CN113259390A - Account safety protection system for recruitment platform - Google Patents

Account safety protection system for recruitment platform Download PDF

Info

Publication number
CN113259390A
CN113259390A CN202110708846.0A CN202110708846A CN113259390A CN 113259390 A CN113259390 A CN 113259390A CN 202110708846 A CN202110708846 A CN 202110708846A CN 113259390 A CN113259390 A CN 113259390A
Authority
CN
China
Prior art keywords
encrypted
information
recruitment
applicant
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110708846.0A
Other languages
Chinese (zh)
Other versions
CN113259390B (en
Inventor
郭宏成
郭有发
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Aidig Network Technology Co ltd
Original Assignee
Shenzhen Aidig Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Aidig Network Technology Co ltd filed Critical Shenzhen Aidig Network Technology Co ltd
Priority to CN202110708846.0A priority Critical patent/CN113259390B/en
Publication of CN113259390A publication Critical patent/CN113259390A/en
Application granted granted Critical
Publication of CN113259390B publication Critical patent/CN113259390B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/105Human resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Resources & Organizations (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Operations Research (AREA)
  • Data Mining & Analysis (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Health & Medical Sciences (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an account safety protection system for a recruitment platform, which is used for solving the problems that the existing recruitment platform cannot perform corresponding encryption operation on personal resume information of job seekers, so that the personal information of the job seekers is easy to leak and the information safety is low; the system comprises an application end, a server, a recruitment platform and a recruitment end, wherein the application end is used for inputting personal resume information by an applicant, encrypting the personal resume information to obtain encrypted resume information, and sending the encrypted resume information to the server; dividing personal resume information into a display field and an encryption field; each encrypted field corresponds to one encryption operation, the encrypted field identification is carried out on the personal resume information input by the corresponding recruiter, and the corresponding encryption operation is carried out on the identified encrypted field to obtain the encrypted resume information; according to the invention, the personal resume information of the applicant is correspondingly encrypted, so that the safety of the personal sensitive information of the applicant is improved, and the resume information of the applicant is prevented from being leaked on the recruitment platform.

Description

Account safety protection system for recruitment platform
Technical Field
The invention relates to the technical field of information safety protection of a recruitment platform, in particular to an account safety protection system for the recruitment platform.
Background
The recruitment platform and the recruitment management platform are internet-based recruitment management platforms aiming at assisting human resources to complete the work of attraction, identification, screening and recording of talents outside enterprises in a more efficient manner. As part of a talent management platform.
In modern society, data has become an important production data and valuable asset. The personal network behavior information can be converted into data resources of potential consumption behaviors, has scarcity and economic value, and becomes an object for pursuing various websites and mobile phone applications. Particularly, at present, network recruitment becomes a main channel for job hunting and recruitment of people, and whether personal information of job seekers in the network recruitment can be effectively protected needs to arouse high attention and vigilance;
the existing recruitment platform cannot perform corresponding encryption operation on the personal resume information of the job seeker, so that the personal information of the job seeker is easy to leak, and the information safety is low.
Disclosure of Invention
The invention aims to provide an account safety protection system for a recruitment platform, aiming at solving the problems that the personal information of a job seeker is easy to leak and the information safety is high due to the fact that the conventional recruitment platform cannot perform corresponding encryption operation on the personal resume information of the job seeker.
The purpose of the invention can be realized by the following technical scheme: an account safety protection system for a recruitment platform comprises an application terminal, a server, a recruitment platform and a recruitment terminal;
the application terminal is used for inputting the personal resume information by the applicant, encrypting the personal resume information to obtain encrypted resume information and sending the encrypted resume information to the server; the specific encryption processing process is as follows: dividing personal resume information into a display field and an encryption field; each encrypted field corresponds to one encryption operation, the encrypted field identification is carried out on the personal resume information input by the corresponding recruiter, and the corresponding encryption operation is carried out on the identified encrypted field to obtain the encrypted resume information;
the recruitment end is used for inputting enterprise requirement information of the enterprise by a recruiter of the enterprise and sending the enterprise requirement information to the server;
the server receives and stores the encrypted resume information and the enterprise demand information sent by the applicant, and simultaneously sends the encrypted resume information to the recruitment platform according to the set permission level of the applicant and sends the enterprise demand information to the recruitment platform;
the recruitment platform displays the encrypted resume information and the enterprise demand information, is in communication connection with the application terminal and the recruitment terminal through the Internet, receives a viewing request instruction fed back by the recruitment terminal and an encrypted field of the request, and feeds back the viewing request instruction and the encrypted field of the request to the server;
the encryption operation comprises the following specific steps:
s1: when the content of the encrypted field is a character, performing encryption operation on the character, specifically: selecting encrypted field contents, setting all characters to correspond to a unique numerical value, matching the encrypted field contents with all the characters to obtain corresponding numerical values, and arranging all the matched numerical values in sequence to obtain a converted text corresponding to the encrypted field contents; substituting each numerical value in the converted text into a numerical value formula preset by an applicant to obtain an encrypted numerical value, and arranging the encrypted numerical values corresponding to the converted text according to a sequence to obtain an encrypted text; sequentially converting the encrypted numerical values in the encrypted text to obtain an encrypted rectangle corresponding to the encrypted numerical values; combining the encrypted rectangles in sequence to obtain encrypted rectangular contents corresponding to the encrypted field contents; the encryption rectangle is composed of a plurality of rectangular grids, and preset colors corresponding to the numbers in the encryption numerical values are correspondingly filled in each rectangular grid;
s2: when the content of the encrypted field is an image, performing encryption operation on the image, specifically: enlarging the image into a plurality of parts to form a pixel grid image, wherein each pixel grid in the pixel grid image has only one color; setting all colors to correspond to a preset color numerical value, identifying the color of each pixel grid in the pixel grid image, and matching the identified color with all colors to obtain the corresponding preset color numerical value; extracting the abscissa and the column coordinate of the pixel grid and forming a triple corresponding to the pixel grid by the abscissa and the column coordinate and a preset color numerical value; marking all triples of the pixel grid image as an image triplet set; adding an encryption value preset by an applicant to each element in each triplet in the image triplet set to obtain a new image triplet set, and marking the new image triplet set as an encryption triplet set; carrying out graph conversion on the encryption triple set to obtain an encryption graph corresponding to the image, and specifically comprising the following steps:
s21: selecting a blank picture, amplifying the blank picture by a plurality of times, establishing a standard square grid on the blank picture, and extracting the numerical values of elements in each triple in the encrypted triple set;
s22: identifying a corresponding number for a numerical value in a first element, selecting a square grid with the number corresponding to the position of a standard square grid, marking the square grid as a line grid, connecting two adjacent line grids to obtain a line and a blank column corresponding to one element, identifying a corresponding number for a numerical value in a second element, and forming a blank two column between two adjacent triples; and so on;
s23: all triples in the encrypted triple set are correspondingly arranged on a standard grid network, and then the triples are reduced by a plurality of times to obtain an encrypted graph;
as a preferred embodiment of the present invention, the server includes an authority setting unit therein; the permission setting unit is used for the applicant to set the permission level of the recruitment platform;
as a preferred embodiment of the present invention, the server further includes a data acquisition unit and a protection analysis unit; the data acquisition unit is used for acquiring platform information of an applicant corresponding to the recruitment platform and sending the platform information to the protection analysis unit; the protection analysis unit is used for platform information protection analysis of the applicant, and specifically comprises the following steps:
SS 1: counting the total number of single-day accesses of the encrypted resume information of the applicant and marking the number as FW 1; comparing the recruiting position in the enterprise demand information with the job hunting position of the applicant, increasing the number of times of no association once when no position name is overlapped between the recruiting position and the job hunting position, and marking the visit duration of the recruiter as the time length of no association; summing all the non-correlation durations to obtain a non-correlation total duration;
SS 2: marking the total number of unassociated times and the total unassociated duration as FW2 and FW3 respectively; then carrying out normalization processing on the total daily visit times, the total non-association times and the total non-association duration and taking the numerical values of the total daily visit times, the total non-association times and the total non-association duration;
SS 3: obtaining a protection reminding value FH by using a formula FH = FW1 × b1+ FW2 × b2+ FW3 × b 3; wherein b1, b2 and b3 are all preset weight coefficients; the values are 0.15, 0.38 and 0.47 respectively; the protection reminding value is a value used for evaluating the probability of reminding the applicant, which is obtained by carrying out weight calculation on the value of the parameter corresponding to the encrypted resume information of the applicant;
SS 4: when the protection reminding value is larger than the set protection reminding threshold value, generating a protection early warning instruction and feeding the instruction back to the application end of the applicant;
as a preferred embodiment of the present invention, the platform information includes a login time and a logout time of the applicant, and job hunting position names and visitor data of the applicant; the visitor data comprises recruiters for visiting the encrypted resume information of the applicants, corresponding enterprises, enterprise demand information and visiting duration; the enterprise demand information comprises the industrial and commercial registration information of the enterprise, the name of the enterprise recruitment post and the post recruitment requirement;
as a preferred embodiment of the present invention, the server further includes an information decryption unit; the information decryption unit is used for decrypting the encrypted resume information, and the specific process is as follows: the recruitment end accesses the encrypted resume information of the applicant through the recruitment platform, the applicant clicks a corresponding encrypted field in the encrypted resume information through the recruitment end to perform decryption request, the recruitment platform generates a decryption request instruction corresponding to the encrypted field and feeds the decryption request instruction back to the information decryption unit, the information decryption unit receives the information decryption instruction and sends enterprise demand information and the decryption request instruction corresponding to the applicant to the recruitment end, the applicant checks the enterprise demand information and the decryption request instruction through the recruitment end, when the applicant inputs consent through the recruitment end, the recruitment end generates a consent request instruction and sends the consent request instruction to the information decryption unit, and the information decryption unit decrypts the encrypted field after receiving the consent instruction fed back by the recruitment end and feeds a decryption result back to the recruitment end; when the applicant inputs disagreement through the application end, the application end generates a refute request instruction and sends the refute request instruction to the information decryption unit, and the information decryption unit receives the refute request instruction fed back by the application end and forwards the refute request instruction to the recruitment end.
As a preferred embodiment of the present invention, the server further includes a registration unit, a database, and a decryption analysis unit; the registration login unit is used for registering the terminal information submitted by the computer terminal owner through the computer terminal and sending the terminal information which is successfully registered to the database for storage; the computer terminal which is successfully registered is marked as a registration terminal, and the server is in communication connection with the registration terminal; the terminal information comprises the model, the position and the production time of the computer terminal; an information decryption unit is also arranged in the registration terminal;
the decryption analysis unit is used for distributing the encrypted fields to be decrypted, and the specific distribution steps are as follows:
establishing communication connection with a registered terminal, and marking the registered terminal which is successfully connected as an initial selection terminal; calculating the distance difference between the position of the initially selected terminal and the position of the server to obtain a decryption distance;
setting all computer terminal models to correspond to a preset model value, and matching the model of the initially selected terminal with all the computer terminal models to obtain the corresponding preset model value;
calculating the time difference between the production time of the registered terminal and the current time to obtain the use duration;
acquiring a solution value of the initially selected terminal; then carrying out normalization processing on the decryption distance, the preset model value, the use duration and the validation value of the primarily selected terminal and taking the numerical values of the decryption distance, the preset model value, the use duration and the validation value;
analyzing the numerical value to obtain a solution merit value of the primary selection terminal; the method comprises the steps of marking a primary selection terminal with the maximum figure of merit of solution as a selected terminal, sending an encrypted field to be decrypted into the selected terminal, decrypting the encrypted field through an information decryption unit in the selected terminal, and feeding back a decrypted result to a server;
compared with the prior art, the invention has the beneficial effects that: in the account safety protection system, an applicant inputs personal resume information to an applicant end, encrypts the personal resume information, and divides the personal resume information into a display field and an encryption field; each encrypted field corresponds to one encryption operation, the encrypted fields are identified corresponding to the resume information input by the applicant, the corresponding encryption operation is executed on the identified encrypted fields to obtain encrypted resume information, the encrypted resume information is sent to the server, the server sends the encrypted resume information to the recruitment platform according to the set permission level of the applicant, the security of the personal sensitive information of the applicant is improved by correspondingly encrypting the personal resume information of the applicant, and the resume information of the applicant is prevented from being leaked on the recruitment platform.
Drawings
In order to facilitate understanding for those skilled in the art, the present invention will be further described with reference to the accompanying drawings.
FIG. 1 is an overall schematic block diagram of the present invention;
FIG. 2 is a schematic block diagram of the internal server of the present invention;
FIG. 3 is a schematic diagram of encrypted rectangular content according to the present invention;
FIG. 4 is a diagram of an encryption pattern according to the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the following embodiments, and it should be understood that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, an account safety protection system for a recruitment platform includes an application terminal, a server, a recruitment platform and a recruitment terminal;
the application terminal is used for inputting the personal resume information by the applicant, encrypting the personal resume information to obtain encrypted resume information and sending the encrypted resume information to the server;
the specific encryption processing process is as follows: dividing personal resume information into a display field and an encryption field; the display field includes: skill introduction, certificate introduction, etc.; the encrypted field comprises an identity card number, a mobile phone number, a home address and the like;
each encrypted field corresponds to one encryption operation, the encrypted field identification is carried out on the personal resume information input by the corresponding recruiter, and the corresponding encryption operation is carried out on the identified encrypted field to obtain the encrypted resume information; the method specifically comprises the following steps:
when the content of the encrypted field is a character, performing encryption operation on the character, specifically: selecting encrypted field contents, setting all characters to correspond to a unique numerical value, matching the encrypted field contents with all the characters to obtain corresponding numerical values, and arranging all the matched numerical values in sequence to obtain a converted text corresponding to the encrypted field contents; substituting each numerical value in the converted text into a numerical value formula preset by an applicant to obtain an encrypted numerical value, and arranging the encrypted numerical values corresponding to the converted text according to a sequence to obtain an encrypted text; sequentially converting the encrypted numerical values in the encrypted text to obtain an encrypted rectangle corresponding to the encrypted numerical values; combining the encrypted rectangles in sequence to obtain encrypted rectangular contents corresponding to the encrypted field contents; the encryption rectangle is composed of a plurality of rectangular grids which are 3 multiplied by 3 or 4 multiplied by 4 grids; preset colors corresponding to the numbers in the encrypted numerical values are correspondingly filled in each rectangular grid; the concrete expression is as follows: setting the encryption value as: 1234567; 1. 2, 3, 4, 5, 6 and 7 are respectively a color a, a color B, a color C, a color D, a color E, a color F and a color G; filling the colors in the rectangular grids respectively; as shown in fig. 3;
when the content of the encrypted field is an image, performing encryption operation on the image, specifically: enlarging the image into a plurality of parts to form a pixel grid image, wherein each pixel grid in the pixel grid image has only one color; setting all colors to correspond to a preset color numerical value, identifying the color of each pixel grid in the pixel grid image, and matching the identified color with all colors to obtain the corresponding preset color numerical value; extracting the abscissa and the column coordinate of the pixel grid and forming a triple corresponding to the pixel grid by the abscissa and the column coordinate and a preset color numerical value; marking all triples of the pixel grid image as an image triplet set; adding an encryption value preset by an applicant to each element in each triplet in the image triplet set to obtain a new image triplet set, and marking the new image triplet set as an encryption triplet set; carrying out graph conversion on the encrypted triple set to obtain an encrypted graph corresponding to the image; selecting a blank picture, amplifying the blank picture by a plurality of times, establishing a standard square grid on the blank picture, and extracting the numerical values of elements in each triple in the encrypted triple set; identifying a corresponding number for a numerical value in a first element, selecting a square grid with the number corresponding to the position of a standard square grid, marking the square grid as a line grid, connecting two adjacent line grids to obtain a line and a blank column corresponding to one element, identifying a corresponding number for a numerical value in a second element, and forming a blank two column between two adjacent triples; the method specifically comprises the following steps: the triplets are {15, 27, 48}, {16, 27, 889}, and are shown in fig. 4 after being encrypted; all triples in the encrypted triple set are correspondingly arranged on a standard grid network, and then the triples are reduced by a plurality of times to obtain an encrypted graph;
the recruitment end is used for inputting enterprise requirement information of the enterprise by a recruiter of the enterprise and sending the enterprise requirement information to the server; the server receives and stores the encrypted resume information and the enterprise demand information sent by the applicant, and simultaneously sends the encrypted resume information to the recruitment platform according to the set permission level of the applicant and sends the enterprise demand information to the recruitment platform; the recruitment platform displays the encrypted resume information and the enterprise demand information, is in communication connection with the application terminal and the recruitment terminal through the Internet, receives a viewing request instruction fed back by the recruitment terminal and an encrypted field of the request, and feeds back the viewing request instruction and the encrypted field of the request to the server;
referring to fig. 2, the server includes a permission setting unit, a data collecting unit, a protection analyzing unit, a registration logging unit, a decryption analyzing unit, a database, and an information decryption unit;
the permission setting unit is used for the applicant to set the permission level of the recruitment platform; such as: grade one: sending the display field of the applicant and the corresponding content to a recruitment platform;
the data acquisition unit is used for acquiring platform information of an applicant corresponding to the recruitment platform and sending the platform information to the protection analysis unit; the platform information comprises the login time and the quit time of the applicant, and the job hunting position name and visitor data of the applicant; the visitor data comprises recruiters for visiting the encrypted resume information of the applicants, corresponding enterprises, enterprise demand information and visiting duration; the enterprise demand information comprises the industrial and commercial registration information of the enterprise, the name of the enterprise recruitment post and the post recruitment requirement; the protection analysis unit is used for platform information protection analysis of the applicant, and specifically comprises the following steps:
SS 1: counting the total number of single-day accesses of the encrypted resume information of the applicant and marking the number as FW 1; comparing the recruiting position in the enterprise demand information with the job hunting position of the applicant, increasing the number of times of no association once when no position name is overlapped between the recruiting position and the job hunting position, and marking the visit duration of the recruiter as the time length of no association; summing all the non-correlation durations to obtain a non-correlation total duration;
SS 2: marking the total number of unassociated times and the total unassociated duration as FW2 and FW3 respectively; then carrying out normalization processing on the total daily visit times, the total non-association times and the total non-association duration and taking the numerical values of the total daily visit times, the total non-association times and the total non-association duration;
SS 3: obtaining a protection reminding value FH by using a formula FH = FW1 × b1+ FW2 × b2+ FW3 × b 3; wherein b1, b2 and b3 are all preset weight coefficients; the values are 0.15, 0.38 and 0.47 respectively; the protection reminding value is a value used for evaluating the probability of reminding the applicant, which is obtained by carrying out weight calculation on the value of the parameter corresponding to the encrypted resume information of the applicant;
SS 4: when the protection reminding value is larger than the set protection reminding threshold value, generating a protection early warning instruction, and feeding the protection early warning instruction back to the application end of the applicant so as to remind the applicant in time; when an applicant inputs a protection instruction to the protection analysis unit through the application terminal, the protection analysis unit deletes the encrypted resume information of the applicant from the recruitment platform;
the registration login unit is used for registering the terminal information submitted by the computer terminal owner through the computer terminal and sending the terminal information which is successfully registered to the database for storage; the computer terminal which is successfully registered is marked as a registration terminal, and the server is in communication connection with the registration terminal; the terminal information comprises the model, the position and the production time of the computer terminal; an information decryption unit is also arranged in the registration terminal;
the decryption analysis unit is used for distributing the encrypted fields to be decrypted, and the specific distribution steps are as follows:
establishing communication connection with a registered terminal, and marking the registered terminal which is successfully connected as an initial selection terminal; calculating the distance difference between the position of the initially selected terminal and the position of the server to obtain a decryption distance, and marking the decryption distance as JM 1;
setting all computer terminal models to correspond to a preset model value, matching the model of the primarily selected terminal with all the computer terminal models to obtain a corresponding preset model value, and marking the value as JM 2;
calculating the time difference between the production time of the registered terminal and the current time to obtain the service life, and marking the service life as JM 3;
obtaining a solution value of the initially selected terminal and marking the solution value as JM 4; then carrying out normalization processing on the decryption distance, the preset model value, the use duration and the validation value of the primarily selected terminal and taking the numerical values of the decryption distance, the preset model value, the use duration and the validation value;
using the formula:
Figure 698376DEST_PATH_IMAGE001
obtaining a solution optimal value JQ of the initially selected terminal; wherein, the lambda is a correction factor and takes a value of 0.87; f1, f2, f3 and f4 are preset weight proportion coefficients; the values are 1.3, 1.7, 10.9 and 1.75 respectively; the probability that the encryption field is processed by the primary selection terminal is higher when the preset model value and the solution value are larger and the solution value is higher; the smaller the decryption distance and the use duration are, the larger the solution figure of merit is;
marking the initially selected terminal with the maximum optimal value as a selected terminal, sending the encrypted field to be decrypted into the selected terminal, decrypting the encrypted field through an information decryption unit in the selected terminal, and feeding back the decrypted result to the server; meanwhile, the total processing times of the selected terminal is increased once; the decryption analysis unit marks the moment of sending the encrypted field to be decrypted as the processing starting moment of the selected terminal; marking the time of the feedback result as the processing completion time;
calculating the time difference between the processing starting time and the processing finishing time to obtain the single processing duration; summing all single processing time lengths of the selected terminals, taking the average value to obtain a processing time length average value, and marking the processing time length average value as CL 1;
marking the total processing times of the selected terminal as CL 2; carrying out normalization processing on the average value of the processing time and the total processing times and taking the numerical values of the average value and the total processing times; obtaining a solution value JM4 of the selected terminal by using a formula JM4= (f 5/CL 1) + CL2 × f 6; wherein f5 and f6 are preset weight coefficients; 6.8 and 0.56 respectively.
The information decryption unit decrypts the encrypted resume information, specifically: the recruitment end accesses the encrypted resume information of the applicant through the recruitment platform, the applicant clicks a corresponding encrypted field in the encrypted resume information through the recruitment end to perform decryption request, the recruitment platform generates a decryption request instruction corresponding to the encrypted field and feeds the decryption request instruction back to the information decryption unit, the information decryption unit receives the information decryption instruction and sends enterprise demand information and the decryption request instruction corresponding to the applicant to the recruitment end, the applicant checks the enterprise demand information and the decryption request instruction through the recruitment end, when the applicant inputs consent through the recruitment end, the recruitment end generates a consent request instruction and sends the consent request instruction to the information decryption unit, and the information decryption unit decrypts the encrypted field after receiving the consent instruction fed back by the recruitment end and feeds a decryption result back to the recruitment end; when the applicant inputs disagreement through the application end, the application end generates a refute request instruction and sends the refute request instruction to the information decryption unit, and the information decryption unit receives the refute request instruction fed back by the application end and forwards the refute request instruction to the recruitment end.
The formulas are obtained by acquiring a large amount of data and performing software simulation, and the coefficients in the formulas are set by the technicians in the field according to actual conditions;
when the system is used, a candidate inputs personal resume information to a candidate terminal, the personal resume information is encrypted, and the personal resume information is divided into a display field and an encryption field; each encrypted field corresponds to one encryption operation, the encrypted fields are identified corresponding to the personal resume information input by the applicant, the corresponding encryption operation is executed on the identified encrypted fields to obtain encrypted resume information, the encrypted resume information is sent to the server, the server sends the encrypted resume information to the recruitment platform according to the set permission level of the applicant, the personal resume information of the applicant is correspondingly encrypted, the safety of the personal sensitive information of the applicant is improved, and the resume information of the applicant is prevented from being leaked on the recruitment platform; encrypting the characters, selecting encrypted field contents, setting that all the characters correspond to a unique numerical value, matching the encrypted field contents with all the characters to obtain corresponding numerical values, and arranging all the matched numerical values in sequence to obtain a converted text corresponding to the encrypted field contents; substituting each numerical value in the converted text into a numerical value formula preset by an applicant to obtain an encrypted numerical value, and arranging the encrypted numerical values corresponding to the converted text according to a sequence to obtain an encrypted text; sequentially converting the encrypted numerical values in the encrypted text to obtain an encrypted rectangle corresponding to the encrypted numerical values; combining the encrypted rectangles in sequence to obtain encrypted rectangular contents corresponding to the encrypted field contents; carrying out encryption operation on the image, amplifying the image into a plurality of parts to form a pixel grid image, wherein each pixel grid in the pixel grid image only has one color; setting all colors to correspond to a preset color numerical value, identifying the color of each pixel grid in the pixel grid image, and matching the identified color with all colors to obtain the corresponding preset color numerical value; extracting the abscissa and the column coordinate of the pixel grid and forming a triple corresponding to the pixel grid by the abscissa and the column coordinate and a preset color numerical value; marking all triples of the pixel grid image as an image triplet set; adding an encryption value preset by an applicant to each element in each triplet in the image triplet set to obtain a new image triplet set, and marking the new image triplet set as an encryption triplet set; carrying out graph conversion on the encrypted triple set to obtain an encrypted graph corresponding to the image; selecting a blank picture, amplifying the blank picture by a plurality of times, establishing a standard square grid on the blank picture, and extracting the numerical values of elements in each triple in the encrypted triple set; identifying a corresponding number for a numerical value in a first element, selecting a square grid of which the number corresponds to the position of a standard square grid, marking the square grid as a line grid, connecting two adjacent line grids to obtain a line and a blank column which correspond to one element, identifying a corresponding number for a numerical value in a second element, and enabling two adjacent triplets to be blank and two columns, corresponding all triplets in an encrypted triplet set on the standard square grid, and then reducing the triplets by a plurality of times to obtain an encrypted graph.
The preferred embodiments of the invention disclosed above are intended to be illustrative only. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise forms disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best utilize the invention. The invention is limited only by the claims and their full scope and equivalents.

Claims (7)

1. An account safety protection system for a recruitment platform comprises an application terminal, a server, the recruitment platform and a recruitment terminal, and is characterized in that:
the application terminal is used for inputting the personal resume information by the applicant, encrypting the personal resume information to obtain encrypted resume information and sending the encrypted resume information to the server; the specific encryption processing process is as follows: dividing personal resume information into a display field and an encryption field; each encrypted field corresponds to one encryption operation, the encrypted field identification is carried out on the personal resume information input by the corresponding recruiter, and the corresponding encryption operation is carried out on the identified encrypted field to obtain the encrypted resume information; the encrypted field includes a character or an image;
when the content of the encrypted field is a character, performing encryption operation on the character, specifically: selecting encrypted field contents, setting all characters to correspond to a unique numerical value, matching the encrypted field contents with all the characters to obtain corresponding numerical values, and arranging all the matched numerical values in sequence to obtain a converted text corresponding to the encrypted field contents; substituting each numerical value in the converted text into a numerical value formula preset by an applicant to obtain an encrypted numerical value, and arranging the encrypted numerical values corresponding to the converted text according to a sequence to obtain an encrypted text; sequentially converting the encrypted numerical values in the encrypted text to obtain an encrypted rectangle corresponding to the encrypted numerical values; combining the encrypted rectangles in sequence to obtain encrypted rectangular contents corresponding to the encrypted field contents; the encryption rectangle is composed of a plurality of rectangular grids, and preset colors corresponding to the numbers in the encryption numerical values are correspondingly filled in each rectangular grid;
when the content of the encrypted field is an image, performing encryption operation on the image, specifically: enlarging the image into a plurality of parts to form a pixel grid image, wherein each pixel grid in the pixel grid image has only one color; setting all colors to correspond to a preset color numerical value, identifying the color of each pixel grid in the pixel grid image, and matching the identified color with all colors to obtain the corresponding preset color numerical value; extracting the abscissa and the column coordinate of the pixel grid and forming a triple corresponding to the pixel grid by the abscissa and the column coordinate and a preset color numerical value; marking all triples of the pixel grid image as an image triplet set; adding an encryption value preset by an applicant to each element in each triplet in the image triplet set to obtain a new image triplet set, and marking the new image triplet set as an encryption triplet set; carrying out graph conversion on the encryption triple set to obtain an encryption graph corresponding to the image, and specifically comprising the following steps:
s21: selecting a blank picture, amplifying the blank picture by a plurality of times, establishing a standard square grid on the blank picture, and extracting the numerical values of elements in each triple in the encrypted triple set;
s22: identifying a corresponding number for a numerical value in a first element, selecting a square grid with the number corresponding to the position of a standard square grid, marking the square grid as a line grid, connecting two adjacent line grids to obtain a line and a blank column corresponding to one element, identifying a corresponding number for a numerical value in a second element, and forming a blank two column between two adjacent triples; and so on;
s23: all triples in the encrypted triple set are correspondingly arranged on a standard grid network, and then the triples are reduced by a plurality of times to obtain an encrypted graph;
the recruitment end is used for inputting enterprise requirement information of the enterprise by a recruiter of the enterprise and sending the enterprise requirement information to the server;
the server receives and stores the encrypted resume information and the enterprise demand information sent by the applicant, and simultaneously sends the encrypted resume information to the recruitment platform according to the set permission level of the applicant and sends the enterprise demand information to the recruitment platform;
and the recruitment platform displays the encrypted resume information and the enterprise demand information, is in communication connection with the application terminal and the recruitment terminal through the Internet, receives the viewing request instruction fed back by the recruitment terminal and the requested encrypted field, and feeds back the viewing request instruction and the requested encrypted field to the server.
2. The account security protection system for the recruitment platform of claim 1, wherein the server comprises an authority setting unit; the permission setting unit is used for the applicant to set the permission level of the recruitment platform.
3. The account security protection system for the recruitment platform of claim 2, further comprising a data acquisition unit and a protection analysis unit in the server; the data acquisition unit is used for acquiring platform information of an applicant corresponding to the recruitment platform and sending the platform information to the protection analysis unit; the protection analysis unit is used for platform information protection analysis of the applicant, and specifically comprises the following steps: counting the total number of single-day accesses of the encrypted resume information of the applicant; comparing the recruiting position in the enterprise demand information with the job hunting position of the applicant, increasing the number of times of no association once when no position name is overlapped between the recruiting position and the job hunting position, and marking the visit duration of the recruiter as the time length of no association; summing all the non-correlation durations to obtain a non-correlation total duration;
carrying out normalization processing on the total daily visit times, the total non-association times and the total non-association duration and taking the numerical values of the total daily visit times, the total non-association times and the total non-association duration;
and obtaining a protection reminding value through numerical analysis, generating a protection early warning instruction when the protection reminding value is larger than a set protection reminding threshold value, and feeding back the protection early warning instruction to the application end of the applicant, wherein the protection reminding value is a numerical value used for evaluating the probability of reminding the applicant by performing weight calculation on numerical values of parameters corresponding to the encrypted resume information of the applicant.
4. The account security system for a recruitment platform of claim 3 wherein the platform information comprises a login time and a logout time of an applicant, and job hunting position names and visitor data of the applicant; the visitor data comprises recruiters for visiting the encrypted resume information of the applicants, corresponding enterprises, enterprise demand information and visiting duration; the enterprise demand information comprises the industrial and commercial registration information of the enterprise, the name of the recruitment post of the enterprise and the post recruitment requirement.
5. The account security protection system for the recruitment platform of claim 3, further comprising an information decryption unit in the server; the information decryption unit is used for decrypting the encrypted resume information, and the specific process is as follows: the recruitment end accesses the encrypted resume information of the applicant through the recruitment platform, the applicant clicks a corresponding encrypted field in the encrypted resume information through the recruitment end to perform decryption request, the recruitment platform generates a decryption request instruction corresponding to the encrypted field and feeds the decryption request instruction back to the information decryption unit, the information decryption unit receives the information decryption instruction and sends enterprise demand information and the decryption request instruction corresponding to the applicant to the recruitment end, the applicant checks the enterprise demand information and the decryption request instruction through the recruitment end, when the applicant inputs consent through the recruitment end, the recruitment end generates a consent request instruction and sends the consent request instruction to the information decryption unit, and the information decryption unit decrypts the encrypted field after receiving the consent instruction fed back by the recruitment end and feeds a decryption result back to the recruitment end; when the applicant inputs disagreement through the application end, the application end generates a refute request instruction and sends the refute request instruction to the information decryption unit, and the information decryption unit receives the refute request instruction fed back by the application end and forwards the refute request instruction to the recruitment end.
6. The account security system for the recruitment platform of claim 5, wherein the server further comprises a registration unit and a database; the registration login unit is used for registering the terminal information submitted by the computer terminal owner through the computer terminal and sending the terminal information which is successfully registered to the database for storage; the computer terminal which is successfully registered is marked as a registration terminal, and the server is in communication connection with the registration terminal; the terminal information includes the model, position and production time of the computer terminal.
7. The account security protection system for the recruitment platform according to claim 6, wherein the server further comprises a decryption analysis unit, the decryption analysis unit is used for distributing the encrypted fields to be decrypted to the selected terminal, decrypting the encrypted fields through an information decryption unit built in the selected terminal and feeding back the decryption result to the server.
CN202110708846.0A 2021-06-25 2021-06-25 Account safety protection system for recruitment platform Active CN113259390B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110708846.0A CN113259390B (en) 2021-06-25 2021-06-25 Account safety protection system for recruitment platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110708846.0A CN113259390B (en) 2021-06-25 2021-06-25 Account safety protection system for recruitment platform

Publications (2)

Publication Number Publication Date
CN113259390A true CN113259390A (en) 2021-08-13
CN113259390B CN113259390B (en) 2021-09-14

Family

ID=77189781

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110708846.0A Active CN113259390B (en) 2021-06-25 2021-06-25 Account safety protection system for recruitment platform

Country Status (1)

Country Link
CN (1) CN113259390B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117411728A (en) * 2023-12-14 2024-01-16 成都极数链科技有限公司 Personnel resume privatization management method, computer equipment and storage medium

Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020114452A1 (en) * 2000-12-21 2002-08-22 Hamilton Jon W. Method and system for digital image authentication
CN1801188A (en) * 2006-01-18 2006-07-12 冯文伦 Matrix type two-dimensional bar code and its encoding and decoding method
CN101009548A (en) * 2006-01-24 2007-08-01 马恒利 Data encryption method based on encryption technology
CN101072107A (en) * 2007-06-11 2007-11-14 腾讯科技(深圳)有限公司 Two-dimensional information encryption method and device, and two-dimensional information authenticating method and server
US20110106550A1 (en) * 2009-11-02 2011-05-05 Skelton Donald H Resume and cv certification process
US20110142230A1 (en) * 2003-02-07 2011-06-16 Britesmart Llc Real-time data encryption
WO2011080745A2 (en) * 2009-12-31 2011-07-07 Vaultive Ltd. System, apparatus and method for encryption and decryption of data transmitted over a network
US20140281945A1 (en) * 2013-03-14 2014-09-18 Yossi Avni System and method of encoding content and an image
WO2018052726A1 (en) * 2016-09-15 2018-03-22 Nuts Holdings, Llc Encrypted userdata transit and storage
CN109064119A (en) * 2018-07-09 2018-12-21 绿佳康(广东)科技有限公司 Recruitment methods and device on line
CN109922225A (en) * 2018-10-26 2019-06-21 湖南工程学院 A kind of new rectangular image three-dimensional encryption method
CN109993502A (en) * 2019-04-01 2019-07-09 北京网聘咨询有限公司 Cross-platform intelligent terminal resume delivery system and method
CN110489945A (en) * 2019-07-26 2019-11-22 山东科技大学 A kind of biographic information protection and retroactive method of divulging a secret
CN111062696A (en) * 2019-12-18 2020-04-24 广州森立公共服务有限公司 Human resource recruitment and resume matching system
US20200184278A1 (en) * 2014-03-18 2020-06-11 Z Advanced Computing, Inc. System and Method for Extremely Efficient Image and Pattern Recognition and Artificial Intelligence Platform
CN111353166A (en) * 2020-02-25 2020-06-30 南通大学 Encryption method for converting picture into Chinese character
CN112000977A (en) * 2020-11-02 2020-11-27 浙江微能科技有限公司 System for encrypting and keeping digital assets
CN112232750A (en) * 2020-04-23 2021-01-15 苏州有信有服信息技术有限公司 Recruitment website job hunting and recruitment information management system
CN112464283A (en) * 2020-12-04 2021-03-09 广州威创信息技术有限公司 Data storage system based on block chain
CN112507364A (en) * 2020-12-16 2021-03-16 合肥执念网络科技有限公司 Data encryption system based on cloud computing

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020114452A1 (en) * 2000-12-21 2002-08-22 Hamilton Jon W. Method and system for digital image authentication
US20110142230A1 (en) * 2003-02-07 2011-06-16 Britesmart Llc Real-time data encryption
CN1801188A (en) * 2006-01-18 2006-07-12 冯文伦 Matrix type two-dimensional bar code and its encoding and decoding method
CN101009548A (en) * 2006-01-24 2007-08-01 马恒利 Data encryption method based on encryption technology
CN101072107A (en) * 2007-06-11 2007-11-14 腾讯科技(深圳)有限公司 Two-dimensional information encryption method and device, and two-dimensional information authenticating method and server
US20110106550A1 (en) * 2009-11-02 2011-05-05 Skelton Donald H Resume and cv certification process
WO2011080745A2 (en) * 2009-12-31 2011-07-07 Vaultive Ltd. System, apparatus and method for encryption and decryption of data transmitted over a network
US20140281945A1 (en) * 2013-03-14 2014-09-18 Yossi Avni System and method of encoding content and an image
US20200184278A1 (en) * 2014-03-18 2020-06-11 Z Advanced Computing, Inc. System and Method for Extremely Efficient Image and Pattern Recognition and Artificial Intelligence Platform
WO2018052726A1 (en) * 2016-09-15 2018-03-22 Nuts Holdings, Llc Encrypted userdata transit and storage
CN109064119A (en) * 2018-07-09 2018-12-21 绿佳康(广东)科技有限公司 Recruitment methods and device on line
CN109922225A (en) * 2018-10-26 2019-06-21 湖南工程学院 A kind of new rectangular image three-dimensional encryption method
CN109993502A (en) * 2019-04-01 2019-07-09 北京网聘咨询有限公司 Cross-platform intelligent terminal resume delivery system and method
CN110489945A (en) * 2019-07-26 2019-11-22 山东科技大学 A kind of biographic information protection and retroactive method of divulging a secret
CN111062696A (en) * 2019-12-18 2020-04-24 广州森立公共服务有限公司 Human resource recruitment and resume matching system
CN111353166A (en) * 2020-02-25 2020-06-30 南通大学 Encryption method for converting picture into Chinese character
CN112232750A (en) * 2020-04-23 2021-01-15 苏州有信有服信息技术有限公司 Recruitment website job hunting and recruitment information management system
CN112000977A (en) * 2020-11-02 2020-11-27 浙江微能科技有限公司 System for encrypting and keeping digital assets
CN112464283A (en) * 2020-12-04 2021-03-09 广州威创信息技术有限公司 Data storage system based on block chain
CN112507364A (en) * 2020-12-16 2021-03-16 合肥执念网络科技有限公司 Data encryption system based on cloud computing

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
HAIYONG BAO;GUIYI WEI;JUN SHAO;ZHENFU CAO: ""Efficient and secure electronic resume using smart cards"", 《2011 EIGHTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD)》 *
孙峰等: "一种高鲁棒性数字水印算法的FPGA实现", 《电子测量技术》 *
王艳萍等: "基于Android的高校就业平台设计与实现", 《电脑编程技巧与维护》 *
钟彩等: "一种基于新超混沌Chen系统的置乱替代相结合的加密算法", 《液晶与显示》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117411728A (en) * 2023-12-14 2024-01-16 成都极数链科技有限公司 Personnel resume privatization management method, computer equipment and storage medium
CN117411728B (en) * 2023-12-14 2024-02-13 成都极数链科技有限公司 Personnel resume privatization management method, computer equipment and storage medium

Also Published As

Publication number Publication date
CN113259390B (en) 2021-09-14

Similar Documents

Publication Publication Date Title
CN108346191B (en) Attendance checking method and device, computer equipment and storage medium
Dagher et al. Broncovote: Secure voting system using ethereum’s blockchain
Hsiao et al. Employing blockchain technology to strengthen security of wireless sensor networks
DE102019106528A1 (en) TIME- AND PLACE-BASED AUTHENTICATION APPLICATION DATA
CN110781930A (en) User portrait grouping and behavior analysis method and system based on log data of network security equipment
CN111125512A (en) Service recommendation processing method, device and system
CN110287724B (en) Data storage and verification method and device
CN111079197B (en) Audit result data storage method and device, electronic equipment and medium
CN109274672A (en) A kind of mobile operation management and data interaction system for information communication device
CN108268799B (en) Data query system and method, storage medium and terminal
JP7029773B2 (en) Blockchain-based bid bidding information processing methods, systems, devices and media
CN113259390B (en) Account safety protection system for recruitment platform
CN107239934A (en) A kind of builder's system of real name service and management system
CN112016075B (en) Travel information verification method based on block chain, electronic device and medium
CN109446761B (en) Information security processing method, storage medium and terminal equipment
CN112464283A (en) Data storage system based on block chain
CN112417315A (en) User portrait generation method, device, equipment and medium based on website registration
CN110837653A (en) Label prediction method, device and computer readable storage medium
CN114004639B (en) Method, device, computer equipment and storage medium for recommending preferential information
CN114511265A (en) Tea production circulation tracing method and system based on logistics Internet of things and block chain
CN106768016A (en) A kind of use APP quick discriminatings, collection, the method for analysis grouting data
CN113240442A (en) Agricultural Internet of things agricultural product quality safety tracing method and system
JP2007004549A (en) Access control method
CN113190200B (en) Exhibition data security protection method and device
KR102443906B1 (en) Method for reading qualification in real time of manpower on construction site using facial recognition technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant