CN113849133B - Processing method and device of privacy data, electronic equipment and storage medium - Google Patents
Processing method and device of privacy data, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN113849133B CN113849133B CN202111150646.4A CN202111150646A CN113849133B CN 113849133 B CN113849133 B CN 113849133B CN 202111150646 A CN202111150646 A CN 202111150646A CN 113849133 B CN113849133 B CN 113849133B
- Authority
- CN
- China
- Prior art keywords
- processed
- data
- privacy data
- determining
- privacy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000003672 processing method Methods 0.000 title description 2
- 238000000034 method Methods 0.000 claims abstract description 52
- 238000012545 processing Methods 0.000 claims abstract description 27
- 238000004891 communication Methods 0.000 claims description 18
- 238000004590 computer program Methods 0.000 claims description 8
- 230000000694 effects Effects 0.000 claims description 7
- 238000013507 mapping Methods 0.000 claims description 6
- 238000009825 accumulation Methods 0.000 abstract description 11
- 230000008569 process Effects 0.000 description 7
- 230000009471 action Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000000802 evaporation-induced self-assembly Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0646—Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
- G06F3/0652—Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention provides a method, a device, electronic equipment and a storage medium for processing privacy data, wherein the method comprises the following steps: acquiring privacy data to be processed, determining the use time length of the privacy data to be processed, and determining the target data type of the privacy data to be processed; determining a target preset effective duration of the privacy data to be processed according to the target data type, and comparing the use duration with the target preset effective duration; and if the using time length exceeds the target preset effective time length, deleting the privacy data to be processed. By determining the use duration of the privacy data to be processed and the target preset effective duration, comparing the use duration with the target preset effective duration, and determining whether to delete the privacy data to be processed according to the comparison result, data accumulation and data leakage can be avoided.
Description
Technical Field
The embodiment of the invention relates to the technical field of data processing, in particular to a method and a device for processing private data, electronic equipment and a storage medium.
Background
With the continuous development of the internet of things technology, smart home has become more and more popular, and users can control smart devices through APP (application program) at ordinary times, so as to achieve the purpose of using the smart devices.
However, the user may need to acquire user data or device data, such as the current location or current status of the device that the user is authorized to use, during the control of the smart device via the APP. If such data is not properly handled, it may cause data accumulation and data leakage.
Disclosure of Invention
In order to solve the above technical problem that if the data are not properly processed, data accumulation and data leakage may be caused, the embodiments of the present invention provide a method, an apparatus, an electronic device, and a storage medium for processing private data.
In a first aspect of an embodiment of the present invention, there is first provided a method for processing private data, the method including:
acquiring privacy data to be processed, determining the use time length of the privacy data to be processed, and determining the target data type of the privacy data to be processed;
determining a target preset effective duration of the privacy data to be processed according to the target data type, and comparing the use duration with the target preset effective duration;
and if the using time length exceeds the target preset effective time length, deleting the privacy data to be processed.
In an alternative embodiment, the acquiring the privacy data to be processed includes:
acquiring the privacy data to be processed according to a preset privacy data processing period;
or,
and in a first preset time period, acquiring the privacy data to be processed if the acquisition quantity of the privacy data exceeds a preset data quantity threshold value.
In an optional implementation manner, the determining, according to the target data type, a target preset valid duration of the to-be-processed privacy data includes:
acquiring a mapping relation between a preset data type and a preset effective duration, and searching the preset effective duration corresponding to the target data type according to the mapping relation;
and determining the preset effective duration corresponding to the target data type as the target preset effective duration of the privacy data to be processed.
In an optional implementation manner, if the usage time exceeds the target preset valid time, deleting the to-be-processed privacy data includes:
if the using time length exceeds the target preset effective time length, searching whether backup data exists in the privacy data to be processed;
if the to-be-processed private data does not exist the backup data, deleting the to-be-processed private data;
and if the to-be-processed privacy data exist in the backup data, deleting the to-be-processed privacy data and the backup data.
In an alternative embodiment, the method further comprises:
searching an object corresponding to the privacy data to be processed and determining the active condition of the object under the condition that the privacy data to be processed comprises the object privacy data;
and judging whether the object is an inactive object according to the active condition of the object, and deleting the privacy data to be processed when the object is the inactive object.
In an alternative embodiment, the determining the activity of the object includes:
searching the login time of the application program of the last login of the object, and acquiring the current time;
calculating a first difference between the current time and the login time;
the judging whether the object is an inactive object according to the active condition of the object comprises the following steps:
if the first difference value is larger than a preset first threshold value, determining that the object is the inactive object;
and if the first difference value is not greater than the preset first threshold value, determining that the object is an active object.
In an alternative embodiment, the method further comprises:
searching equipment corresponding to the privacy data to be processed and determining the active condition of the equipment under the condition that the privacy data to be processed comprises the equipment privacy data;
judging whether the equipment is inactive equipment according to the active condition of the equipment, and deleting the privacy data to be processed under the condition that the equipment is inactive equipment.
In an alternative embodiment, the determining the activity of the device includes:
searching the last use time of the equipment and acquiring the current time;
calculating a second difference between the current time and the use time;
judging whether the equipment is inactive equipment according to the active condition of the equipment, including:
if the second difference value is larger than a preset second threshold value, determining that the equipment is the inactive equipment;
and if the second difference value is not greater than the preset second threshold value, determining that the equipment is active equipment.
In an alternative embodiment, the method further comprises:
determining the privacy data to be processed within a second preset time period under the condition that the privacy data to be processed comprises equipment privacy data;
and deleting the rest of the privacy data to be processed except the privacy data to be processed in the second preset time period from the privacy data to be processed.
In a second aspect of the embodiment of the present invention, there is provided a processing apparatus for private data, the apparatus including:
the data acquisition module is used for acquiring the privacy data to be processed;
the first determining module is used for determining the use duration of the privacy data to be processed;
the type determining module is used for determining the target data type of the privacy data to be processed;
the second determining module is used for determining target preset effective duration of the privacy data to be processed according to the target data type;
the duration comparison module is used for comparing the use duration with the target preset effective duration;
and the data deleting module is used for deleting the privacy data to be processed if the using time length exceeds the target preset effective time length.
In a third aspect of the embodiment of the present invention, there is also provided an electronic device, including a processor, a communication interface, a memory, and a communication bus, where the processor, the communication interface, and the memory complete communication with each other through the communication bus;
a memory for storing a computer program;
and a processor, configured to implement the method for processing private data described in the first aspect when executing the program stored in the memory.
In a fourth aspect of the embodiments of the present invention, there is also provided a storage medium having stored therein instructions that, when executed on a computer, cause the computer to perform the method for processing private data described in the first aspect.
In a fifth aspect of embodiments of the present invention, there is also provided a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of processing private data as described in the first aspect above.
According to the technical scheme provided by the embodiment of the invention, the privacy data to be processed is obtained, the use time length of the privacy data to be processed is determined, the target data type of the privacy data to be processed is determined, the target preset effective time length of the privacy data of the data to be processed is determined according to the target data type, the use time length is compared with the target preset effective time length, and if the use time length exceeds the target preset effective time length, the privacy data to be processed is deleted. By determining the use duration of the privacy data to be processed and the target preset effective duration, comparing the use duration with the target preset effective duration, and determining whether to delete the privacy data to be processed according to the comparison result, data accumulation and data leakage can be avoided.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
In order to more clearly illustrate the embodiments of the invention or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, and it will be obvious to a person skilled in the art that other drawings can be obtained from these drawings without inventive effort.
Fig. 1 is a schematic flow chart of an implementation of a method for processing private data according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of another method for processing private data according to an embodiment of the present invention;
fig. 3 is a schematic flow chart of another method for processing private data according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a device for processing private data according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
As shown in fig. 1, a schematic implementation flow chart of a method for processing private data according to an embodiment of the present invention is provided, and the method is applied to a processor, and may specifically include the following steps:
s101, acquiring privacy data to be processed, determining the use duration of the privacy data to be processed, and determining the target data type of the privacy data to be processed.
Currently, in the process of controlling the intelligent device through the APP, a user may need to acquire privacy data such as user data and/or device data, for example, a current location authorized for use by the user or a current state of the device. For this reason, data accumulation and data leakage may be caused.
In order to solve data accumulation and data disclosure, in the embodiment of the invention, the privacy data to be processed is acquired, the use duration of the privacy data to be processed is determined, and the target data type of the privacy data to be processed is determined.
For example, to address data accumulation and data disclosure, the privacy data to be processed is acquired (159, … …), the time period of use of the privacy data to be processed is determined (2 days), and the target data type (cell phone number) of the privacy data to be processed is determined.
In the embodiment of the invention, the private data to be processed can be obtained according to a preset private data processing period, or in a first preset time period, if the collection amount of the private data exceeds a preset data amount threshold value, the private data to be processed is obtained.
For example, in the embodiment of the present invention, the private data to be processed may be acquired every day, or in a day, if the acquired amount of the private data exceeds a preset data amount threshold, the private data to be processed may be acquired.
It should be noted that, in the process of controlling the intelligent device through the APP, the user may need to acquire private data such as user data and/or device data, which may cause an excessive collection amount of the private data, so in order to avoid data accumulation, in this case, the private data to be processed may be acquired.
S102, determining a target preset effective duration of the privacy data to be processed according to the target data type, and comparing the use duration with the target preset effective duration.
In the embodiment of the invention, the target preset effective duration of the privacy data to be processed can be determined according to the target data type of the privacy data to be processed, so that the using duration can be compared with the target preset effective duration.
For example, in the embodiment of the present invention, different effective durations are set for different types of privacy data, that is, different effective durations exist for different data types of the privacy data, and a mapping relationship exists between the data types and the effective durations, which is shown in the following table 1.
Data type | Effective duration of time |
Mobile phone number | For 30 days |
Current position | For 7 days |
…… | …… |
TABLE 1
According to the mapping relation between the preset data type and the preset effective duration shown in the table 1, searching the preset effective duration corresponding to the target data type, and determining that the preset effective duration corresponding to the target data type is the target preset effective duration of the privacy data to be processed.
For example, for a target data type (mobile phone number) of the privacy data to be processed, as shown in table 1 above, a preset valid duration (30 days) corresponding to the target data type is searched, and the preset valid duration corresponding to the target data type is determined to be the target preset valid duration of the privacy data to be processed.
And S103, deleting the privacy data to be processed if the using time length exceeds the target preset effective time length.
And (3) regarding the use time length of the privacy data to be processed and the target preset effective time length, if the use time length exceeds the target preset effective time length, indicating that the privacy data to be processed is out of date, deleting the privacy data to be processed, otherwise, temporarily eliminating the privacy data to be processed.
For example, for the use duration (31 days) and the target preset valid duration (30 days) of the to-be-processed privacy data (159 and … …), the use duration is beyond the target preset valid duration, which indicates that the to-be-processed privacy data is out of date, and the to-be-processed privacy data is deleted.
If the using time length exceeds the target preset effective time length, the fact that the privacy data to be processed is out of date is indicated, whether the privacy data to be processed has backup data or not can be searched at the moment, and if the privacy data to be processed does not have the backup data, the privacy data to be processed is deleted.
In addition, for the privacy data to be processed, if the privacy data to be processed has backup data, deleting the privacy data to be processed and the backup data. Therefore, the privacy data to be processed can be determined not to be restored after being deleted, and the safety of the data is ensured.
For example, if the usage time length exceeds the target preset effective time length, the expiration of the privacy data to be processed is indicated, at this time, whether the backup data exists in the privacy data to be processed can be searched in the database, and if the backup data does not exist in the privacy data to be processed, the privacy data to be processed is deleted.
And for the privacy data to be processed, if the backup data of the privacy data to be processed exists in the database, deleting the privacy data to be processed and the backup data. Therefore, the privacy data to be processed can be determined not to be restored after being deleted, and the safety of the data is ensured.
It should be noted that, for the privacy data to be processed, after being deleted, the privacy data to be processed may be re-acquired if necessary, which is not limited in the embodiment of the present invention.
Through the description of the technical scheme provided by the embodiment of the invention, the to-be-processed privacy data is obtained, the use time length of the to-be-processed privacy data is determined, the target data type of the to-be-processed privacy data is determined, the target preset effective time length of the privacy data of the to-be-processed data is determined according to the target data type, the use time length is compared with the target preset effective time length, and if the use time length exceeds the target preset effective time length, the to-be-processed privacy data is deleted.
By determining the use duration of the privacy data to be processed and the target preset effective duration, comparing the use duration with the target preset effective duration, and determining whether to delete the privacy data to be processed according to the comparison result, data accumulation and data leakage can be avoided.
As shown in fig. 2, a flowchart of another method for processing private data according to an embodiment of the present invention is shown, where the method is applied to a processor, and may specifically include the following steps:
s201, acquiring the privacy data to be processed, determining the use duration of the privacy data to be processed, and determining the target data type of the privacy data to be processed.
In the embodiment of the present invention, the step is similar to the step S101, and the embodiment of the present invention is not described here again.
S202, determining a target preset effective duration of the privacy data to be processed according to the target data type, and comparing the use duration with the target preset effective duration.
In the embodiment of the present invention, the step is similar to the step S102, and the embodiment of the present invention is not described here again.
And S203, deleting the privacy data to be processed if the using time length exceeds the target preset effective time length.
In the embodiment of the present invention, the step is similar to the step S103, and the embodiment of the present invention is not described here again.
S204, searching an object corresponding to the privacy data to be processed and determining the active condition of the object under the condition that the privacy data to be processed comprises the object privacy data.
In the embodiment of the invention, for the to-be-processed privacy data, besides deleting the to-be-processed privacy data by setting the effective duration, whether to delete the to-be-processed privacy data can be determined by other dimensions.
Specifically, in the case that the privacy data to be processed includes the object privacy data, the object corresponding to the privacy data to be processed is searched, that is, it is determined to which object (for example, user) the privacy data to be processed belongs, and then the active condition of the object can be determined.
For example, for the to-be-processed privacy data (159 … …), it is known that the to-be-processed privacy data includes user privacy data, and at this time, a user corresponding to the to-be-processed privacy data may be searched, that is, a user to which the to-be-processed privacy data belongs is determined, so that an activity condition of the user may be determined.
The method comprises the steps of searching the login time of the application program of the last login of the object, obtaining the current time, and calculating a first difference value between the current time and the login time. The activity of the object is characterized by a first difference, the smaller the first difference, the more alive the object is indicated, otherwise the opposite is true.
For example, the login time of each user to log in the application program last time is stored in the database, so that the login time of the user A to log in the application program last time can be searched, the current time is obtained, and a first difference value between the current time and the login time is calculated.
S205, judging whether the object is an inactive object according to the active condition of the object, and deleting the privacy data to be processed when the object is the inactive object.
In the embodiment of the invention, for the active condition of the object, whether the object is an inactive object can be judged according to the active condition of the object, and the privacy data to be processed is deleted under the condition that the object is an inactive object, otherwise, the privacy data to be processed is not needed to be deleted temporarily.
In the embodiment of the invention, the active condition of the object is represented by the first difference value, so that if the first difference value is greater than a preset first threshold value, the object is determined to be the inactive object, and if the first difference value is not greater than the preset first threshold value, the object is determined to be the active object.
For example, in the embodiment of the present invention, a first threshold value (7 days) is preset, and for the first difference value, if the first difference value is greater than the preset first threshold value, it is indicated that the user has not logged in to the application program for at least 7 days, and at this time, it may be determined that the user is an inactive user.
In addition, if the first difference is not greater than the preset first threshold, it is indicated that the user logs in the application program within 7 days, and it is indicated that the user is active, and at this time, it can be determined that the user is an active user. And determining whether the user is active or not according to the magnitude relation between the first difference value and the preset first threshold value.
Through the description of the technical scheme provided by the embodiment of the invention, for the privacy data to be processed, besides deleting the privacy data to be processed by setting the effective duration, the privacy data to be processed can be deleted by the condition that the object recently logs in the application program, so that data accumulation and data leakage can be avoided from multiple dimensions.
As shown in fig. 3, a flowchart of another method for processing private data according to an embodiment of the present invention is shown, where the method is applied to a processor, and may specifically include the following steps:
s301, acquiring the privacy data to be processed, determining the use duration of the privacy data to be processed, and determining the target data type of the privacy data to be processed.
In the embodiment of the present invention, the step is similar to the step S101, and the embodiment of the present invention is not described here again.
S302, determining a target preset effective duration of the privacy data to be processed according to the target data type, and comparing the use duration with the target preset effective duration.
In the embodiment of the present invention, the step is similar to the step S102, and the embodiment of the present invention is not described here again.
And S303, deleting the privacy data to be processed if the using time length exceeds the target preset effective time length.
In the embodiment of the present invention, the step is similar to the step S103, and the embodiment of the present invention is not described here again.
S304, searching an object corresponding to the privacy data to be processed and determining the active condition of the object under the condition that the privacy data to be processed comprises the object privacy data.
In the embodiment of the present invention, the step is similar to the step S204 described above, and the embodiment of the present invention is not described here again.
S305, judging whether the object is an inactive object according to the active condition of the object, and deleting the privacy data to be processed when the object is the inactive object.
In the embodiment of the present invention, the step is similar to the step S205 described above, and the embodiment of the present invention is not described here again.
S306, searching equipment corresponding to the privacy data to be processed and determining the active condition of the equipment under the condition that the privacy data to be processed comprises the equipment privacy data.
In the embodiment of the invention, for the to-be-processed privacy data, besides deleting the to-be-processed privacy data by setting the effective duration, whether to delete the to-be-processed privacy data can be determined by other dimensions.
Specifically, in the case that the privacy data to be processed includes device privacy data, a device corresponding to the privacy data to be processed is searched, that is, a device to which the privacy data to be processed belongs is searched, so that an active condition of the device can be determined.
For example, for the privacy data to be processed (the device operates normally), it is known that the privacy data to be processed includes the device privacy data, and at this time, the device corresponding to the privacy data to be processed is searched, that is, the device to which the privacy data to be processed belongs is searched, so that the active condition of the device can be determined.
The last use time of the device can be searched, the current time is acquired, and a second difference value between the current time and the use time is calculated. Characterizing the activity of the device by a second difference value, the smaller the second difference value, the more active (i.e., frequently used) the device, and otherwise the opposite.
For example, the last time of use of each device is stored in the database, so that the last time of use of device a can be searched, the current time is obtained, and a second difference between the current time and the time of use is calculated.
S307, judging whether the equipment is an inactive equipment according to the active condition of the equipment, and deleting the privacy data to be processed when the equipment is the inactive equipment.
In the embodiment of the invention, for the active condition of the device, whether the device is an inactive device can be judged according to the active condition of the device, and if the device is an inactive device, the device is not commonly used, at this time, the to-be-processed privacy data can be deleted, otherwise, the to-be-processed privacy data is not required to be deleted temporarily.
In the embodiment of the invention, the second difference value characterizes the active condition of the device, if the second difference value is greater than a preset second threshold value, the device is not commonly used, the device can be determined to be the inactive device at the moment, and if the second difference value is not greater than the preset second threshold value, the device is commonly used, and the device is determined to be the active device at the moment.
For example, in the embodiment of the present invention, a first threshold value (15 days) is preset, and for the second difference value, if the second difference value is greater than the preset second threshold value, it is indicated that the device has not been used for at least 15 days, it is indicated that the device is not used frequently, and it may be determined that the device is an inactive device.
In addition, if the first difference is not greater than the preset second threshold, it indicates that the device is used within 15 days, it indicates that the device is frequently used, and at this time, it can be determined that the device is an active device. And determining whether the equipment is active or not according to the magnitude relation between the second difference value and the preset second threshold value.
Further, with respect to the to-be-processed private data, in the case where the to-be-processed private data includes device private data, it may be necessary to use a part of the to-be-processed private data, for example, for presentation or the like, thereby determining to-be-processed private data within a second preset period of time, and deleting the rest of the to-be-processed private data other than the to-be-processed private data within the second preset period of time from the to-be-processed private data.
For example, in the case where the to-be-processed privacy data includes device privacy data, the to-be-processed privacy data within the last 7 days is required for presentation, so that the to-be-processed privacy data within the last 7 days can be determined, and thus, from among the to-be-processed privacy data, the to-be-processed privacy data within the last 7 days is retained for presentation, and the rest of the to-be-processed privacy data other than the to-be-processed privacy data within the last 7 days is deleted.
Through the description of the technical scheme provided by the embodiment of the invention, for the to-be-processed private data, besides deleting the to-be-processed private data by setting the effective duration, the to-be-processed private data can be deleted by the condition that the object recently logs in the application program, the to-be-processed private data can be deleted by the frequently used equipment, and the to-be-processed private data can be deleted by intercepting the time period, so that data accumulation and data leakage can be avoided from multiple dimensions.
Corresponding to the above method embodiment, the embodiment of the present invention further provides a device for processing private data, as shown in fig. 4, where the device may include: the data acquisition module 410, the first determination module 420, the type determination module 430, the second determination module 440, the duration comparison module 450, the data deletion module 460.
A data acquisition module 410, configured to acquire privacy data to be processed;
a first determining module 420, configured to determine a usage duration of the privacy data to be processed;
a type determining module 430, configured to determine a target data type of the privacy data to be processed;
a second determining module 440, configured to determine a target preset valid duration of the privacy data to be processed according to the target data type;
a duration comparison module 450, configured to compare the usage duration with the target preset effective duration;
the data deleting module 460 is configured to delete the privacy data to be processed if the usage duration exceeds the target preset duration.
The embodiment 5 of the present invention further provides an electronic device, as shown in fig. 5, including a processor 51, a communication interface 52, a memory 53, and a communication bus 54, wherein the processor 51, the communication interface 52, the memory 53 complete communication with each other through the communication bus 54,
a memory 53 for storing a computer program;
the processor 51 is configured to execute a program stored in the memory 53, and implement the following steps:
acquiring privacy data to be processed, determining the use time length of the privacy data to be processed, and determining the target data type of the privacy data to be processed; determining a target preset effective duration of the privacy data to be processed according to the target data type, and comparing the use duration with the target preset effective duration; and if the using time length exceeds the target preset effective time length, deleting the privacy data to be processed.
The communication bus mentioned by the above electronic device may be a peripheral component interconnect standard (Peripheral Component Interconnect, abbreviated as PCI) bus or an extended industry standard architecture (Extended Industry Standard Architecture, abbreviated as EISA) bus, or the like. The communication bus may be classified as an address bus, a data bus, a control bus, or the like. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
The communication interface is used for communication between the electronic device and other devices.
The memory may include random access memory (Random Access Memory, RAM) or non-volatile memory (non-volatile memory), such as at least one disk memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU for short), a network processor (Network Processor, NP for short), etc.; but also digital signal processors (Digital Signal Processing, DSP for short), application specific integrated circuits (Application Specific Integrated Circuit, ASIC for short), field-programmable gate arrays (Field-Programmable Gate Array, FPGA for short) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
In yet another embodiment of the present invention, a storage medium is provided, where instructions are stored, which when executed on a computer, cause the computer to perform the method for processing private data according to any of the above embodiments.
In a further embodiment of the present invention, there is also provided a computer program product containing instructions which, when run on a computer, cause the computer to perform the method of processing private data of any of the above embodiments.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present invention, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a storage medium or transmitted from one storage medium to another, for example, from one website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) means. The storage media may be any available media that can be accessed by a computer or a data storage device such as a server, data center, or the like that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), etc.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In this specification, each embodiment is described in a related manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for system embodiments, since they are substantially similar to method embodiments, the description is relatively simple, as relevant to see a section of the description of method embodiments.
The foregoing description is only of the preferred embodiments of the present invention and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention are included in the protection scope of the present invention.
Claims (11)
1. A method of processing private data, the method comprising:
acquiring privacy data to be processed, determining the use time length of the privacy data to be processed, and determining the target data type of the privacy data to be processed;
determining a target preset effective duration of the privacy data to be processed according to the target data type, and comparing the use duration with the target preset effective duration;
if the using time length exceeds the target preset effective time length, deleting the privacy data to be processed;
searching an object corresponding to the privacy data to be processed and determining the active condition of the object under the condition that the privacy data to be processed comprises the object privacy data;
and judging whether the object is an inactive object according to the active condition of the object, and deleting the privacy data to be processed when the object is the inactive object.
2. The method of claim 1, wherein the obtaining the private data to be processed comprises:
acquiring the privacy data to be processed according to a preset privacy data processing period;
or,
and in a first preset time period, acquiring the privacy data to be processed if the acquisition quantity of the privacy data exceeds a preset data quantity threshold value.
3. The method according to claim 1, wherein the determining the target preset valid period of the privacy data to be processed according to the target data type includes:
acquiring a mapping relation between a preset data type and a preset effective duration, and searching the preset effective duration corresponding to the target data type according to the mapping relation;
and determining the preset effective duration corresponding to the target data type as the target preset effective duration of the privacy data to be processed.
4. The method according to claim 1, wherein deleting the privacy data to be processed if the usage time exceeds the target preset valid time period comprises:
if the using time length exceeds the target preset effective time length, searching whether backup data exists in the privacy data to be processed;
if the to-be-processed private data does not exist the backup data, deleting the to-be-processed private data;
and if the to-be-processed privacy data exist in the backup data, deleting the to-be-processed privacy data and the backup data.
5. The method of claim 1, wherein the determining the activity of the object comprises:
searching the login time of the application program of the last login of the object, and acquiring the current time;
calculating a first difference between the current time and the login time;
the judging whether the object is an inactive object according to the active condition of the object comprises the following steps:
if the first difference value is larger than a preset first threshold value, determining that the object is the inactive object;
and if the first difference value is not greater than the preset first threshold value, determining that the object is an active object.
6. The method according to claim 1, wherein the method further comprises:
searching equipment corresponding to the privacy data to be processed and determining the active condition of the equipment under the condition that the privacy data to be processed comprises the equipment privacy data;
judging whether the equipment is inactive equipment according to the active condition of the equipment, and deleting the privacy data to be processed under the condition that the equipment is inactive equipment.
7. The method of claim 6, wherein the determining the activity of the device comprises:
searching the last use time of the equipment and acquiring the current time;
calculating a second difference between the current time and the use time;
judging whether the equipment is inactive equipment according to the active condition of the equipment, including:
if the second difference value is larger than a preset second threshold value, determining that the equipment is the inactive equipment;
and if the second difference value is not greater than the preset second threshold value, determining that the equipment is active equipment.
8. The method according to claim 1, wherein the method further comprises:
determining the privacy data to be processed within a second preset time period under the condition that the privacy data to be processed comprises equipment privacy data;
and deleting the rest of the privacy data to be processed except the privacy data to be processed in the second preset time period from the privacy data to be processed.
9. A device for processing private data, the device comprising:
the data acquisition module is used for acquiring the privacy data to be processed;
the first determining module is used for determining the use duration of the privacy data to be processed;
the type determining module is used for determining the target data type of the privacy data to be processed;
the second determining module is used for determining target preset effective duration of the privacy data to be processed according to the target data type;
the duration comparison module is used for comparing the use duration with the target preset effective duration;
the data deleting module is used for deleting the privacy data to be processed if the using time length exceeds the target preset effective time length;
searching an object corresponding to the privacy data to be processed and determining the active condition of the object under the condition that the privacy data to be processed comprises the object privacy data;
and judging whether the object is an inactive object according to the active condition of the object, and deleting the privacy data to be processed when the object is the inactive object.
10. The electronic equipment is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory are communicated with each other through the communication bus;
a memory for storing a computer program;
a processor for implementing the method of any one of claims 1 to 8 when executing a program stored on a memory.
11. A storage medium having stored thereon a computer program, which when executed by a processor, implements the method of any of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111150646.4A CN113849133B (en) | 2021-09-29 | 2021-09-29 | Processing method and device of privacy data, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111150646.4A CN113849133B (en) | 2021-09-29 | 2021-09-29 | Processing method and device of privacy data, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113849133A CN113849133A (en) | 2021-12-28 |
CN113849133B true CN113849133B (en) | 2023-09-12 |
Family
ID=78977155
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111150646.4A Active CN113849133B (en) | 2021-09-29 | 2021-09-29 | Processing method and device of privacy data, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113849133B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1569108A1 (en) * | 2004-02-26 | 2005-08-31 | Research In Motion Limited | Data protection for applications on a mobile electronic device |
CN102497633A (en) * | 2011-12-14 | 2012-06-13 | 华中科技大学 | Protection method for private information in cellphones |
CN107861688A (en) * | 2017-10-30 | 2018-03-30 | 努比亚技术有限公司 | A kind of data-erasure method, terminal and readable storage medium storing program for executing |
CN111221586A (en) * | 2018-11-08 | 2020-06-02 | 奇酷互联网络科技(深圳)有限公司 | Privacy cleaning method for application program, readable storage medium and terminal equipment |
CN111625863A (en) * | 2020-05-27 | 2020-09-04 | 上海明略人工智能(集团)有限公司 | Privacy protection method and device, electronic equipment and storage medium |
CN112818398A (en) * | 2021-02-06 | 2021-05-18 | 陈笑男 | Data processing method and big data processing equipment for big data privacy protection |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9043891B2 (en) * | 2010-02-18 | 2015-05-26 | Microsoft Technology Licensiing, LLC | Preserving privacy with digital identities |
-
2021
- 2021-09-29 CN CN202111150646.4A patent/CN113849133B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1569108A1 (en) * | 2004-02-26 | 2005-08-31 | Research In Motion Limited | Data protection for applications on a mobile electronic device |
CN102497633A (en) * | 2011-12-14 | 2012-06-13 | 华中科技大学 | Protection method for private information in cellphones |
CN107861688A (en) * | 2017-10-30 | 2018-03-30 | 努比亚技术有限公司 | A kind of data-erasure method, terminal and readable storage medium storing program for executing |
CN111221586A (en) * | 2018-11-08 | 2020-06-02 | 奇酷互联网络科技(深圳)有限公司 | Privacy cleaning method for application program, readable storage medium and terminal equipment |
CN111625863A (en) * | 2020-05-27 | 2020-09-04 | 上海明略人工智能(集团)有限公司 | Privacy protection method and device, electronic equipment and storage medium |
CN112818398A (en) * | 2021-02-06 | 2021-05-18 | 陈笑男 | Data processing method and big data processing equipment for big data privacy protection |
Also Published As
Publication number | Publication date |
---|---|
CN113849133A (en) | 2021-12-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108038130B (en) | Automatic false user cleaning method, device, equipment and storage medium | |
CN108255620B (en) | Service logic processing method, device, service server and system | |
CN109213604B (en) | Data source management method and device | |
CN109492024A (en) | Data processing method, device, computer equipment and storage medium | |
CN109450969B (en) | Method and device for acquiring data from third-party data source server and server | |
CN112115200B (en) | Data synchronization method, device, electronic equipment and readable storage medium | |
CN107688626A (en) | Slow inquiry log processing method, device and electronic equipment | |
CN109067794B (en) | Network behavior detection method and device | |
CN109246234B (en) | Image file downloading method and device, electronic equipment and storage medium | |
CN111159160B (en) | Version rollback method and device, electronic equipment and storage medium | |
CN111427628A (en) | Software function module configuration method, device, software product and storage medium | |
CN110069217B (en) | Data storage method and device | |
CN110113187B (en) | Configuration updating method and device, configuration server and configuration system | |
CN111125240B (en) | Distributed transaction realization method and device, electronic equipment and storage medium | |
CN113849133B (en) | Processing method and device of privacy data, electronic equipment and storage medium | |
CN110727895B (en) | Sensitive word sending method and device, electronic equipment and storage medium | |
CN110083482B (en) | Method and device for performing erasure code processing on file storage system and electronic equipment | |
CN111399849A (en) | Method and system for determining application program installation package | |
CN110855484A (en) | Method, system, electronic device and storage medium for automatically detecting traffic change | |
CN116069591A (en) | Interface performance monitoring method, device, equipment and storage medium | |
CN113064801B (en) | Data point burying method and device, readable storage medium and computer equipment | |
CN109165127B (en) | Problem interface positioning method and device and electronic equipment | |
CN113572824B (en) | Dynamic updating method and device for timeout duration, electronic equipment and storage medium | |
CN112506896A (en) | Data deleting method and device and electronic equipment | |
CN113872947B (en) | Data reporting method and device, electronic equipment and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |