CN116521661B - User data destruction method, device, electronic equipment and computer readable medium - Google Patents

User data destruction method, device, electronic equipment and computer readable medium Download PDF

Info

Publication number
CN116521661B
CN116521661B CN202310444596.3A CN202310444596A CN116521661B CN 116521661 B CN116521661 B CN 116521661B CN 202310444596 A CN202310444596 A CN 202310444596A CN 116521661 B CN116521661 B CN 116521661B
Authority
CN
China
Prior art keywords
data
user data
information
group
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310444596.3A
Other languages
Chinese (zh)
Other versions
CN116521661A (en
Inventor
龚旭东
肖凡
柯明正
张超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Vany Technology Co ltd
Original Assignee
Shanghai Vany Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Vany Technology Co ltd filed Critical Shanghai Vany Technology Co ltd
Priority to CN202310444596.3A priority Critical patent/CN116521661B/en
Publication of CN116521661A publication Critical patent/CN116521661A/en
Application granted granted Critical
Publication of CN116521661B publication Critical patent/CN116521661B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/215Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Software Systems (AREA)
  • Computational Linguistics (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the disclosure discloses a user data destruction method, a user data destruction device, electronic equipment and a computer readable medium. One embodiment of the method comprises the following steps: dividing the data descending information corresponding to the same data type into the same data descending information group to obtain a first data descending information group set; for each first data-reduction information group: determining data processing channel information of a corresponding data type to acquire each user data group of the corresponding data type as a first user data group set; carrying out block query processing on each first data downlink message in the first data downlink message group to obtain a downlink user data group set; and for each issuing user data group, responding to the fact that the corresponding first data issuing information meets the preset data destruction condition, and destroying the issuing user data group stored by the user data application end. The embodiment improves the processing efficiency of the data issuing information when the user data is destroyed, and reduces the blockage of the data issuing information.

Description

User data destruction method, device, electronic equipment and computer readable medium
Technical Field
Embodiments of the present disclosure relate to the field of computer technology, and in particular, to a method, an apparatus, an electronic device, and a computer readable medium for destroying user data.
Background
With the rapid development of technologies such as face recognition, 5G, and big data, user data related to individuals is also applied to aspects of life. The user data is not only used in the internal controllable system, but also used in a third party system of a specific service scene, so that the user data in the third party system is also required to be destroyed when the user data is destroyed internally. At present, when user data in a third party system is destroyed, a commonly adopted method for issuing an destroyed data command is as follows: and for each data destruction task, after the data destruction task is processed, issuing a data destruction instruction to a third party system.
However, the inventors found that when the above manner is adopted to issue the destruction data instruction, there are often the following technical problems:
first, when the destroyed data volume is large, the sending efficiency of the high concurrency instruction is low, so that the instruction is blocked more.
Secondly, when the third party system identifies a data destroying instruction, the third party system can determine that the data is abnormal and the data is not destroyed, so that the third party system falsely destroys the data more times.
Thirdly, when identifying the sensitive data in the user data, the sensitive data is generally identified through a preset sensitive data identification rule, and when the user data contains unstructured information, the sensitive data cannot be identified, so that more unstructured sensitive data are leaked.
The above information disclosed in this background section is only for enhancement of understanding of the background of the inventive concept and, therefore, may contain information that does not form the prior art that is already known to those of ordinary skill in the art in this country.
Disclosure of Invention
The disclosure is in part intended to introduce concepts in a simplified form that are further described below in the detailed description. The disclosure is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Some embodiments of the present disclosure propose a user data destruction method, apparatus, electronic device, and computer readable medium to solve one or more of the technical problems mentioned in the background section above.
In a first aspect, some embodiments of the present disclosure provide a method for destroying user data, the method including: in response to receiving each data transmission information, dividing the data transmission information corresponding to the same data type into the same data transmission information group, and obtaining each data transmission information group as a first data transmission information group set; for each first data transmission information group in the first data transmission information group set, executing the following steps: determining data processing channel information corresponding to the data types according to the data types corresponding to the first data downlink information groups, and acquiring each user data group corresponding to the data types as a first user data group set through each data processing channel corresponding to the data processing channel information; according to the first user data group set, carrying out block query processing on each first data downlink message in the first data downlink message group to obtain a downlink user data group set, wherein a downlink user data group in the downlink user data group set corresponds to first data downlink message in the first data downlink message group; and for each downlink user data group in the downlink user data group set, responding to the fact that the first data downlink information corresponding to the downlink user data group meets the preset data destruction condition, and destroying the downlink user data group stored in the user data application end according to the downlink user data group, wherein the downlink user data group is stored in the user data application end.
In a second aspect, some embodiments of the present disclosure provide a user data destruction apparatus, including: the dividing unit is configured to divide the data downloading information corresponding to the same data type into the same data downloading information groups in response to receiving the data downloading information, so as to obtain the data downloading information groups as a first data downloading information group set; an execution unit configured to execute, for each first data delivery information group in the first data delivery information group set, the steps of: determining data processing channel information corresponding to the data types according to the data types corresponding to the first data downlink information groups, and acquiring each user data group corresponding to the data types as a first user data group set through each data processing channel corresponding to the data processing channel information; according to the first user data group set, carrying out block query processing on each first data downlink message in the first data downlink message group to obtain a downlink user data group set, wherein a downlink user data group in the downlink user data group set corresponds to first data downlink message in the first data downlink message group; and for each downlink user data group in the downlink user data group set, responding to the fact that the first data downlink information corresponding to the downlink user data group meets the preset data destruction condition, and destroying the downlink user data group stored in the user data application end according to the downlink user data group, wherein the downlink user data group is stored in the user data application end.
In a third aspect, some embodiments of the present disclosure provide an electronic device comprising: one or more processors; a storage device having one or more programs stored thereon, which when executed by one or more processors causes the one or more processors to implement the method described in any of the implementations of the first aspect above.
In a fourth aspect, some embodiments of the present disclosure provide a computer readable medium having a computer program stored thereon, wherein the program, when executed by a processor, implements the method described in any of the implementations of the first aspect above.
The above embodiments of the present disclosure have the following advantageous effects: by the user data destruction method of some embodiments of the present disclosure, processing efficiency of data issuing information when user data is destroyed is improved, and blocking of the data issuing information is reduced. In some embodiments of the present disclosure, first, in response to receiving each data transmission information, data transmission information corresponding to the same data type is divided into the same data transmission information groups, and each data transmission information group is obtained as a first data transmission information group set. Thus, the data transmission information to be processed can be grouped according to the data type in advance. Then, for each first data distribution information group in the first data distribution information group set, the following steps are executed: determining data processing channel information corresponding to the data types according to the data types corresponding to the first data issuing information group, so as to obtain each user data group corresponding to the data types as a first user data group set through each data processing channel corresponding to the data processing channel information. Therefore, the data processing channels can be allocated to the first data issuing information groups according to the data types corresponding to the first data issuing information groups, so that the first data issuing information in the first data issuing information groups is processed through the allocated data processing channels. And secondly, according to the first user data group set, carrying out block query processing on each first data downlink message in the first data downlink message group to obtain a downlink user data group set. Wherein, the sending user data group in the sending user data group set corresponds to the first data sending information in the first data sending information group. Thus, the first data descending information belonging to the same division type can be intensively processed, and the sequential processing of the first data descending information can be avoided. And thirdly, for each of the user data sets, responding to the fact that the first data issuing information corresponding to the user data sets meets the preset data destruction condition, and destroying the user data sets stored by the user data application end according to the user data sets. Wherein the user data application end stores the issuing user data group. Therefore, when the data issuing information characterizes that the corresponding issuing user data group in the third party system needs to be destroyed, the issuing user data group stored in the user data application end storing the issuing user data group can be destroyed. And before destroying the user data, dividing each data descending information, so that each data descending information can be divided into each data processing channel for centralized processing according to the data type corresponding to each data descending information. And because the first data descending information belonging to the same division type can be processed in a centralized way, the sequential processing of the first data descending information can be avoided. And further, the processing efficiency of data transmission information when the user data is destroyed is improved, and the blockage of the data transmission information is reduced.
Drawings
The above and other features, advantages, and aspects of embodiments of the present disclosure will become more apparent by reference to the following detailed description when taken in conjunction with the accompanying drawings. The same or similar reference numbers will be used throughout the drawings to refer to the same or like elements. It should be understood that the figures are schematic and that elements and components are not necessarily drawn to scale.
FIG. 1 is a flow chart of some embodiments of a user data destruction method according to the present disclosure;
FIG. 2 is a schematic structural view of some embodiments of a user data destruction apparatus according to the present disclosure;
fig. 3 is a schematic structural diagram of an electronic device suitable for use in implementing some embodiments of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete. It should be understood that the drawings and embodiments of the present disclosure are for illustration purposes only and are not intended to limit the scope of the present disclosure.
It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings. Embodiments of the present disclosure and features of embodiments may be combined with each other without conflict.
It should be noted that the terms "first," "second," and the like in this disclosure are merely used to distinguish between different devices, modules, or units and are not used to define an order or interdependence of functions performed by the devices, modules, or units.
It should be noted that references to "one", "a plurality" and "a plurality" in this disclosure are intended to be illustrative rather than limiting, and those of ordinary skill in the art will appreciate that "one or more" is intended to be understood as "one or more" unless the context clearly indicates otherwise.
The names of messages or information interacted between the various devices in the embodiments of the present disclosure are for illustrative purposes only and are not intended to limit the scope of such messages or information.
Operations such as collection, storage, use, etc. of personal information (e.g., user data) of a user referred to in the present disclosure, before performing the corresponding operations, the relevant organization or individual is up to the end to include developing personal information security impact assessment, fulfilling informed obligations to the personal information body, obtaining authorized consent of the personal information body in advance, etc.
The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Fig. 1 illustrates a flow 100 of some embodiments of a user data destruction method according to the present disclosure. The user data destruction method comprises the following steps:
step 101, in response to receiving each data transmission information, dividing the data transmission information corresponding to the same data type into the same data transmission information group, and obtaining each data transmission information group as a first data transmission information group set.
In some embodiments, an execution body (e.g., a computing device of a server) of the user data destruction method may divide data downlink information corresponding to the same data type into the same data downlink information groups in response to receiving each data downlink information, so as to obtain each data downlink information group as the first data downlink information group set. The data issuing information may be information for issuing a data processing task, which is sent by at least one client. The respective data transmission information may include data transmission information for transmitting data, and may further include data transmission information for destroying data. The data-delivery information may include, but is not limited to: data type, system information, user account information, and data distribution type. Data types may include, but are not limited to: picture class, text class. The system information may represent a system (e.g., a third party system) to which the data delivery information is to be delivered. The system information may include a system name. The user account information may be a user account of a user who sends data issuing information. Data delivery types may include, but are not limited to: distribution class and destruction class. Wherein each first data downlink message included in the first data downlink message group corresponds to the same data type.
Before step 101, the executing body may further generate, for each user data in the user data set, identification information corresponding to the user data according to the user data. The identification information may include a data type, system information, user account information, and a data distribution type. In practice, the execution body may determine a data type corresponding to the user data. In practice, the executing body may determine the data type of the user data as a picture class in response to determining that the user data includes a picture. The user data may correspond to system information, user account information, and a data distribution type. The system information corresponding to the user data may be a name of a system that needs to use the user data. The user account information corresponding to the user data may be a user account of a user having authority to manage the user data. The data transmission type corresponding to the user data may be a type for transmitting the user data. In practice, the execution body may combine the data type, the system information, the user account information and the data distribution type corresponding to the user data into the identification information corresponding to the user data. Then, the user data may be grouped according to the identification information of the user data in the user data set, so as to obtain a user data group set. Wherein, each user data in the user data group corresponds to the same data type, the same system information, the same user account information and the same data issuing type. In practice, the executing body may divide each user data corresponding to the same data type, the same system information, the same user account information and the same data transmission type into the same user data set, so as to obtain a user data set. Thus, the user data in the user data set can be grouped in advance according to the data type, the system information, the user account information and the data issuing type.
Step 102, for each first data delivery information group in the first data delivery information group set, executing the following steps:
and 1021, determining data processing channel information corresponding to the data types according to the data types corresponding to the first data issuing information groups, so as to acquire all user data groups corresponding to the data types as a first user data group set through all data processing channels corresponding to the data processing channel information.
In some embodiments, the executing body may determine data processing channel information corresponding to the data type according to a data type corresponding to the first data downlink information group, so as to obtain, through each data processing channel corresponding to the data processing channel information, each user data group corresponding to the data type as the first user data group set. In practice, the execution body may determine each data processing channel identifier corresponding to the data type in the set of data processing channel identifiers as data processing channel information. Each user data group corresponds to the same data type, the same system information, the same user account information and the same data issuing type. The user data may include, but is not limited to, at least one of: user name, user identification, user avatar.
Step 1022, according to the first user data group set, performing block query processing on each first data downlink message in the first data downlink message group, to obtain a downlink user data group set.
In some embodiments, the executing body may perform a block query process on each first data downlink message in the first data downlink message group according to the first user data group set to obtain a downlink user data group set. Wherein, the sending user data group in the sending user data group set corresponds to the first data sending information in the first data sending information group.
In some optional implementations of some embodiments, first, the executing body may divide the first data downlink information corresponding to the same system information in the first data downlink information group into a group to obtain a second data downlink information group set.
Then, for each second data-descending information group in the second data-descending information group set, the following steps are performed:
and a first step of determining the system information corresponding to the second data downloading information group as target system information.
And a second step of dividing each first user data group corresponding to the target system information from the first user data group set as a second user data group set. And the system information corresponding to each second user data group in the second user data group set is the target system information.
And thirdly, according to the second user data set, carrying out block query processing on each second data downlink message in the second data downlink message set to obtain each downlink user data set.
Finally, each of the obtained sets of delivery user data may be determined as a set of delivery user data sets. Therefore, the first user data set can be divided from the dimension of the system information, and the query can be further partitioned on the basis of the second user data set, so that the query efficiency is improved.
In some optional implementations of some embodiments, the executing body may perform a block query process on each second data downlink message in the second data downlink message group according to the second user data group set to obtain each downlink user data group by:
and dividing the second data downloading information corresponding to the same user account information in the second data downloading information group into one group to obtain a third data downloading information group set.
The second step, for each third data transmission information group in the third data transmission information group set, executing the following steps:
And a first sub-step of determining the user account information corresponding to the third data issuing information group as target user account information.
And a second sub-step of dividing each second user data group corresponding to the target user account information from the second user data group set as a third user data group set. And the user account information corresponding to each third user data group in the third user data group set is the target user account information.
And a third sub-step of carrying out block query processing on each third data downloading information in the third data downloading information group according to the third user data group set to obtain each downloading user data group. Therefore, the second user data set can be divided from the dimension of the user account information, and the query can be further partitioned on the basis of the second user data set, so that the query efficiency is improved.
In some optional implementations of some embodiments, the executing body may perform a block query process on each third data downlink message in the third data downlink message group according to the third user data group set to obtain each downlink user data group by:
Dividing third data transmission information corresponding to the same data transmission type in the third data transmission information group into one group to obtain a fourth data transmission information group set;
the second step, for each fourth data transmission information group in the fourth data transmission information group set, executing the following steps:
and a first sub-step of determining the data transmission type corresponding to the fourth data transmission information group as a target data transmission type.
And a second sub-step of dividing a third user data group corresponding to the target data issuing type from the third user data group set as a fourth user data group. And the data transmission types corresponding to the fourth user data in the fourth user data group are all the target data transmission types.
And a third sub-step of determining the fourth user data set as the issuing user data set. Therefore, the third user data set can be divided from the dimension of the data issuing type, so that the third user data set can be divided to the issuing user data set which finally needs to be inquired, and the inquiring efficiency is improved.
Step 1023, for each of the user data sets, responding to the determination that the first data issuing information corresponding to the user data set satisfies the preset data destruction condition, and destroying the user data set stored by the user data application end according to the user data set.
In some embodiments, for each of the set of sending user data sets, the executing body may perform destruction processing on the sending user data set stored in the user data application according to the sending user data set in response to determining that the first data sending information corresponding to the sending user data set meets a preset data destruction condition. The preset data destruction condition may be that a data transmission type included in the first data transmission information is a destruction type. The user data application may be a server corresponding to system information included in the first data downloading information. The user data application end stores the issuing user data group.
In some optional implementations of some embodiments, the executing body may, in response to determining that the data delivery type corresponding to the first data delivery information is a destruction type, execute, for each of the delivery user data groups, the following steps:
the first step is to encrypt the second key through the first key to obtain an encrypted second key. The first key may be a key of user account information corresponding to the issued user data, which is randomly generated. The second key may be a key randomly generated corresponding to a login validity period of the user account information included in the first data transfer information, or a key randomly generated corresponding to a token validity period of the system information included in the first data transfer information. That is, the second key is valid for the login validity period or the token validity period. As an example, the executing entity may encrypt the second key with the first key by using the SM2 algorithm, to obtain an encrypted second key.
And secondly, determining sensitive user data in the issuing user data.
And thirdly, encrypting the sensitive user data in the issuing user data through the encryption second key to obtain encrypted issuing user data. As an example, the executing body may use an SM4 algorithm, and encrypt the sensitive user data in the sending user data by using the encrypted second key to obtain encrypted sending user data.
And fourth, generating verification information corresponding to the sensitive user data through a third key. The third key may be a key randomly generated corresponding to a login validity period of the user account information included in the first data transfer information, or a key randomly generated corresponding to a token validity period of the system information included in the first data transfer information. That is, the third key is valid for the login validity period or the token validity period. As an example, the executing body may perform salt hash processing on the sensitive user data by using an SM3 algorithm to obtain verification information. The verification information is valid in the login validity period or the token validity period.
And fifthly, checking the sensitive user data according to the checking information and the information to be checked corresponding to the sensitive user data to obtain a checking result. The information to be verified may be verification information of the sensitive user data generated according to the third key, which is sent by a data source (client). In practice, the executing body may generate a verification result representing that the verification is passed in response to determining that the verification information is the same as the information to be verified. The execution body may further generate a verification result indicating that the verification is not passed in response to determining that the verification information is different from the information to be verified.
And sixthly, transmitting the encrypted issuing user data and the data destruction information to the user data application end in response to the fact that the verification result representation passes verification, so that the user data application end destroys the stored issuing user data according to the data destruction information. The first data downloading information corresponding to the user data comprises the data destruction information. The data destruction information may be information representing a destruction mode. For example, the data destruction information may include, but is not limited to: destroying time.
Seventh, in response to determining that a destroying feedback result corresponding to the issued user data sent by the user data application end is received, destroying and checking the issued user data of the user data application end to obtain a destroying and checking result.
And eighth, in response to determining that the destruction check result represents that the destruction is not performed, performing a dark-pin destruction process on the issued user data stored by the user data application terminal.
And ninth, in response to determining that the verification result represents that the verification is not passed, sending tamper information corresponding to the issued user data to a target terminal. The tamper information may be information indicating that the sending user data is tampered. The tamper information may include a data identifier of the issuing user data. The target terminal may be a terminal that handles user data anomalies.
Optionally, the foregoing user data may include user-defined description information. The user-defined description information may be unstructured text information which is self-described by the user. For example, the user-defined description information may be a personal information profile of the user.
In some optional implementations of some embodiments, the executing entity may determine the sensitive user data in the outgoing user data by:
And determining each data meeting the preset sensitive field condition in the issued user data as each sensitive user information. The preset sensitive field condition may be that a field corresponding to data included in the user data belongs to a sensitive field. The sensitive field may be preset.
And secondly, constructing a grammar tree corresponding to the user-defined description information according to the user-defined description information. In practice, the execution body may construct an abstract syntax tree corresponding to the user-defined description information.
And thirdly, extracting a custom description word set meeting preset grammar conditions from the grammar tree. The user-defined description information comprises the user-defined description word set. The preset grammar condition may be that sentence components of the text corresponding to the node are subject, object or list. In practice, the execution body may extract, from the syntax tree, each text satisfying a preset syntax condition as a custom description word set.
And fourthly, inputting the custom description word set into a pre-trained word class recognition model to obtain a word class set. The word class in the word class set corresponds to the custom description word in the custom description word set. The word-class recognition model may be a neural network model for recognizing word classes of words. The part of speech may be the semantic type to which the term belongs. For example, the word class of "A city B district C street" may be an address class. The term of "18 years" may be an age category. The word class recognition model comprises a coding layer, an interaction layer, an aggregation layer and an output layer.
And fifthly, selecting the custom description words with the corresponding word classes meeting the preset sensitive word class conditions from the custom description word set as sensitive user information. The preset sensitive word class condition may be that the word class belongs to a sensitive word class. The sensitive word class may be predetermined. For example, sensitive word classes may include, but are not limited to: address class, name class, age class.
And sixthly, determining each piece of determined sensitive user information as sensitive user data.
The first step-the sixth step are taken as an invention point of the embodiment of the present disclosure, and solve the third technical problem mentioned in the background art, when sensitive data in user data is identified, the sensitive data is generally identified by a preset sensitive data identification rule, and when unstructured information is included in the user data, the sensitive data cannot be identified, so that more unstructured sensitive data is leaked. Factors that lead to more unstructured sensitive data leakage tend to be as follows: when the sensitive data in the user data is identified, the sensitive data is usually identified through a preset sensitive data identification rule, and when unstructured information is contained in the user data, the sensitive data cannot be identified. If the above factors are solved, the effect of reducing unstructured sensitive data leakage can be achieved. To achieve this, the present disclosure first extracts a custom description word set from a constructed grammar tree of user-custom description information. The word class of each custom description word is then identified by a pre-trained word class identification model to determine whether the custom description word is sensitive. Thereby, the automatic identification of sensitive data in unstructured information can be realized. Thereby reducing unstructured sensitive data leakage.
In some optional implementations of some embodiments, the executing body may perform destruction check on the issued user data at the user data application end, to obtain a destruction check result:
the first step, the data result corresponding to the data identifier is obtained from the user data application terminal through the data identifier corresponding to the issued user data. In practice, the executing body may acquire, from the user data application end, user data with a corresponding data identifier that is the same as the data identifier of the sending user data as a data result.
And secondly, generating a destroying verification result representing destroyed in response to the fact that the data result is empty.
And thirdly, generating a destroying check result representing undestroyed state in response to the fact that the data result comprises user data. Therefore, whether the user data application end destroys the user data to be destroyed can be determined in advance.
In some optional implementations of some embodiments, the executing entity may perform a blackout process on the delivered user data stored by the user data application end by:
first, generating updated user data corresponding to the issued user data according to the issued user data. The updated user data comprises first updated user data, second updated user data and data identifiers corresponding to the issued user data. In practice, the executing body may randomly generate, as the initial updated user data, user data different from the issued user data according to the data type of the issued user data. The initial updated user data is the same as the data type and data representation of the issued user data. For example, the above-mentioned user data may be a cell phone number of 11 bits. The initial update user data is also an 11-bit cell phone number. Then, the initial updated user data may be split into first updated user data and second updated user data according to a preset splitting manner. Here, the specific setting of the preset splitting manner is not limited. For example, when the initial update user data is a mobile phone number of 11 bits, the preset splitting manner may be a manner of splitting the initial update user data into 7 bits+4 bits of numbers. The first 7 digits may be the first updated user data. The last 4 digits may be used as the second updated user data. Then, the first updated user data, the second updated user data, and the data identifier corresponding to the delivery user data may be combined into updated user data corresponding to the delivery user data.
And a second step of encrypting the first updated user data and the second updated user data included in the updated user data according to a fourth key to obtain encrypted updated data, wherein the encrypted updated data includes encrypted first updated user data, encrypted second updated user data and the data identifier. The fourth key may be a randomly generated key. In practice, the executing body may encrypt the first update user data and the second update user data included in the update user data by using an SM4 algorithm through a fourth key, so as to obtain encrypted update data.
And a third step of transmitting the encrypted update data, the fourth key, and the data update information to the user data application, so that the user data application decrypts the encrypted first update user data included in the encrypted update data by the fourth key, updates the stored first update user data included in the sending user data to the decrypted first update user data, and so that the user data application decrypts the encrypted second update user data included in the encrypted update data by the fourth key and the decrypted first update user data, generates a fifth key, decrypts the encrypted second update user data included in the sending user data by the fifth key, and updates the stored second update user data included in the sending user data to the decrypted second update user data. The fifth key may be a key updated by the user data application end based on the fourth key by using a variable cipher device according to the changed first updated user data.
The first step-the fourth step are taken as an invention point of the embodiment of the disclosure, so that the technical problem mentioned in the background art is solved, and when the third party system recognizes the data destroying instruction, the data abnormality can be determined without data destruction, and the number of times of false data destroying of the third party system is more. Factors that cause the third party system to falsely destroy data more often are as follows: when the third party system recognizes the data destroying instruction, the data abnormality can be determined without data destruction. If the above factors are solved, the effect of reducing the number of times of false destroying data by the third party system can be achieved. In order to achieve the effect, after the user data application end is confirmed in advance that the issuing user data is not destroyed, the method and the device send encrypted updating user data for updating the issuing user data to the user data application end, so that the user data application end updates the issuing user data to be destroyed into updating user data. Meanwhile, the encrypted updated user data comprises two sections of data, so that a sectional decryption mode is needed when the user data application end decrypts the encrypted updated user data. Thus, the user data application end can update the user data in a segmented way. And further, the user data application end can be prevented from finding abnormal data replacement in advance to a certain extent without updating. Thereby reducing the number of times of false data destruction of the third party system.
The above embodiments of the present disclosure have the following advantageous effects: by the user data destruction method of some embodiments of the present disclosure, processing efficiency of data issuing information when user data is destroyed is improved, and blocking of the data issuing information is reduced. In some embodiments of the present disclosure, first, in response to receiving each data transmission information, data transmission information corresponding to the same data type is divided into the same data transmission information groups, and each data transmission information group is obtained as a first data transmission information group set. Thus, the data transmission information to be processed can be grouped according to the data type in advance. Then, for each first data distribution information group in the first data distribution information group set, the following steps are executed: determining data processing channel information corresponding to the data types according to the data types corresponding to the first data issuing information group, so as to obtain each user data group corresponding to the data types as a first user data group set through each data processing channel corresponding to the data processing channel information. Therefore, the data processing channels can be allocated to the first data issuing information groups according to the data types corresponding to the first data issuing information groups, so that the first data issuing information in the first data issuing information groups is processed through the allocated data processing channels. And secondly, according to the first user data group set, carrying out block query processing on each first data downlink message in the first data downlink message group to obtain a downlink user data group set. Wherein, the sending user data group in the sending user data group set corresponds to the first data sending information in the first data sending information group. Thus, the first data descending information belonging to the same division type can be intensively processed, and the sequential processing of the first data descending information can be avoided. And thirdly, for each of the user data sets, responding to the fact that the first data issuing information corresponding to the user data sets meets the preset data destruction condition, and destroying the user data sets stored by the user data application end according to the user data sets. Wherein the user data application end stores the issuing user data group. Therefore, when the data issuing information characterizes that the corresponding issuing user data group in the third party system needs to be destroyed, the issuing user data group stored in the user data application end storing the issuing user data group can be destroyed. And before destroying the user data, dividing each data descending information, so that each data descending information can be divided into each data processing channel for centralized processing according to the data type corresponding to each data descending information. And because the first data descending information belonging to the same division type can be processed in a centralized way, the sequential processing of the first data descending information can be avoided. And further, the processing efficiency of data transmission information when the user data is destroyed is improved, and the blockage of the data transmission information is reduced.
With further reference to fig. 2, as an implementation of the method shown in the above figures, the present disclosure provides some embodiments of a user data destruction apparatus, which correspond to those method embodiments shown in fig. 1, and which are particularly applicable in various electronic devices.
As shown in fig. 2, the user data destruction apparatus 200 of some embodiments includes: a dividing unit 201 and an executing unit 202. Wherein the dividing unit 201 is configured to divide the data downlink information corresponding to the same data type into the same data downlink information group in response to receiving each data downlink information, so as to obtain each data downlink information group as a first data downlink information group set; the execution unit 202 is configured to execute, for each first data-delivery information group of the set of first data-delivery information groups, the following steps: determining data processing channel information corresponding to the data types according to the data types corresponding to the first data downlink information groups, and acquiring each user data group corresponding to the data types as a first user data group set through each data processing channel corresponding to the data processing channel information; according to the first user data group set, carrying out block query processing on each first data downlink message in the first data downlink message group to obtain a downlink user data group set, wherein a downlink user data group in the downlink user data group set corresponds to first data downlink message in the first data downlink message group; and for each downlink user data group in the downlink user data group set, responding to the fact that the first data downlink information corresponding to the downlink user data group meets the preset data destruction condition, and destroying the downlink user data group stored in the user data application end according to the downlink user data group, wherein the downlink user data group is stored in the user data application end.
It will be appreciated that the elements described in the apparatus 200 correspond to the various steps in the method described with reference to fig. 1. Thus, the operations, features and resulting benefits described above for the method are equally applicable to the apparatus 200 and the units contained therein, and are not described in detail herein.
Referring now to fig. 3, a schematic diagram of an architecture of an electronic device 300 (e.g., a server-side computing device) suitable for use in implementing some embodiments of the present disclosure is shown. The electronic device shown in fig. 3 is merely an example and should not impose any limitations on the functionality and scope of use of embodiments of the present disclosure.
As shown in fig. 3, the electronic device 300 may include a processing means 301 (e.g., a central processing unit, a graphics processor, etc.) that may perform various suitable actions and processes in accordance with a program stored in a Read Only Memory (ROM) 302 or a program loaded from a storage means 308 into a Random Access Memory (RAM) 303. In the RAM 303, various programs and data required for the operation of the electronic apparatus 300 are also stored. The processing device 301, the ROM 302, and the RAM 303 are connected to each other via a bus 304. An input/output (I/O) interface 305 is also connected to bus 304.
In general, the following devices may be connected to the I/O interface 305: input devices 306 including, for example, a touch screen, touchpad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 307 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 308 including, for example, magnetic tape, hard disk, etc.; and communication means 309. The communication means 309 may allow the electronic device 300 to communicate with other devices wirelessly or by wire to exchange data. While fig. 3 shows an electronic device 300 having various means, it is to be understood that not all of the illustrated means are required to be implemented or provided. More or fewer devices may be implemented or provided instead. Each block shown in fig. 3 may represent one device or a plurality of devices as needed.
In particular, according to some embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, some embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flow chart. In such embodiments, the computer program may be downloaded and installed from a network via communications device 309, or from storage device 308, or from ROM 302. The above-described functions defined in the methods of some embodiments of the present disclosure are performed when the computer program is executed by the processing means 301.
It should be noted that, the computer readable medium described in some embodiments of the present disclosure may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In some embodiments of the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In some embodiments of the present disclosure, however, the computer-readable signal medium may comprise a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, fiber optic cables, RF (radio frequency), and the like, or any suitable combination of the foregoing.
In some implementations, the clients, servers may communicate using any currently known or future developed network protocol, such as HTTP (HyperText Transfer Protocol ), and may be interconnected with any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the internet (e.g., the internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed networks.
The computer readable medium may be contained in the electronic device; or may exist alone without being incorporated into the electronic device. The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: in response to receiving each data transmission information, dividing the data transmission information corresponding to the same data type into the same data transmission information group, and obtaining each data transmission information group as a first data transmission information group set; for each first data transmission information group in the first data transmission information group set, executing the following steps: determining data processing channel information corresponding to the data types according to the data types corresponding to the first data downlink information groups, and acquiring each user data group corresponding to the data types as a first user data group set through each data processing channel corresponding to the data processing channel information; according to the first user data group set, carrying out block query processing on each first data downlink message in the first data downlink message group to obtain a downlink user data group set, wherein a downlink user data group in the downlink user data group set corresponds to first data downlink message in the first data downlink message group; and for each downlink user data group in the downlink user data group set, responding to the fact that the first data downlink information corresponding to the downlink user data group meets the preset data destruction condition, and destroying the downlink user data group stored in the user data application end according to the downlink user data group, wherein the downlink user data group is stored in the user data application end.
Computer program code for carrying out operations for some embodiments of the present disclosure may be written in one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in some embodiments of the present disclosure may be implemented by means of software, or may be implemented by means of hardware. The described units may also be provided in a processor, for example, described as: a processor includes a partitioning unit and an execution unit. The names of the units do not limit the unit itself in some cases, for example, the dividing unit may also be described as "a unit that divides data-descending information corresponding to the same data type into the same data-descending information group in response to receiving each data-descending information, and obtains each data-descending information group as the first data-descending information group set".
The functions described above herein may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: a Field Programmable Gate Array (FPGA), an Application Specific Integrated Circuit (ASIC), an Application Specific Standard Product (ASSP), a system on a chip (SOC), a Complex Programmable Logic Device (CPLD), and the like.
The foregoing description is only of the preferred embodiments of the present disclosure and description of the principles of the technology being employed. It will be appreciated by those skilled in the art that the scope of the invention in the embodiments of the present disclosure is not limited to the specific combination of the above technical features, but encompasses other technical features formed by any combination of the above technical features or their equivalents without departing from the spirit of the invention. Such as the above-described features, are mutually substituted with (but not limited to) the features having similar functions disclosed in the embodiments of the present disclosure.

Claims (8)

1. A method of user data destruction, comprising:
for each piece of user data in a user data set, generating identification information corresponding to the user data according to the user data, wherein the identification information comprises a data type, system information, user account information and a data issuing type;
grouping the user data according to the identification information of the user data in the user data set to obtain a user data set, wherein the user data in the user data set corresponds to the same data type, the same system information, the same user account information and the same data issuing type;
in response to receiving each data transmission information, dividing the data transmission information corresponding to the same data type into the same data transmission information group, and obtaining each data transmission information group as a first data transmission information group set;
for each first data-delivery information group in the first data-delivery information group set, performing the steps of:
determining data processing channel information corresponding to the data types according to the data types corresponding to the first data downlink information groups, and acquiring each user data group corresponding to the data types as a first user data group set through each data processing channel corresponding to the data processing channel information;
According to the first user data group set, carrying out block query processing on each first data downlink message in the first data downlink message group to obtain a downlink user data group set, wherein a downlink user data group in the downlink user data group set corresponds to first data downlink message in the first data downlink message group;
for each of the user data sets, in response to determining that a first data issuing information corresponding to the user data set meets a preset data destruction condition, destruction processing is performed on the user data set stored in a user data application end according to the user data set, wherein the user data application end stores the user data set, and in response to determining that the first data issuing information corresponding to the user data set meets the preset data destruction condition, destruction processing is performed on the user data set stored in the user data application end according to the user data set, including:
in response to determining that the data delivery type corresponding to the first data delivery information is a destruction type, for each of the delivery user data sets, executing the following steps:
Encrypting the second key through the first key to obtain an encrypted second key;
determining sensitive user data in the issuing user data;
encrypting the sensitive user data in the issuing user data through the encryption second secret key to obtain encrypted issuing user data;
generating verification information corresponding to the sensitive user data through a third secret key, wherein the verification information is obtained by performing salt hash processing on the sensitive user data;
checking the sensitive user data according to the checking information and the information to be checked corresponding to the sensitive user data to obtain a checking result, wherein the information to be checked is the checking information of the sensitive user data generated according to the third secret key and sent by a data source terminal;
transmitting the encrypted issuing user data and data destruction information to the user data application end in response to the fact that the verification result representation passes verification, so that the user data application end destroys the stored issuing user data according to the data destruction information, wherein first data issuing information corresponding to the issuing user data comprises the data destruction information;
In response to determining that a destroying feedback result corresponding to the issued user data sent by the user data application end is received, destroying and checking the issued user data of the user data application end to obtain a destroying and checking result;
responding to the fact that the destruction verification result representation is not destroyed, and performing a dark-pin destruction process on the issued user data stored by the user data application end;
and transmitting tamper information corresponding to the issued user data to a target terminal in response to determining that the verification result representation fails verification.
2. The method of claim 1, wherein the performing, according to the first set of user data groups, a block query process on each first data downlink message in the first data downlink message group to obtain a set of downlink user data groups includes:
dividing the first data downlink information corresponding to the same system information in the first data downlink information group into one group to obtain a second data downlink information group set;
for each second data-descending message group in the second data-descending message group set, performing the steps of:
determining system information corresponding to the second data downloading information group as target system information;
Dividing each first user data group corresponding to the target system information from the first user data group set to be used as a second user data group set;
according to the second user data set, carrying out block query processing on each second data downlink message in the second data downlink message set to obtain each downlink user data set;
and determining each obtained issuing user data set as an issuing user data set.
3. The method of claim 2, wherein the performing, according to the second set of user data groups, a block query process on each second data downlink message in the second data downlink message group to obtain each downlink user data group includes:
dividing the second data downloading information corresponding to the same user account information in the second data downloading information group into one group to obtain a third data downloading information group set;
for each third data-delivery information group in the third data-delivery information group set, performing the steps of:
determining user account information corresponding to the third data issuing information group as target user account information;
dividing each second user data set corresponding to the target user account information from the second user data set to be used as a third user data set;
And according to the third user data group set, carrying out block query processing on each third data downlink message in the third data downlink message group to obtain each downlink user data group.
4. The method of claim 3, wherein the performing, according to the third user data set, a block query process on each third data downlink message in the third data downlink message set to obtain each downlink user data set includes:
dividing the third data transmission information corresponding to the same data transmission type in the third data transmission information group into one group to obtain a fourth data transmission information group set;
for each fourth data-delivery information group in the fourth data-delivery information group set, performing the steps of:
determining the data issuing type corresponding to the fourth data issuing information group as a target data issuing type;
dividing a third user data group corresponding to the target data issuing type from the third user data group set as a fourth user data group;
and determining the fourth user data set as a transmitting user data set.
5. The method of claim 4, wherein the performing destruction check on the issued user data at the user data application end to obtain a destruction check result includes:
Acquiring a data result corresponding to the data identifier from the user data application terminal through the data identifier corresponding to the issued user data;
generating a destroy verification result representing destroyed in response to determining that the data result is empty;
in response to determining that the data results include user data, a destruction check result is generated that characterizes the destruction.
6. A user data destruction apparatus comprising:
the generating unit is configured to generate identification information corresponding to the user data according to the user data for each user data in the user data set, wherein the identification information comprises a data type, system information, user account information and a data issuing type;
the grouping unit is configured to perform grouping processing on each user data according to the identification information of each user data in the user data set to obtain a user data set, wherein each user data in the user data set corresponds to the same data type, the same system information, the same user account information and the same data issuing type;
the dividing unit is configured to divide the data downloading information corresponding to the same data type into the same data downloading information groups in response to receiving the data downloading information, so as to obtain the data downloading information groups as a first data downloading information group set; an execution unit configured to execute, for each first data-delivery information group in the first data-delivery information group set, the steps of: determining data processing channel information corresponding to the data types according to the data types corresponding to the first data downlink information groups, and acquiring each user data group corresponding to the data types as a first user data group set through each data processing channel corresponding to the data processing channel information; according to the first user data group set, carrying out block query processing on each first data downlink message in the first data downlink message group to obtain a downlink user data group set, wherein a downlink user data group in the downlink user data group set corresponds to first data downlink message in the first data downlink message group; for each of the user data sets, in response to determining that a first data issuing information corresponding to the user data set meets a preset data destruction condition, destruction processing is performed on the user data set stored in a user data application end according to the user data set, wherein the user data application end stores the user data set, and in response to determining that the first data issuing information corresponding to the user data set meets the preset data destruction condition, destruction processing is performed on the user data set stored in the user data application end according to the user data set, including: in response to determining that the data delivery type corresponding to the first data delivery information is a destruction type, for each of the delivery user data sets, executing the following steps: encrypting the second key through the first key to obtain an encrypted second key; determining sensitive user data in the issuing user data; encrypting the sensitive user data in the issuing user data through the encryption second secret key to obtain encrypted issuing user data; generating verification information corresponding to the sensitive user data through a third secret key, wherein the verification information is obtained by performing salt hash processing on the sensitive user data; checking the sensitive user data according to the checking information and the information to be checked corresponding to the sensitive user data to obtain a checking result, wherein the information to be checked is the checking information of the sensitive user data generated according to the third secret key and sent by a data source terminal; transmitting the encrypted issuing user data and data destruction information to the user data application end in response to the fact that the verification result representation passes verification, so that the user data application end destroys the stored issuing user data according to the data destruction information, wherein first data issuing information corresponding to the issuing user data comprises the data destruction information; in response to determining that a destroying feedback result corresponding to the issued user data sent by the user data application end is received, destroying and checking the issued user data of the user data application end to obtain a destroying and checking result; responding to the fact that the destruction verification result representation is not destroyed, and performing a dark-pin destruction process on the issued user data stored by the user data application end; and transmitting tamper information corresponding to the issued user data to a target terminal in response to determining that the verification result representation fails verification.
7. An electronic device, comprising:
one or more processors;
a storage device having one or more programs stored thereon,
when executed by the one or more processors, causes the one or more processors to implement the method of any of claims 1-5.
8. A computer readable medium having stored thereon a computer program, wherein the computer program, when executed by a processor, implements the method of any of claims 1-5.
CN202310444596.3A 2023-04-23 2023-04-23 User data destruction method, device, electronic equipment and computer readable medium Active CN116521661B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310444596.3A CN116521661B (en) 2023-04-23 2023-04-23 User data destruction method, device, electronic equipment and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310444596.3A CN116521661B (en) 2023-04-23 2023-04-23 User data destruction method, device, electronic equipment and computer readable medium

Publications (2)

Publication Number Publication Date
CN116521661A CN116521661A (en) 2023-08-01
CN116521661B true CN116521661B (en) 2024-02-06

Family

ID=87405855

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310444596.3A Active CN116521661B (en) 2023-04-23 2023-04-23 User data destruction method, device, electronic equipment and computer readable medium

Country Status (1)

Country Link
CN (1) CN116521661B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104679851A (en) * 2015-02-12 2015-06-03 广东欧珀移动通信有限公司 Data deleting method and terminal

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104679851A (en) * 2015-02-12 2015-06-03 广东欧珀移动通信有限公司 Data deleting method and terminal

Also Published As

Publication number Publication date
CN116521661A (en) 2023-08-01

Similar Documents

Publication Publication Date Title
CN107249004B (en) Identity authentication method, device and client
CN111460453A (en) Machine learning training method, controller, device, server, terminal and medium
CN109743161B (en) Information encryption method, electronic device and computer readable medium
CN109660534B (en) Multi-merchant-based security authentication method and device, electronic equipment and storage medium
CN107040520B (en) Cloud computing data sharing system and method
CN113268761B (en) Information encryption method and device, electronic equipment and computer readable medium
CN113032818B (en) Task encryption method and device, electronic equipment and computer readable medium
CN111259409A (en) Information encryption method and device, electronic equipment and storage medium
CN111246407B (en) Data encryption and decryption method and device for short message transmission
CN114239072A (en) Block chain node management method and block chain network
CN114881247A (en) Longitudinal federal feature derivation method, device and medium based on privacy computation
CN116521661B (en) User data destruction method, device, electronic equipment and computer readable medium
CN115361450A (en) Request information processing method, apparatus, electronic device, medium, and program product
CN111030930B (en) Decentralized network data fragment transmission method, device, equipment and medium
CN117633848B (en) User information joint processing method, device, equipment and computer readable medium
CN114595465A (en) Data encryption processing method and device and electronic equipment
CN115495793B (en) Multi-set problem safety sending method, device, equipment and medium
CN116456341B (en) Data security authentication method, device, equipment and storage medium
CN114003188B (en) Information encryption display method, device, electronic equipment and computer readable medium
CN114567476B (en) Data security protection method and device, electronic equipment and medium
CN114301710B (en) Method for determining whether message is tampered, secret pipe platform and secret pipe system
CN118171303A (en) Model data storage method, apparatus, electronic device, and computer-readable medium
CN114500093B (en) Safe interaction method and system for message information
CN115087978B (en) Cross-domain frequency filter for fraud detection
CN111786937B (en) Method, apparatus, electronic device and readable medium for identifying malicious request

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant