5 performs data processing, only the division of each program module is illustrated, and in practical applications, the processing may be distributed to different program modules according to needs, that is, the internal structure of the apparatus may be divided into different program modules to complete all or part of the processing described above. In addition, the data processing apparatus and the data processing method provided by the above embodiments belong to the same concept, and specific implementation processes thereof are described in the method embodiments for details, which are not described herein again.
An embodiment of the present application further provides another data processing apparatus, as shown in fig. 6, the apparatus includes:
a first sending unit 601, configured to send a first key and first information to a server, so that the server sends the first key and the first information to at least one second user end; the first key is generated based on a first set algorithm; the first information represents encrypted user information of the first user terminal;
a first receiving unit 602, configured to receive third information; the third information represents the predicted evaluation result of the first user terminal on the target item; the third information is determined by the server according to the received second information and the corresponding weight coefficient of the second user terminal; and the second information represents an evaluation result of the first user end on the target project, which is obtained by homomorphic operation of the second user end corresponding to the second information based on the first key and the first information.
In one embodiment, the apparatus further comprises:
the decryption unit is used for decrypting the third information based on the second key and obtaining fourth information according to a decryption result; the fourth information represents recommendation information matched with the predicted evaluation result of the first user side on the target item; the second secret key is a private key matched with the first secret key.
In practical applications, the first sending unit 601 and the first receiving unit 602 may be implemented by a processor in a data processing apparatus. Of course, the processor needs to run the program stored in the memory to implement the functions of the above-described program modules.
It should be noted that, when the data processing device provided in the embodiment of fig. 6 performs data processing, only the division of the program modules is illustrated, and in practical applications, the processing may be distributed to different program modules according to needs, that is, the internal structure of the device may be divided into different program modules to complete all or part of the processing described above. In addition, the data processing apparatus and the data processing method provided in the foregoing embodiments belong to the same concept, and specific implementation processes thereof are described in the method embodiments, and are not described herein again.
An embodiment of the present application further provides another data processing apparatus, as shown in fig. 7, the apparatus includes:
a first receiving unit 701, configured to receive a first key and first information sent by a server; the first secret key is generated by the first user terminal based on a first set algorithm; the first information represents encrypted user information of the first user terminal;
a first generating unit 702 for generating second information; the second information represents the evaluation result of the first user end on the target item, which is obtained by homomorphic operation of the first secret key and the first information;
a first sending unit 703, configured to send the second information to the server, so that the server determines third information according to the received second information sent by at least one second user and a weight coefficient corresponding to a corresponding second user; and the third information represents the predicted evaluation result of the first user terminal to the target item.
In an embodiment, the first generating unit 702 generates the second information, including:
determining a second weight coefficient; the second weight coefficient represents the importance degree of fifth information in the process of generating the second information; the fifth information represents the evaluation result of the second user on the target project;
and inputting the first key, the first information, the fifth information and the second weight coefficient to a third set algorithm to generate the second information.
In practical applications, the first receiving unit 701, the first generating unit 702, and the first transmitting unit 703 may be implemented by a processor in a data processing apparatus. Of course, the processor needs to run the program stored in the memory to implement the functions of the above-described program modules.
It should be noted that, when the data processing device provided in the embodiment of fig. 7 performs data processing, only the division of the program modules is illustrated, and in practical applications, the processing may be distributed to different program modules according to needs, that is, the internal structure of the device may be divided into different program modules to complete all or part of the processing described above. In addition, the data processing apparatus and the data processing method provided in the foregoing embodiments belong to the same concept, and specific implementation processes thereof are described in the method embodiments, and are not described herein again.
In this embodiment of the present application, based on hardware implementation of the foregoing program module, and in order to implement the method in this embodiment of the present application, an embodiment of the present application further provides an electronic device, and fig. 8 is a schematic diagram of a hardware composition structure of the electronic device in this embodiment of the present application, and as shown in fig. 8, the electronic device includes:
a communication interface 1 capable of performing information interaction with other devices such as network devices and the like;
and the processor 2 is connected with the communication interface 1 to realize information interaction with other equipment, and is used for executing the data processing method provided by one or more technical schemes when running a computer program. And the computer program is stored on the memory 3.
In practice, of course, the various components in the electronic device are coupled together by means of the bus system 4. It will be appreciated that the bus system 4 is used to enable the communication of connections between these components. The bus system 4 comprises, in addition to a data bus, a power bus, a control bus and a status signal bus. For the sake of clarity, however, the various buses are labeled as bus system 4 in fig. 8.
The memory 3 in the embodiment of the present application is used to store various types of data to support the operation of the electronic device. Examples of such data include: any computer program for operating on an electronic device.
It will be appreciated that the memory 3 may be either volatile memory or nonvolatile memory, and may include both volatile and nonvolatile memory. Among them, the nonvolatile Memory may be a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Programmable Read-Only Memory (EPROM), an Electrically Erasable Programmable Read-Only Memory (EEPROM), a magnetic random access Memory (FRAM), a Flash Memory (Flash Memory), a magnetic surface Memory, an optical Disc, or a Compact Disc Read-Only Memory (CD-ROM); the magnetic surface storage may be disk storage or tape storage. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), synchronous Static Random Access Memory (SSRAM), dynamic Random Access Memory (DRAM), synchronous Dynamic Random Access Memory (SDRAM), double Data Rate Synchronous Dynamic Random Access Memory (DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (ESDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced DRAM), synchronous Dynamic Random Access Memory (SLDRAM), direct Memory (DRmb Access), and Random Access Memory (DRAM). The memory 3 described in the embodiments of the present application is intended to comprise, without being limited to, these and any other suitable types of memory.
The method disclosed in the above embodiment of the present application may be applied to the processor 2, or implemented by the processor 2. The processor 2 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by instructions in the form of hardware integrated logic circuits or software in the processor 2. The processor 2 described above may be a general purpose processor, DSP, or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, or the like. The processor 2 may implement or perform the methods, steps and logic blocks disclosed in the embodiments of the present application. A general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the method disclosed in the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software modules may be located in a storage medium located in the memory 3, and the processor 2 reads the program in the memory 3 and performs the steps of the foregoing method in combination with its hardware.
When the processor 2 executes the program, the corresponding processes in the methods according to the embodiments of the present application are realized, and for brevity, are not described herein again.
In an exemplary embodiment, the present application further provides a storage medium, i.e. a computer storage medium, specifically a computer readable storage medium, for example, including a memory 3 storing a computer program, which can be executed by a processor 2 to implement the steps of the foregoing method. The computer readable storage medium may be Memory such as FRAM, ROM, PROM, EPROM, EEPROM, flash Memory, magnetic surface Memory, optical disk, or CD-ROM.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus, terminal and method may be implemented in other manners. The above-described device embodiments are only illustrative, for example, the division of the unit is only one logical function division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit may be implemented in the form of hardware, or in the form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps of implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer-readable storage medium, and when executed, executes the steps including the method embodiments; and the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media capable of storing program code.
Alternatively, the integrated unit described above may be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially implemented or portions thereof that contribute to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for enabling an electronic device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media capable of storing program code.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A data processing method is applied to a server and comprises the following steps:
sending the first key and the first information to at least one second user end; the first secret key is generated by the first user terminal based on a first set algorithm; the first information represents encrypted user information of the first user terminal;
receiving second information returned by each second user terminal in the at least one second user terminal; the second information represents an evaluation result of the first user end on the target project, which is obtained by homomorphic operation of the second user end corresponding to the second information based on the first secret key and the first information;
determining third information according to the received second information and a first weight coefficient corresponding to a second user end; the third information represents the predicted evaluation result of the first user terminal on the target item;
and sending the third information to the first user.
2. The data processing method according to claim 1, wherein when determining the third information according to the received second information and the first weight coefficient corresponding to the second ue, the method further comprises:
and determining a corresponding first weight coefficient based on the user category of the corresponding second user terminal.
3. The data processing method of claim 2, wherein the user category comprises a first category or a second category; wherein, the first and the second end of the pipe are connected with each other,
the first category represents a user side with a friend relationship with the first user side; the second category represents a user terminal that does not have a friendly relationship with the first user terminal.
4. A data processing method, applied to a first user side, the method comprising:
sending the first key and the first information to a server so that the server sends the first key and the first information to at least one second user end; the first key is generated based on a first set algorithm; the first information represents encrypted user information of the first user terminal;
receiving third information; the third information represents the predicted evaluation result of the first user terminal on the target item; the third information is determined by the server according to the received second information and a first weight coefficient corresponding to a second user end; and the second information represents an evaluation result of the first user end on the target project, which is obtained by homomorphic operation of the second user end corresponding to the second information based on the first key and the first information.
5. The data processing method of claim 4, wherein the method further comprises:
decrypting the third information based on the second key, and obtaining fourth information according to a decryption result; the fourth information represents recommendation information matched with the predicted evaluation result of the first user end on the target item; the second secret key is a private key matched with the first secret key.
6. A data processing method, applied to a second user side, the method comprising:
receiving a first key and first information sent by a server; the first secret key is generated by the first user terminal based on a first set algorithm; the first information represents encrypted user information of the first user terminal;
generating second information; the second information represents the evaluation result of the first user end on the target item, which is obtained by homomorphic operation of the first secret key and the first information;
sending the second information to the server, so that the server determines third information according to the received second information sent by at least one second user side and the first weight coefficient corresponding to the corresponding second user side; and the third information represents the predicted evaluation result of the first user terminal to the target item.
7. The data processing method of claim 6, wherein the generating second information comprises:
determining a second weight coefficient; the second weight coefficient represents the importance degree of fifth information in the process of generating the second information; the fifth information represents the evaluation result of the second user on the target project;
and inputting the first key, the first information, the fifth information and the second weight coefficient to a third set algorithm to generate the second information.
8. A data processing apparatus, comprising:
the first sending unit is used for sending the first key and the first information to at least one second user end; the first secret key is generated by the first user terminal based on a first set algorithm; the first information represents encrypted user information of the first user terminal;
a first receiving unit, configured to receive second information returned by each second user equipment in the at least one second user equipment; the second information represents an evaluation result of the first user end on the target project, which is obtained by homomorphic operation of the second user end corresponding to the second information based on the first secret key and the first information;
the first determining unit is used for determining third information according to the received second information and a first weight coefficient corresponding to the corresponding second user terminal; the third information represents the predicted evaluation result of the first user terminal on the target item;
and the second sending unit is used for sending the third information to the first user.
9. A data processing apparatus, characterized by comprising:
the first sending unit is used for sending the first key and the first information to a server so that the server sends the first key and the first information to at least one second user end; the first key is generated based on a first set algorithm; the first information represents encrypted user information of a first user terminal;
a first receiving unit configured to receive third information; the third information represents a predicted evaluation result of the first user terminal on the target item; the third information is determined by the server according to the received second information and a first weight coefficient corresponding to the second user end; and the second information represents the evaluation result of the target project by the first user end, which is obtained by the homomorphic operation of the second user end corresponding to the second information based on the first secret key and the first information.
10. A data processing apparatus, comprising:
the first receiving unit is used for receiving a first key and first information sent by the server; the first secret key is generated by the first user terminal based on a first set algorithm; the first information represents encrypted user information of the first user terminal;
a first generating unit configured to generate second information; the second information is characterized in that the first secret key and the first information are subjected to homomorphic operation to obtain an evaluation result of the first user end on a target item;
a first sending unit, configured to send the second information to the server, so that the server determines third information according to the received second information sent by at least one second user and a first weight coefficient corresponding to a corresponding second user; and the third information represents the predicted evaluation result of the first user terminal to the target item.
CN202110220400.3A 2021-02-26 2021-02-26 Data processing method and device, electronic equipment and storage medium Active CN112948675B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110220400.3A CN112948675B (en) 2021-02-26 2021-02-26 Data processing method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110220400.3A CN112948675B (en) 2021-02-26 2021-02-26 Data processing method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112948675A CN112948675A (en) 2021-06-11
CN112948675B true CN112948675B (en) 2023-01-10

Family

ID=76246677

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110220400.3A Active CN112948675B (en) 2021-02-26 2021-02-26 Data processing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112948675B (en)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5689361B2 (en) * 2011-05-20 2015-03-25 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Method, program, and system for converting a part of graph data into a data structure that is an image of a homomorphic map
CN107666388B (en) * 2016-07-28 2019-11-01 郑珂威 Block chain information encryption method based on complete homomorphic cryptography method
CN109831297A (en) * 2019-01-24 2019-05-31 中国人民武装警察部队工程大学 A kind of full homomorphic cryptography method of more identity for supporting thresholding to decrypt

Also Published As

Publication number Publication date
CN112948675A (en) 2021-06-11

Similar Documents

Publication Publication Date Title
KR101843340B1 (en) Privacy-preserving collaborative filtering
CN110457945B (en) List query method, query party device, service party device and storage medium
US8091139B2 (en) System and method for masking arbitrary Boolean functions
US20140006445A1 (en) System and method for searching a database or data sharing system for the presence of data
US10826694B2 (en) Method for leakage-resilient distributed function evaluation with CPU-enclaves
CN111404952B (en) Transformer substation data encryption transmission method and device, computer equipment and storage medium
JP2012129993A (en) Cryptographic device protection method and protection system
CN109067517B (en) Encryption and decryption device, encryption and decryption method and communication method of hidden key
CN115269938B (en) Homomorphic encryption-based keyword track hiding query method, system and related device
CN112953974B (en) Data collision method, device, equipment and computer readable storage medium
CN112152802B (en) Data encryption method, electronic device and computer storage medium
Badsha et al. Privacy preserving user based web service recommendations
CN112235299A (en) Data encryption and decryption method, device, equipment, system and medium
CN112989027A (en) Method for querying lists and for providing list query service and related products
WO2014030706A1 (en) Encrypted database system, client device and server, method and program for adding encrypted data
CN114124343A (en) Privacy-protecting risk scoring information query method, device, system and equipment
CN113726772A (en) Method, device, equipment and storage medium for realizing on-line inquiry session
CN112948675B (en) Data processing method and device, electronic equipment and storage medium
EP2879325A1 (en) Method for determining a statistic value on data based on encrypted data
CN117371010A (en) Data trace query method, electronic device and readable storage medium
CN114362912A (en) Identification password generation method based on distributed key center, electronic device and medium
CN115150055B (en) Privacy protection ridge regression method based on homomorphic encryption
CN113434906B (en) Data query method, device, computer equipment and storage medium
CN113824713B (en) Key generation method, system and storage medium
EP3681094B1 (en) Impeding data access

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant