WO2015070562A1 - 一种数据管理的方法及设备 - Google Patents

一种数据管理的方法及设备 Download PDF

Info

Publication number
WO2015070562A1
WO2015070562A1 PCT/CN2014/075306 CN2014075306W WO2015070562A1 WO 2015070562 A1 WO2015070562 A1 WO 2015070562A1 CN 2014075306 W CN2014075306 W CN 2014075306W WO 2015070562 A1 WO2015070562 A1 WO 2015070562A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
user
graphic
image
module
Prior art date
Application number
PCT/CN2014/075306
Other languages
English (en)
French (fr)
Inventor
袁明轩
曾嘉
张世明
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2015070562A1 publication Critical patent/WO2015070562A1/zh
Priority to US14/980,947 priority Critical patent/US20160110401A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/248Presentation of query results
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • G06F16/9024Graphs; Linked lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/9038Presentation of query results
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/904Browsing; Visualisation therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • G06F16/9577Optimising the visualization of content, e.g. distillation of HTML documents
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Definitions

  • the present invention relates to the field of computer science, and in particular to a method and device for data management.
  • User data protection technology is an important research topic in the field of computer science, data mining and Internet data management. It studies how to manage user data so that useful data is protected while it is being shared. With the massive use of social networks and mobile Internet terminals, more and more user data is being provided to Internet service providers, and user data protection has become an urgent need to solve important problems.
  • the technical problem to be solved by the present application is to provide a data management method and device, which can intuitively reflect user data, thereby enabling users to comprehensively evaluate and manage their own data, and effectively protect user data security.
  • the present application provides a data management method, including: acquiring data published by a first user on the Internet and a shared domain of the data; and expressing the data published by the first user as user data in a unified format; Displaying the unified format user data into a time or space relationship graphic or image by a visualization technique, wherein the graphic or image is the time of the visual angle of the second user specified in the shared domain of the data A graphic or image that relates to space.
  • the method further includes: receiving an operation instruction for adjusting the graphic or image; returning to the graphic or according to the operation instruction Setting options for adjusting user data corresponding to the image; receiving an instruction to select the setting option, and adjusting user data corresponding to the graphic or image.
  • the determining, according to the operation instruction, returning a setting for adjusting user data corresponding to the graphic or image the method further includes: displaying the adjustment effect corresponding to the setting option by a visualization technology for the user to preview.
  • the converting, by the visualization technology, the user data of the unified format into a visual angle of a second user specified in a shared domain of the data comprises: converting the user data of the unified format into a visual angle of the designated second user in the shared domain of the data by using a visualization technology in combination with an electronic map function A graphic or image of time-space relationship is displayed.
  • the data published by the first user includes explicit data and implicit data.
  • the explicit data includes information covered by a data protection setting, where the implicit data includes a user shared Text, images, and information contained in the video.
  • the step of expressing the data published by the first user as user data in a unified format includes: expressing the data published by the first user as user data in a unified format of "who, when, where, and with whom is shared.”
  • a second aspect provides a data management device, including an obtaining module, an expression module, and a display module, wherein: the obtaining module is configured to acquire data published by a first user on the Internet and a shared domain of the data, and output the same to the
  • the expression module is configured to express the data published by the first user as user data in a unified format, and output the unified format user data to the display module; the display module is configured to pass
  • the visualization technology converts the unified format user data into a time or space relationship graphic or image for display, wherein the graphic or image is the time and time of the visual angle of the second user specified in the shared domain of the data A graphic or image of a spatial relationship.
  • the device further includes: a receiving module, a returning module, and an adjusting module, wherein: the receiving module is configured to receive an adjustment to the graphic or image And an operation instruction outputting the operation instruction to the return module; the returning module is configured to return a setting option for adjusting user data corresponding to the graphic or image according to the operation instruction; And receiving an instruction for selecting the setting option, and adjusting user data corresponding to the graphic or image.
  • the returning module is further configured to display the adjustment effect corresponding to the setting option by using a visualization technology for the user Preview.
  • the display module is configured to convert the user data of the unified format into a shared domain of the data by using a visualization technology in conjunction with an electronic map function A graphic or image showing the temporal and spatial relationship of the visual angle of the specified second user is displayed.
  • the data published by the first user includes explicit data and implicit data.
  • the explicit data includes information covered by a data protection setting, where the implicit data includes a user shared Text, images, and information contained in the video.
  • the expression module is configured to express data published by the first user as “Who, He User data in a uniform format when, where, and about who is being shared.
  • the present application obtains data shared by the first user of the data source of the Internet and the shared domain of the data, and expresses the data published by the first user as a user in a unified format.
  • the data is then displayed by converting the user data in a uniform format into a graphic or image of the temporal and spatial relationship of the visual angle of the second user specified in the shared domain.
  • users can intuitively read and understand the release of user data, so that users can comprehensively evaluate and timely manage their data without being leaked, effectively protect user data security, and give users a better experience.
  • FIG. 1 is a flow chart of an embodiment of a method for data management of the present application
  • FIG. 2 is a flow chart of another embodiment of a method for data management of the present application.
  • FIG. 3 is a schematic structural diagram of an embodiment of a data management device of the present application.
  • FIG. 4 is a schematic structural diagram of another embodiment of a data management device of the present application.
  • FIG. 5 is a schematic structural diagram of still another embodiment of a data management device of the present application.
  • User data protection technology is an important research topic in the field of computer science, data mining and Internet data management. It studies how to manage user data so that useful data is protected while it is being shared. With the massive use of social networks and mobile Internet terminals, more and more user data is being provided to Internet service providers, and user data protection has become an urgent need to solve important problems.
  • User data protection technologies can be divided into two categories: the release/management of privacy-retained data and the privacy management of online users.
  • the release/management of privacy retention data is to study how to publish/manage user data, so that data analysts can not obtain sensitive information of individual users while obtaining useful statistical results.
  • Online user privacy management research can help users manage their online information, so that users can effectively share their information while protecting their privacy.
  • Privacy retention data release refers to the release of a processed (noisy or coarse-grained) data rather than the original data to the data analyst.
  • K-anonymity algorithm which means that the identifiable information of each user becomes the same as other at least K-1 users through data coarsening.
  • the disadvantages of the current method are: (1) Need to assume the background knowledge of the attacker, if the assumption is not appropriate, the model may fail the whole; (2) There is no guarantee of the availability of published data.
  • Differential privacy protection is to provide a query interface for data analysts.
  • Online users' privacy management mainly studies two issues: (1) How to design a friendly user privacy protection setting tool to make it easy for users to manage their personal information; (2) How to make users understand and evaluate the release status of their own data information.
  • Internet services become more common and diverse. A large amount of data of the user is provided to the service provider to obtain the corresponding service. How to manage and publish this information becomes an important issue.
  • service providers such as social networking sites, offer different privacy data protection settings tools to assist users in setting their own data publishing strategies. But the complex rules of information diversification and protection make it difficult for users to understand and use these tools.
  • Current research considers using learning algorithms to classify user data to make setup easier. But users still need to understand and learn the rules of protection in order to use these tools.
  • Another method of protection is to calculate a privacy data leakage index based on the personal data published by the user. When the index is below a certain threshold, the user is reminded to strengthen the protection strategy of his own data.
  • the main problem with this approach is that the index does not intuitively reflect the user's data breach. Users cannot see from the index which private data needs protection and how to protect it.
  • Another important issue is that current online users' privacy data management methods only protect against one data source and cannot adapt to the current situation in which users frequently use multiple Internet services.
  • the present application aims to solve the defects of the existing user data protection technology, and proposes a data management method and device, which can intuitively reflect user data, thereby enabling users to comprehensively evaluate and manage their own data, and effectively protect user data. Safety.
  • FIG. 1 is a flowchart of an embodiment of a data management method according to the present application.
  • the data management method of the present embodiment is described in terms of a data management device for implementing a data management method.
  • Data management methods include:
  • Step S101 Acquire data shared by the first user on the Internet and a shared domain of the data
  • the data management device obtains data published by the first user of the Internet and a shared domain of the data.
  • the data published by the first user here includes the data that it publishes at each data source.
  • a shared domain is a range in which data published by a first user is allowed to be shared, that is, from a shared domain, it can be reflected who has the right to read the data.
  • the acquired data released by the first user includes explicit data and implicit data.
  • Explicit data includes information that the data protection settings engine can cover, such as user profile, interest, age, occupation, and check-in data.
  • Implicit data includes information contained in texts, pictures, videos, etc. shared by users. For example, the information posted by a user on Facebook to drink with friends or the user sharing information posted by his friend to drink with the user includes the information that the user is drinking at a certain time.
  • Step S102 Express the data published by the first user as user data in a unified format
  • the explicit data is structured information.
  • Explicit data is provided to different service providers and displayed in the service provider's own format.
  • the data management device can establish metadata representation of explicit data, and express the explicit data into a unified format by means of metadata expression.
  • Implicit data information is implicit in the various unstructured information published by the first user. Because the information of the Internet satisfies the characteristics of 4A (Anyone, Anytime, Anywhere, Anything), these unstructured information can be uniformly identified as when, where, and who (who) and what (What) Who is shared with (Who). Therefore, the design format for designing an implicit data is: Who, When, Where And What to Whom. Each implicit information can be expressed in such a format.
  • the explicit data of the above unified format is also converted into such a format, and the explicit data includes data related to the first user time, space and social relationship, for example, the check-in data can be expressed as a design expression format.
  • the display data and implicit data published by the first user on the Internet are expressed in a unified format.
  • Step S103 Converting user data of the unified format into a graphic or image of a time-to-space relationship by a visualization technique, wherein the graphic or image is a temporal and spatial relationship of a visual angle of the second user specified in the shared domain of the data.
  • Graphic or image is a temporal and spatial relationship of a visual angle of the second user specified in the shared domain of the data.
  • Visualization technology refers to the theory, method and technology of using computer graphics and image processing technology to convert data into graphics or images and display them on the screen.
  • the user data of the unified format is converted into a graphic or image of the temporal and spatial relationship of the visual angle of the second user specified in the shared domain of the data.
  • the second user here includes all users sharing data published by the first user.
  • the data management method of the present application obtains the data distributed by the first user of the data source of the Internet and the shared domain of the data, and expresses the data published by the first user as user data in a unified format. And then convert the unified format user data into a graphic or image of the temporal and spatial relationship of the visual angle of the second user specified in the shared domain.
  • users can intuitively read and understand the release of user data, realize the transparency between users and their data, and display user data through different users to observe their perspectives, so that users can comprehensively evaluate and timely Manage your own data without being leaked, effectively protect user data security and give users a better experience.
  • FIG. 2 is a flowchart of another embodiment of a data management method according to the present application.
  • the data management method of the present embodiment is described by using a data management device that implements a data management method.
  • the management method includes the following steps:
  • Step S201 Acquire data and a shared domain of data published by the first user of each data source on the Internet;
  • the data management device obtains data published by the first user of the Internet and a shared domain of the data.
  • the data published by the first user includes data published by the first user among the various data sources on the Internet.
  • the shared domain here refers to the range of data allowed by the first user to be shared, that is, the shared domain can reflect who has the right to read the data.
  • the acquired data released by the first user includes explicit data and implicit data.
  • the explicit data includes information that the above data protection setting engine can cover, such as the user's profile, interest, age, occupation, and check-in data.
  • Implicit data includes information contained in texts, pictures, videos, etc. shared by users. For example, the information posted by a user on Facebook to drink with friends or the user sharing information posted by his friend to drink with the user includes the information that the user is drinking at a certain time.
  • Step S202 Express the data published by the first user as user data in a unified format
  • the explicit data is structured information.
  • Explicit data is provided to different service providers and displayed in the service provider's own format.
  • the data management device can establish metadata representation of explicit data, and express the explicit data into a unified format by means of metadata expression.
  • Implicit data information is implicit in the various unstructured information published by the first user. Because the information of the Internet satisfies the characteristics of 4A (Anyone, Anytime, Anywhere, Anything), these unstructured information can be uniformly identified as when, where, and who (who) and what (What) Who is shared with (Who). Therefore, the design format for designing an implicit data is: Who, When, Where And What to Whom. Each implicit information can be expressed in such a format.
  • the explicit data of the above unified format is also converted into such a format, and the explicit data includes data related to the first user time, space and social relationship, for example, the check-in data can be expressed as a design expression format.
  • the display data and implicit data published by the first user on the Internet are expressed in a unified format.
  • Step S203 Display, by using a visualization technology, user data of a unified format into a graphic or image of a temporal and spatial relationship, wherein the graphic or image is a temporal and spatial relationship of a visual angle of the second user specified in the shared domain of the data.
  • Graphic or image
  • the user data of the unified format is converted into a graphic or image of the temporal and spatial relationship of the visual angle of a certain second user specified in the shared domain of the data.
  • the second user here includes all users sharing data published by the first user.
  • the data released by the first user is displayed in a more realistic and vivid manner in terms of time and space.
  • the electronic map function is further combined, and the user data of the unified format is designated as a second.
  • a graphic or image of the temporal and spatial relationship of the visual angle of the user is displayed on the electronic map.
  • Step S204 Receive an operation instruction for adjusting a graphic or an image.
  • the data management device receives an operation instruction for the user to adjust the graphic or image.
  • the user finds that during the sick leave, there is a path connecting the bars, and the first user can intuitively find that the corresponding data has been leaked.
  • This disclosure may come from the data leakage of the first user itself or from the data sharing of his friends. At this time, you can directly wipe the path of the connection bar on the display interface to prevent its supervisor from seeing the data about this part of the bar.
  • Step S205 return, according to the operation instruction, a setting option for adjusting user data corresponding to the graphic or the image;
  • the analysis engine in the background of the data management device system automatically finds a setting option for adjusting the user data corresponding to the adjusted graphic or image. And feedback to the user for the user to choose.
  • the data management device system finds the user data (ie, the original data) corresponding to the erased graphics or images. Cancelling one or more of these raw data to the supervisor's reading rights can achieve the effect that the user wants to protect.
  • the system automatically calculates all the solutions that can achieve the protection effect, and generates setting options for adjusting the user data corresponding to the graphics or images. An adjustment scheme is returned to the user corresponding to a setting option.
  • connection bar path there are two data sources corresponding to the connection bar path, namely data source one and data source two
  • canceling the reading permission of the supervisor on the data source one or canceling the reading permission of the supervisor on the data source two can achieve the protection effect (of course, at the same time, Cancelling the reading authority of the data source one or two is another scheme, and can also achieve the protection effect.
  • the scheme has the same protection effect, the information loss is greater than other schemes, and the system will automatically filter out the scheme. Only return the setting options corresponding to the preferred solution that can achieve the desired effect).
  • the system can display the adjustment effect corresponding to the returned setting options through the visualization technology for the user to preview, and the user selects one of the setting options according to the preview adjustment effect.
  • Step S206 receiving an instruction for selecting a setting option, and adjusting user data corresponding to the graphic or the image;
  • the data management device further receives an instruction of the user to select a setting option, and performs corresponding adjustment on the user data corresponding to the graphic or the graphic.
  • the system controls the permissions of the corresponding data source according to the user's selection.
  • This mechanism enables users to automatically adjust their privacy protection. For example, if the user erases the path connecting the bar on the display interface, the user data such as time, location, event information, etc. corresponding to the path of the connected bar in the viewing angle is hiddenly adjusted.
  • the user can directly erase or display the graphic or image of the display interface, thereby achieving adjustment of the self data, which is simple to implement, more convenient and direct to operate, and can be more effectively protected.
  • User data giving users a better experience.
  • FIG. 3 is a schematic structural diagram of an embodiment of a data management device of the present application.
  • the data management device 100 of the present embodiment includes an obtaining module 11, an expression module 12, and a display module 13, wherein:
  • the obtaining module 11 is configured to acquire data shared by the first user on the Internet and a shared domain of the data, and output the same to the expression module 12;
  • the acquisition module 11 obtains data published by the first user of the Internet and a shared domain of the data.
  • the data published by the first user includes data published by the first user on each data source of the Internet.
  • the shared domain here refers to the shared scope of the data published by the first user of each data source, that is, the shared domain can reflect who has the right to read the data.
  • the acquired data released by the first user includes explicit data and implicit data.
  • Explicit data includes information that the data protection settings engine can cover, such as user profile, interest, age, occupation, and check-in data.
  • Implicit data includes information contained in texts, pictures, videos, etc. shared by users. For example, the information posted by a user on Facebook to drink with friends or the user sharing information posted by his friend to drink with the user includes the information that the user is drinking at a certain time.
  • the expression module 12 is configured to express the data published by the first user as user data in a unified format, and output the user data in a unified format to the display module 13;
  • the explicit data is structured information.
  • Explicit data is provided to different service providers and displayed in the service provider's own format.
  • the expression module 12 can establish metadata representation of explicit data, and express the explicit data into a unified format by means of metadata expression.
  • Implicit data information is implicit in the various unstructured information published by the first user. Because the information of the Internet satisfies the characteristics of 4A (Anyone, Anytime, Anywhere, Anything), these unstructured information can be uniformly identified as when, where, and who (who) and what (What) Who is shared with (Who). Therefore, the design format for designing an implicit data is: Who, When, Where And What to Whom. Each implicit information can be expressed in such a format by the expression module 12.
  • the simultaneous expression module 12 also converts the explicit data of the unified format described above into a format in which the first user includes time, space and social relationship related data, for example, the check-in data can be represented as a design expression format.
  • the display data and implicit data published by the first user on the Internet are expressed in a unified format.
  • the display module 13 is configured to convert the user data of the unified format into a graphic or image of a time-to-space relationship by a visualization technology, wherein the graphic or the image is the time and the visual angle of the second user specified in the shared domain of the data.
  • a graphic or image of a spatial relationship is configured to convert the user data of the unified format into a graphic or image of a time-to-space relationship by a visualization technology, wherein the graphic or the image is the time and the visual angle of the second user specified in the shared domain of the data.
  • a graphic or image of a spatial relationship is configured to convert the user data of the unified format into a graphic or image of a time-to-space relationship by a visualization technology, wherein the graphic or the image is the time and the visual angle of the second user specified in the shared domain of the data.
  • Visualization technology refers to the theory, method and technology of using computer graphics and image processing technology to convert data into graphics or images and display them on the screen.
  • the display module 13 converts the user data of the unified format into a graphic or image of a temporal and spatial relationship of the visual angle of the second user specified in the shared domain of the data through a visualization technique.
  • the second user here includes all users sharing data published by the first user.
  • the display module 13 can further combine the electronic map function on the basis of the visualization technology to specify the user data in the unified format.
  • a graphic or image of the temporal and spatial relationship of the visual angle of a second user is displayed on the electronic map.
  • the display module 13 displays user data from a visual perspective of different users through a visualization technology, and the user can intuitively read and understand the release of his own data.
  • FIG. 4 is a schematic structural diagram of another embodiment of the data management device of the present application.
  • the data management device 200 of the present embodiment includes an obtaining module 21, an expression module 22, a display module 23, a receiving module 24, and a returning module 25, and Adjustment module 26, wherein:
  • the obtaining module 21 is configured to acquire data shared by the first user on the Internet and a shared domain of the data, and output the same to the expression module 22;
  • the expression module 22 is configured to express the data published by the first user as user data in a unified format, and output the user data in a unified format to the display module 23;
  • the display module 23 is configured to convert the user data of the unified format into a graphic or image of a temporal and spatial relationship by using a visualization technique, wherein the graphic or the image is the time and the visual angle of the second user specified in the shared domain of the data.
  • a graphic or image of a spatial relationship is configured to convert the user data of the unified format into a graphic or image of a temporal and spatial relationship by using a visualization technique, wherein the graphic or the image is the time and the visual angle of the second user specified in the shared domain of the data.
  • a graphic or image of a spatial relationship is configured to convert the user data of the unified format into a graphic or image of a temporal and spatial relationship by using a visualization technique, wherein the graphic or the image is the time and the visual angle of the second user specified in the shared domain of the data.
  • the receiving module 24 is configured to receive an operation instruction for adjusting a graphic or an image, and output the operation instruction to the returning module 25;
  • the receiving module 24 receives an operation instruction for the user to adjust the graphic or image.
  • the user finds that during the sick leave, there is a path connecting the bars, and the first user can intuitively find that the corresponding data has been leaked.
  • This disclosure may come from the data leakage of the first user itself or from the data sharing of his friends. At this time, you can directly wipe the path of the connection bar on the display interface to prevent its supervisor from seeing the data about this part of the bar.
  • the returning module 25 is configured to return a setting option for adjusting user data corresponding to the graphic or the image according to the operation instruction;
  • the analysis engine in the background of the data management device system automatically finds a setting option for adjusting the user data corresponding to the adjusted graphic or image.
  • the setting options are fed back to the user via the return module 25 for selection by the user.
  • the data management device system finds the user data (ie, the original data) corresponding to the erased graphics or images. Cancelling one or more of these raw data to the supervisor's reading rights can achieve the effect that the user wants to protect.
  • the system automatically calculates all the solutions that can achieve the protection effect, and generates setting options for adjusting the user data corresponding to the graphics or images. An adjustment scheme is returned to the user corresponding to a setting option.
  • connection bar path there are two data sources corresponding to the connection bar path, namely data source one and data source two
  • canceling the reading permission of the supervisor on the data source one or canceling the reading permission of the supervisor on the data source two can achieve the protection effect (of course, at the same time, Cancelling the reading authority of the data source one or two is another scheme, and can also achieve the protection effect.
  • the scheme has the same protection effect, the information loss is greater than other schemes, and the system will automatically filter out the scheme. Only return the setting options corresponding to the preferred solution that can achieve the desired effect).
  • the returning module 25 can also display the adjustment effect corresponding to the returned setting option through the visualization technology for the user to preview, and the user selects one of the setting options according to the preview adjustment effect.
  • the adjustment module 26 is configured to receive an instruction to select a setting option, and adjust user data corresponding to the graphic or image.
  • the adjustment module 26 receives an instruction of the user to select a setting option, and performs corresponding adjustment on the user data corresponding to the graphic or the graphic. In this way, the system controls the permissions of the corresponding data source according to the user's selection. This mechanism enables users to automatically adjust their privacy protection. For example, if the user erases the path connecting the bar on the display interface, the user data such as time, location, event information, etc. corresponding to the path of the connected bar in the viewing angle is hiddenly adjusted.
  • FIG. 5 is a schematic structural diagram of another embodiment of the data management device of the present application.
  • the data management device 300 of the present embodiment includes a processor 31, a receiver 32, a transmitter 33, a random access memory 34, and only The memory 35, the bus 36, and the network interface unit 37 are read.
  • the processor 31 is coupled to the receiver 32, the transmitter 33, the random access memory 34, the read only memory 35, and the network interface unit 37 via the bus 36.
  • the basic data input device in the read-only memory 35 or the bootloader boot system in the embedded system is booted to boot the data management device 300 into a normal operating state.
  • the application and operating system are run in the random access memory 34, and data is received from the network or transmitted to the network through the network interface unit 37, such that:
  • the processor 31 is configured to acquire data shared by the first user of the Internet and a shared domain of the data, and express the data published by the first user as user data in a unified format, and then convert the unified format user data into a time-space relationship graphic. Or the image is displayed, wherein the graphic or image is a graphic or image of the temporal and spatial relationship of the visual angle of the second user specified in the shared domain of the data.
  • the processor 31 can further combine the electronic map function on the basis of the visualization technology to specify the user data in the unified format.
  • the graphic or image of the temporal and spatial relationship of the visual angle of the second user is displayed on the electronic map.
  • the receiver 32 is configured to receive an operation instruction for adjusting the displayed graphic or image
  • the processor 31 further returns a setting option for adjusting the user data corresponding to the graphic or the image according to the operation instruction, and further receives an instruction for the user to select the setting option, and adjusts the user data corresponding to the graphic or the image.
  • the processor 31 of the embodiment of the present application may be a central processing unit CPU or an application specific integrated circuit ASIC (Application Specific) Integrated Circuit), or one or more integrated circuits configured to implement embodiments of the present application.
  • ASIC Application Specific
  • the method and device for data management of the present application acquires data shared by a first user of each data source of the Internet and a shared domain of data, and expresses data published by the first user as user data in a unified format.
  • the unified format user data is then converted into a graphic or image of the temporal and spatial relationship of the visual angle of the second user specified in the shared domain.
  • the user can directly erase or display the graphic or image of the display interface, thereby realizing the adjustment of the self data, realizing the simplicity, the operation is more convenient and direct, and the user data can be more effectively protected, and the user is more effectively protected. Good experience.
  • the disclosed system, apparatus, and method may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the modules or units is only a logical function division.
  • there may be another division manner for example, multiple units or components may be used. Combinations can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
  • a computer readable storage medium A number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) or a processor to perform all or part of the steps of the methods described in various embodiments of the present application.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read only memory (ROM, Read-Only) Memory, random access memory (RAM), disk or optical disk, and other media that can store program code.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Computational Linguistics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • User Interface Of Digital Computer (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本发明公开了一种数据管理的方法及设备。其中,数据管理的方法包括:获取互联网上第一用户发布的数据以及数据的共享域;将第一用户发布的数据表达为统一格式的用户数据;通过可视化技术将统一格式的用户数据转化为时间与空间关系的图形或图像进行显示。通过上述方式,本发明能够直观的反映用户数据,从而使用户能够全面的评估和管理自己的数据,有效保护用户数据安全。

Description

一种数据管理的方法及设备
【技术领域】
本发明涉及计算机科学领域,特别是涉及一种数据管理的方法及设备。
【背景技术】
用户数据保护技术是计算机科学领域中数据库,数据挖掘和互联网数据管理方向的一个重要研究课题。它研究如何管理用户的数据,使得有用数据在被发布共享的同时,用户的隐私数据得到保护。随着社交网络和移动互联网终端的大量使用,越来越多的用户数据被提供给互联网服务提供商,用户数据保护成为当前急需解决重要问题。
现有的用户数据保护的方法和工具,并不能直观的反映用户数据的泄露情况,用户无法得知自己的哪些数据泄露而需要保护,不能有效保护用户数据安全。
【发明内容】
本申请主要解决的技术问题是提供一种数据管理的方法及设备,能够直观的反映用户数据,从而使用户能够全面的评估和管理自己的数据,有效保护用户数据安全。
第一方面,本申请提供一种数据管理的方法,包括:获取互联网上第一用户发布的数据以及所述数据的共享域;将所述第一用户发布的数据表达为统一格式的用户数据;通过可视化技术将所述统一格式的用户数据转化为时间与空间关系的图形或图像进行显示,其中,所述图形或图像是所述数据的共享域中指定的第二用户所处视觉角度的时间与空间关系的图形或图像。
结合第一方面,在第一方面的第一种可能的实现方式中:所述方法还包括:接收对所述图形或图像进行调整的操作指令;根据所述操作指令,返回对所述图形或图像对应的用户数据进行调整的设置选项;接收选择所述设置选项的指令,对所述图形或图像对应的用户数据进行调整。
结合第一方面的第一种可能的实现方式,在第一方面的第二种可能的实现方式中:所述根据所述操作指令,返回对所述图形或图像对应的用户数据进行调整的设置选项的步骤之后,还包括:将所述设置选项对应的调整效果通过可视化技术展示以供用户预览。
结合第一方面,在第一方面的第三种可能的实现方式中:所述通过可视化技术将所述统一格式的用户数据转化为所述数据的共享域中指定的第二用户所处视觉角度的时间与空间关系的图形或图像进行显示的步骤包括:通过可视化技术结合电子地图功能,将所述统一格式的用户数据转化为所述数据的共享域中指定的第二用户所处视觉角度的时间与空间关系的图形或图像进行显示。
结合第一方面,在第一方面的第四种可能的实现方式中:所述的第一用户发布的数据包括显式数据和隐式数据。
结合第一方面的第四种可能的实现方式,在第一方面的第五种可能的实现方式中:所述显式数据包括数据保护设置所覆盖的信息;所述隐式数据包括用户分享的文字、图片以及视频所包含的信息。
结合第二方面或第二方面的任一可能的实现方式,在第一方面的第六种可能的实现方式中:所述将所述第一用户发布的数据表达为统一格式的用户数据的步骤包括:将所述第一用户发布的数据表达为“谁,何时,何地,和关于什么被分享给谁”的统一格式的用户数据。
第二方面,提供一种数据管理设备,包括获取模块、表达模块以及显示模块,其中:所述获取模块用于获取互联网上第一用户发布的数据以及所述数据的共享域,并输出给所述表达模块;所述表达模块用于将所述第一用户发布的数据表达为统一格式的用户数据,并将所述统一格式的用户数据输出给所述显示模块;所述显示模块用于通过可视化技术将所述统一格式的用户数据转化为时间与空间关系的图形或图像进行显示,其中,所述图形或图像是所述数据的共享域中指定的第二用户所处视觉角度的时间与空间关系的图形或图像。
结合第二方面,在第二方面的第一种可能的实现方式中:所述设备还包括接收模块、返回模块以及调整模块,其中:所述接收模块用于接收对所述图形或图像进行调整的操作指令,并将所述操作指令输出给所述返回模块;所述返回模块用于根据所述操作指令,返回对所述图形或图像对应的用户数据进行调整的设置选项;所述调整模块用于接收选择所述设置选项的指令,对所述图形或图像对应的用户数据进行调整。
结合第二方面的第一种可能的实现方式,在第二方面的第二种可能的实现方式中:所述返回模块还用于将所述设置选项对应的调整效果通过可视化技术展示以供用户预览。
结合第二方面,在第二方面的第三种可能的实现方式中:所述显示模块用于通过可视化技术结合电子地图功能,将所述统一格式的用户数据转化为所述数据的共享域中指定的第二用户所处视觉角度的时间与空间关系的图形或图像进行显示。
结合第二方面,在第二方面的第四种可能的实现方式中:所述的第一用户发布的数据包括显式数据和隐式数据。
结合第二方面的第四种可能的实现方式,在第二方面的第五种可能的实现方式中:所述显式数据包括数据保护设置所覆盖的信息;所述隐式数据包括用户分享的文字、图片以及视频所包含的信息。
结合第二方面或第二方面任一可能的实现方式,在第二方面的第六种可能的实现方式中:所述表达模块用于将所述第一用户发布的数据表达为“谁,何时,何地,和关于什么被分享给谁”的统一格式的用户数据。
本申请的有益效果是:区别于现有技术的情况,本申请通过获取互联网各数据源的第一用户发布的数据以及数据的共享域,并把第一用户发布的数据表达为统一格式的用户数据,然后将统一格式的用户数据转化为共享域中指定的第二用户所处视觉角度的时间与空间关系的图形或图像进行显示。通过这样的方式,用户可以直观的阅读和理解用户数据的发布情况,从而使用户能够全面的评估和及时管理自己的数据不被泄露,有效保护用户数据安全,给用户更好的体验。
【附图说明】
图1是本申请数据管理的方法一个实施方式的流程图;
图2是本申请数据管理的方法另一个实施方式的流程图;
图3是本申请数据管理设备一个实施方式的结构示意图;
图4是本申请数据管理设备另一个实施方式的结构示意图;
图5是本申请数据管理设备还有一个实施方式的结构示意图。
【具体实施方式】
用户数据保护技术是计算机科学领域中数据库,数据挖掘和互联网数据管理方向的一个重要研究课题。它研究如何管理用户的数据,使得有用数据在被发布共享的同时,用户的隐私数据得到保护。随着社交网络和移动互联网终端的大量使用,越来越多的用户数据被提供给互联网服务提供商,用户数据保护成为当前急需解决重要问题。
用户数据保护技术可以分为两大类:隐私保留数据的发布/管理和在线用户的隐私管理。隐私保留数据的发布/管理是研究如何发布/管理用户的数据,使得数据分析工作者在取得有用的统计结果的同时,无法获取了个体用户的敏感信息。在线用户的隐私管理研究如何协助用户管理自己的在线信息,从而使得用户在有效分享信息的同时,保护好自己的隐私。
隐私保留数据的发布/管理有两种基本技术:隐私保留数据发布和差异隐私保护。隐私保留数据发布是指发布一个处理(噪音化或粗粒度化)后的数据而不是原数据给数据分析工作者。当处理数据的时候,需要假设攻击者的背景知识和隐私保护的目标。其中最有代表性的方式是K匿名算法,即通过数据粗粒度化,把每个用户的可辨识信息变成和其它至少K-1个用户相同。当前方法的缺点是:(1) 需要假设攻击者的背景知识,如果假设不合适,模型可能整个失败;(2) 对发布数据的可用性没有任何保证。差异隐私保护是为数据分析者提供一个查询接口。数据分析者不能直接接触数据,只能通过接口提供的聚集查询 (aggregate query) 的结果来做分析。接口在查询结果上加噪音来保证任何个体的信息不被泄露。差异隐私保护的方法有两个主要问题:(1) 保护过强,聚类查询的结果对分析准确度的影响很难界定;(2) 只能支持有限数量的查询,很难支持复杂的数据挖掘任务。
在线用户的隐私管理主要研究两个问题: (1) 如何设计友好的用户隐私保护设置工具使用户方便的管理自己的个人信息; (2) 如何使用户了解和评估自己数据信息的发布状况。随着互联网使用的增加,互联网服务变得更加普遍和多样化。用户的大量数据被提供给服务提供商来获取相应的服务。如何管理和发布这些信息成为一个重要问题。当前不同的服务提供商,比如社交网站提供不同的隐私数据保护设置工具来协助用户设置自己数据发布的策略。但是信息的多样化和保护的复杂规则使得用户很难理解和使用这些工具。当前的研究考虑使用学习算法来分类用户的数据,从而使设置更简单。但是用户仍需理解和学习保护的规则才能使用这些工具。还有的保护方法是根据用户发布的个人数据计算一个隐私数据泄露指数,当指数低于一定阈值的时候,提醒用户加强自己数据的保护策略。这种方法的主要问题是指数并不能直观的反映用户的数据泄露情况。用户从指数无法看出哪些隐私数据需要保护和怎么样保护。另外一个重要问题是当前在线用户的隐私数据管理方法只针对一个数据源做保护,无法适应当前用户经常使用多个互联网服务的状况。
本申请旨在解决现有用户数据保护技术所存在的缺陷,提出一种数据管理的方法及设备,能够直观的反映用户数据,从而使用户能够全面的评估和管理自己的数据,有效保护用户数据安全。
以下结合具体实施方式对本申请的技术方案进行进一步的解释与说明,但是这只是本申请数据管理的方法及设备的具体实施方式,并不用以限制本申请的保护范围。
请参阅图1,图1是本申请数据管理的方法一个实施方式的流程图,本实施方式的数据管理的方法是以实现数据管理的方法的数据管理设备的角度来进行描述,本实施方式的数据管理的方法包括:
步骤S101:获取互联网上第一用户发布的数据以及数据的共享域;
数据管理设备获取互联网第一用户发布的数据以及这些数据的共享域。这里第一用户发布的数据包括其在各个数据源发布的数据。共享域是指第一用户发布的数据允许共享的范围,即从共享域能够体现哪些人有权限阅读这些数据。
所获取的第一用户发布的数据包括显式数据和隐式数据。
显式数据包括数据保护设置引擎可以覆盖的信息,比如用户的侧写、兴趣、年龄、职业和签到数据等。
隐式数据包括用户分享的文字、图片、视频等包含的信息。比如用户在facebook上发布的和朋友一起喝酒的信息或者用户分享其朋友发布的跟该用户一起喝酒的信息,都包含了该用户在某个时段喝酒这一信息。
步骤S102:将第一用户发布的数据表达为统一格式的用户数据;
第一用户发布的数据中,显式数据是结构化的信息。显式数据被提供给不同的服务提供程序,并以服务提供程序自己的格式显示。比如数据管理设备可以建立显式数据的元数据表达,通过元数据表达的方式将显式数据表达为统一的格式。
隐式数据的信息隐含在第一用户发布的各种非结构化信息中。因为互联网的信息满足4A(Anyone,Anytime,Anywhere,Anything)特性,这些非结构化的信息可以被统一标识为何时(When),何地(Where),与谁(Who)和关于什么(What)被分享给谁(Who)。因此,设计一种隐式数据的表述格式为:Who,When,Where and What to Whom。每个隐式信息都可以被表达为这样的格式。
同时将上述的统一格式的显式数据也转化为这样的格式,显式数据中包括第一用户时间、空间和社交关系相关的数据,比如签到数据可以被表达为设计的表述格式。这样第一用户在互联网中发布的显示数据和隐式数据都被表达为统一的格式。
步骤S103:通过可视化技术将统一格式的用户数据转化为时间与空间关系的图形或图像进行显示,其中,图形或图像是数据的共享域中指定的第二用户所处视觉角度的时间与空间关系的图形或图像;
可视化技术是指运用计算机图形学和图像处理技术,将数据换为图形或图像在屏幕上显示出来,并进行交互处理的理论、方法和技术。通过可视化技术,将统一格式的用户数据转化为数据的共享域中指定的第二用户所处视觉角度的时间和空间关系的图形或图像进行显示。这里的第二用户包括共享第一用户发布的数据的所有用户。
通过可视化技术将用户数据从不同用户的视觉角度来进行显示,用户可以直观的阅读和理解自己数据的发布情况。
通过上述实施方式的阐述,可以理解,本申请数据管理的方法通过获取互联网各数据源的第一用户发布的数据以及数据的共享域,并把第一用户发布的数据表达为统一格式的用户数据,然后将统一格式的用户数据转化为共享域中指定的某第二用户所处视觉角度的时间与空间关系的图形或图像进行显示。通过这样的方式,用户可以直观的阅读和理解用户数据的发布情况,实现用户与其数据之间的透明,并通过不同用户观察自己的视角角度来展示用户数据,从而使用户能够全面的评估和及时管理自己的数据不被泄露,有效保护用户数据安全,给用户更好的体验。
请参阅图2,图2是本申请数据管理的方法另一个实施方式的流程图,本实施方式数据管理的方法是以实现数据管理的方法的数据管理设备的角度来进行描述,本实施方式数据管理的方法包括以下步骤:
步骤S201:获取互联网上各数据源第一用户发布的数据以及数据的共享域;
数据管理设备获取互联网第一用户发布的数据以及这些数据的共享域。第一用户发布的数据包括互联网上各个数据源中第一用户发布的数据。这里的共享域是指第一用户发布的数据允许共享的范围,即从共享域能够体现哪些人有权限阅读这些数据。
所获取的第一用户发布的数据包括显式数据和隐式数据。
显式数据包括上述数据保护设置引擎可以覆盖的信息,比如用户的侧写、兴趣、年龄、职业和签到数据等。
隐式数据包括用户分享的文字、图片、视频等包含的信息。比如用户在facebook上发布的和朋友一起喝酒的信息或者用户分享其朋友发布的跟该用户一起喝酒的信息,都包含了该用户在某个时段喝酒这一信息。
步骤S202:将第一用户发布的数据表达为统一格式的用户数据;
第一用户发布的数据中,显式数据是结构化的信息。显式数据被提供给不同的服务提供程序,并以服务提供程序自己的格式显示。比如数据管理设备可以建立显式数据的元数据表达,通过元数据表达的方式将显式数据表达为统一的格式。
隐式数据的信息隐含在第一用户发布的各种非结构化信息中。因为互联网的信息满足4A(Anyone,Anytime,Anywhere,Anything)特性,这些非结构化的信息可以被统一标识为何时(When),何地(Where),与谁(Who)和关于什么(What)被分享给谁(Who)。因此,设计一种隐式数据的表述格式为:Who,When,Where and What to Whom。每个隐式信息都可以被表达为这样的格式。
同时将上述的统一格式的显式数据也转化为这样的格式,显式数据中包括第一用户时间、空间和社交关系相关的数据,比如签到数据可以被表示为设计的表述格式。这样第一用户在互联网中发布的显示数据和隐式数据都被表达为统一的格式。
步骤S203:通过可视化技术将统一格式的用户数据转化为时间与空间关系的图形或图像进行显示,其中,图形或图像是数据的共享域中指定的第二用户所处视觉角度的时间与空间关系的图形或图像;
通过可视化技术,将统一格式的用户数据转化为数据的共享域中指定的某第二用户所处视觉角度的时间和空间关系的图形或图像进行显示。这里的第二用户包括共享第一用户发布的数据的所有用户。
其中,为更逼真、形象的将第一用户发布的数据以时间和空间的关系显示出来,在可视化技术的基础上,进一步地结合电子地图功能,将统一格式的用户数据以指定的某第二用户所处视觉角度的时间和空间关系的图形或图像在电子地图上显示出来。
步骤S204:接收对图形或图像进行调整的操作指令。
如果第一用户发现某个视觉角度的图形或图像显示上,出现某些自己不想让该视觉角度的第二用户看到的信息,或者想让该视觉角度的第二用户看到但没有在图形或图像上显示的信息,这时,可以对可视化的显示界面上图形或图像进行操作。数据管理设备接收用户对图形或图像进行调整的操作指令。
比如第一用户的某个时段在其主管视角的角度的图形或图像中,用户发现在其病假期间,有个连接酒吧的路径,该第一用户就可以直观的发现相应的数据已经泄露。这个泄露可能来自第一用户本身的数据泄露,也可能来自其朋友的数据分享。这时可以直接擦掉显示界面上连接酒吧的路径,以避免其主管看到关于酒吧这部分的数据信息。
步骤S205:根据操作指令,返回对图形或图像对应的用户数据进行调整的设置选项;
根据操作指令,数据管理设备系统后台的分析引擎会自动找到对进行调整的图形或图像对应的用户数据进行相应调整的设置选项。并反馈给用户以供用户选择。
比如根据用户擦掉显示界面上连接酒吧的路径的操作指令,数据管理设备系统找到这些擦掉的图形或图像对应的用户数据(即原始数据)。取消一个或者多个这些原始数据对主管的阅读权限可以达到用户所想要保护的效果。系统自动计算出所有可以达到保护效果的方案,生成对图形或图像对应的用户数据进行调整的设置选项。一种调整方案对应一个设置选项返回给用户。比如对应连接酒吧路径的有两个数据源,分别是数据源一和数据源二,取消主管对数据源一的阅读权限或取消主管对数据源二的阅读权限都可以达到保护效果(当然,同时取消主管对数据源一、二的阅读权限是另外一种方案,也可以达到保护效果,但这种方案在取得相同保护效果的情况下信息损失大于其它方案,系统会自动过滤掉这种方案。只返回能够达到所需效果的较佳方案对应的设置选项)。
另一方面,为了方便引导用户对设置选项的选择,系统可以将返回的设置选项对应的调整效果通过可视化技术展示以供用户预览,用户根据预览调整效果,选择其中一个设置选项。
步骤S206:接收选择设置选项的指令,对图形或图像对应的用户数据进行调整;
数据管理设备进一步接收用户选择设置选项的指令,对图形或图形对应的用户数据进行相应的调整。通过这样的方式,系统根据用户的选择对相应数据源的权限进行控制。这种机制实现了用户对自己隐私的自动调整保护。比如用户擦掉的是显示界面上连接酒吧的路径,那么对该视角角度中这个连接酒吧的路径对应的用户数据比如时间、地点、事件信息等都做隐藏的调整。
通过上述实施方式,进一步地,用户可以直接对显示界面的图形或图像进行擦除或显示的操作,就能达到对自己数据的调整,实现简单,操作起来更加方便和直接,能够更加有效的保护用户数据,给用户更好的体验。
请参阅图3,图3是本申请数据管理设备一个实施方式的结构示意图,本实施方式的数据管理设备100包括获取模块11、表达模块12以及显示模块13,其中:
获取模块11用于获取互联网上第一用户发布的数据以及数据的共享域,并输出给表达模块12;
获取模块11获取互联网第一用户发布的数据以及这些数据的共享域。第一用户发布的数据包括互联网各个数据源上第一用户发布的数据。这里的共享域是指各数据源第一用户发布的数据的共享范围,即从共享域能够体现哪些人有权限阅读这些数据。
所获取的第一用户发布的数据包括显式数据和隐式数据。
显式数据包括数据保护设置引擎可以覆盖的信息,比如用户的侧写、兴趣、年龄、职业和签到数据等。
隐式数据包括用户分享的文字、图片、视频等包含的信息。比如用户在facebook上发布的和朋友一起喝酒的信息或者用户分享其朋友发布的跟该用户一起喝酒的信息,都包含了该用户在某个时段喝酒这一信息。
表达模块12用于将第一用户发布的数据表达为统一格式的用户数据,并将统一格式的用户数据输出给显示模块13;
第一用户发布的数据中,显式数据是结构化的信息。显式数据被提供给不同的服务提供程序,并以服务提供程序自己的格式显示。比如表达模块12可以建立显式数据的元数据表达,通过元数据表达的方式将显式数据表达为统一的格式。
隐式数据的信息隐含在第一用户发布的各种非结构化信息中。因为互联网的信息满足4A(Anyone,Anytime,Anywhere,Anything)特性,这些非结构化的信息可以被统一标识为何时(When),何地(Where),与谁(Who)和关于什么(What)被分享给谁(Who)。因此,设计一种隐式数据的表述格式为:Who,When,Where and What to Whom。每个隐式信息都可以通过表达模块12被表达为这样的格式。
同时表达模块12将上述的统一格式的显式数据也转化为这样的格式,显式数据中包括第一用户时间、空间和社交关系相关的数据,比如签到数据可以被表示为设计的表述格式。这样第一用户在互联网中发布的显示数据和隐式数据都被表达为统一的格式。
显示模块13用于通过可视化技术将统一格式的用户数据转化为时间与空间关系的图形或图像进行显示,其中,图形或图像是数据的共享域中指定的第二用户所处视觉角度的时间与空间关系的图形或图像。
可视化技术是指运用计算机图形学和图像处理技术,将数据换为图形或图像在屏幕上显示出来,并进行交互处理的理论、方法和技术。显示模块13通过可视化技术,将统一格式的用户数据转化为数据的共享域中指定的第二用户所处视觉角度的时间和空间关系的图形或图像进行显示。这里的第二用户包括共享第一用户发布的数据的所有用户。
其中,为更逼真、形象的将第一用户发布的数据以时间和空间的关系显示出来,显示模块13可以在可视化技术的基础上,进一步地结合电子地图功能,将统一格式的用户数据以指定的某第二用户所处视觉角度的时间和空间关系的图形或图像在电子地图上显示出来。
显示模块13通过可视化技术将用户数据从不同用户的视觉角度来进行显示,用户可以直观的阅读和理解自己数据的发布情况。
请参阅图4,图4是本申请数据管理设备另一个实施方式的结构示意图,本实施方式的数据管理设备200包括获取模块21、表达模块22、显示模块23、接收模块24、返回模块25以及调整模块26,其中:
获取模块21用于获取互联网上第一用户发布的数据以及数据的共享域,并输出给表达模块22;
表达模块22用于将第一用户发布的数据表达为统一格式的用户数据,并将统一格式的用户数据输出给显示模块23;
显示模块23用于通过可视化技术将统一格式的用户数据转化为时间与空间关系的图形或图像进行显示,其中,图形或图像是数据的共享域中指定的第二用户所处视觉角度的时间与空间关系的图形或图像。
接收模块24用于接收对图形或图像进行调整的操作指令,并将操作指令输出给返回模块25;
如果第一用户发现某个视觉角度的图形或图像显示上,出现某些自己不想让该视觉角度的第二用户看到的信息,或者想让该视觉角度的第二用户看到但没有在图形或图像上显示,这时,可以在可视化的显示界面上图形或图像进行操作。接收模块24接收用户对图形或图像进行调整的操作指令。
比如第一用户的某个时段在其主管视角的角度的图形或图像中,用户发现在其病假期间,有个连接酒吧的路径,该第一用户就可以直观的发现相应的数据已经泄露。这个泄露可能来自第一用户本身的数据泄露,也可能来自其朋友的数据分享。这时可以直接擦掉显示界面上连接酒吧的路径,以避免其主管看到关于酒吧这部分的数据信息。
返回模块25用于根据操作指令,返回对图形或图像对应的用户数据进行调整的设置选项;
根据操作指令,数据管理设备系统后台的分析引擎会自动找到对进行调整的图形或图像对应的用户数据进行相应调整的设置选项。通过返回模块25将所述设置选项反馈给用户以供用户选择。
比如根据用户擦掉显示界面上连接酒吧的路径的操作指令,数据管理设备系统找到这些擦掉的图形或图像对应的用户数据(即原始数据)。取消一个或者多个这些原始数据对主管的阅读权限可以达到用户所想要保护的效果。系统自动计算出所有可以达到保护效果的方案,生成对图形或图像对应的用户数据进行调整的设置选项。一种调整方案对应一个设置选项返回给用户。比如对应连接酒吧路径的有两个数据源,分别是数据源一和数据源二,取消主管对数据源一的阅读权限或取消主管对数据源二的阅读权限都可以达到保护效果(当然,同时取消主管对数据源一、二的阅读权限是另外一种方案,也可以达到保护效果,但这种方案在取得相同保护效果的情况下信息损失大于其它方案,系统会自动过滤掉这种方案。只返回能够达到所需效果的较佳方案对应的设置选项)。
另一方面,为了方便引导用户对设置选项的选择,返回模块25还可以将返回的设置选项对应的调整效果通过可视化技术展示以供用户预览,用户根据预览调整效果,选择其中一个设置选项。
调整模块26用于接收选择设置选项的指令,对图形或图像对应的用户数据进行调整。
调整模块26接收用户选择设置选项的指令,对图形或图形对应的用户数据进行相应的调整。通过这样的方式,系统根据用户的选择对相应数据源的权限进行控制。这种机制实现了用户对自己隐私的自动调整保护。比如用户擦掉的是显示界面上连接酒吧的路径,那么对该视角角度中这个连接酒吧的路径对应的用户数据比如时间、地点、事件信息等都做隐藏的调整。
请参阅图5,图5是本申请数据管理设备还有一个实施方式的结构示意图,本实施方式的数据管理设备300包括处理器31、接收器32、发送器33、随机存取存储器34、只读存储器35、总线36以及网络接口单元37。其中,处理器31通过总线36分别耦接接收器32、发送器33、随机存取存储器34、只读存储器35以及网络接口单元37。其中,当需要运行数据管理设备300时,通过固化在只读存储器35中的基本输入输出系统或者嵌入式系统中的bootloader引导系统进行启动,引导数据管理设备300进入正常运行状态。在数据管理设备300进入正常运行状态后,在随机存取存储器34中运行应用程序和操作系统,通过网络接口单元37从网络接收数据或者向网络发送数据,使得:
处理器31用于获取互联网第一用户发布的数据以及数据的共享域,并把第一用户发布的数据表达为统一格式的用户数据,然后将统一格式的用户数据转化为时间与空间关系的图形或图像进行显示,其中,图形或图像是数据的共享域中指定的第二用户所处视觉角度的时间与空间关系的图形或图像。
其中,为更逼真、形象的将第一用户发布的数据以时间和空间的关系显示出来,处理器31可以在可视化技术的基础上,进一步地结合电子地图功能,将统一格式的用户数据以指定的第二用户所处视觉角度的时间和空间关系的图形或图像在电子地图上显示出来。
接收器32用于接收对所显示的图形或图像进行调整的操作指令;
处理器31进一步根据操作指令,返回对图形或图像对应的用户数据进行调整的设置选项,并进一步接收用户选择设置选项的指令,对图形或图像对应的用户数据进行调整。
其中,本申请实施方式的处理器31可能是一个中央处理器CPU,或者是特定集成电路ASIC(Application Specific Integrated Circuit),或者是被配置成实施本申请实施方式的一个或多个集成电路。
通过上述的实施方式,本申请数据管理的方法及设备,通过获取互联网各数据源的第一用户发布的数据以及数据的共享域,并把第一用户发布的数据表达为统一格式的用户数据,然后将统一格式的用户数据转化为共享域中指定的第二用户所处视觉角度的时间与空间关系的图形或图像进行显示。通过这样的方式,用户可以直观的阅读和理解用户数据的发布情况,实现用户与其数据之间的透明,并通过不同用户观察自己的视角角度来展示用户数据,从而使用户能够全面的评估和及时管理自己的数据不被泄露,有效保护用户数据安全,给用户更好的体验。
并且,用户可以直接对显示界面的图形或图像进行擦除或显示的操作,就能达到对自己数据的调整,实现简单,操作起来更加方便和直接,能够更加有效的保护用户数据,给用户更好的体验。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器(processor)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述仅为本申请的实施例,并非因此限制本申请的专利范围,凡是利用本申请说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本申请的专利保护范围内。

Claims (14)

  1. 一种数据管理的方法,其特征在于,包括:
    获取互联网上第一用户发布的数据以及所述数据的共享域;
    将所述第一用户发布的数据表达为统一格式的用户数据;
    通过可视化技术将所述统一格式的用户数据转化为时间与空间关系的图形或图像进行显示,其中,所述图形或图像是所述数据的共享域中指定的第二用户所处视觉角度的时间与空间关系的图形或图像。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    接收对所述图形或图像进行调整的操作指令;
    根据所述操作指令,返回对所述图形或图像对应的用户数据进行调整的设置选项;
    接收选择所述设置选项的指令,对所述图形或图像对应的用户数据进行调整。
  3. 根据权利要求2所述的方法,其特征在于,所述根据所述操作指令,返回对所述图形或图像对应的用户数据进行调整的设置选项的步骤之后,还包括:将所述设置选项对应的调整效果通过可视化技术展示以供用户预览。
  4. 根据权利要求1所述的方法,其特征在于,所述通过可视化技术将所述统一格式的用户数据转化为所述数据的共享域中指定的第二用户所处视觉角度的时间与空间关系的图形或图像进行显示的步骤包括:
    通过可视化技术结合电子地图功能,将所述统一格式的用户数据转化为所述数据的共享域中指定的第二用户所处视觉角度的时间与空间关系的图形或图像进行显示。
  5. 根据权利要求1所述的方法,其特征在于,所述的第一用户发布的数据包括显式数据和隐式数据。
  6. 根据权利要求5所述的方法,其特征在于,所述显式数据包括所述数据保护设置所覆盖的信息;所述隐式数据包括用户分享的文字、图片以及视频所包含的信息。
  7. 根据权利要求1-6任一项所述的方法,其特征在于,
    所述将所述第一用户发布的数据表达为统一格式的用户数据的步骤包括:将所述第一用户发布的数据表达为“谁,何时,何地,和关于什么被分享给谁”的统一格式的用户数据。
  8. 一种数据管理设备,其特征在于,包括获取模块、表达模块以及显示模块,其中:
    所述获取模块用于获取互联网上第一用户发布的数据以及所述数据的共享域,并输出给所述表达模块;
    所述表达模块用于将所述第一用户发布的数据表达为统一格式的用户数据,并将所述统一格式的用户数据输出给所述显示模块;
    所述显示模块用于通过可视化技术将所述统一格式的用户数据转化为时间与空间关系的图形或图像进行显示,其中,所述图形或图像是所述数据的共享域中指定的第二用户所处视觉角度的时间与空间关系的图形或图像。
  9. 根据权利要求8所述的设备,其特征在于,所述设备还包括接收模块、返回模块以及调整模块,其中:
    所述接收模块用于接收对所述图形或图像进行调整的操作指令,并将所述操作指令输出给所述返回模块;
    所述返回模块用于根据所述操作指令,返回对所述图形或图像对应的用户数据进行调整的设置选项;
    所述调整模块用于接收选择所述设置选项的指令,对所述图形或图像对应的用户数据进行调整。
  10. 根据权利要求9所述的设备,其特征在于,所述返回模块还用于将所述设置选项对应的调整效果通过可视化技术展示以供用户预览。
  11. 根据权利要求8所述的设备,其特征在于,所述显示模块用于通过可视化技术结合电子地图功能,将所述统一格式的用户数据转化为所述数据的共享域中指定的第二用户所处视觉角度的时间与空间关系的图形或图像进行显示。
  12. 根据权利要求8述的设备,其特征在于,所述的第一用户发布的数据包括显式数据和隐式数据。
  13. 根据权利要求12述的设备,其特征在于,所述显式数据包括数据保护设置所覆盖的信息;所述隐式数据包括用户分享的文字、图片以及视频所包含的信息。
  14. 根据权利要求8-13任一项所述的设备,其特征在于,所述表达模块用于将所述第一用户发布的数据表达为“谁,何时,何地,和关于什么被分享给谁”的统一格式的用户数据。
PCT/CN2014/075306 2013-11-13 2014-04-14 一种数据管理的方法及设备 WO2015070562A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/980,947 US20160110401A1 (en) 2013-11-13 2015-12-28 Data Management Method and Device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310567072.X 2013-11-13
CN201310567072.XA CN104636669B (zh) 2013-11-13 2013-11-13 一种数据管理的方法及设备

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/980,947 Continuation US20160110401A1 (en) 2013-11-13 2015-12-28 Data Management Method and Device

Publications (1)

Publication Number Publication Date
WO2015070562A1 true WO2015070562A1 (zh) 2015-05-21

Family

ID=53056692

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/075306 WO2015070562A1 (zh) 2013-11-13 2014-04-14 一种数据管理的方法及设备

Country Status (3)

Country Link
US (1) US20160110401A1 (zh)
CN (1) CN104636669B (zh)
WO (1) WO2015070562A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111881482A (zh) * 2020-08-05 2020-11-03 黄灿楠 基于区块链技术的用户身份隐私加密方法

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10416841B2 (en) * 2015-08-10 2019-09-17 Microsoft Technology Licensing, Llc Animated data visualization video
US11354332B2 (en) * 2020-05-20 2022-06-07 Sap Se Enabling data access by external cloud-based analytics system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102200988A (zh) * 2010-03-01 2011-09-28 微软公司 具有推荐的社交网络系统
CN102348171A (zh) * 2010-07-29 2012-02-08 国际商业机器公司 消息处理方法及其系统
WO2012117397A2 (en) * 2011-03-01 2012-09-07 Arazi Dalya System and method for social network platform
CN103023965A (zh) * 2011-11-09 2013-04-03 微软公司 基于事件的媒体分组、回放和共享

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8811643B2 (en) * 2003-05-08 2014-08-19 Advanced Bionics Integrated cochlear implant headpiece
US7733441B2 (en) * 2004-06-03 2010-06-08 Semiconductor Energy Labortory Co., Ltd. Organic electroluminescent lighting system provided with an insulating layer containing fluorescent material
WO2009006273A2 (en) * 2007-06-29 2009-01-08 3M Innovative Properties Company Synchronized views of video data and three-dimensional model data
EP2803001A1 (en) * 2011-10-31 2014-11-19 Forsythe Hamish Method, process and system to atomically structure varied data and transform into context associated data
CN102609507A (zh) * 2012-02-03 2012-07-25 浙江工业大学 基于Web的数据可视化系统
US20130238396A1 (en) * 2012-03-06 2013-09-12 Jukka SAPPINEN Method, system and apparatus for designing assessment report

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102200988A (zh) * 2010-03-01 2011-09-28 微软公司 具有推荐的社交网络系统
CN102348171A (zh) * 2010-07-29 2012-02-08 国际商业机器公司 消息处理方法及其系统
WO2012117397A2 (en) * 2011-03-01 2012-09-07 Arazi Dalya System and method for social network platform
CN103023965A (zh) * 2011-11-09 2013-04-03 微软公司 基于事件的媒体分组、回放和共享

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111881482A (zh) * 2020-08-05 2020-11-03 黄灿楠 基于区块链技术的用户身份隐私加密方法
CN111881482B (zh) * 2020-08-05 2023-03-28 黄灿楠 基于区块链技术的用户身份隐私加密方法

Also Published As

Publication number Publication date
CN104636669A (zh) 2015-05-20
US20160110401A1 (en) 2016-04-21
CN104636669B (zh) 2018-08-14

Similar Documents

Publication Publication Date Title
US10083320B2 (en) Dynamic content redaction
US9553867B2 (en) Secure application access system
US9202078B2 (en) Data perturbation and anonymization using one way hash
US9270947B2 (en) Terminal device, server, data processing system, data processing method, and program
US20110264804A1 (en) Cloud-based web content filtering
WO2014069787A1 (en) Security through metadata orchestrators
WO2017131300A1 (en) System and method to enable privacy-preserving real time services against inference attacks
US10169600B2 (en) Encryption policies for various nodes of a file
WO2016108378A1 (en) Electronic system with risk presentation mechanism and method of operation thereof
WO2018124729A1 (en) Privacy-preserving transformation of continuous data
US9984225B2 (en) Method and system for providing tokenless secure login by visual cryptography
WO2014003516A1 (ko) 데이터 공유 제공 방법 및 장치
WO2017026356A1 (ja) 画像処理装置、画像復元装置、画像処理方法および画像復元方法
WO2017026837A1 (en) Method for masking content displayed on electronic device
CN113806777A (zh) 文件访问的实现方法及装置、存储介质及电子设备
CN112487451B (zh) 展示方法、装置和电子设备
WO2015070562A1 (zh) 一种数据管理的方法及设备
US20180020010A1 (en) Analog security for digital data
CN112567441A (zh) 信息处理系统、信息处理方法和信息处理装置
CN107820614A (zh) 隐私增强的个人搜索索引
CN107251480A (zh) 数据保管装置、数据更新系统、数据处理方法和数据处理程序
WO2023124944A1 (zh) 视频通话方法、装置、电子设备和存储介质
US9916459B2 (en) Photograph metadata encryption
WO2021040138A1 (ko) 해시태그 기반의 사진 인화 서비스 제공 시스템
US20180025172A1 (en) Data storage apparatus, data processing method, and computer readable medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14861304

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14861304

Country of ref document: EP

Kind code of ref document: A1