CN115456324A - Management method, device and system for job hunting privacy information - Google Patents

Management method, device and system for job hunting privacy information Download PDF

Info

Publication number
CN115456324A
CN115456324A CN202210883834.6A CN202210883834A CN115456324A CN 115456324 A CN115456324 A CN 115456324A CN 202210883834 A CN202210883834 A CN 202210883834A CN 115456324 A CN115456324 A CN 115456324A
Authority
CN
China
Prior art keywords
terminal
information
job
privacy information
sending
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210883834.6A
Other languages
Chinese (zh)
Inventor
陈添兰
鲍远福
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou Minzu University
Original Assignee
Guizhou Minzu University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Minzu University filed Critical Guizhou Minzu University
Priority to CN202210883834.6A priority Critical patent/CN115456324A/en
Publication of CN115456324A publication Critical patent/CN115456324A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • G06Q10/063112Skill-based matching of a person or a group to a task
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/105Human resources
    • G06Q10/1053Employment or hiring

Abstract

The application discloses a job hunting privacy information management method which is used for improving the privacy information security level of job hunters. The method comprises the following steps: acquiring resume information of a first terminal, wherein the resume information comprises basic information and privacy information, and the first terminal is a terminal held by a job seeker; extracting the privacy information from the resume information; generating a public key and a private key pair of the first terminal; encrypting the private information by using the public key of the first terminal, and storing the private key of the first terminal; sending the encrypted privacy information to an information management center at the cloud end for storage; when a browsing request sent by a second terminal is received, sending a request prompt to the first terminal, wherein the second terminal is a terminal held by a recruiter; when the first terminal agrees with the browsing request, decrypting the encrypted private information by using a private key of the first terminal; and sending the decrypted privacy information to the second terminal.

Description

Management method, device and system for job hunting privacy information
Technical Field
The application relates to the technical field of information management, in particular to a management method, device and system of job hunting privacy information.
Background
With the development of digital informatization, the job hunting and recruitment process also starts to gradually develop from off-line to on-line, and then a recruitment platform based on the internet is generated. The recruitment platform can provide a platform for demand information sharing for the job seeker and the recruiter, reduce the situation of information inconsistency between the job seeker and the recruiter, and enrich the job hunting and recruitment channel.
In the job hunting and recruitment process of the recruitment platform, in order to enable a recruitment enterprise to know the personal condition of a job seeker better, the resume of the job seeker generally needs to display privacy information such as personal name, contact way, academic calendar, vocational skills and the like, and when the recruitment enterprise receives the resume delivered by the job seeker, the recruitment enterprise can browse all information in the resume.
However, at present, recruitment enterprises download resumes of job seekers by means of false recruitment or platform loopholes, and obtain privacy information of the job seekers from the resumes, so that the privacy information of the job seekers cannot be effectively protected on the recruitment platform.
Disclosure of Invention
The application provides a job hunting privacy information management method, device and system, which can improve the privacy information security level of job hunters.
The application provides a job-seeking privacy information management method in a first aspect, which comprises the following steps:
acquiring resume information of a first terminal, wherein the resume information comprises basic information and privacy information, and the first terminal is a terminal held by a job seeker;
extracting the privacy information from the resume information;
generating a public key and a private key pair of the first terminal;
encrypting the private information by using the public key of the first terminal, and storing the private key of the first terminal;
sending the encrypted privacy information to an information management center at the cloud end for storage;
when a browsing request sent by a second terminal is received, sending a request prompt to the first terminal, wherein the second terminal is a terminal held by a recruiter, and the browsing request is a request for browsing the privacy information;
when the first terminal agrees with the browsing request, decrypting the encrypted private information by using a private key of the first terminal;
and sending the decrypted privacy information to the second terminal.
Optionally, after the encrypted private information is sent to an information management center at a cloud for storage, the job-hunting private information management method further includes:
extracting the basic information from the resume information;
publicly displaying the basic information in a working area block;
when receiving a browsing request sent by a second terminal, sending a request prompt to the first terminal includes:
when the second terminal checks the basic information, detecting whether the second terminal sends a browsing request;
and if so, sending a request prompt to the first terminal.
Optionally, after the decrypted privacy information is sent to the second terminal, the job-seeking privacy information management method further includes:
when an order receiving request sent by the first terminal is received, the same order numbers are synchronously generated for the first terminal and the second terminal, and the order receiving request is used for requesting an interview process from the recruiter for the job seeker;
and sending an order receiving prompt to the second terminal to prompt the recruiter to perform an interview process with the job seeker according to the order number.
Optionally, the synchronizing generating the same order number for the first terminal and the second terminal includes:
displaying an order function selection interface to the first terminal, and guiding the job seeker to select an order function;
and when the order function selection is completed, generating an order number in the order information area of the first terminal, and synchronously generating the same order number in the order information area of the second terminal.
Optionally, after the sending the order receiving prompt to the second terminal, the job-hunting privacy information management method further includes:
and assessing the reputation grades of the job seeker and the recruiter according to the completion state of the order number.
The application provides in a second aspect a job-hunting privacy information management apparatus, including:
the system comprises an acquisition unit, a processing unit and a display unit, wherein the acquisition unit is used for acquiring resume information of a first terminal, the resume information comprises basic information and privacy information, and the first terminal is a terminal held by a job seeker;
a first extraction unit configured to extract the privacy information from the resume information;
a first generating unit, configured to generate a public key and a private key pair of the first terminal;
the encryption unit is used for encrypting the private information by using the public key of the first terminal and reserving the private key of the first terminal;
the storage unit is used for sending the encrypted privacy information to an information management center at the cloud end for storage;
the system comprises a first sending unit, a second sending unit and a third sending unit, wherein the first sending unit is used for sending a request prompt to a first terminal when receiving a browsing request sent by a second terminal, the second terminal is a terminal held by a recruiter, and the browsing request is a request for browsing the privacy information;
the decryption unit is used for decrypting the encrypted private information by using a private key of the first terminal when the first terminal agrees with the browsing request;
and the second sending unit is used for sending the decrypted privacy information to the second terminal.
Optionally, the job-hunting privacy information management apparatus further includes:
a second extraction unit configured to extract the basic information from the resume information;
the display unit is used for publicly displaying the basic information in the working area block;
the first sending unit is specifically configured to:
when the second terminal checks the basic information, detecting whether the second terminal sends a browsing request;
and if so, sending a request prompt to the first terminal.
Optionally, the job hunting privacy information management apparatus further includes:
the second generation unit is used for synchronously generating the same order number for the first terminal and the second terminal when receiving an order receiving request sent by the first terminal, wherein the order receiving request is used for requesting an interview process from the recruiter for the job seeker;
and the third sending unit is used for sending an order receiving prompt to the second terminal so as to prompt the recruiter to perform an interview process with the job seeker according to the order number.
Optionally, the second generating unit is specifically configured to:
displaying an order function selection interface to the first terminal, and guiding the job seeker to select an order function;
and when the order function selection is completed, generating an order number in the order information area of the first terminal, and synchronously generating the same order number in the order information area of the second terminal.
Optionally, the job-hunting privacy information management apparatus further includes:
and the assessment unit is used for assessing the reputation grades of the job seeker and the recruiter according to the completion state of the order number.
A third aspect of the present application provides a job-hunting privacy information management system, including:
the system comprises a central processing unit, a memory, an input/output interface, a wired or wireless network interface and a power supply;
the memory is a transient memory or a persistent memory;
the central processor is configured to communicate with the memory and to execute the instructions of the memory to perform the method of the first aspect and any one of the alternatives of the first aspect.
A fourth aspect of the present application provides a computer-readable storage medium comprising instructions which, when executed on a computer, cause the computer to perform the method of the first aspect and any one of the alternatives of the first aspect.
According to the technical scheme, the method has the following effects:
acquiring resume information of a first terminal, wherein the resume information comprises basic information and privacy information, and the first terminal is a terminal held by a job seeker; extracting privacy information from the resume information; generating a public key and a private key pair of the first terminal; encrypting the private information by using a public key of the first terminal, and storing a private key of the first terminal; sending the encrypted private information to an information management center at the cloud end for storage; when a browsing request sent by a second terminal is received, sending a request prompt to the first terminal, wherein the second terminal is a terminal held by a recruiter, and the browsing request is a request for browsing privacy information; when the first terminal agrees with the browsing request, the private key of the first terminal is used for decrypting the encrypted private information; and sending the decrypted privacy information to the second terminal. Through so, can encrypt the privacy information of job seeker and store, only when the job seeker agrees, the recruitment person just can browse the privacy information of job seeker to the condition that the privacy information that can reduce job seeker is revealed has promoted job seeker's privacy information security level.
Drawings
Fig. 1 is a schematic diagram of an embodiment of a job-searching privacy information management method in the present application;
2-1 and 2-2 are diagrams illustrating another embodiment of a job-seeking privacy information management method in the present application;
fig. 3 is a schematic view of an embodiment of the job-searching privacy information management apparatus in the present application;
fig. 4 is a schematic diagram of another embodiment of the job-searching privacy information management apparatus in the present application;
fig. 5 is a schematic diagram of an embodiment of the job-searching privacy information management system in the present application.
Detailed Description
The application provides a job hunting privacy information management method, device and system, which are used for improving the privacy information security level of job hunters.
The job hunting privacy information management method is applied to the internet-based job hunting and recruitment network platform, and when a recruiter wants to check the privacy information in the resume of the job hunter, the job hunter can check the privacy information only by the consent of the job hunter.
Referring to fig. 1, an embodiment of the job-hunting privacy information management method described in the present application includes:
101. the system acquires resume information of a first terminal, wherein the resume information comprises basic information and privacy information, and the first terminal is a terminal held by a job seeker;
in the embodiment, when a user logs in the system, the login options of the job seeker and the recruiter are displayed on the login interface of the system for the user to select, and when the user logs in for the first time, the system guides the user to fill in data according to different identities of the user. The data filled by the job seeker when logging in the system for the first time is resume information, and the resume information comprises basic information and privacy information, such as: the basic information in the resume information is: the nickname, sex, academic calendar, post or expected salary of the job seeker, and the privacy information in the resume information is as follows: the privacy information of the job seeker is as follows: name, ID card number, family address, accessory information or contact information of the job seeker, wherein the accessory information is as follows: identity card front and back scanning pieces, academic certificate scanning pieces or various honor certificate scanning pieces. The data filled in by the recruiter is full public information, such as: a company name, a company address, a company legal person, a post requirement, or a recruiter. The data fill requirements of the job seeker and recruiter are not limited herein.
102. The system extracts privacy information from the resume information;
in this embodiment, after the system guides the first terminal to complete the filling of the resume information, the privacy information is extracted from the resume information.
103. The system generates a public key and a private key pair of the first terminal;
in this embodiment, the asymmetric encryption algorithm is a secret key security method, the public key and the private key are a pair of unique keys in the asymmetric encryption algorithm, and when the public key is used to encrypt data, only the corresponding private key in the key pair can be used to decrypt the data; when data is encrypted using a private key, only the corresponding public key of the key pair can be used for decryption. Before the privacy information in the resume information is encrypted by using an asymmetric encryption algorithm, a key pair of a public key and a private key needs to be generated for the first terminal.
104. The system encrypts the private information by using the public key of the first terminal and stores the private key of the first terminal;
in this embodiment, after generating a unique public key and private key pair for the first terminal, the system uses the public key of the first terminal to asymmetrically encrypt the private information in the resume information, stores the private key of the first terminal, stores the private key in the first terminal in the data management center of the first terminal, and extracts the private key from the data management center when decryption is required.
105. The system sends the encrypted privacy information to an information management center at the cloud for storage;
in this embodiment, the system sends the privacy information after encrypting to the information management center in high in the clouds, is stored the privacy information after encrypting by this information management center, and does not publish to the external world, just can follow the information management center and draw out when the job seeker agrees that other units look over, reduces the condition that other units looked over at will and download job seeker's complete resume.
106. When a browsing request sent by a second terminal is received, the system sends a request prompt to the first terminal, the second terminal is a terminal held by a recruiter, and the browsing request is a request for browsing private information;
when the recruiter wants to view the privacy information in the resume information of the job seeker, the recruiter needs to send a browsing request to the system, and the system sends a request prompt to the job seeker after receiving the browsing request. For example: when the recruiter A wants to browse all information of the job seeker B when viewing the resume of the job seeker B, the recruiter A can click an 'more view' button in a system interface, and after the system detects that the 'more view' button is clicked, a message prompt of 'people pay attention to the resume and asking whether to agree to view the complete resume' is sent to the job seeker B.
107. When the first terminal agrees to the browsing request, the system decrypts the encrypted private information by using a private key of the first terminal;
in this embodiment, after the first terminal receives the request prompt, the job seeker may reply with the first terminal to approve browsing, disapprove browsing, or not reply. And only when the job seeker agrees with the browsing request of the recruiter, the system can acquire the private key of the first terminal from the data management center of the first terminal and decrypt the encrypted private information by using the private key.
108. And the system sends the decrypted privacy information to the second terminal.
After the system decrypts the encrypted private information by using the private key of the first terminal, the system extracts the decrypted private information from the information management center at the cloud end and sends the decrypted private information to the second terminal held by the recruiter, and at the moment, the recruiter can check or collect the private information but does not have the authority to download the private information.
In the embodiment, through like this, can encrypt the privacy information of job seeker and store, only when the job seeker agrees, the recruiter can browse the privacy information of job seeker to can reduce the condition that job seeker's privacy information is revealed, promote job seeker's privacy information security level.
Referring to fig. 2-1 and 2-2, another embodiment of the job-searching privacy information management method in the present application includes:
201. the system acquires resume information of a first terminal, wherein the resume information comprises basic information and privacy information, and the first terminal is a terminal held by a job seeker;
202. the system extracts the privacy information from the resume information;
203. the system generates a public key and a private key pair of the first terminal;
204. the system encrypts the private information by using the public key of the first terminal and stores the private key of the first terminal;
205. the system sends the encrypted private information to an information management center at the cloud end for storage;
steps 201 to 205 in this embodiment are similar to steps 101 to 105 in the embodiment shown in fig. 1, and are not repeated here.
206. The system extracts basic information from resume information;
207. the system publicly displays basic information in a working area block;
208. when the second terminal checks the basic information, the system detects whether the second terminal sends a browsing request, if so, step 209 is executed, and if not, the process is ended;
209. the system sends a request prompt to the first terminal.
Optionally, in this embodiment, the basic information in the resume information is publicable information, and after the system extracts the basic information from the resume information, the basic information may be displayed in a working area block, and the working area block may be provided with a search box, a filtering box, a nearby finding work or a recommended work and other functional areas. The recruiter can search or search the basic information meeting the requirement in the working area block, and when the recruiter is interested in the basic information in the resume information and wants to view all the information in the resume information, the recruiter can send a browsing request to the system through the second terminal. For example: the recruiter A searches resume information meeting the recruitment requirement in the working area block through the search box or the screening box, and wants to know the job seeker deeply after checking the basic information in the resume information, and at the moment, the recruiter A can click a 'more checking' button in the resume information to send a browsing request to the system.
Because the data filled in by the recruiter is the full-public data, when the job seeker finds the recruitment information meeting the work requirement through the search frame or the screening frame, the job seeker can check all the recruitment information of the recruiter, such as: company name, company address, post demand, or demand population. When the job seeker wants to know the recruiter more deeply, the job seeker can click on the more view case in the recruitment information, and at the moment, the system can be network-linked to the homepage of the corresponding company of the recruiter for the job seeker to view more specific information.
Through the mode of only openly displaying the basic information of the job seeker, the resume screening process of the recruiter can be simplified, and the condition that the privacy information of the job seeker is illegally utilized can be reduced.
210. When the first terminal agrees to the browsing request, the system decrypts the encrypted private information by using a private key of the job seeker;
211. and the system sends the decrypted privacy information to the second terminal.
Steps 210 and 211 in this embodiment are similar to steps 107 and 108 in the embodiment shown in fig. 1, and are not repeated here.
212. When receiving an order receiving request sent by a first terminal, the system displays an order function selection interface to the first terminal and guides a job seeker to select an order function;
213. when the order function selection is completed, the system generates an order number in an order information area of a first terminal, and synchronously generates the same order number in an order information area of a second terminal, and an order receiving request is a job seeker request for carrying out an interview process on a recruiter;
214. and the system sends an order receiving prompt to the second terminal so as to prompt the recruiter to perform an interview process with the job seeker according to the order number.
Optionally, in this embodiment, when the job seeker is interested in the recruitment information of the recruiter, the job seeker may click an order receiving button of the recruitment information to send an order receiving request to the system. Before sending the order receiving request, the job seeker can firstly collect the recruitment information into a favorite so as to prepare for subsequent order receiving. After the system receives the order receiving request, the job seeker can select functions in an order function selection interface, the order function selection interface can comprise a basic function and an additional function, the order function can be established by the two parties together, and if one party is not satisfied, the order function can be modified, for example: the basic functions are: payment of expenses, positioning information, resume exposure, voice chat or video chat, the additional function is: the method comprises the steps of checking a card for work, timing, uploading photos, uploading videos, uploading audio or sharing a journey, and the specific steps are not limited. After the job seeker completes function selection, the system respectively synchronously generates the same series of order numbers in the order information areas of the job seeker and the recruiter, and sends an order receiving prompt to the recruiter, for example: after the job seeker receives the order, the system displays the order number in the 'received order' status column of the 'my order' functional area of the recruiter, and sends a message notification that the recruiter has received the order of the people and needs to check the order in time to the recruiter, so that the recruiter can check the basic information of the corresponding job seeker according to the order number.
In addition, after the job seeker completes the order taking, when any one of the job seeker and the recruiter clicks the video interview, the system automatically generates interview frames of the job seeker and the recruiter, and the interview frames can flexibly arrange interview forms according to job hunting requirements and job characteristics, such as: text chat, voice chat, or video chat. In the order numbering process, before the two parties do not reach the unified opinion, the two parties have the right to cancel the order, modify resume information or recruit information. After the two parties reach a consensus, the first terminal and the second terminal prompt that the transaction is successful and prompt the two parties to select a service, which may include: and checking the working condition, starting and recording the video monitoring, signing in and checking a card, uploading a video or uploading a picture, wherein the specific point is not limited.
By the method, a more efficient customized interview process can be provided, and the information equivalence degrees of the recruiter and the job seeker can be balanced.
215. And the system evaluates the reputation grades of the job seeker and the recruiter according to the completion state of the order number.
Optionally, in this embodiment, after the order is completed, the system may respectively perform reputation level assessment on the job seeker and the recruiter according to the completion state of the order number, where the higher the completion degree is, the higher the reputation level is. The reputation level can implement a mutual scoring cumulative level mode, and both parties can obtain a scoring chance at least once every time a single transaction is successful. For example: after the order is finished, both parties can mutually evaluate the good score, the medium score or the poor score, wherein the good score is added by 1, the poor score is added by 1, and the medium score is 0. In each natural month, the reputation score between the same job seeker and recruiter does not exceed 30 points, and no scoring is performed if the scores of the job seeker and recruiter have exceeded the rating within the scoring rules. If the same job contents exist between the same job seeker and the same job recruiter within 15 days and a plurality of orders are traded, the job seeker and the job recruiter can only calculate plus 1 point after obtaining a plurality of good comments, and the deduction 1 point after obtaining a plurality of bad comments. In another implementation mode, the system can also take the completeness of resume information of a job seeker and the completeness of recruitment information of a recruiter as one of the reputation level assessment bases. Therefore, more assessment bases can be provided for job seekers and recruiters in the job hunting and recruiting process, and the quality of job hunting and recruiting is improved.
In the embodiment, the private information of the job seeker can be encrypted and stored, and only when the job seeker agrees, the recruiter can browse the private information of the job seeker, so that the condition that the private information of the job seeker is leaked can be reduced, and the security level of the private information of the job seeker is improved. In addition, through the mode of only openly displaying the basic information of the job seeker, the resume screening process of the recruiter can be simplified, and the condition that the privacy information of the job seeker is illegally utilized can be reduced; through the mode of order receiving, a more efficient customized interview process can be provided, and the information equivalence degrees of the recruiter and the job seeker are balanced; more assessment bases can be provided for job seekers and recruiters in the processes of job hunting and recruitment through reputation degree rating, and therefore the quality of job hunting and recruitment is improved.
Referring to fig. 3, an embodiment of a job-searching privacy information management apparatus in the present application includes:
an obtaining unit 301, configured to obtain resume information of a first terminal, where the resume information includes basic information and privacy information, and the first terminal is a terminal held by a job seeker;
a first extraction unit 302 for extracting privacy information from the resume information;
a first generating unit 303, configured to generate a public key and a private key pair of the first terminal;
an encrypting unit 304, configured to encrypt the private information using a public key of the first terminal, and store a private key of the first terminal;
the storage unit 305 is configured to send the encrypted private information to an information management center in the cloud for storage;
the first sending unit 306 is configured to send a request prompt to the first terminal when receiving a browsing request sent by a second terminal, where the second terminal is a terminal held by a recruiter, and the browsing request is a request for browsing the private information;
a decryption unit 307, configured to decrypt the encrypted private information using a private key of the first terminal when the first terminal agrees with the browsing request;
a second sending unit 308, configured to send the decrypted privacy information to the second terminal.
In this embodiment, the obtaining unit 301 obtains resume information of a first terminal, where the resume information includes basic information and privacy information, and the first terminal is a terminal held by a job seeker; the first extraction unit 302 extracts privacy information from the resume information; the first generating unit 303 generates a public key and a private key pair of the first terminal; the encryption unit 304 encrypts the private information by using the public key of the first terminal and stores the private key of the first terminal; the storage unit 305 sends the encrypted privacy information to an information management center in the cloud for storage; when a browsing request sent by a second terminal is received, the first sending unit 306 sends a request prompt to the first terminal, the second terminal is a terminal held by a recruiter, and the browsing request is a request for browsing private information; when the first terminal agrees with the browse request, the decryption unit 307 decrypts the encrypted private information using the private key of the first terminal; the second transmitting unit 308 transmits the decrypted privacy information to the second terminal.
Referring to fig. 4, another embodiment of the job-searching privacy information management apparatus in the present application includes:
an obtaining unit 401, configured to obtain resume information of a first terminal, where the resume information includes basic information and privacy information, and the first terminal is a terminal held by a job seeker;
a first extraction unit 402 for extracting privacy information from the resume information;
a first generating unit 403, configured to generate a public key and a private key pair of the first terminal;
an encrypting unit 404, configured to encrypt the private information using a public key of the first terminal, and store a private key of the first terminal;
the storage unit 405 is configured to send the encrypted private information to an information management center in the cloud for storage;
a second extracting unit 406, configured to extract the basic information from the resume information;
a display unit 407, configured to display the basic information in the work area block in public;
a first sending unit 408, configured to detect whether the second terminal sends a browsing request when the second terminal checks the basic information; if so, sending a request prompt to the first terminal, wherein the second terminal is a terminal held by a recruiter, and the browsing request is a request for browsing the private information;
a decryption unit 409, configured to decrypt, when the first terminal agrees to the browsing request, the encrypted private information using the private key of the first terminal;
a second sending unit 410, configured to send the decrypted privacy information to the second terminal.
A second generating unit 411, configured to generate the same order number for the first terminal and the second terminal synchronously when receiving an order receiving request sent by the first terminal, where the order receiving request is a request of the job seeker to perform an interview procedure on the recruiter;
a third sending unit 412, configured to send an order pickup prompt to the second terminal, so as to prompt the recruiter to perform an interview process with the job seeker according to the order number.
And the evaluating unit 413 is configured to perform reputation ranking on the job seeker and the recruiter according to the completion status of the order number.
In this embodiment, the functions of the units are similar to those of steps 201 to 215 in the embodiment shown in fig. 2, and are not repeated here.
Referring to fig. 5, an embodiment of a job-seeking privacy information management system in the present application includes:
a central processing unit 502, a memory 501, an input/output interface 503, a wired or wireless network interface 504 and a power supply 505;
the memory 501 is a transient storage memory or a persistent storage memory;
the central processor 502 is configured to communicate with the memory 501 and execute the instruction operations in the memory 501 to perform the steps in the embodiments of fig. 1-2 described above.
The present application provides a computer-readable storage medium comprising instructions which, when executed on a computer, cause the computer to perform the steps of the aforementioned embodiments of fig. 1-2.
It can be clearly understood by those skilled in the art that, for convenience and simplicity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and the like.

Claims (10)

1. A job-hunting privacy information management method is characterized by comprising the following steps:
the method comprises the steps of obtaining resume information of a first terminal, wherein the resume information comprises basic information and privacy information, and the first terminal is a terminal held by a job seeker;
extracting the privacy information from the resume information;
generating a public key and a private key pair of the first terminal;
encrypting the private information by using the public key of the first terminal, and storing the private key of the first terminal;
sending the encrypted privacy information to an information management center at the cloud end for storage;
when a browsing request sent by a second terminal is received, sending a request prompt to the first terminal, wherein the second terminal is a terminal held by a recruiter, and the browsing request is a request for browsing the privacy information;
when the first terminal agrees with the browsing request, decrypting the encrypted private information by using a private key of the first terminal;
and sending the decrypted privacy information to the second terminal.
2. The job-hunting privacy information management method according to claim 1, wherein after the encrypted privacy information is sent to an information management center in a cloud for storage, and before a request prompt is sent to the first terminal when a browsing request sent by a second terminal is received, the job-hunting privacy information management method further comprises:
extracting the basic information from the resume information;
publicly displaying the basic information in a working area block;
when a browsing request sent by a second terminal is received, sending a request prompt to the first terminal includes:
when the second terminal checks the basic information, detecting whether the second terminal sends a browsing request;
and if so, sending a request prompt to the first terminal.
3. The job-hunting privacy information management method according to claim 1, wherein after the sending of the decrypted privacy information to the second terminal, the job-hunting privacy information management method further comprises:
when an order receiving request sent by the first terminal is received, the same order numbers are synchronously generated for the first terminal and the second terminal, and the order receiving request is used for requesting an interview process from the recruiter for the job seeker;
and sending an order receiving prompt to the first terminal to prompt the recruiter to perform an interview process with the job seeker according to the order number.
4. The job-hunting privacy information management method according to claim 3, wherein the synchronizing to generate the same order number for the first terminal and the second terminal comprises:
displaying an order function selection interface to the first terminal, and guiding the job seeker to select an order function;
and when the order function selection is completed, generating an order number in the order information area of the first terminal, and synchronously generating the same order number in the order information area of the second terminal.
5. The job-hunting privacy information management method according to claim 3, wherein after the sending of the order-receiving prompt to the second terminal, the job-hunting privacy information management method further comprises:
and assessing the reputation grades of the job seeker and the recruiter according to the completion state of the order number.
6. A job-hunting privacy information management apparatus, comprising:
the system comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring resume information of a first terminal, the resume information comprises basic information and privacy information, and the first terminal is a terminal held by a job seeker;
a first extracting unit configured to extract the privacy information from the resume information;
a first generating unit, configured to generate a public key and a private key pair of the first terminal;
the encryption unit is used for encrypting the private information by using the public key of the first terminal and storing the private key of the first terminal;
the storage unit is used for sending the encrypted privacy information to an information management center at the cloud end for storage;
the system comprises a first sending unit, a second sending unit and a third sending unit, wherein the first sending unit is used for sending a request prompt to a first terminal when receiving a browsing request sent by a second terminal, the second terminal is a terminal held by a recruiter, and the browsing request is a request for browsing the privacy information;
the decryption unit is used for decrypting the encrypted private information by using a private key of the first terminal when the first terminal agrees with the browsing request;
and the second sending unit is used for sending the decrypted privacy information to the second terminal.
7. The job-hunting privacy information management device according to claim 6, further comprising:
a second extraction unit configured to extract the basic information from the resume information;
the display unit is used for publicly displaying the basic information in the working area block;
the first sending unit is specifically configured to:
when the second terminal checks the basic information, detecting whether the second terminal sends a browsing request;
and if so, sending a request prompt to the first terminal.
8. The job-hunting privacy information management device according to claim 6, further comprising:
the second generation unit is used for synchronously generating the same order number for the first terminal and the second terminal when receiving an order receiving request sent by the first terminal, wherein the order receiving request is used for requesting an interview process from the recruiter for the job seeker;
and the third sending unit is used for sending an order receiving prompt to the second terminal so as to prompt the recruiter to perform an interview process with the job seeker according to the order number.
9. A job-hunting privacy information management system, comprising:
the system comprises a central processing unit, a memory, an input/output interface, a wired or wireless network interface and a power supply;
the memory is a transient storage memory or a persistent storage memory;
the central processor is configured to communicate with the memory and execute the operations of the instructions in the memory to perform the method of any of claims 1 to 5.
10. A computer-readable storage medium comprising instructions that, when executed on a computer, cause the computer to perform the method of any of claims 1 to 5.
CN202210883834.6A 2022-07-26 2022-07-26 Management method, device and system for job hunting privacy information Pending CN115456324A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210883834.6A CN115456324A (en) 2022-07-26 2022-07-26 Management method, device and system for job hunting privacy information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210883834.6A CN115456324A (en) 2022-07-26 2022-07-26 Management method, device and system for job hunting privacy information

Publications (1)

Publication Number Publication Date
CN115456324A true CN115456324A (en) 2022-12-09

Family

ID=84296015

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210883834.6A Pending CN115456324A (en) 2022-07-26 2022-07-26 Management method, device and system for job hunting privacy information

Country Status (1)

Country Link
CN (1) CN115456324A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115936630A (en) * 2023-01-04 2023-04-07 湖南海润天恒信息科技有限公司 Manpower resource platform talent data information safety management system based on block chain
CN116523486A (en) * 2023-05-29 2023-08-01 点米(北京)科技有限公司 Human resource sharing system and method based on big data
CN117411728A (en) * 2023-12-14 2024-01-16 成都极数链科技有限公司 Personnel resume privatization management method, computer equipment and storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115936630A (en) * 2023-01-04 2023-04-07 湖南海润天恒信息科技有限公司 Manpower resource platform talent data information safety management system based on block chain
CN116523486A (en) * 2023-05-29 2023-08-01 点米(北京)科技有限公司 Human resource sharing system and method based on big data
CN116523486B (en) * 2023-05-29 2024-01-30 点米(北京)科技有限公司 Human resource sharing system and method based on big data
CN117411728A (en) * 2023-12-14 2024-01-16 成都极数链科技有限公司 Personnel resume privatization management method, computer equipment and storage medium
CN117411728B (en) * 2023-12-14 2024-02-13 成都极数链科技有限公司 Personnel resume privatization management method, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
US11777726B2 (en) Methods and systems for recovering data using dynamic passwords
US11323272B2 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
US11818265B2 (en) Methods and systems for creating and recovering accounts using dynamic passwords
US11074639B2 (en) Cloud-based item storage system
CN115456324A (en) Management method, device and system for job hunting privacy information
WO2018145127A1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
US10417434B2 (en) Method, apparatus, and computer-readable medium for data exchange
CN101291217A (en) Network identity authentication method
EP1011223A1 (en) Method and system for creating and managing at least one cryptographic key
JP6293245B1 (en) Transaction mutual monitoring system with enhanced security
US11496316B1 (en) System and method for identity verification for online dating
JP5663512B2 (en) Personal information collection system and program
CN111131227A (en) Data processing method and device
CN112560057A (en) Business social system based on block chain and IPFS technology
JP2018519585A (en) Dialog record query processing method and device
CN111767576A (en) User matching method and system based on privacy information and readable storage medium
US11481462B2 (en) System and method for generating a content network
US20230336534A1 (en) Decentralized messaging inbox
US20210327002A1 (en) Distributed ledger based mass balancing via secret sharing
KR20230106871A (en) Method for providing online education platform service
KR20230106872A (en) Method for providing online certificate platform service
CN116418813A (en) Cryptographic authorization-based interhunter information sharing method and system
JP2007264942A (en) Electronic document delivery system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination