WO2020087876A1 - 一种信息流转方法、装置及系统 - Google Patents

一种信息流转方法、装置及系统 Download PDF

Info

Publication number
WO2020087876A1
WO2020087876A1 PCT/CN2019/083045 CN2019083045W WO2020087876A1 WO 2020087876 A1 WO2020087876 A1 WO 2020087876A1 CN 2019083045 W CN2019083045 W CN 2019083045W WO 2020087876 A1 WO2020087876 A1 WO 2020087876A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
information
extended
access control
privacy
Prior art date
Application number
PCT/CN2019/083045
Other languages
English (en)
French (fr)
Inventor
李凤华
谢绒娜
李晖
张玲翠
牛犇
Original Assignee
中国科学院信息工程研究所
西安电子科技大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国科学院信息工程研究所, 西安电子科技大学 filed Critical 中国科学院信息工程研究所
Publication of WO2020087876A1 publication Critical patent/WO2020087876A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Definitions

  • This article relates to, but not limited to, the field of information application technology, and particularly refers to an information transfer method, device, and system.
  • Access control needs to propose corresponding access control schemes according to application scenarios. While the current access control system performs access control, it retrieves the query-related access control policies from the policy library, and the monitor performs the access control policies. This method is mostly applied to a single system. For the cross-system and cross-domain information transfer process, the retrieval and execution of access control policies require the coordinated operation of multiple policy libraries and multiple monitors in different systems and different domains. The frequent system and cross-domain transfer process will inevitably cause problems such as low efficiency, incomplete policy retrieval, policy conflicts, inadequate monitoring of policy execution, and difficulty in evaluating access control effects.
  • the related access control scheme only solves the problem of what access authority the access requesting entity has to the resource, and does not restrict the access requesting entity after obtaining the resource access authority.
  • An embodiment of the present invention discloses an information transfer method, including:
  • the first node generates the sending privacy label of the local node of the information; wherein, the sending privacy label of the local node is used to represent extended control of other nodes that receive the information;
  • the first node sends information and the sending privacy tag of the local node.
  • the sending privacy tag of the local node that the first node generates information may include:
  • the first node may generate the sending privacy tag of the local node according to at least one of the following: first scene information and first privacy protection requirements.
  • the sending privacy tag of the local node may include:
  • the first constrained access control condition and the first extended access control condition include the first constrained access control condition, the first extended access control condition and the first privacy protection requirement;
  • the sending privacy tag of the local node of the generated information may include:
  • the first node generates the first constrained access control condition according to at least one of the following: first scene information, first privacy protection requirement;
  • the first node generates the first extended access control condition according to any combination of one or more of the following: first scenario information, first privacy protection requirement, and first restricted access control condition.
  • the first constrained access control condition includes one or more of the following judgment conditions: attributes of a node that is allowed to receive information, attributes of a node that is not allowed to receive information, an environment where a node that is allowed to receive information is located, and permission to receive The environment in which the information node is located; where the condition to be met by the node to receive the information to successfully receive the information is to satisfy the first constrained access control condition; to satisfy the first constrained access control condition is to meet the corresponding judgment condition or not to meet the Analyzing conditions;
  • the surrounding environment may include any combination of one or more of the following: time, spatial location, network, equipment;
  • the first extended access control condition may be used to describe the extended control operation that the node receiving the information can complete after receiving the information and the conditions that need to be met, including: extended control operation, operating condition, extended control operation and operating condition Corresponding relationship; wherein, the operation condition is a condition to be satisfied for performing the extension control operation.
  • the extended control operation includes at least one of the following: arithmetic operation and propagation operation;
  • the arithmetic operation may include any combination of one or more of the following:
  • the propagation operation may include any combination of one or more of the following:
  • the operating conditions may include any combination of one or more of the following:
  • the information sent by the first node and the privacy tag sent by the local node may include:
  • the first node may send the information and the privacy tag sent by the local node to the server;
  • the first node may send the information and the sending privacy tag of the local node to the second node Or it can be forwarded to the second node through the server.
  • the first scene information may include any combination of one or more of the following:
  • the node that generates the information the node that sends the information, the node that receives the information, the node attribute that generates the information, the node attribute that sends the information, the node attribute that receives the information, the environment where the information is generated, the operations performed on the information, the environment where the information is sent, and the information Receiving environment;
  • the first privacy protection requirement may include any combination of one or more of the following:
  • the environment may include any combination of one or more of the following: time, spatial location, network, device.
  • determining whether the second node meets the first constrained access control condition for sending privacy tags of the own node may include:
  • the attribute of the second node conforms to the attribute of the node permitted to receive information in the first restricted access control condition
  • the attribute of the second node does not meet the attribute of the node that is not allowed to receive information in the first restricted access control condition
  • the environment where the second node is located satisfies the environment where the node that is allowed to receive information in the first restricted access control condition is located;
  • the environment where the second node is located does not satisfy the environment where the node that is not allowed to receive information in the first restricted access control condition is located;
  • the second node When the second node satisfies at least one of the following, it is determined that the second node does not satisfy the first constrained access control condition:
  • the attribute of the second node conforms to the attribute of the node that is not allowed to receive information in the first restricted access control condition
  • the attribute of the second node does not meet the attribute of the node that is allowed to receive information in the first restricted access control condition
  • the environment where the second node is located satisfies the environment where the node that is not allowed to receive information in the first restricted access control condition is located;
  • the environment where the second node is located does not satisfy the environment where the node that is allowed to receive information in the first restricted access control condition is located.
  • An embodiment of the present invention discloses an information transfer method, including:
  • the second node receives information from other nodes and the transmission privacy labels of the other nodes of the information; wherein, the transmission privacy labels of the other nodes are used to represent the extended control limits for other nodes that receive the information;
  • the second node When the second node needs to perform an extended control operation on the information, and determines that the second node has the authority to perform the extended control operation on the information according to the privacy tags sent by the other nodes, the second node pairs The information performs the extended control operation.
  • the judging whether the second node has the authority to perform extended control operations on the information according to the privacy tags sent by the other nodes may include:
  • the second extended access control condition in the sent privacy tags of the other nodes; wherein the second extended access control condition is used to describe the extended control operation that the node receiving the information can complete after receiving the information and what needs to be met Conditions, including: extended control operations, operating conditions, correspondence between extended control operations and operating conditions; wherein, the operating conditions are conditions to be fulfilled for performing the extended control operations;
  • the second node When the second node satisfies the operation condition corresponding to the extension control operation that the second node needs to perform in the second extended access control condition, it is determined that the second node has the authority to perform the extension control operation that needs to be performed on the information;
  • the second node does not satisfy the operation condition corresponding to the extension control operation that the second node needs to perform in the second extended access control condition, or the second extended access control condition does not include the extension control operation that the second node needs to perform At that time, it is determined that the second node does not have the authority to perform the required extended control operation on the information.
  • the operating conditions may include any combination of one or more of the following:
  • Determining whether the second node satisfies the operation condition corresponding to the extension control operation required by the second node in the second extended access control condition includes:
  • the second node When the second node satisfies at least one of the following, it is determined that the second node satisfies the second extended access control condition:
  • the attribute of the second node conforms to the attribute of the node that receives the information that allows the extended control operation in the operating conditions corresponding to the extended control operation required by the second node in the second extended access control condition;
  • the attribute of the second node does not comply with the attribute of the node that does not allow the reception of information for the extended control operation among the operating conditions corresponding to the extended control operation that the second node needs to perform in the second extended access control condition;
  • the environment where the second node is located meets the environment where the node that receives the information that allows the extension control operation among the operating conditions corresponding to the extension control operation that the second node needs to perform in the second extended access control condition is located;
  • the environment where the second node is located does not satisfy the environment where the node that receives the information that does not allow the extension control operation among the operation conditions corresponding to the extension control operation that the second node needs to perform in the second extended access control condition is located;
  • the second node When the second node satisfies at least one of the following, it is determined that the second node does not satisfy the second extended access control condition:
  • the attribute of the second node conforms to the attribute of the node that does not allow the receiving information of the extended control operation among the operating conditions corresponding to the extended control operation that the second node needs to perform in the second extended access control condition;
  • the attribute of the second node does not meet the attribute of the node that receives the information that allows the extended control operation among the operating conditions corresponding to the extended control operation that the second node needs to perform in the second extended access control condition;
  • the environment in which the second node is located meets the environment in which the node that does not allow the reception of information in the extension control operation among the operating conditions corresponding to the extension control operation that the second node needs to perform in the second extended access control condition is in the environment;
  • the environment where the second node is located does not satisfy the environment where the node that receives the information that allows the extension control operation among the operation conditions corresponding to the extension control operation that the second node needs to perform in the second extended access control condition is located.
  • the second node performing the extension control operation on the information may include:
  • the second node forwards the information and the privacy tags sent by other nodes to other nodes;
  • the second node generates the sending privacy label of the current node of the information, generates a new sending privacy label of the node according to the sending privacy label of the node and the sending privacy label of other nodes, and converts the information and the new sending privacy label of the node Send to other nodes; wherein, the new sending privacy label of the local node can be used to indicate extended control of other nodes that receive the information.
  • the sending privacy tag of the local node may include any combination of one or more of the following:
  • the generating the third privacy protection effect includes: the second node generating the third privacy protection effect in the sending privacy tag of the local node according to any combination of one or more of the following: the first privacy protection requirement, the extension performed by the second node Control operations, attributes of the second node, and environment in which the second node is located.
  • the extended access effect is determined according to the third privacy protection effect in the sending privacy label of the local node and the second privacy protection requirement in the sending privacy label of other nodes.
  • generating the new sending privacy label of the node based on the sending privacy label of the node and the sending privacy label of other nodes may include: taking the union of the sending privacy label of other nodes and the sending privacy label of the node as the own node New send privacy tag.
  • An embodiment of the present invention discloses an information transfer device, including:
  • the generation module is set to generate the sending privacy label of the local node of the information; wherein, the sending privacy label of the local node is used to indicate extended control of other nodes that receive the information;
  • the sending module is configured to send information and the sending privacy tag of the local node.
  • An embodiment of the present invention discloses an information transfer device, including:
  • the receiving module is configured to receive information from other nodes and send privacy tags of other nodes of the information; wherein, the send privacy tags of other nodes are used to indicate extended control of other nodes that receive the information;
  • the processing module is configured to perform an extended control operation on the information, and determine that the second node has the authority to perform the extended control operation on the information according to the privacy tags sent by the other nodes Perform the extended control operation on the information.
  • processing module may be configured to implement the extended control operation on the information in the following manner:
  • the extended control operation When the extended control operation is forwarding, the information and the privacy tags sent by other nodes can be forwarded to other nodes;
  • the sending privacy label of the local node that generated the information can generate a new sending privacy label of the node based on the sending privacy label of the node and the sending privacy label of other nodes, and send the information and the new sending privacy label of the node to Other nodes; wherein, the new sending privacy tag of the current node can be used to indicate extended control of other nodes that have received the information.
  • the sending privacy tag of the local node may include any combination of one or more of the following:
  • the new sending privacy tag of the local node may include any combination of one or more of the following:
  • the third privacy protection effect is generated according to any combination of one or more of the following: the first privacy protection requirement, the extended control operation performed by the second node, the attributes of the second node, and the environment in which the second node is located.
  • processing module can also be set to:
  • the extended access effect is determined according to the third privacy protection effect in the sending privacy label of the local node and the second privacy protection requirement in the sending privacy label of other nodes.
  • An embodiment of the present invention discloses an information transfer device, including a processor and a computer-readable storage medium.
  • the computer-readable storage medium stores instructions, and when the instructions are executed by the processor, any of the above A method of information flow.
  • An embodiment of the present invention discloses a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, any of the steps of the above information transfer method is implemented.
  • An embodiment of the present invention discloses an information transfer system, including:
  • the first node is set to generate the sending privacy label of the own node of the information; wherein, the sending privacy label of the own node is used to represent the extended control of other nodes receiving the information; sending the information and sending by the own node Privacy label
  • the second node is set to receive information from other nodes and send privacy tags of other nodes of the information; wherein, the send privacy tags of other nodes are used to indicate extended control of other nodes receiving the information; when needed When performing an extension control operation on the information, and judging that the second node has the authority to perform the extension control operation on the information according to the privacy tags sent by the other nodes, perform the extension control operation on the information.
  • the second node may be configured to implement the extended control operation on the information in the following manner:
  • the extended control operation When the extended control operation is forwarding, the information and the privacy tags sent by other nodes can be forwarded to other nodes;
  • the sending privacy label of the local node that generated the information generating a new sending privacy label of the node based on the sending privacy label of the node and the sending privacy labels of other nodes, and sending the information and the new sending privacy label of the node to Other nodes; wherein, the new sending privacy tag of the current node can be used to indicate extended control of other nodes that have received the information.
  • the sending privacy tag of the local node may include any combination of one or more of the following:
  • the new sending privacy tag of the local node may include any combination of one or more of the following:
  • the third privacy protection effect is generated according to any combination of one or more of the following: the first privacy protection requirement, the extended control operation performed by the second node, the attributes of the second node, and the environment in which the second node is located.
  • the second node is also set to:
  • the extended access effect can be determined according to the third privacy protection effect in the sending privacy tag of the local node and the second privacy protection requirement in the sending privacy tag of other nodes.
  • the information transfer method of at least one embodiment of the present application includes: a first node generating information of a sending privacy label of the own node; wherein, the sending privacy label of the own node is used to represent extended control of other nodes that receive the information ; The first node sends information and the send privacy tag of the local node.
  • the information transfer method in at least one embodiment of the present application includes: the second node receives information from other nodes and the privacy tags sent by other nodes; wherein, the privacy tags sent by other nodes are used to indicate the Extension control by other nodes; when the second node needs to perform extension control operations on the information, and it is determined that the second node has the authority to perform extension control operations on the information according to the privacy tags sent by the other nodes , The second node performs the extended control operation on the information.
  • the second node can control the extended control operation of the information based on the privacy tags sent by other nodes.
  • the first node and the second node can be the same system or different systems. It is in the same domain or in different domains. Information can be sent directly between nodes or through one or more servers. Therefore, unified access control for information during random access and flow is realized, especially for unified access control during cross-system and cross-domain random access and flow.
  • FIG. 3 is a schematic diagram of the structural composition of an information transfer device according to an embodiment of the invention.
  • FIG. 4 is a schematic diagram of the structure of an information transfer device according to an embodiment of the invention.
  • FIG. 5 is a schematic structural diagram of an information transfer system according to an embodiment of the present invention.
  • an embodiment of the present application proposes an information transfer method, including:
  • Step 100 The first node generates the sending privacy label of the local node of the information; wherein the sending privacy label of the local node is used to indicate extended control of other nodes that receive the information; the extended control includes controlling whether the information can be received And whether you can operate the information after receiving it.
  • the sending privacy label of the local node that the first node generates information includes:
  • the first node generates a privacy tag of the local node according to at least one of the following information: the first scene information and the first privacy protection requirement.
  • the first scene information includes any combination of one or more of the following:
  • the node that generates the information the node that sends the information, the node that receives the information, the node attribute that generates the information, the node attribute that sends the information, the node attribute that receives the information, the environment where the information is generated, the operations performed on the information, the environment where the information is sent, and the information Receiving environment;
  • the environment for generating information or the environment for sending information or the environment for receiving information includes at least one of the following: time, spatial location, network, and device.
  • the first privacy protection requirement includes any combination of one or more of the following:
  • the environment includes any combination of one or more of the following: time, spatial location, network, and equipment.
  • the attributes include but are not limited to any combination of one or more of the following: identity, role, relationship, address, mobile phone number, ID number, phone number, occupation.
  • the sending privacy tag of this node includes any combination of one or more of the following:
  • the first constrained access control condition, the first extended access control condition, and the first privacy protection requirement are configured to satisfy the first constrained access control condition, the first extended access control condition, and the first privacy protection requirement
  • the first constrained access control condition includes one or more of the following judgment conditions: attributes of nodes that are allowed to receive information, attributes of nodes that are not allowed to receive information, and where nodes that are allowed to receive information are located Environment, the environment in which the node not allowed to receive information is located; where the condition to be satisfied by the node to receive information to successfully receive information is to satisfy the first constrained access control condition; to satisfy the first constrained access control condition is to meet the corresponding judgment condition , Or does not meet the corresponding judgment conditions;
  • the environment in which the node is located includes any combination of one or more of the following: time, spatial location, network, and device.
  • the first extended access control condition is used to describe the extended control operation that the node receiving the information can complete after receiving the information and the conditions that need to be met, including:
  • the extension control operation, the operation condition, the correspondence relationship between the extension control operation and the operation condition, the operation condition is a condition to be satisfied to perform the extension control operation.
  • the extended control operation includes at least one of the following operations: arithmetic operation and propagation operation.
  • arithmetic operations are used to describe the arithmetic operations that information can be performed, including any combination of one or more of the following: read, write, encrypt, obfuscate, generalize, difference, sign, check signature, and calculate Summary.
  • the propagation operation is used to describe the propagation operation that the node receiving the information can perform on the information after obtaining the information access authority, including any combination of one or more of the following:
  • the operating conditions include any combination of one or more of the following: attributes of a node that receives information that allows extension control operations, attributes of a node that receives information that does not allow extension control operations, and extension that allows The environment in which the information receiving node of the control operation is located, and the environment in which the information receiving node that does not allow the extended control operation is located.
  • the node that generates information, the node that sends information, and the node that receives information can belong to nodes in the same domain, or nodes in different domains; they can belong to one system or different systems.
  • the sending privacy label of the local node that the first node generates information includes:
  • the first node generates information according to at least one of the first constrained access control conditions in the sending privacy tag of the node: the first scene information and the first privacy protection requirement;
  • the first node generates information according to any combination of one or more of the following first extended access control conditions in the transmitted privacy tag of the node: first scene information, first privacy protection requirements, and first restricted access control conditions.
  • the target node that is, the node that receives information
  • the first constrained access control condition allows the attributes of the nodes receiving the information and the environment in which they are located.
  • the first scene information and the first privacy protection requirement may be described in natural language and / or in a formal manner, and the formal manner includes but is not limited to any one or more of the following Combination: collection, Extensible Markup Language (XML, Extensible Markup Language).
  • XML Extensible Markup Language
  • the first constrained access control condition and the first extended access control condition may be described in natural language and / or in a formal manner.
  • the first constrained access control condition and the first extended access control condition include but are not limited to any combination including one or more of the following: role-based access control condition, attribute-based access control condition, relationship-based access control condition, mandatory Access control conditions, autonomous access control conditions, etc .;
  • the first constrained access control condition and the first extended access control condition in the sending privacy tag of the local node that generated the information may be generated by manual input or generated according to a pre-designed rule.
  • the pre-designed rules are used to describe the method of generating the first constrained access control condition and the first extended access control condition according to the first scenario information and the first privacy protection requirement, which may be in natural language and / or form Language description.
  • the pre-designed rules may adopt the following methods, but are not limited to the following methods: the set of the first privacy protection requirement and / or the first scene information and the set in the first constrained access control condition may be directly mapped, or mapped through a function, or The first privacy protection requirement and / or the set of the first scene information is directly mapped with the set in the first extended access control condition, or mapped through a function.
  • the attribute of the node that receives the information in the first scene information and the node that allows operation in the first privacy protection requirement are mapped to obtain the attribute of the node that allows the information to be received in the first restricted access control condition, and then the first scene information
  • the attributes of the node receiving the information in the first privacy protection requirement and the node not allowed to operate in the first privacy protection requirement are mapped to obtain the attributes of the node not permitted to receive the information in the first restricted access control condition
  • the The node and the allowed operation environment in the first privacy protection requirement are mapped to obtain the environment in which the node that allows receiving the information in the first constrained access control condition is located, and the node receiving the information in the first scene information and the first privacy protection
  • the environment in which the operation is not allowed in the requirement is mapped to obtain the environment in which the node in the first restricted access control condition is not allowed to receive information.
  • the information receiving node, the information receiving node attribute, the information sending node, the information sending node attribute, the information sending environment, the information receiving environment, and the first privacy protection requirements allowed in the first scene information The operation, the attribute of the node that allows operation, and the environment that allows the operation are mapped to obtain the attribute of the node that receives the information that allows the extension control operation in the operation condition corresponding to the extension control operation in the first extended access control condition, and the extension control operation is allowed.
  • the environment of the information receiving node in the first scene information is the information receiving node, the receiving information node attribute, the sending information node, the sending information node attribute, the information sending environment, the information receiving environment and the first
  • the operations that are not allowed in the privacy protection requirements, the node attributes that are not allowed to operate, and the environment that are not allowed to operate are mapped to obtain the extension control operation in the first extended access control condition that corresponds to the operation condition that does not allow the extension control operation to be received
  • the attributes of the information node and the extension are not allowed Environment in which the node receives the operation control information.
  • the sending privacy label of the information node corresponds to the information.
  • the sending privacy label of the information generated by different information may be the same or different.
  • the same information may generate one or more information sending privacy labels of the node.
  • Step 101 The first node sends information and the local node sends a privacy tag.
  • the first node sends the information and the privacy tag of the local node to the server;
  • the information and the sending privacy tag of the local node are sent to the second node or forwarded by the server To the second node; when it is determined that the second node does not satisfy the first constrained access control condition in the sending privacy tag of the node, the information and the sending privacy tag of the node are not sent to the second node.
  • the information and the privacy tag sent by the local node may be sent to the second node or the server at the same time, or may be sent separately. This embodiment does not limit the sending method.
  • determining whether the second node meets the first constrained access control condition includes:
  • the attribute of the second node conforms to the attribute of the node permitted to receive information in the first restricted access control condition
  • the attribute of the second node does not meet the attribute of the node that is not allowed to receive information in the first restricted access control condition
  • the environment where the second node is located satisfies the environment where the node that is allowed to receive information in the first restricted access control condition is located;
  • the environment where the second node is located does not satisfy the environment where the node that is not allowed to receive information in the first restricted access control condition is located.
  • the second node When the second node satisfies at least one of the following, it is determined that the second node does not satisfy the first constrained access control condition:
  • the attribute of the second node conforms to the attribute of the node that is not allowed to receive information in the first restricted access control condition
  • the attribute of the second node does not meet the attribute of the node that is allowed to receive information in the first restricted access control condition
  • the environment where the second node is located satisfies the environment where the node that is not allowed to receive information in the first restricted access control condition is located;
  • the environment where the second node is located does not satisfy the environment where the node that is allowed to receive information in the first restricted access control condition is located.
  • determining whether the attribute of the second node meets the attribute of the node permitted to receive information in the first restricted access control condition includes:
  • the attribute requirement of the node that allows receiving information in the restricted access control condition and the node relationship that generates the information is a friend relationship
  • determining whether the environment where the second node is located satisfies the environment where the node that is allowed to receive information in the first restricted access control condition includes:
  • determining whether the attributes of the second node meet the attributes of the node that is not allowed to receive information in the first constrained access control condition includes:
  • the attribute requirement of the node that does not allow receiving information in the restricted access control condition and the node relationship that generates the information is a friend relationship, it is determined whether the attribute of the second node is a friend relationship with the node that generates the information.
  • determining whether the environment where the second node is located satisfies the environment where the node is not allowed to receive information in the first restricted access control condition includes:
  • FIG. 2 another embodiment of the present application proposes an information transfer method, including:
  • Step 200 The second node receives information from other nodes and the transmission privacy tags of the other nodes of the information; wherein the transmission privacy tags of other nodes are used to indicate extended control of other nodes that receive the information
  • the privacy tags sent by other nodes include: a second constrained access control condition, a second extended access control condition, and a second privacy protection requirement.
  • the second node When the second node receives the information of the first node and sends the privacy tag, the second constrained access control condition, the second extended access control condition, the second privacy protection requirement and the first constrained access control condition, the first The extended access control conditions and the first privacy protection requirements are the same, and will not be repeated here.
  • the second node When the second node receives information from other nodes than the first node and sends a privacy tag, the second constrained access control condition, the second extended access control condition, the second privacy protection requirement and the first constraint of the foregoing embodiment
  • the access control conditions, the first extended access control conditions, and the first privacy protection requirements may be the same or different.
  • Step 201 When the second node needs to perform an extended control operation on the information and determines that the second node has the authority to perform the extended control operation on the information according to the transmitted privacy tag, the second node pairs The information performs the extended control operation.
  • the second node when it is determined that the second node does not have the authority to perform the extended control operation on the information according to the privacy tags sent by other nodes, the second node does not perform the extended control operation on the information.
  • determining whether the second node has the authority to perform extended control operations on the information according to the privacy tags sent by other nodes includes:
  • the second extended access control condition is used to describe the extended control operation that the node receiving the information can complete after receiving the information and the conditions that need to be met, including: extended control operation, operating conditions, extended Correspondence between control operations and operating conditions;
  • the operating condition is a condition to be satisfied for performing the extended control operation
  • the second node When the second node satisfies the operation condition corresponding to the extension control operation that the second node needs to perform in the second extended access control condition, it is determined that the second node has the authority to perform the extension control operation that needs to be performed on the information;
  • the second node When the second node does not satisfy the operation condition corresponding to the extension control operation performed in the second extended access control condition, or the second extended access control condition does not include the extension control operation that the second node needs to perform, determine the first The two nodes do not have the authority to perform the extended control operations required for the information.
  • the operating conditions include any combination of one or more of the following: the attributes of the node that allows the extension control operation to receive information, the attributes of the node that does not allow the extension control operation to receive information, the permission to perform the extension control operation The environment in which the node is located, the environment in which the node that does not allow extended control operations to receive information.
  • determining whether the second node satisfies the extended control operation required by the second node in the second extended access control condition includes:
  • the attribute of the second node conforms to the attribute of the node that receives the information that allows the extended control operation in the operating conditions corresponding to the extended control operation required by the second node in the second extended access control condition;
  • the attribute of the second node does not comply with the attribute of the node that does not allow the reception of information for the extended control operation among the operating conditions corresponding to the extended control operation that the second node needs to perform in the second extended access control condition;
  • the environment where the second node is located meets the environment where the node that receives the information that allows the extension control operation among the operating conditions corresponding to the extension control operation that the second node needs to perform in the second extended access control condition is located;
  • the attribute of the second node does not satisfy the environment in which the node that does not allow the receiving of the extension control operation among the operation conditions corresponding to the extension control operation that the second node needs to perform in the second extended access control condition is located.
  • the attribute of the second node conforms to the attribute of the node that does not allow the receiving information of the extended control operation among the operating conditions corresponding to the extended control operation that the second node needs to perform in the second extended access control condition;
  • the attribute of the second node does not meet the attribute of the node that receives the information that allows the extended control operation among the operating conditions corresponding to the extended control operation that the second node needs to perform in the second extended access control condition;
  • the environment in which the second node is located meets the environment in which the node that does not allow the reception of information in the extension control operation among the operating conditions corresponding to the extension control operation that the second node needs to perform in the second extended access control condition is in the environment;
  • the environment where the second node is located does not satisfy the environment where the node that receives the information that allows the extension control operation among the operation conditions corresponding to the extension control operation that the second node needs to perform in the second extended access control condition is located.
  • the extended control operation includes at least one of the following operations: arithmetic operation and propagation operation.
  • arithmetic operations are used to describe the arithmetic operations that information can be performed, including any combination of one or more of the following: read, write, encrypt, obfuscate, generalize, difference, sign, check signature, and calculate Summary.
  • the propagation operation is used to describe the propagation operation that the node receiving the information can perform on the information after obtaining the information access authority, including any combination of one or more of the following:
  • the second node performing the extension control operation on the information includes:
  • the second node forwards the information and the privacy tags sent by other nodes to other nodes;
  • the second node generates the sending privacy label of the current node of the information, generates a new sending privacy label of the node according to the sending privacy label of the node and the sending privacy label of other nodes, and converts the information and the new sending privacy label of the node Send to other nodes; wherein, the new sending privacy label of the local node is used to represent extended control of other nodes that receive the information.
  • the new sending privacy tag of this node includes any combination of one or more of the following:
  • the fourth constrained access control condition is used to describe the condition that the next node receiving information needs to meet to receive information, including any combination of one or more of the following:
  • Attributes of nodes that are allowed to receive information attributes of nodes that are not allowed to receive information, environments where nodes are allowed to receive information, environments where nodes are not allowed to receive information;
  • the environment in which the node is located includes any combination of one or more of the following: time, spatial location, network, and device.
  • the fourth extended access control condition is used to describe the extended control operation that the next node receiving information can complete after receiving the information and the conditions that need to be met, including:
  • An extension control operation an operation condition, a correspondence relationship between an extension control operation and an operation condition; wherein, the operation condition is a condition to be satisfied for performing the extension control operation.
  • the extended control operation includes at least one of the following operations: arithmetic operation and propagation operation.
  • arithmetic operations are used to describe the arithmetic operations that information can be performed, including any combination of one or more of the following: read, write, encrypt, obfuscate, generalize, difference, sign, check signature, and calculate Summary.
  • the propagation operation is used to describe the propagation operation that the node receiving the information can perform on the information after obtaining the information access authority, including any combination of one or more of the following:
  • the operating conditions include any combination of one or more of the following: attributes of a node that receives information that allows extension control operations, attributes of a node that receives information that does not allow extension control operations, and extension that allows The environment in which the information receiving node of the control operation is located, and the environment in which the information receiving node that does not allow the extended control operation is located.
  • the sending privacy tag of this node includes any combination of one or more of the following:
  • the second node generates the third constrained access control condition according to at least one of the following: third scene information and third privacy protection requirements;
  • the second node generates the third extended access control condition according to any combination of one or more of the following: third scenario information, a third privacy protection requirement, and a third restricted access control condition;
  • the second node generates the third privacy protection effect according to any combination of one or more of the following: a third privacy protection requirement, an extended control operation performed by the second node, attributes of the second node, and a second node environment.
  • the third constrained access control condition is used to describe the condition that the next node needs to meet to receive information, including any combination of one or more of the following:
  • Attributes of nodes that are allowed to receive information attributes of nodes that are not allowed to receive information, environments where nodes are allowed to receive information, environments where nodes are not allowed to receive information;
  • the environment in which the node is located includes any combination of one or more of the following: time, spatial location, network, and device.
  • the third extended access control condition is used to describe the extended control operation that the next receiving information node can complete after receiving the information and the conditions that need to be met, including:
  • An extension control operation an operation condition, a correspondence relationship between an extension control operation and an operation condition; wherein, the operation condition is a condition to be satisfied for performing the extension control operation.
  • the extended control operation includes at least one of the following operations: arithmetic operation and propagation operation.
  • arithmetic operations are used to describe the arithmetic operations that information can be performed, including any combination of one or more of the following: read, write, encrypt, obfuscate, generalize, difference, sign, check signature, and calculate Summary.
  • the propagation operation is used to describe the propagation operation that the node receiving the information can perform on the information after obtaining the information access authority, including any combination of one or more of the following:
  • the operating conditions include any combination of one or more of the following: attributes of a node that receives information that allows extension control operations, attributes of a node that receives information that does not allow extension control operations, and extension that allows The environment in which the information receiving node of the control operation is located, and the environment in which the information receiving node that does not allow the extended control operation is located.
  • generating a new transmission privacy label of the node based on the transmission privacy labels of other nodes and the transmission privacy labels of the node includes: union of the transmission privacy labels of other nodes and the transmission privacy labels of the node As the new sending privacy label of this node.
  • the union of the second constrained access control condition and the third constrained access control condition is taken as the fourth constrained access control condition, and the other parameters can be deduced by analogy, which will not be repeated here.
  • the method further includes:
  • the second node generates a third privacy protection effect according to any combination of one or more of the following: the first privacy protection requirement, the extended control operation performed by the second node, the attributes of the second node, and the environment where the second node is located
  • the extended access effect is judged according to the third privacy protection effect in the sending privacy tag of this node and the second privacy protection requirement in the sending privacy tag of other nodes. Among them, you can use qualitative or quantitative methods to determine the effect of extended access.
  • the said privacy protection effect represents the protection effect achieved after privacy protection of information, that is, the privacy measurement function is called for the information before and after privacy protection, and the value obtained by the difference between the two calls to the privacy measurement function is the privacy Protection effect.
  • the privacy metric function may use methods such as conditional entropy, mutual information, privacy metrics for time series data, and the concept of difference to measure privacy information.
  • the evaluation of privacy effects mainly includes the availability of information after protection, the irreversibility of privacy protection, and the reversibility in a controlled environment.
  • the availability of private information refers to the impact of new information on the system function or performance of the private information after the privacy protection algorithm.
  • the irreversibility of privacy protection means that the third party or attacker cannot infer the original information from the privacy protection algorithm and information obtained by the third party or attacker.
  • Reversibility in a controlled environment means that a third party can restore all or part of the privacy-protected information when certain information is known.
  • the privacy metrics include but are not limited to include conditional entropy and mutual information for privacy metrics, obfuscation-based privacy protection schemes for privacy metrics, and differential concepts for privacy metrics.
  • the qualitative method directly gives whether the extended access effect is good or bad.
  • the second node satisfies the operating condition corresponding to the extended control operation in the first extended access control condition, the corresponding extended control operation is performed , The effect of extended access control is better; when the second node does not meet the operating conditions corresponding to the extended control operation in the first extended access control condition, the corresponding extended control operation is performed, or the privacy tag of other nodes is sent.
  • the extended control operation is not included in the second extended access control condition, the effect of the extended access control is not good.
  • a quantitative method uses an access control effect evaluation function to calculate an extended access control effect value.
  • the function is not used to limit the protection scope of the embodiment of the present invention, and details are not described here.
  • the second node may generate a privacy protection effect according to any combination of one or more of the first privacy protection requirements, the extended control operations performed by the second node, the attributes of the second node, and the environment in which the second node is located
  • the function generates the third privacy protection effect.
  • the function is not used to limit the protection scope of the embodiment of the present invention, and details are not described here.
  • the second node is used to control the extended control operation of the information based on the privacy tags sent by other nodes.
  • the first node and the second node may be the same system or different systems. It is in the same domain or in different domains.
  • Information can be sent directly between nodes or through one or more servers. Therefore, unified access control for information during random access and flow is realized, especially for unified access control during cross-system and cross-domain random access and flow.
  • an information transfer device (such as a first node), including:
  • the generation module 301 is set to generate a transmission privacy label of the local node of the information; wherein, the transmission privacy label of the local node is used to represent extended control of other nodes that receive the information;
  • the sending module 302 is configured to send information and the sending privacy tag of the local node.
  • the generation module 301 is set to:
  • the sending privacy tag of the local node that generates information according to at least one of the following: first scene information, first privacy protection requirement.
  • the first scene information includes any combination of one or more of the following:
  • the node that generates the information the node that sends the information, the node that receives the information, the node attribute that generates the information, the node attribute that sends the information, the node attribute that receives the information, the environment where the information is generated, the operations performed on the information, the environment where the information is sent, and the information Receiving environment;
  • the environment for generating information or the environment for sending information or the environment for receiving information includes any combination of one or more of the following: time, spatial location, network, and device.
  • the first privacy protection requirement includes any combination of one or more of the following:
  • the environment includes any combination of one or more of the following: time, spatial location, network, and equipment.
  • the attributes include but are not limited to any combination of one or more of the following: identity, role, relationship, address, mobile phone number, ID number, phone number, occupation.
  • the sending privacy tag of this node includes any combination of one or more of the following:
  • the first constrained access control condition, the first extended access control condition, and the first privacy protection requirement are configured to satisfy the first constrained access control condition, the first extended access control condition, and the first privacy protection requirement
  • the first constrained access control condition includes one or more of the following judgment conditions: attributes of nodes that are allowed to receive information, attributes of nodes that are not allowed to receive information, and where nodes that are allowed to receive information are located Environment, the environment in which the node not allowed to receive information is located; where the condition to be satisfied by the node to receive information to successfully receive information is to satisfy the first constrained access control condition; to satisfy the first constrained access control condition is to meet the corresponding judgment condition , Or does not meet the corresponding judgment conditions;
  • the environment in which the node is located includes any combination of one or more of the following: time, spatial location, network, and device.
  • the first extended access control condition is used to describe the extended control operation that the node receiving the information can complete after receiving the information and the conditions that need to be met, including:
  • the extension control operation, the operation condition, the correspondence relationship between the extension control operation and the operation condition, the operation condition is a condition to be satisfied to perform the extension control operation.
  • the extended control operation includes at least one of the following operations: arithmetic operation and propagation operation.
  • arithmetic operations are used to describe the arithmetic operations that information can be performed, including any combination of one or more of the following: read, write, encrypt, obfuscate, generalize, difference, sign, check signature, and calculate Summary.
  • the propagation operation is used to describe the propagation operation that the node receiving the information can perform on the information after obtaining the information access authority, including any combination of one or more of the following:
  • the operating conditions include any combination of one or more of the following: attributes of a node that receives information that allows extension control operations, attributes of a node that receives information that does not allow extension control operations, and extension that allows The environment in which the information receiving node of the control operation is located, and the environment in which the information receiving node that does not allow the extended control operation is located.
  • the node that generates information, the node that sends information, and the node that receives information can belong to nodes in the same domain, or nodes in different domains; they can belong to one system, or they can belong to different systems.
  • Information can be sent directly between nodes or through one or more servers.
  • the generation module 301 is set to:
  • the first extended access control condition in the sent privacy tag of the node is generated according to any combination of one or more of the following: first scene information, first privacy protection requirement, and first constrained access control condition.
  • the first scene information and the first privacy protection requirement may be described in natural language and / or in a formal manner, and the formal manner includes but is not limited to any one or more of the following Combination: collection, Extensible Markup Language (XML, Extensible Markup Language).
  • XML Extensible Markup Language
  • the first constrained access control condition and the first extended access control condition may be described in natural language and / or in a formal manner.
  • the first constrained access control condition and the first extended access control condition include but are not limited to any combination including one or more of the following: role-based access control condition, attribute-based access control condition, relationship-based access control condition, mandatory Access control conditions, autonomous access control conditions, etc .;
  • the first constrained access control condition and the first extended access control condition in the sending privacy tag of the local node that generated the information may be generated by manual input or generated according to a pre-designed rule.
  • the pre-designed rules are used to describe the method of generating the first constrained access control condition and the first extended access control condition according to the first scene information and the first privacy protection requirement, which may use natural language and / or Formal language description.
  • the pre-designed rules may adopt the following methods, but are not limited to the following methods: the set of the first privacy protection requirement and / or the first scene information and the set in the first constrained access control condition may be directly mapped, or mapped through a function, or The first privacy protection requirement and / or the set of the first scene information is directly mapped with the set in the first extended access control condition, or mapped through a function.
  • the attribute of the node that receives the information in the first scene information and the node that allows operation in the first privacy protection requirement are mapped to obtain the attribute of the node that allows the information to be received in the first restricted access control condition, and then the first scene information
  • the attributes of the node receiving the information in the first privacy protection requirement and the node not allowed to operate in the first privacy protection requirement are mapped to obtain the attributes of the node not permitted to receive the information in the first restricted access control condition
  • the The node and the allowed operation environment in the first privacy protection requirement are mapped to obtain the environment in which the node that allows receiving the information in the first constrained access control condition is located, and the node receiving the information in the first scene information and the first privacy protection
  • the environment in which the operation is not allowed in the requirement is mapped to obtain the environment in which the node in the first restricted access control condition is not allowed to receive information.
  • the information receiving node, the information receiving node attribute, the information sending node, the information sending node attribute, the information sending environment, the information receiving environment, and the first privacy protection requirements allowed in the first scene information The operation, the attribute of the node that allows operation, and the environment that allows the operation are mapped to obtain the attribute of the node that receives the information that allows the extension control operation in the operation condition corresponding to the extension control operation in the first extended access control condition, and the extension control operation is allowed.
  • the environment of the information receiving node in the first scene information is the information receiving node, the receiving information node attribute, the sending information node, the sending information node attribute, the information sending environment, the information receiving environment and the first
  • the operations that are not allowed in the privacy protection requirements, the node attributes that are not allowed to operate, and the environment that are not allowed to operate are mapped to obtain the extension control operation in the first extended access control condition that corresponds to the operation condition that does not allow the extension control operation to be received
  • the attributes of the information node and the extension are not allowed The environment in which the node that receives the information in the control operation is located.
  • the sending module 302 is configured to:
  • the information and the sending privacy tag of the local node are sent to the second node or forwarded by the server To the second node; when it is determined that the second node does not satisfy the first constrained access control condition in the sending privacy tag of the node, the information and the sending privacy tag of the node are not sent to the second node.
  • the sending module 302 may simultaneously send the information and the sending privacy tag of the local node to the second node, or may send them separately.
  • the sending mode is not limited.
  • the sending module 302 is configured to implement the following manner to determine whether the second node meets the first constrained access control condition:
  • the attributes of the second node whose attributes meet the permission of receiving information in the first restricted access control condition include:
  • the attribute of the second node does not meet the attribute of the node that is not allowed to receive information in the first restricted access control condition
  • the environment in which the environment of the second node satisfies the node that is allowed to receive information in the first restricted access control condition includes:
  • the environment where the second node is located does not satisfy the environment where the node that is not allowed to receive information in the first restricted access control condition is located.
  • the second node When the second node satisfies at least one of the following, it is determined that the second node does not satisfy the first constrained access control condition:
  • the attribute of the second node conforms to the attribute of the node that is not allowed to receive information in the first restricted access control condition
  • the attribute of the second node does not meet the attribute of the node that is allowed to receive information in the first restricted access control condition
  • the environment where the second node is located satisfies the environment where the node that is not allowed to receive information in the first restricted access control condition is located;
  • the environment where the second node is located does not satisfy the environment where the node that is allowed to receive information in the first restricted access control condition is located.
  • the implementation process of the information transfer device in this embodiment is the same as the implementation process of the information transfer method in the foregoing embodiment, and details are not described herein again.
  • an information transfer device (such as a second node), including:
  • the receiving module 401 is configured to receive information from other nodes and send privacy tags of other nodes of the information; wherein, the send privacy tags of the other nodes are used to represent extended control of other nodes that receive the information;
  • the processing module 402 is configured to, when the second node needs to perform an extended control operation on the information, and determine that the second node has the authority to perform the extended control operation on the information according to the privacy tags sent by the other nodes, The second node performs the extended control operation on the information.
  • the privacy tags sent by other nodes include: a second constrained access control condition, a second extended access control condition, and a second privacy protection requirement.
  • the second node When the second node receives the information of the first node and sends the privacy tag, the second constrained access control condition, the second extended access control condition, the second privacy protection requirement and the first constrained access control condition, the first The extended access control conditions and the first privacy protection requirements are the same, and will not be repeated here.
  • the second node When the second node receives information from other nodes than the first node and sends a privacy tag, the second constrained access control condition, the second extended access control condition, the second privacy protection requirement and the first constraint of the foregoing embodiment
  • the access control conditions, the first extended access control conditions, and the first privacy protection requirements may be the same or different.
  • processing module 402 is further configured to:
  • the second node When it is determined that the second node does not have the authority to perform the extended control operation on the information according to the transmission privacy tags of other nodes, the second node does not perform the extended control operation on the information.
  • the processing module 402 is configured to implement the following manner to determine whether the second node has the authority to perform extended control operations on the information according to the privacy tags sent by other nodes:
  • the second extended access control condition in the sending privacy tag; wherein the second extended access control condition is used to describe the extended control operation and the conditions that need to be met after the node receiving the information receives the information, including : Correspondence between extended control operations, operating conditions, extended control operations and operating conditions; where the operating conditions are the conditions to be fulfilled for performing the extended control operations;
  • the second node When the second node satisfies the operation condition corresponding to the extension control operation that the second node needs to perform in the second extended access control condition, it is determined that the second node has the authority to perform the extension control operation that needs to be performed on the information;
  • the second node When the second node does not satisfy the operation condition corresponding to the extension control operation performed in the second extended access control condition, or the second extended access control condition does not include the extension control operation that the second node needs to perform, determine the first The two nodes do not have the authority to perform the extended control operations required for the information.
  • the operating conditions include any combination of one or more of the following: attributes of a node that receives information that allows extension control operations, attributes of a node that receives information that does not allow extension control operations, and extension that allows The environment in which the information receiving node of the control operation is located, and the environment in which the information receiving node that does not allow the extended control operation is located.
  • the processing module 402 is configured to implement the following manner to determine whether the second node meets the operation condition corresponding to the extension control operation required by the second node in the second extended access control condition:
  • the attribute of the second node conforms to the attribute of the node that receives the information that allows the extended control operation in the operating conditions corresponding to the extended control operation required by the second node in the second extended access control condition;
  • the attribute of the second node does not comply with the attribute of the node that does not allow the reception of information for the extended control operation among the operating conditions corresponding to the extended control operation that the second node needs to perform in the second extended access control condition;
  • the environment where the second node is located meets the environment where the node that receives the information that allows the extension control operation among the operating conditions corresponding to the extension control operation that the second node needs to perform in the second extended access control condition is located;
  • the environment in which the second node is located does not satisfy the environment in which the node that receives the information that does not allow the extension control operation among the operation conditions corresponding to the extension control operation that the second node needs to perform in the second extended access control condition is in .
  • the second node When the second node satisfies at least one of the following, it is determined that the second node does not satisfy the second extended access control condition:
  • the attribute of the second node conforms to the attribute of the node that does not allow the receiving information of the extended control operation among the operating conditions corresponding to the extended control operation that the second node needs to perform in the second extended access control condition;
  • the attribute of the second node does not meet the attribute of the node that receives the information that allows the extended control operation among the operating conditions corresponding to the extended control operation that the second node needs to perform in the second extended access control condition;
  • the environment in which the second node is located meets the environment in which the node that does not allow the reception of information in the extension control operation among the operating conditions corresponding to the extension control operation that the second node needs to perform in the second extended access control condition is in the environment;
  • the environment of the second node does not satisfy the environment of the node that receives the information that allows the extension control operation among the operation conditions corresponding to the extension control operation that the second node needs to perform in the second extended access control condition.
  • the extended control operation includes at least one of the following operations: arithmetic operation and propagation operation.
  • arithmetic operations are used to describe the arithmetic operations that information can be performed, including any combination of one or more of the following: read, write, encrypt, obfuscate, generalize, difference, sign, check signature, and calculate Summary.
  • the propagation operation is used to describe the propagation operation that the node receiving the information can perform on the information after obtaining the information access authority, including any combination of one or more of the following:
  • the processing module 402 is configured to implement the extension control operation on the information in the following manner:
  • the sending privacy label of the local node that generated the information generating a new sending privacy label of the node based on the sending privacy label of the node and sending privacy labels of other nodes, and sending the information and the new sending privacy label of the node to other Node; wherein, the new sending privacy label of the current node is used to represent the extended control of other nodes receiving the information.
  • the new sending privacy label of the node includes any combination of one or more of the following:
  • the fourth constrained access control condition is used to describe the condition that the next node receiving information needs to meet to receive information, including any combination of one or more of the following:
  • Attributes of nodes that are allowed to receive information attributes of nodes that are not allowed to receive information, environments where nodes are allowed to receive information, environments where nodes are not allowed to receive information;
  • the environment in which the node is located includes any combination of one or more of the following: time, spatial location, network, and device.
  • the fourth extended access control condition is used to describe the extended control operation that the next node receiving the information can complete after receiving the information and the conditions that need to be met, including:
  • An extension control operation an operation condition, a correspondence relationship between an extension control operation and an operation condition; wherein, the operation condition is a condition to be satisfied for performing the extension control operation.
  • the extended control operation includes at least one of the following operations: arithmetic operation and propagation operation.
  • arithmetic operations are used to describe the arithmetic operations that information can be performed, including any combination of one or more of the following: read, write, encrypt, obfuscate, generalize, difference, sign, check signature, and calculate Summary.
  • the propagation operation is used to describe the propagation operation that the node receiving the information can perform on the information after obtaining the information access authority, including any combination of one or more of the following:
  • the operating conditions include any combination of one or more of the following: attributes of a node that receives information that allows extension control operations, attributes of a node that receives information that does not allow extension control operations, and extension that allows The environment in which the information receiving node of the control operation is located, and the environment in which the information receiving node that does not allow the extended control operation is located.
  • the sending privacy tag of this node includes any combination of one or more of the following:
  • the third restricted access control condition the third extended access control condition, the second privacy protection requirement, and the third privacy protection effect;
  • the second node generates the third constrained access control condition according to at least one of the following: third scene information and third privacy protection requirements;
  • the second node generates the third extended access control condition according to any combination of one or more of the following: third scenario information, a third privacy protection requirement, and a third restricted access control condition;
  • the second node generates the third privacy protection effect according to any combination of one or more of the following: a third privacy protection requirement, an extended control operation performed by the second node, attributes of the second node, and a second node environment.
  • the third constrained access control condition is used to describe the condition that the next node receiving information needs to meet to receive information, including any combination of one or more of the following:
  • Attributes of nodes that are allowed to receive information attributes of nodes that are not allowed to receive information, environments where nodes are allowed to receive information, environments where nodes are not allowed to receive information;
  • the environment in which the node is located includes any combination of one or more of the following: time, spatial location, network, and device.
  • the third extended access control condition is used to describe the extended control operation that the next node receiving the information can complete after receiving the information and the conditions that need to be met, including:
  • An extension control operation an operation condition, a correspondence relationship between an extension control operation and an operation condition; wherein, the operation condition is a condition to be satisfied for performing the extension control operation.
  • the extended control operation includes at least one of the following operations: arithmetic operation and propagation operation.
  • arithmetic operations are used to describe the arithmetic operations that information can be performed, including any combination of one or more of the following: read, write, encrypt, obfuscate, generalize, difference, sign, check signature, and calculate Summary.
  • the dissemination operation is used to describe the dissemination operation that the next node receiving information can perform on the information after obtaining the information access authority, including any combination of one or more of the following:
  • the operating conditions include any combination of one or more of the following: attributes of a node that receives information that allows extension control operations, attributes of a node that receives information that does not allow extension control operations, and extension that allows The environment in which the information receiving node of the control operation is located, and the environment in which the information receiving node that does not allow the extended control operation is located.
  • the processing module 402 is configured to generate a new transmission privacy label of the node based on the transmission privacy labels of other nodes and the transmission privacy labels of the node by: The union of the node's sending privacy tags serves as the node's new sending privacy tag.
  • the union of the second constrained access control condition and the third constrained access control condition is taken as the fourth constrained access control condition, and the other parameters can be deduced by analogy.
  • processing module 402 is further configured to:
  • the third privacy protection effect is generated according to any combination of one or more of the following: the first privacy protection requirement, the extended control operation performed by the second node, the attributes of the second node, and the environment in which the second node is located;
  • the third privacy protection effect in the sending privacy tag and the second privacy protection requirement in the sending privacy tag of other nodes determine the extended access effect.
  • the said privacy protection effect represents the protection effect achieved after privacy protection of information, that is, the privacy measurement function is called for the information before and after privacy protection, and the value obtained by the difference between the two calls to the privacy measurement function is the privacy Protection effect.
  • the privacy metric function may use methods such as conditional entropy, mutual information, privacy metrics for time series data, and the concept of difference to measure privacy information.
  • the evaluation of privacy effects mainly includes the availability of information after protection, the irreversibility of privacy protection, and the reversibility in a controlled environment.
  • the availability of private information refers to the impact of new information on the system function or performance of the private information after the privacy protection algorithm.
  • the irreversibility of privacy protection means that the third party or attacker cannot infer the original information from the privacy protection algorithm and information obtained by the third party or attacker.
  • Reversibility in a controlled environment means that a third party can restore all or part of the privacy-protected information when certain information is known.
  • the privacy metrics include but are not limited to include conditional entropy and mutual information for privacy metrics, obfuscation-based privacy protection schemes for privacy metrics, and differential concepts for privacy metrics.
  • a qualitative or quantitative method may be used to determine the effect of extended access.
  • the qualitative method directly gives whether the extended access effect is good or bad.
  • the second node satisfies the operating condition corresponding to the extended control operation in the first extended access control condition, the corresponding extended control operation is performed , The effect of extended access control is better; when the second node does not meet the operating conditions corresponding to the extended control operation in the first extended access control condition, the corresponding extended control operation is performed, or the privacy tag of other nodes is sent.
  • the extended control operation is not included in the second extended access control condition, the effect of the extended access control is not good.
  • the quantitative method uses the access control effect evaluation function to calculate the extended access control effect value.
  • the function is not used to limit the protection scope of the embodiment of the present invention, and details are not described here.
  • the second node may generate a privacy protection effect according to any combination of one or more of the first privacy protection requirements, the extended control operations performed by the second node, the attributes of the second node, and the environment in which the second node is located
  • the function generates the third privacy protection effect.
  • the function is not used to limit the protection scope of the embodiment of the present invention, and details are not described here.
  • the embodiment of the present invention controls the extension control operation of information by the second node based on the privacy tags sent by other nodes.
  • the first node and the second node may be the same system or different systems, and may be in the same domain. It can also be in different domains, and the information can be sent directly between nodes or through one or more servers. Therefore, unified access control for information during random access and flow is realized, especially for unified access control during cross-system and cross-domain random access and flow.
  • the implementation process of the information transfer device in the embodiment of the present invention is the same as the implementation process of the information transfer method in the foregoing embodiment, and details are not described herein again.
  • Another embodiment of the present application provides an information transfer device, including a processor and a computer-readable storage medium, where the computer-readable storage medium stores instructions, which are implemented when the instructions are executed by the processor Any kind of information transfer method.
  • Another embodiment of the present application provides a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, the steps of any one of the above information transfer methods are implemented.
  • FIG. 5 another embodiment of the present application provides an information transfer system, including:
  • the first node 501 is set to the sending privacy label of the own node that generates the information; wherein, the sending privacy label of the own node is used to indicate extended control of other nodes that receive the information; sending information and the sending privacy of the own node label;
  • the second node 502 is configured to receive the information sent by other nodes and the transmission privacy tags of the other nodes of the information; wherein, the transmission privacy tags of other nodes are used to represent the extended control of the other nodes receiving the information ;
  • the second node needs to perform an extended control operation on the information, and determines that the second node has the authority to perform the extended control operation on the information according to the privacy tags sent by the other nodes, the second node Perform the extended control operation on the information.
  • the first node 501 is configured to implement the sending of the privacy tag of the local node that generates information in the following manner:
  • the sending privacy tag of the local node that generates information according to at least one of the following: first scene information, first privacy protection requirement.
  • the first scene information includes any combination of one or more of the following:
  • the node that generates the information the node that sends the information, the node that receives the information, the node attribute that generates the information, the node attribute that sends the information, the node attribute that receives the information, the environment where the information is generated, the operations performed on the information, the environment where the information is sent, and the information Receiving environment;
  • the environment for generating information or the environment for sending information or the environment for receiving information includes any combination of one or more of the following: time, spatial location, network, and device.
  • the first privacy protection requirement includes any combination of one or more of the following:
  • the environment includes any combination of one or more of the following: time, spatial location, network, and equipment.
  • the attributes include but are not limited to any combination of one or more of the following: identity, role, relationship, address, mobile phone number, ID number, phone number, occupation.
  • the sending privacy tag of this node includes any combination of one or more of the following:
  • the first constrained access control condition, the first extended access control condition, and the first privacy protection requirement are configured to satisfy the first constrained access control condition, the first extended access control condition, and the first privacy protection requirement
  • the first constrained access control condition includes one or more of the following judgment conditions: attributes of nodes that are allowed to receive information, attributes of nodes that are not allowed to receive information, and where nodes that are allowed to receive information are located Environment, the environment in which the node not allowed to receive information is located; where the condition to be satisfied by the node to receive information to successfully receive information is to satisfy the first constrained access control condition; to satisfy the first constrained access control condition is to meet the corresponding judgment condition , Or does not meet the corresponding judgment conditions.
  • the environment in which the node is located includes any combination of one or more of the following: time, spatial location, network, and device.
  • the first extended access control condition is used to describe the extended control operation that the node receiving the information can complete after receiving the information and the conditions that need to be met, including any combination of one or more of the following:
  • the extension control operation, the operation condition, the correspondence relationship between the extension control operation and the operation condition, the operation condition is a condition to be satisfied to perform the extension control operation.
  • the extended control operation includes at least one of the following operations: arithmetic operation and propagation operation.
  • arithmetic operations are used to describe the arithmetic operations that information can be performed, including any combination of one or more of the following: read, write, encrypt, obfuscate, generalize, difference, sign, check signature, and calculate Summary.
  • the propagation operation is used to describe the propagation operation that the node receiving the information can perform on the information after obtaining the information access authority, including any combination of one or more of the following:
  • the operating conditions include any combination of one or more of the following: attributes of a node that receives information that allows extension control operations, attributes of a node that receives information that does not allow extension control operations, and extension that allows The environment in which the information receiving node of the control operation is located, and the environment in which the information receiving node that does not allow the extended control operation is located.
  • the node that generates information, the node that sends information, and the node that receives information can belong to nodes in the same domain, or nodes in different domains; they can belong to one system, or they can belong to different systems.
  • Information can be sent directly between nodes or through one or more servers.
  • the first node 501 is configured to generate the sending privacy tag of the node in the following manner:
  • the first extended access control condition in the sent privacy tag of the node is generated according to any combination of one or more of the following: first scene information, first privacy protection requirement, and first constrained access control condition.
  • the first scene information and the first privacy protection requirement may be described in natural language and / or in a formal manner, and the formal manner includes but is not limited to any one or more of the following Combination: collection, Extensible Markup Language (XML, Extensible Markup Language).
  • XML Extensible Markup Language
  • the first constrained access control condition and the first extended access control condition may be described in natural language and / or in a formal manner.
  • the first constrained access control condition and the first extended access control condition include but are not limited to any combination including one or more of the following: role-based access control condition, attribute-based access control condition, relationship-based access control condition, mandatory Access control conditions, autonomous access control conditions, etc .;
  • the first constrained access control condition and the first extended access control condition in the sending privacy tag of the local node that generated the information may be generated by manual input or generated according to a pre-designed rule.
  • the pre-designed rules are used to describe the method of generating the first constrained access control condition and the first extended access control condition according to the first scene information and the first privacy protection requirement, which may use natural language and / or Formal language description.
  • the pre-designed rules may adopt the following methods, but are not limited to the following methods: the set of the first privacy protection requirement and / or the first scene information and the set in the first constrained access control condition may be directly mapped, or mapped through a function, or The first privacy protection requirement and / or the set of the first scene information is directly mapped with the set in the first extended access control condition, or mapped through a function.
  • the attribute of the node that receives the information in the first scene information and the node that allows operation in the first privacy protection requirement are mapped to obtain the attribute of the node that allows the information to be received in the first restricted access control condition, and then the first scene information
  • the attributes of the node receiving the information in the first privacy protection requirement and the node not allowed to operate in the first privacy protection requirement are mapped to obtain the attributes of the node not permitted to receive the information in the first restricted access control condition
  • the The node and the allowed operation environment in the first privacy protection requirement are mapped to obtain the environment in which the node that allows receiving the information in the first constrained access control condition is located, and the node receiving the information in the first scene information and the first privacy protection
  • the environment in which the operation is not allowed in the requirement is mapped to obtain the environment in which the node in the first restricted access control condition is not allowed to receive information.
  • the information receiving node, the information receiving node attribute, the information sending node, the information sending node attribute, the information sending environment, the information receiving environment, and the first privacy protection requirements allowed in the first scene information The operation, the attribute of the node that allows operation, and the environment that allows the operation are mapped to obtain the attribute of the node that receives the information that allows the extension control operation in the operation condition corresponding to the extension control operation in the first extended access control condition, and the extension control operation is allowed.
  • the environment of the information receiving node in the first scene information is the information receiving node, the receiving information node attribute, the sending information node, the sending information node attribute, the information sending environment, the information receiving environment and the first
  • the operations that are not allowed in the privacy protection requirements, the node attributes that are not allowed to operate, and the environment that are not allowed to operate are mapped to obtain the extension control operation in the first extended access control condition that corresponds to the operation condition that does not allow the extension control operation to be received
  • the attributes of the information node and the extension are not allowed Environment in which the node receives the operation control information.
  • the first node 501 sends the information and the privacy tag of the local node to the server;
  • the information and the sending privacy tag of the local node are sent to the second node or forwarded by the server To the second node; when it is determined that the second node does not satisfy the first constrained access control condition in the sending privacy tag of the node, the information and the sending privacy tag of the node are not sent to the second node.
  • the information and the privacy tag sent by the local node may be sent to the second node or the server at the same time, or may be sent separately. This embodiment does not limit the sending method.
  • the first node 501 is set to implement the following manner to determine whether the second node meets the first constrained access control condition:
  • the attribute of the second node conforms to the attribute of the node permitted to receive information in the first restricted access control condition
  • the attribute of the second node does not meet the attribute of the node that does not allow receiving information in the first restricted access control condition
  • the environment in which the second node is located meets the environment in which the node allowed to receive information in the first restricted access control condition includes the environment in which the second node or the application server is located;
  • the environment of the second node does not satisfy the environment of the node that is not allowed to receive information in the first restricted access control condition.
  • the second node When the second node satisfies at least one of the following, it is determined that the second node does not satisfy the first constrained access control condition:
  • the attribute of the second node conforms to the attribute of the node that is not allowed to receive information in the first restricted access control condition
  • the attribute of the second node does not meet the attribute of the node that is allowed to receive information in the first restricted access control condition
  • the environment of the second node satisfies the environment of the node that is not allowed to receive information in the first restricted access control condition
  • the environment of the second node does not satisfy the environment of the node that is allowed to receive information in the first restricted access control condition.
  • the second node 502 is further configured to:
  • the second node When it is determined that the second node does not have the authority to perform the extended control operation on the information according to the transmission privacy tags of other nodes, the second node does not perform the extended control operation on the information.
  • the second node 502 is configured to implement the following manner to determine whether the second node has the authority to perform extended control operations on the information according to the privacy tags sent by other nodes:
  • the second extended access control condition in the sent privacy tags of the other nodes; wherein the second extended access control condition is used to describe the extended control operation that the node receiving the information can complete after receiving the information and what needs to be met Conditions, including: extended control operations, operating conditions, correspondence between extended control operations and operating conditions; wherein, the operating conditions are conditions to be fulfilled for performing the extended control operations;
  • the second node When the second node satisfies the operation condition corresponding to the extension control operation that the second node needs to perform in the second extended access control condition, it is determined that the second node has the authority to perform the extension control operation that needs to be performed on the information;
  • the second node When the second node does not satisfy the operation condition corresponding to the extension control operation performed in the second extended access control condition, or the second extended access control condition does not include the extension control operation that the second node needs to perform, determine the first The two nodes do not have the authority to perform the extended control operations required for the information.
  • the operating conditions include any combination of one or more of the following: attributes of a node that receives information that allows extension control operations, attributes of a node that receives information that does not allow extension control operations, and extension that allows The environment in which the information receiving node of the control operation is located, and the environment in which the information receiving node that does not allow the extended control operation is located.
  • the second node 502 is configured to implement the following manner to determine whether the second node satisfies the operation condition corresponding to the extension control operation required by the second node in the second extended access control condition:
  • the attribute of the second node conforms to the attribute of the node that receives the information that allows the extended control operation in the operating conditions corresponding to the extended control operation required by the second node in the second extended access control condition;
  • the attribute of the second node does not comply with the attribute of the node that does not allow the reception of information for the extended control operation among the operating conditions corresponding to the extended control operation that the second node needs to perform in the second extended access control condition;
  • the environment where the second node is located meets the environment where the node that receives the information that allows the extension control operation among the operating conditions corresponding to the extension control operation that the second node needs to perform in the second extended access control condition is located;
  • the environment in which the second node is located does not satisfy the environment in which the node that receives the information that does not allow the extension control operation among the operation conditions corresponding to the extension control operation that the second node needs to perform in the second extended access control condition is in .
  • the second node When the second node satisfies at least one of the following, it is determined that the second node does not satisfy the second extended access control condition:
  • the attribute of the second node conforms to the operation condition corresponding to the extension control operation that the second node needs to perform in the second extended access control condition, and the attribute of the node that does not allow the receiving information of the extension control operation includes the second node ’s Attributes;
  • the attribute of the second node does not meet the attribute of the node that receives the information that allows the extended control operation among the operating conditions corresponding to the extended control operation that the second node needs to perform in the second extended access control condition;
  • the environment in which the second node is located meets the environment in which the node that does not allow the reception of information in the extension control operation among the operating conditions corresponding to the extension control operation that the second node needs to perform in the second extended access control condition is in the environment;
  • the environment where the second node is located does not satisfy the environment where the node that receives the information that allows the extension control operation among the operation conditions corresponding to the extension control operation that the second node needs to perform in the second extended access control condition is located.
  • the extended control operation includes at least one of the following operations: arithmetic operation and propagation operation.
  • arithmetic operations are used to describe the arithmetic operations that information can be performed, including any combination of one or more of the following: read, write, encrypt, obfuscate, generalize, difference, sign, check signature, and calculate Summary.
  • the propagation operation is used to describe the propagation operation that the node receiving the information can perform on the information after obtaining the information access authority, including any combination of one or more of the following:
  • the second node 502 is configured to implement the extension control operation on the information in the following manner:
  • the sending privacy label of the local node that generated the information generating a new sending privacy label of the node based on the sending privacy label of the node and the sending privacy label of other nodes, and sending the information and the new sending privacy label of the node to other Node; wherein, the new sending privacy label of the current node is used to represent the extended control of other nodes receiving the information.
  • the new sending privacy label of the node includes any combination of one or more of the following:
  • the fourth constrained access control condition is used to describe the condition that the next node receiving information needs to meet to receive information, including any combination of one or more of the following:
  • Attributes of nodes that are allowed to receive information attributes of nodes that are not allowed to receive information, environments where nodes are allowed to receive information, environments where nodes are not allowed to receive information;
  • the environment in which the node is located includes any combination of one or more of the following: time, spatial location, network, and device.
  • the fourth extended access control condition is used to describe the extended control operation that the next node receiving information can complete after receiving the information and the conditions that need to be met, including:
  • An extension control operation an operation condition, a correspondence relationship between an extension control operation and an operation condition; wherein, the operation condition is a condition to be satisfied for performing the extension control operation.
  • the extended control operation includes at least one of the following operations: arithmetic operation and propagation operation.
  • arithmetic operations are used to describe the arithmetic operations that information can be performed, including any combination of one or more of the following: read, write, encrypt, obfuscate, generalize, difference, sign, check signature, and calculate Summary.
  • the propagation operation is used to describe the propagation operation that the node receiving the information can perform on the information after obtaining the information access authority, including any combination of one or more of the following:
  • the operating conditions include any combination of one or more of the following: attributes of a node that receives information that allows extension control operations, attributes of a node that receives information that does not allow extension control operations, and extension that allows The environment in which the information receiving node of the control operation is located, and the environment in which the information receiving node that does not allow the extended control operation is located.
  • the sending privacy tag of this node includes any combination of one or more of the following:
  • the second node generates the third constrained access control condition according to at least one of the following: third scene information and third privacy protection requirements;
  • the second node generates the third extended access control condition according to any combination of one or more of the following: third scenario information, a third privacy protection requirement, and a third restricted access control condition;
  • the second node generates the third privacy protection effect according to any combination of one or more of the following: a third privacy protection requirement, an extended control operation performed by the second node, attributes of the second node, and a second node environment.
  • the third constrained access control condition is used to describe the condition that the next node receiving information needs to meet to receive information, including any combination of one or more of the following:
  • Attributes of nodes that are allowed to receive information attributes of nodes that are not allowed to receive information, environments where nodes are allowed to receive information, environments where nodes are not allowed to receive information;
  • the environment in which the node is located includes any combination of one or more of the following: time, spatial location, network, and device.
  • the third extended access control condition is used to describe the extended control operation that the next node receiving the information can complete after receiving the information and the conditions that need to be met, including any combination of one or more of the following:
  • An extension control operation an operation condition, a correspondence relationship between an extension control operation and an operation condition; wherein, the operation condition is a condition to be satisfied for performing the extension control operation.
  • the extended control operation includes at least one of the following operations: arithmetic operation and propagation operation.
  • arithmetic operations are used to describe the arithmetic operations that information can be performed, including any combination of one or more of the following: read, write, encrypt, obfuscate, generalize, difference, sign, check signature, and calculate Summary.
  • the propagation operation is used to describe the propagation operation that the node receiving the information can perform on the information after obtaining the information access authority, including any combination of one or more of the following:
  • the operating conditions include any combination of one or more of the following: attributes of a node that receives information that allows extension control operations, attributes of a node that receives information that does not allow extension control operations, and extension that allows The environment in which the information receiving node of the control operation is located, and the environment in which the information receiving node that does not allow the extended control operation is located.
  • the second node 502 is configured to generate a new transmission privacy label of the current node based on the transmission privacy labels of other nodes and the transmission privacy labels of the current node by: The union of the sending privacy label of this node is used as the new sending privacy label of this node.
  • the union of the second constrained access control condition and the third constrained access control condition is taken as the fourth constrained access control condition, and the other parameters can be deduced by analogy, which will not be repeated here.
  • the second node 502 is further configured to:
  • the third privacy protection effect is generated according to any combination of one or more of the following: first privacy protection requirements, extended control operations performed by the second node, attributes of the second node, and environment of the second node;
  • the extended access effect is judged according to the third privacy protection effect in the sending privacy tag of this node and the second privacy protection requirement in the sending privacy tag of other nodes.
  • the said privacy protection effect represents the protection effect achieved after privacy protection of information, that is, the privacy measurement function is called for the information before and after privacy protection, and the value obtained by the difference between the two calls to the privacy measurement function is the privacy Protection effect.
  • the privacy metric function may use methods such as conditional entropy, mutual information, privacy metrics for time series data, and the concept of difference to measure privacy information.
  • the evaluation of privacy effects mainly includes the availability of information after protection, the irreversibility of privacy protection, and the reversibility in a controlled environment.
  • the availability of private information refers to the impact of new information on the system function or performance of the private information after the privacy protection algorithm.
  • the irreversibility of privacy protection refers to the fact that a third party or attacker cannot infer the original information from the privacy protection algorithms and information obtained by third parties or attackers.
  • Reversibility in a controlled environment means that a third party can restore all or part of the privacy-protected information when certain information is known.
  • the privacy metrics include but are not limited to include conditional entropy and mutual information for privacy metrics, obfuscation-based privacy protection schemes for privacy metrics, and differential concepts for privacy metrics.
  • a qualitative or quantitative method may be used to determine the effect of extended access.
  • the qualitative method directly gives whether the extended access effect is good or bad.
  • the second node satisfies the operating condition corresponding to the extended control operation in the first extended access control condition, the corresponding extended control operation is performed , The effect of extended access control is better; when the second node does not meet the operating conditions corresponding to the extended control operation in the first extended access control condition, the corresponding extended control operation is performed, or the privacy tag of other nodes is sent.
  • the extended control operation is not included in the second extended access control condition, the effect of the extended access control is not good.
  • a quantitative method uses an access control effect evaluation function to calculate an extended access control effect value.
  • the function is not used to limit the protection scope of the embodiment of the present invention, and details are not described here.
  • the second node may generate a privacy protection effect according to any combination of one or more of the first privacy protection requirements, the extended control operations performed by the second node, the attributes of the second node, and the environment in which the second node is located
  • the function generates a third privacy protection effect.
  • the function is not used to limit the protection scope of this embodiment, and will not be repeated here.
  • This example illustrates how to generate constrained access control conditions and extended access control conditions in the sending privacy label of this node through examples.
  • the user u 1 in the social system S generates the information M, the generation time 2018/8/10, 10:00, and uploads the information M to the social system, the user accessing the information M is u 2 , and the user u 2 forwards the information M to User u 3 .
  • the user accessing the information M only has the read permission, but not the modification permission, nor the backup permission.
  • the generated scene information is:
  • System information social system S;
  • the generator of information M user u 1 ;
  • Visitors and forwarders of information M user u 2 ;
  • Recipient of the forwarded message M user u 3 ;
  • Privacy protection requirements include:
  • the user accessing the information M only has the read permission, but not the modification permission, nor the backup permission.
  • Attributes of nodes allowed to receive information the visitor of information M belongs to the social system S, and the relationship between the visitor u 2 of the information M and the user u 1 is a friend relationship;
  • Extended control operations forwarding, reading
  • the scenario information, privacy protection requirements, constrained access control conditions and extended control condition descriptions in the above examples can adopt any method such as natural language and formal description.
  • This example illustrates how to determine the authority of the extended control operation based on the sent privacy tag.
  • the restricted access control conditions and extended access control conditions in the sending privacy tag are generated according to user u 1 , user u 2 and user u 1 are in a friend relationship, and both belong to social system S, so user u 2 has a message M
  • user u 2 has read and forward operation authority, without write authority, if the user u 2 reads the information M, the judgment result is that the extended control operation can be performed, if the user u 2 writes the information M, the judgment result is not possible Extended control operations.
  • User u 2 forwards the information M.
  • the judgment result is that extended control operations can be performed, otherwise if user u 3 does not belong to the social system S, or the user u 3 and the user u 2 are in a friend relationship, the extended control operation cannot be performed.
  • This example illustrates how to generate privacy protection effects through examples.
  • the user u 2 uses the privacy protection algorithm S to perform a privacy operation on the information M to obtain new information M ′, and calls the privacy measurement algorithm to obtain the privacy metric value of the information M is C 1 , and the privacy of the information M ′
  • the metric value is C 2 , and C 2 and C 1 are privacy protection effects.
  • the above embodiment uses a privacy protection effect generation function to calculate and generate a privacy protection effect through a quantitative method.
  • This example illustrates how to judge the effect of extended access through examples.
  • the extended control conditions require that the information M can only be forwarded to users in the social system S and forward messages for their friends. If the user u 2 receives the information M, it is forwarded to other users outside the system, or to the system except himself. For users other than friends, the effect of extended access is not good. If the user u 2 receives the message M, he can only forward it to his friends in the system, and the extended access effect is good. After the information is forwarded, after other users receive the message, they can modify, delete, and backup the message arbitrarily, and the extended access effect is not good. This example only judges the effect of extended access control through a qualitative method.
  • the term computer storage medium includes both volatile and non-volatile implemented in any method or technology configured to store information (such as computer-readable instructions, data structures, program modules, or other data) Sex, removable and non-removable media.
  • Computer storage media include but are not limited to RAM, ROM, EEPROM, flash memory or other memory technologies, CD-ROM, digital versatile disk (DVD) or other optical disk storage, magnetic cartridges, magnetic tape, magnetic disk storage or other magnetic storage devices, or may Any other medium configured to store the desired information and be accessible by the computer.
  • the communication medium generally contains computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transmission mechanism, and may include any information delivery medium .

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)
  • Small-Scale Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明实施例公开了一种信息流转方法、装置及系统,所述方法包括:第一节点生成信息的本节点的发送隐私标签;其中,本节点的发送隐私标签用于表示对接收到所述信息的其他节点进行的延伸控制;第一节点发送信息和本节点的发送隐私标签。

Description

一种信息流转方法、装置及系统 技术领域
本文涉及但不限于信息应用技术领域,尤指一种信息流转方法、装置及系统。
背景技术
随着网络技术、信息技术的持续快速发展和应用的广泛普及,形成了包含局域网、互联网、移动网和物联网等具有开放性、异构性、移动性、动态性、多安全域等诸多特性的泛在网络,其信息传播方式可以归纳为通过“网络之网络”访问“系统之系统”。泛在网络中,跨系统、跨域随机访问和流转成为信息交换的主体。
信息在跨系统、跨域随机访问和流转的过程中,不同信息系统和域中的访问实体和访问环境也不同,访问控制需要根据应用场景提出对应的访问控制方案。而目前访问控制系统在执行访问控制时,从策略库检索查询相关的访问控制策略,由监控器进行访问控制策略的执行。这种方式大多应用在单一系统,对于跨系统、跨域信息流转过程中,访问控制策略的检索和执行需要不同系统、不同域中的多个策略库和多个监控器协同运作,在信息跨系统、跨域频繁流转过程势必会造成效率低、策略检索不完备、策略冲突和策略执行监控不到位、访问控制效果评估困难等问题。
另一方面,相关的访问控制方案只解决了访问请求实体在什么条件下对资源有什么访问权限的问题,并没有对访问请求实体在得到资源访问权限后进行约束控制。
信息在跨系统、跨域流转过程中,数据的收集、共享、发布等不同环节都会导致用户隐私信息的泄露,给用户带来巨大的安全威胁。相关访问控制和隐私保护方案大都聚焦于单一信息系统的用户信息的隐私泄露问题,针对跨系统、跨域交互场景中存在的隐私泄露问题没有提出体系化解决方案。
发明概述
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。
本发明实施例公开了一种信息流转方法,包括:
第一节点生成信息的本节点的发送隐私标签;其中,本节点的发送隐私标签用于表示对接收到所述信息的其他节点进行的延伸控制;
第一节点发送信息和所述本节点的发送隐私标签。
其中,所述第一节点生成信息的本节点的发送隐私标签可以包括:
所述第一节点可以根据以下至少之一生成所述本节点的发送隐私标签:第一场景信息、第一隐私保护需求。
其中,所述本节点的发送隐私标签可以包括:
第一约束访问控制条件、第一延伸访问控制条件;或包括第一约束访问控制条件、第一延伸访问控制条件以及第一隐私保护需求;
所述生成信息的本节点的发送隐私标签可以包括:
所述第一节点根据以下至少之一生成所述第一约束访问控制条件:第一场景信息、第一隐私保护需求;
所述第一节点根据以下一个或多个的任意组合生成所述第一延伸访问控制条件:第一场景信息、第一隐私保护需求、第一约束访问控制条件。
其中,所述第一约束访问控制条件包括以下一种或多种判断条件:允许接收信息的节点的属性、不允许接收信息的节点的属性、允许接收信息的节点所处的环境、不允许接收信息的节点所处的环境;其中,待接收信息的节点成功接收信息要满足的条件是满足第一约束访问控制条件;满足第一约束访问控制条件是符合相应的判断条件,或不符合相应的判断条件;
其中,所述所处的环境可以包括以下一个或多个的任意组合:时间、空间位置、网络、设备;
所述第一延伸访问控制条件可以用于描述接收信息的节点接收到信息后所能完成的延伸控制操作及需要满足的条件,包括:延伸控制操作、操作条件、延伸控制操作和操作条件之间的对应关系;其中,所述操作条件为进行所述延伸控制操作所要满足的条件。
其中,所述延伸控制操作包括以下至少之一:运算操作、传播操作;
其中,所述运算操作可以包括以下一个或多个的任意组合:
读、写、加密、模糊、泛化、差分、签名、验签、计算摘要;
所述传播操作可以包括以下一个或多个的任意组合:
保存、复制、粘贴、转发、剪切、修改、删除。
其中,操作条件可以包括以下一个或多个的任意组合:
允许进行延伸控制操作的接收信息的节点的属性、不允许进行延伸控制操作的接收信息的节点的属性、允许进行延伸控制操作的接收信息的节点所处的环境、不允许进行延伸控制操作的接收信息的节点所处的环境。
其中,所述第一节点发送信息和所述本节点的发送隐私标签可以包括:
第一节点可以将所述信息和所述本节点的发送隐私标签发送给服务器;
或者,当判断出第二节点满足所述本节点的发送隐私标签的第一约束访问控制条件时,第一节点可以将所述信息和所述本节点的发送隐私标签发送给所述第二节点或可以通过服务器转发给第二节点。
其中,所述第一场景信息可以包括以下一个或多个的任意组合:
生成信息的节点、发送信息的节点、接收信息的节点、生成信息的节点属性、发送信息的节点属性、接收信息的节点属性、信息生成的环境、对信息进行的操作、信息发送的环境、信息接收的环境;
所述第一隐私保护需求可以包括以下一个或多个的任意组合:
允许的操作、不允许的操作、允许操作的节点、不允许操作的节点、允许操作的节点属性、不允许操作的节点属性、允许操作的环境、不允许操作的环境;
所述环境可以包括以下一个或多个的任意组合:时间、空间位置、网络、设备。
其中,判断第二节点是否满足本节点的发送隐私标签的第一约束访问控制条件可以包括:
当第二节点满足以下至少之一时,判断出第二节点满足第一约束访问控制条件:
第二节点的属性符合第一约束访问控制条件中的允许接收信息的节点的属性;
第二节点的属性不符合第一约束访问控制条件中的不允许接收信息的节点的属性;
第二节点所处的环境满足第一约束访问控制条件中的允许接收信息的节点所处的环境;
第二节点所处的环境不满足第一约束访问控制条件中的不允许接收信息的节点所处的环境;
当第二节点满足以下至少之一时,判断出第二节点不满足第一约束访问控制条件:
第二节点的属性符合第一约束访问控制条件中的不允许接收信息的节点的属性;
第二节点的属性不符合第一约束访问控制条件中的允许接收信息的节点的属性;
第二节点所处的环境满足第一约束访问控制条件中的不允许接收信息的节点所处的环境;
第二节点所处的环境不满足第一约束访问控制条件中的允许接收信息的节点所处的环境。
本发明实施例公开了一种信息流转方法,包括:
第二节点从其他节点接收信息和所述信息的其他节点的发送隐私标签;其中,其他节点的发送隐私标签用于表示对接收到所述信息的其他节点进行的延伸控制限;
当第二节点需要对所述信息进行延伸控制操作,且根据所述其他节点的发送隐私标签判断出所述第二节点有对所述信息进行延伸控制操作的权限时,所述第二节点对所述信息进行所述延伸控制操作。
其中,所述根据所述其他节点的发送隐私标签判断所述第二节点是否有对所述信息进行延伸控制操作的权限可以包括:
获取所述其他节点的发送隐私标签中的第二延伸访问控制条件;其中,所述第二延伸访问控制条件用于描述接收信息的节点接收到信息后所能完成的延伸控制操作及需要满足的条件,包括:延伸控制操作、操作条件、延伸控制操作和操作条件之间的对应关系;其中,所述操作条件为进行所述延伸控制操作所要满足的条件;
判断第二节点是否满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件;
当第二节点满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件时,确定第二节点有对信息进行需要进行的延伸控制操作的权限;
当第二节点不满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件,或所述第二延伸访问控制条件中不包括第二节点需要进行的延伸控制操作时,确定第二节点没有对信息进行需要进行的延伸控制操作的权限。
其中,所述操作条件可以包括以下一个或多个的任意组合:
允许进行延伸控制操作的接收信息的节点的属性、不允许进行延伸控制操作的接收信息的节点的属性、允许进行延伸控制操作的接收信息的节点所处的环境、不允许进行延伸控制操作的接收信息的节点所处的环境;
判断所述第二节点是否满足第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件包括:
当所述第二节点满足以下至少之一时,判断出所述第二节点满足所述第二延伸访问控制条件:
所述第二节点的属性符合所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的允许进行延伸控制操作的接收信息的节点的属性;
所述第二节点的属性不符合所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的不允许进行延伸控制操作的接收信息的节点的属性;
所述第二节点所处的环境满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的允许进行延伸控制操作的接收信息的节点所处的环境;
所述第二节点所处的环境不满足第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的不允许进行延伸控制操作的接收信息的节点所处的环境;
当所述第二节点满足以下至少之一时,判断出所述第二节点不满足所述第二延伸访问控制条件:
所述第二节点的属性符合所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的不允许进行延伸控制操作的接收信息的节点的属性;
所述第二节点的属性不符合所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的允许进行延伸控制操作的接收信息的节点的属性;
所述第二节点所处的环境满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的不允许进行延伸控制操作的接收信息的节点所处的环境;
所述第二节点所处的环境不满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的允许进行延伸控制操作的接收信息的节点所处的环境。
其中,当所述延伸控制操作为转发时,所述第二节点对信息进行延伸控制操作可以包括:
第二节点将信息和其他节点的发送隐私标签转发给其他节点;
或者,第二节点生成信息的本节点的发送隐私标签,根据本节点的发送隐私标签和其他节点的发送隐私标签生成本节点的新的发送隐私标签,将信息和本节点的新的发送隐私标签发送给其他节点;其中,所述本节点的新的发送隐私标签可以用于表示对接收到所述信息的其他节点进行的延伸控制。
其中,所述本节点的发送隐私标签可以包括以下一个或多个的任意组合:
第三约束访问控制条件、第三延伸访问控制条件、第三隐私保护需求、第三隐私保护效果;
所述本节点的新的发送隐私标签包括以下一个或多个的任意组合:
第四约束访问控制条件、第四延伸访问控制条件、第四隐私保护需求、第四隐私保护效果;
所述生成第三隐私保护效果包括:第二节点根据以下一个或多个的任意组合生成本节点的发送隐私标签中的第三隐私保护效果:第一隐私保护需求、第二节点所进行的延伸控制操作、第二节点的属性、第二节点所处的环境。
其中,根据所述的本节点的发送隐私标签中的第三隐私保护效果和其他节点的发送隐私标签中的第二隐私保护需求判断延伸访问效果。
其中,所述根据本节点的发送隐私标签和其他节点的发送隐私标签生成本节点的新的发送隐私标签可以包括:将其他节点的发送隐私标签和本节点的发送隐私标签的并集作为本节点的新的发送隐私标签。
本发明实施例公开了一种信息流转装置,包括:
生成模块,设置成生成信息的本节点的发送隐私标签;其中,本节点的发送隐私标签用于表示对接收到所述信息的其他节点进行的延伸控制;
发送模块,设置成发送信息和所述本节点的发送隐私标签。
本发明实施例公开了一种信息流转装置,包括:
接收模块,设置成从其他节点接收信息和所述信息的其他节点的发送隐私标签;其中,其他节点的发送隐私标签用于表示对接收到所述信息的其他节点进行的延伸控制;
处理模块,设置成需要对所述信息进行延伸控制操作,且根据所述其他节点的发送隐私标签判断出所述第二节点有对所述信息进行延伸控制操作的权限时,所述第二节点对所述信息进行所述延伸控制操作。
其中,所述处理模块可以设置成采用以下方式实现所述对信息进行延伸控制操作:
当所述延伸控制操作为转发时,可以将信息和其他节点的发送隐私标签 转发给其他节点;
或者,生成信息的本节点的发送隐私标签,可以根据本节点的发送隐私标签和其他节点的发送隐私标签生成本节点的新的发送隐私标签,将信息和本节点的新的发送隐私标签发送给其他节点;其中,所述本节点的新的发送隐私标签可以用于表示对接收到所述信息的其他节点进行的延伸控制。
其中,所述本节点的发送隐私标签可以包括以下一个或多个的任意组合:
第三约束访问控制条件、第三延伸访问控制条件、第三隐私保护需求、第三隐私保护效果;
所述本节点的新的发送隐私标签可以包括以下一个或多个的任意组合:
第四约束访问控制条件、第四延伸访问控制条件、第四隐私保护需求、第四隐私保护效果;
所述处理模块可以设置成采用以下方式实现所述生成第三隐私保护效果:
根据以下一个或多个的任意组合生成第三隐私保护效果:第一隐私保护需求、第二节点所进行的延伸控制操作、第二节点的属性、第二节点所处的环境。
其中,所述处理模块还可以设置成:
根据所述的本节点的发送隐私标签中的第三隐私保护效果和其他节点的发送隐私标签中的第二隐私保护需求判断延伸访问效果。
本发明实施例公开了一种信息流转装置,包括处理器和计算机可读存储介质,所述计算机可读存储介质中存储有指令,当所述指令被所述处理器执行时,实现上述任一种信息流转方法。
本发明实施例公开了一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现上述任一种信息流转方法的步骤。
本发明实施例公开了一种信息流转系统,包括:
第一节点,设置成生成信息的本节点的发送隐私标签;其中,本节点的发送隐私标签用于表示对接收到所述信息的其他节点进行的延伸控制;发送信息和所述本节点的发送隐私标签;
第二节点,设置成从其他节点接收信息和所述信息的其他节点的发送隐私标签;其中,其他节点的发送隐私标签用于表示对接收到所述信息的其他节点进行的延伸控制;当需要对所述信息进行延伸控制操作,且根据所述其他节点的发送隐私标签判断出所述第二节点有对所述信息进行延伸控制操作的权限时,对所述信息进行所述延伸控制操作。
其中,所述第二节点可以设置成采用以下方式实现所述对信息进行延伸控制操作:
当所述延伸控制操作为转发时,可以将信息和其他节点的发送隐私标签转发给其他节点;
或者,生成信息的本节点的发送隐私标签,根据本节点的发送隐私标签和其他节点的发送隐私标签生成本节点的新的发送隐私标签,可以将信息和本节点的新的发送隐私标签发送给其他节点;其中,所述本节点的新的发送隐私标签可以用于表示对接收到所述信息的其他节点进行的延伸控制。
其中,所述本节点的发送隐私标签可以包括以下一个或多个的任意组合:
第三约束访问控制条件、第三延伸访问控制条件、第三隐私保护需求、第三隐私保护效果;
所述本节点的新的发送隐私标签可以包括以下一个或多个的任意组合:
第四约束访问控制条件、第四延伸访问控制条件、第四隐私保护需求、第四隐私保护效果;
所述第二节点可以设置成采用以下方式实现所述生成第三隐私保护效果:
根据以下一个或多个的任意组合生成第三隐私保护效果:第一隐私保护需求、第二节点所进行的延伸控制操作、第二节点的属性、第二节点所处的环境。
其中,所述第二节点还设置成:
可以根据所述的本节点的发送隐私标签中的第三隐私保护效果和其他节点的发送隐私标签中的第二隐私保护需求判断延伸访问效果。
本申请的至少一个实施例的信息流转方法包括:第一节点生成信息的本节点的发送隐私标签;其中,本节点的发送隐私标签用于表示对接收到所述 信息的其他节点进行的延伸控制;第一节点发送信息和所述本节点的发送隐私标签。本申请至少一个实施例的信息流转方法包括:第二节点从其他节点接收信息和所述信息的其他节点的发送隐私标签;其中,其他节点的发送隐私标签用于表示对接收到所述信息的其他节点进行的延伸控制;当第二节点需要对所述信息进行延伸控制操作,且根据所述其他节点的发送隐私标签判断出所述第二节点有对所述信息进行延伸控制操作的权限时,所述第二节点对所述信息进行所述延伸控制操作。通过上述两个实施例方案,基于其他节点的发送隐私标签实现对第二节点对信息的延伸控制操作进行控制,第一节点和第二节点可以是同一个系统,也可以是不同的系统,可以是同一个域内,也可以是不同的域内,信息的发送可以节点之间直接发送或通过一个或多个服务器发送。因此,实现了对信息在随机访问和流转过程中进行统一的访问控制,特别是跨系统、跨域随机访问和流转过程中进行统一的访问控制。
在阅读并理解了附图和详细描述后,可以明白其他方面。
附图概述
图1为本发明实施例的信息流转方法的流程图;
图2为本发明实施例的信息流转方法的流程图;
图3为本发明实施例的信息流转装置的结构组成示意图;
图4为本发明实施例的信息流转装置的结构组成示意图;
图5为本发明实施例的信息流转系统的结构组成示意图。
详述
在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互任意组合。
参见图1,本申请一个实施例提出了一种信息流转方法,包括:
步骤100、第一节点生成信息的本节点的发送隐私标签;其中本节点的发送隐私标签用于表示对接收到所述信息的其他节点进行的延伸控制;所述延伸控制包括控制能否接收信息以及接收信息后能否对信息进行操作。
一个示例性的实施例中,第一节点生成信息的本节点的发送隐私标签包括:
第一节点根据以下至少之一生成信息的本节点的发送隐私标签:第一场景信息、第一隐私保护需求。
一个示例性的实施例中,第一场景信息包括以下一个或多个的任意组合:
生成信息的节点、发送信息的节点、接收信息的节点、生成信息的节点属性、发送信息的节点属性、接收信息的节点属性、信息生成的环境、对信息进行的操作、信息发送的环境、信息接收的环境;
一个示例性的实施例中,信息生成的环境或信息发送的环境或信息接收的环境包括以下至少之一:时间、空间位置、网络、设备。
一个示例性的实施例中,第一隐私保护需求包括以下一个或多个的任意组合:
允许的操作、不允许的操作、允许操作的节点、不允许操作的节点、允许操作的节点属性、不允许操作的节点属性、允许操作的环境、不允许操作的环境;
所述的环境包括以下一个或多个的任意组合:时间、空间位置、网络、设备。
所述的属性包括但不限于以下一个或多个的任意组合:身份、角色、关系、地址、手机号、ID号、电话号码、职业。
一个示例性的实施例中,本节点的发送隐私标签包括以下一个或多个的任意组合:
第一约束访问控制条件、第一延伸访问控制条件、第一隐私保护需求;
一个示例性的实施例中,所述第一约束访问控制条件包括以下一种或多种判断条件:允许接收信息的节点的属性、不允许接收信息的节点的属性、允许接收信息的节点所处的环境、不允许接收信息的节点所处的环境;其中,待接收信息的节点成功接收信息要满足的条件是满足第一约束访问控制条件;满足第一约束访问控制条件是符合相应的判断条件,或不符合相应的判断条件;
一个示例性的实施例中,节点所处的环境包括以下一个或多个的任意组合:时间、空间位置、网络、设备。
一个示例性的实施例中,第一延伸访问控制条件用于描述接收信息的节点接收到信息后所能完成的延伸控制操作及需要满足的条件,包括:
延伸控制操作、操作条件、延伸控制操作和操作条件的对应关系,所述操作条件为进行延伸控制操作所要满足的条件。
一个示例性的实施例中,延伸控制操作包括以下至少之一:运算操作、传播操作。
一个示例性的实施例中,运算操作用于描述信息可被执行的运算操作,包括以下一个或多个的任意组合:读、写、加密、模糊、泛化、差分、签名、验签、计算摘要。
一个示例性的实施例中,传播操作用于描述接收信息的节点在得到信息访问权限后对信息可执行的传播操作,包括以下一个或多个的任意组合:
保存、复制、粘贴、转发、剪切、修改、删除。
一个示例性的实施例中,操作条件包括以下一个或多个的任意组合:允许进行延伸控制操作的接收信息的节点的属性、不允许进行延伸控制操作的接收信息的节点的属性、允许进行延伸控制操作的接收信息的节点所处的环境、不允许进行延伸控制操作的接收信息的节点所处的环境。
在本实施例中,生成信息的节点、发送信息的节点、接收信息的节点可以属于同一个域的节点,也可以是不同的域的节点;可以属于一个系统,也可以属于不同的系统。
一个示例性的实施例中,第一节点生成信息的本节点的发送隐私标签包括:
第一节点根据以下至少之一生成信息的本节点的发送隐私标签中的第一约束访问控制条件:第一场景信息、第一隐私保护需求;
第一节点根据以下一个或多个的任意组合生成信息的本节点的发送隐私标签中的第一延伸访问控制条件:第一场景信息、第一隐私保护需求、第一约束访问控制条件。
第一延伸访问控制条件中如果延伸控制操作为发送或转发操作,那么第一延伸访问控制条件中延伸控制操作对应的操作条件中的允许发送或转发的对象节点(即接收信息的节点)必须满足第一约束访问控制条件中允许接收信息的节点的属性和所处的环境。
一个示例性的实施例中,第一场景信息和第一隐私保护需求可以采用自然语言和/或形式化的方式描述,所述的形式化的方式包括但不限于包括以下一个或多个的任意组合:集合、可扩展标记语言(XML,Extensible Markup Language)。
一个示例性的实施例中,第一约束访问控制条件和第一延伸访问控制条件可以采用自然语言和/或形式化的方式描述。第一约束访问控制条件和第一延伸访问控制条件包括但不限于包括以下一个或多个的任意组合:基于角色的访问控制条件、基于属性的访问控制条件、基于关系的访问控制条件、强制性的访问控制条件、自主性的访问控制条件等;
一个示例性的实施例中,生成信息的本节点的发送隐私标签中第一约束访问控制条件、第一延伸访问控制条件可以采用人工输入的方式生成,或根据预先设计的规则生成。
一个示例性的实施例中,预先设计规则用于描述根据第一场景信息和第一隐私保护需求生成第一约束访问控制条件和第一延伸访问控制条件的方法,可以采用自然语言和/或形式化语言方式描述。
预先设计规则可以采用下面方法,但不限于下面方法:可以将第一隐私保护需求和/或第一场景信息的集合与第一约束访问控制条件中集合直接映射,或者通过函数进行映射,或者将第一隐私保护需求和/或第一场景信息的集合与第一延伸访问控制条件中集合直接映射,或者通过函数进行映射。
例如,将第一场景信息中的接收信息的节点和第一隐私保护需求中的允许操作的节点属性进行映射得到第一约束访问控制条件中的允许接收信息的节点的属性,将第一场景信息中的接收信息的节点和第一隐私保护需求中的不允许操作的节点属性进行映射得到第一约束访问控制条件中的不允许接收信息的节点的属性,将第一场景信息中的接收信息的节点和第一隐私保护需求中的允许操作的环境进行映射得到第一约束访问控制条件中的允许接收信 息的节点所处的环境,将第一场景信息中的接收信息的节点和第一隐私保护需求中的不允许操作的环境进行映射得到第一约束访问控制条件中的不允许接收信息的节点所处的环境。
又如,将第一场景信息中的接收信息的节点、接收信息的节点属性、发送信息的节点、发送信息节点属性、信息发送的环境、信息接收的环境和第一隐私保护需求中的允许的操作、允许操作的节点属性和允许操作的环境进行映射得到第一延伸访问控制条件中的延伸控制操作对应的操作条件中的允许进行延伸控制操作的接收信息的节点的属性和允许进行延伸控制操作的接收信息的节点所处的环境,将第一场景信息中的接收信息的节点、接收信息的节点属性、发送信息的节点、发送信息节点属性、信息发送的环境、信息接收的环境和第一隐私保护需求中的不允许的操作、不允许操作的节点属性和不允许操作的环境进行映射得到第一延伸访问控制条件中的延伸控制操作对应的操作条件中的不允许进行延伸控制操作的接收信息的节点的属性和不允许进行延伸控制操作的接收信息的节点所处的环境。
信息的本节点的发送隐私标签与信息对应,不同信息生成的信息的本节点的发送隐私标签可以相同也可以不同,相同的信息可以生成一个或多个信息的本节点的发送隐私标签。
步骤101、第一节点发送信息和本节点的发送隐私标签。
一个示例性的实施例中,第一节点将所述信息和所述本节点的发送隐私标签发送给服务器;
或者,当判断出第二节点满足所述本节点的发送隐私标签的第一约束访问控制条件时,将所述信息和所述本节点的发送隐私标签发送给所述第二节点或通过服务器转发给第二节点;当判断出第二节点不满足本节点的发送隐私标签中的第一约束访问控制条件时,不将信息和本节点的发送隐私标签发送给第二节点。
一个示例性的实施例中,信息和本节点的发送隐私标签可以同时发送给第二节点或服务器,也可以分别发送,本实施例对发送方式不作限定。
一个示例性的实施例中,判断第二节点是否满足第一约束访问控制条件包括:
当第二节点满足以下至少之一时,判断出第二节点满足第一约束访问控制条件:
第二节点的属性符合第一约束访问控制条件中的允许接收信息的节点的属性;
第二节点的属性不符合第一约束访问控制条件中的不允许接收信息的节点的属性;
第二节点所处的环境满足第一约束访问控制条件中的允许接收信息的节点所处的环境;
第二节点所处的环境不满足第一约束访问控制条件中的不允许接收信息的节点所处的环境。
当第二节点满足以下至少之一时,判断出第二节点不满足第一约束访问控制条件:
第二节点的属性符合第一约束访问控制条件中的不允许接收信息的节点的属性;
第二节点的属性不符合第一约束访问控制条件中的允许接收信息的节点的属性;
第二节点所处的环境满足第一约束访问控制条件中的不允许接收信息的节点所处的环境;
第二节点所处的环境不满足第一约束访问控制条件中的允许接收信息的节点所处的环境。
一个示例性的实施例中,例如,判断第二节点的属性是否符合第一约束访问控制条件中的允许接收信息的节点的属性包括:
如果约束访问控制条件中的允许接收信息的节点的属性要求和生成信息的节点关系为朋友关系,判断第二节点的属性是否和生成信息的节点为朋友关系。
如果约束访问控制条件中的允许接收信息的节点的属性要求接收信息节点的所述的部门为A部门,判断第二节点所属的部门是否为A部门。
一个示例性的实施例中,判断第二节点所处的环境是否满足第一约束访问控制条件中的允许接收信息的节点所处的环境包括:
判断第二节点接收消息的时间是否在第一约束访问控制条件中的允许接收信息的节点的时间范围内;
判断第二节点接收消息所处的空间位置是否满足第一约束访问控制条件中的允许接收信息的节点的空间位置范围内;
判断第二节点接收消息的所用的设备的一种或多种指标是否满足第一约束访问控制条件中的允许接收信息的节点的设备要求;
判断第二节点接收消息的所经过的网络是否满足第一约束访问控制条件中的允许接收信息的节点环境中网络环境的要求。
一个示例性的实施例中,判断第二节点的属性是否符合第一约束访问控制条件中的不允许接收信息的节点的属性包括:
如果约束访问控制条件中的不允许接收信息的节点的属性要求和生成信息的节点关系为朋友关系,判断第二节点的属性是否和生成信息的节点为朋友关系。
其中,判断第二节点所处的环境是否满足第一约束访问控制条件中的不允许接收信息的节点所处的环境包括:
判断第二节点接收消息的时间是否在第一约束访问控制条件中的不允许接收信息的节点的时间范围内;
判断第二节点接收消息所处的空间位置是否满足第一约束访问控制条件中的不允许接收信息的节点的空间位置范围内;
判断第二节点接收消息的所用的设备的一种或多种指标是否满足第一约束访问控制条件中的不允许接收信息的节点的设备要求;
判断第二节点接收消息的所经过的网络是否满足第一约束访问控制条件中的不允许接收信息的节点环境中网络环境的要求。
参见图2,本申请另一个实施例提出了一种信息流转方法,包括:
步骤200、第二节点从其他节点接收信息和所述信息的其他节点的发送 隐私标签;其中,其他节点的发送隐私标签用于表示对接收到所述信息的其他节点进行的延伸控制
一个示例性的实施例中,其他节点的发送隐私标签包括:第二约束访问控制条件、第二延伸访问控制条件、第二隐私保护需求。
当第二节点接收到第一节点的信息和发送隐私标签时,第二约束访问控制条件、第二延伸访问控制条件、第二隐私保护需求与前述实施例的第一约束访问控制条件、第一延伸访问控制条件、第一隐私保护需求相同,这里不再赘述。
当第二节点接收到除第一节点之外的其他节点的信息和发送隐私标签时,第二约束访问控制条件、第二延伸访问控制条件、第二隐私保护需求与前述实施例的第一约束访问控制条件、第一延伸访问控制条件、第一隐私保护需求可能相同也可能不同。
步骤201、当第二节点需要对所述信息进行延伸控制操作,且根据所述发送隐私标签判断出所述第二节点有对所述信息进行延伸控制操作的权限时,所述第二节点对所述信息进行所述延伸控制操作。
一个示例性的实施例中,当根据其他节点的发送隐私标签判断出第二节点没有对信息进行延伸控制操作的权限时,第二节点不对信息进行延伸控制操作。
一个示例性的实施例中,根据其他节点的发送隐私标签判断所述第二节点是否有对所述信息进行延伸控制操作的权限包括:
获取所述其他发送节点的发送隐私标签中的第二延伸访问控制条件;
一个示例性的实施例中,所述第二延伸访问控制条件用于描述接收信息的节点接收到信息后所能完成的延伸控制操作及需要满足的条件,包括:延伸控制操作、操作条件、延伸控制操作和操作条件之间的对应关系;
一个示例性的实施例中,所述操作条件为进行所述延伸控制操作所要满足的条件;
判断第二节点是否满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件;
当第二节点满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件时,确定第二节点有对信息进行需要进行的延伸控制操作的权限;
当第二节点不满足所述第二延伸访问控制条件中进行的延伸控制操作对应的操作条件,或所述第二延伸访问控制条件中不包括第二节点需要进行的延伸控制操作时,确定第二节点没有对信息进行需要进行的延伸控制操作的权限。
其中,操作条件包括以下一个或多个的任意组合:允许进行延伸控制操作的接收信息的节点的属性、不允许进行延伸控制操作的接收信息的节点的属性、允许进行延伸控制操作的接收信息的节点所处的环境、不允许进行延伸控制操作的接收信息的节点所处的环境。
一个示例性的实施例中,判断所述第二节点是否满足第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件包括:
当第二节点满足以下至少之一时,判断出第二节点满足第二延伸访问控制条件:
所述第二节点的属性符合所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的允许进行延伸控制操作的接收信息的节点的属性;
所述第二节点的属性不符合所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的不允许进行延伸控制操作的接收信息的节点的属性;
所述第二节点所处的环境满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的允许进行延伸控制操作的接收信息的节点所处的环境;
所述第二节点的属性不满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的不允许进行延伸控制操作的接收信息的节点所处的环境。
当第二节点满足以下至少之一时,判断出第二节点不满足第二延伸访问 控制条件:
所述第二节点的属性符合所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的不允许进行延伸控制操作的接收信息的节点的属性;
所述第二节点的属性不符合所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的允许进行延伸控制操作的接收信息的节点的属性;
所述第二节点所处的环境满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的不允许进行延伸控制操作的接收信息的节点所处的环境;
所述第二节点所处的环境不满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的允许进行延伸控制操作的接收信息的节点所处的环境。
一个示例性的实施例中,延伸控制操作包括以下至少之一:运算操作、传播操作。
一个示例性的实施例中,运算操作用于描述信息可被执行的运算操作,包括以下一个或多个的任意组合:读、写、加密、模糊、泛化、差分、签名、验签、计算摘要。
一个示例性的实施例中,传播操作用于描述接收信息的节点在得到信息访问权限后对信息可执行的传播操作,包括以下一个或多个的任意组合:
保存、复制、粘贴、转发、剪切、修改、删除。
当延伸控制操作为转发时,所述第二节点对信息进行延伸控制操作包括:
第二节点将信息和其他节点的发送隐私标签转发给其他节点;
或者,第二节点生成信息的本节点的发送隐私标签,根据本节点的发送隐私标签和其他节点的发送隐私标签生成本节点的新的发送隐私标签,将信息和本节点的新的发送隐私标签发送给其他节点;其中,所述本节点的新的发送隐私标签用于表示对接收到所述信息的其他节点进行的延伸控制。
一个示例性的实施例中,本节点的新的发送隐私标签包括以下一个或多 个的任意组合:
第四约束访问控制条件、第四延伸访问控制条件、第四隐私保护需求、第四隐私保护效果;
一个示例性的实施例中,第四约束访问控制条件用于描述下一个接收信息的节点接收信息所需要满足的条件,包括以下一个或多个的任意组合:
允许接收信息的节点的属性、不允许接收信息的节点的属性、允许接收信息的节点所处的环境、不允许接收信息的节点所处的环境;
一个示例性的实施例中,节点所处的环境包括以下一个或多个的任意组合:时间、空间位置、网络、设备。
一个示例性的实施例中,第四延伸访问控制条件用于描述下一个接收信息的节点接收到信息后所能完成的延伸控制操作及需要满足的条件,包括:
延伸控制操作、操作条件、延伸控制操作和操作条件之间的对应关系;其中,所述操作条件为进行所述延伸控制操作所要满足的条件。
一个示例性的实施例中,延伸控制操作包括以下至少之一:运算操作、传播操作。
一个示例性的实施例中,运算操作用于描述信息可被执行的运算操作,包括以下一个或多个的任意组合:读、写、加密、模糊、泛化、差分、签名、验签、计算摘要。
一个示例性的实施例中,传播操作用于描述接收信息的节点在得到信息访问权限后对信息可执行的传播操作,包括以下一个或多个的任意组合:
保存、复制、粘贴、转发、剪切、修改、删除。
一个示例性的实施例中,操作条件包括以下一个或多个的任意组合:允许进行延伸控制操作的接收信息的节点的属性、不允许进行延伸控制操作的接收信息的节点的属性、允许进行延伸控制操作的接收信息的节点所处的环境、不允许进行延伸控制操作的接收信息的节点所处的环境。
一个示例性的实施例中,本节点的发送隐私标签包括以下一个或多个的任意组合:
第三约束访问控制条件、第三延伸访问控制条件、第三隐私保护需求、第三隐私保护效果;
所述生成信息的本节点的发送隐私标签包括:
所述第二节点根据以下至少之一生成所述第三约束访问控制条件:第三场景信息、第三隐私保护需求;
所述第二节点根据以下一个或多个的任意组合生成所述第三延伸访问控制条件:第三场景信息、第三隐私保护需求、第三约束访问控制条件;
所述第二节点根据以下一个或多个的任意组合生成所述第三隐私保护效果:第三隐私保护需求、第二节点所进行的延伸控制操作、第二节点的属性、第二节点环境。
一个示例性的实施例中,第三约束访问控制条件用于描述下一个节点接收信息所需要满足的条件,包括以下一个或多个的任意组合:
允许接收信息的节点的属性、不允许接收信息的节点的属性、允许接收信息的节点所处的环境、不允许接收信息的节点所处的环境;
一个示例性的实施例中,节点所处的环境包括以下一个或多个的任意组合:时间、空间位置、网络、设备。
一个示例性的实施例中,第三延伸访问控制条件用于描述下一个接收信息节点接收到信息后所能完成的延伸控制操作及需要满足的条件,包括:
延伸控制操作、操作条件、延伸控制操作和操作条件之间的对应关系;其中,所述操作条件为进行所述延伸控制操作所要满足的条件。
一个示例性的实施例中,延伸控制操作包括以下至少之一:运算操作、传播操作。
一个示例性的实施例中,运算操作用于描述信息可被执行的运算操作,包括以下一个或多个的任意组合:读、写、加密、模糊、泛化、差分、签名、验签、计算摘要。
一个示例性的实施例中,传播操作用于描述接收信息的节点在得到信息访问权限后对信息可执行的传播操作,包括以下一个或多个的任意组合:
保存、复制、粘贴、转发、剪切、修改、删除。
一个示例性的实施例中,操作条件包括以下一个或多个的任意组合:允许进行延伸控制操作的接收信息的节点的属性、不允许进行延伸控制操作的接收信息的节点的属性、允许进行延伸控制操作的接收信息的节点所处的环境、不允许进行延伸控制操作的接收信息的节点所处的环境。
一个示例性的实施例中,根据其他节点的发送隐私标签和本节点的发送隐私标签生成本节点的新的发送隐私标签包括:将其他节点的发送隐私标签和本节点的发送隐私标签的并集作为本节点的新的发送隐私标签。
例如,将第二约束访问控制条件和第三约束访问控制条件的并集作为第四约束访问控制条件,其他的参数以此类推,这里不再赘述。
一个示例性的实施例中,该方法还包括:
第二节点根据以下一个或多个的任意组合生成第三隐私保护效果:第一隐私保护需求、第二节点所进行的延伸控制操作、第二节点的属性、第二节点所处的环境;
根据本节点的发送隐私标签中的第三隐私保护效果和其他节点的发送隐私标签中的第二隐私保护需求判断延伸访问效果。其中,可以采用定性或定量的方法判断延伸访问效果。
所述的隐私保护效果代表对信息进行隐私保护后所达到的保护效果,即为对隐私保护前后的信息调用隐私度量函数,将两次调用隐私度量函数得到的值做差得到的值即为隐私保护效果。
所述的隐私度量函数可以采用条件熵、互信息、时间序列数据的隐私度量标准、差分的概念等方法对隐私信息进行度量。
隐私效果评估主要包括保护过后的信息的可用性、隐私保护的不可逆性、在可受控环境下的可逆性。
隐私信息的可用性指隐私信息在经过隐私保护算法作用后的新信息对系统功能或性能的影响。
隐私保护的不可逆性指第三方或攻击者基于其能力,从其所获取的隐私保护算法和信息中无法推断出原始的信息。
在可受控环境下的可逆性指第三方在某些信息已知情况下可以对隐私保护后的信息进行全部或部分还原。
所述的隐私度量包括但不限于包括采用条件熵和互信息进行隐私度量、基于混淆技术的隐私保护方案进行隐私度量、差分的概念进行隐私度量。
一个示例性的实施例中,定性的方法直接给出延伸访问效果好或不好,当第二节点在满足第一延伸访问控制条件中延伸控制操作对应的操作条件时进行了对应的延伸控制操作时,延伸访问控制效果为好;当第二节点在不满足第一延伸访问控制条件中延伸控制操作对应的操作条件时进行了对应的延伸控制操作,或进行了其他节点的发送隐私标签中的第二延伸访问控制条件中不包含的延伸控制操作时,延伸访问控制效果为不好。
一个示例性的实施例中,定量的方法采用访问控制效果评估函数计算出延伸访问控制效果值,所述函数不用于限定本发明实施例的保护范围,这里不再赘述。其中,第二节点可以根据第一隐私保护需求、第二节点所进行的延伸控制操作、第二节点的属性、第二节点所处的环境中的一个或多个的任意组合采用隐私保护效果生成函数生成第三隐私保护效果,函数不用于限定本发明实施例的保护范围,这里不再赘述。
一个示例性的实施例中,基于其他节点的发送隐私标签实现对第二节点对信息的延伸控制操作进行控制,第一节点和第二节点可以是同一个系统,也可以是不同的系统,可以是同一个域内,也可以是不同的域内,信息的发送可以节点之间直接发送或通过一个或多个服务器发送。因此,实现了对信息在随机访问和流转过程中进行统一的访问控制,特别是跨系统、跨域随机访问和流转过程中进行统一的访问控制。
参见图3,本申请另一个实施例提出了一种信息流转装置(如第一节点),包括:
生成模块301,设置成生成信息的本节点的发送隐私标签;其中,本节点的发送隐私标签用于表示对接收到所述信息的其他节点进行的延伸控制;
发送模块302,设置成发送信息和本节点的发送隐私标签。
一个示例性的实施例中,生成模块301设置成:
根据以下至少之一生成信息的本节点的发送隐私标签:第一场景信息、第一隐私保护需求。
一个示例性的实施例中,第一场景信息包括以下一个或多个的任意组合:
生成信息的节点、发送信息的节点、接收信息的节点、生成信息的节点属性、发送信息的节点属性、接收信息的节点属性、信息生成的环境、对信息进行的操作、信息发送的环境、信息接收的环境;
一个示例性的实施例中,信息生成的环境或信息发送的环境或信息接收的环境包括以下一个或多个的任意组合:时间、空间位置、网络、设备。
一个示例性的实施例中,第一隐私保护需求包括以下一个或多个的任意组合:
允许的操作、不允许的操作、允许操作的节点、不允许操作的节点、允许操作的节点属性、不允许操作的节点属性、允许操作的环境、不允许操作的环境;
所述的环境包括以下一个或多个的任意组合:时间、空间位置、网络、设备。
所述的属性包括但不限于以下一个或多个的任意组合:身份、角色、关系、地址、手机号、ID号、电话号码、职业。
一个示例性的实施例中,本节点的发送隐私标签包括以下一个或多个的任意组合:
第一约束访问控制条件、第一延伸访问控制条件、第一隐私保护需求;
一个示例性的实施例中,所述第一约束访问控制条件包括以下一种或多种判断条件:允许接收信息的节点的属性、不允许接收信息的节点的属性、允许接收信息的节点所处的环境、不允许接收信息的节点所处的环境;其中,待接收信息的节点成功接收信息要满足的条件是满足第一约束访问控制条件;满足第一约束访问控制条件是符合相应的判断条件,或不符合相应的判断条件;
一个示例性的实施例中,节点所处的环境包括以下一个或多个的任意组合:时间、空间位置、网络、设备。
一个示例性的实施例中,第一延伸访问控制条件用于描述接收信息的节点接收到信息后所能完成的延伸控制操作及需要满足的条件,包括:
延伸控制操作、操作条件、延伸控制操作和操作条件的对应关系,所述操作条件为进行延伸控制操作所要满足的条件。
一个示例性的实施例中,延伸控制操作包括以下至少之一:运算操作、传播操作。
一个示例性的实施例中,运算操作用于描述信息可被执行的运算操作,包括以下一个或多个的任意组合:读、写、加密、模糊、泛化、差分、签名、验签、计算摘要。
一个示例性的实施例中,传播操作用于描述接收信息的节点在得到信息访问权限后对信息可执行的传播操作,包括以下一个或多个的任意组合:
保存、复制、粘贴、转发、剪切、修改、删除。
一个示例性的实施例中,操作条件包括以下一个或多个的任意组合:允许进行延伸控制操作的接收信息的节点的属性、不允许进行延伸控制操作的接收信息的节点的属性、允许进行延伸控制操作的接收信息的节点所处的环境、不允许进行延伸控制操作的接收信息的节点所处的环境。
一个示例性的实施例中,生成信息的节点、发送信息的节点、接收信息的节点可以属于同一个域的节点,也可以是不同的域的节点;可以属于一个系统,也可以属于不同的系统。信息的发送可以节点间直接发送或通过一个或多个服务器发送。
一个示例性的实施例中,生成模块301设置成:
根据以下至少之一生成本节点的发送隐私标签中的第一约束访问控制条件:第一场景信息、第一隐私保护需求;
根据以下一个或多个的任意组合生成本节点的发送隐私标签中的第一延伸访问控制条件:第一场景信息、第一隐私保护需求、第一约束访问控制条件。
一个示例性的实施例中,第一场景信息和第一隐私保护需求可以采用自然语言和/或形式化的方式描述,所述的形式化的方式包括但不限于包括以下 一个或多个的任意组合:集合、可扩展标记语言(XML,Extensible Markup Language)。
一个示例性的实施例中,第一约束访问控制条件和第一延伸访问控制条件可以采用自然语言和/或形式化的方式描述。第一约束访问控制条件和第一延伸访问控制条件包括但不限于包括以下一个或多个的任意组合:基于角色的访问控制条件、基于属性的访问控制条件、基于关系的访问控制条件、强制性的访问控制条件、自主性的访问控制条件等;
一个示例性的实施例中,生成信息的本节点的发送隐私标签中第一约束访问控制条件、第一延伸访问控制条件可以采用人工输入的方式生成,或根据预先设计的规则生成。
一个示例性的实施例中,预先设计规则用于描述根据第一场景信息和第一隐私保护需求生成第一约束访问控制条件和第一延伸访问控制条件的方法,可以采用等自然语言和/或形式化语言方式描述。
预先设计规则可以采用下面方法,但不限于下面方法:可以将第一隐私保护需求和/或第一场景信息的集合与第一约束访问控制条件中集合直接映射,或者通过函数进行映射,或者将第一隐私保护需求和/或第一场景信息的集合与第一延伸访问控制条件中集合直接映射,或者通过函数进行映射。
例如,将第一场景信息中的接收信息的节点和第一隐私保护需求中的允许操作的节点属性进行映射得到第一约束访问控制条件中的允许接收信息的节点的属性,将第一场景信息中的接收信息的节点和第一隐私保护需求中的不允许操作的节点属性进行映射得到第一约束访问控制条件中的不允许接收信息的节点的属性,将第一场景信息中的接收信息的节点和第一隐私保护需求中的允许操作的环境进行映射得到第一约束访问控制条件中的允许接收信息的节点所处的环境,将第一场景信息中的接收信息的节点和第一隐私保护需求中的不允许操作的环境进行映射得到第一约束访问控制条件中的不允许接收信息的节点所处的环境。
又如,将第一场景信息中的接收信息的节点、接收信息的节点属性、发送信息的节点、发送信息节点属性、信息发送的环境、信息接收的环境和第一隐私保护需求中的允许的操作、允许操作的节点属性和允许操作的环境进 行映射得到第一延伸访问控制条件中的延伸控制操作对应的操作条件中的允许进行延伸控制操作的接收信息的节点的属性和允许进行延伸控制操作的接收信息的节点所处的环境,将第一场景信息中的接收信息的节点、接收信息的节点属性、发送信息的节点、发送信息节点属性、信息发送的环境、信息接收的环境和第一隐私保护需求中的不允许的操作、不允许操作的节点属性和不允许操作的环境进行映射得到第一延伸访问控制条件中的延伸控制操作对应的操作条件中的不允许进行延伸控制操作的接收信息的节点的属性和不允许进行延伸控制操作的接收信息的节点所处的环境。
一个示例性的实施例中,发送模块302设置成:
将所述信息和所述本节点的发送隐私标签发送给服务器;
或者,当判断出第二节点满足所述本节点的发送隐私标签的第一约束访问控制条件时,将所述信息和所述本节点的发送隐私标签发送给所述第二节点或通过服务器转发给第二节点;当判断出第二节点不满足本节点的发送隐私标签中的第一约束访问控制条件时,不将信息和本节点的发送隐私标签发送给第二节点。
一个示例性的实施例中,发送模块302可以同时将信息和本节点的发送隐私标签发送给第二节点,也可以分别发送,本实施例对发送方式不作限定。
一个示例性的实施例中,发送模块302设置成采用以下方式实现判断第二节点是否满足第一约束访问控制条件:
当第二节点满足以下时,判断出第二节点满足第一约束访问控制条件:
第二节点的属性符合第一约束访问控制条件中的允许接收信息的节点的属性包括;
第二节点的属性不符合第一约束访问控制条件中的不允许接收信息的节点的属性;
第二节点所处的环境满足第一约束访问控制条件中的允许接收信息的节点所处的环境包括;
第二节点所处的环境不满足第一约束访问控制条件中的不允许接收信息的节点所处的环境。
当第二节点满足以下至少之一时,判断出第二节点不满足第一约束访问控制条件:
第二节点的属性符合第一约束访问控制条件中的不允许接收信息的节点的属性;
第二节点的属性不符合第一约束访问控制条件中的允许接收信息的节点的属性;
第二节点所处的环境满足第一约束访问控制条件中的不允许接收信息的节点所处的环境;
第二节点所处的环境不满足第一约束访问控制条件中的允许接收信息的节点所处的环境。
本实施例的信息流转装置实现过程与前述实施例的信息流转方法的实现过程相同,这里不再赘述。
参见图4,本申请另一个实施例提出了一种信息流转装置(如第二节点),包括:
接收模块401,设置成从其他节点接收信息和所述信息的其他节点的发送隐私标签;其中,所述其他节点的发送隐私标签用于表示对接收到所述信息的其他节点进行的延伸控制;
处理模块402,设置成当第二节点需要对所述信息进行延伸控制操作,且根据所述其他节点的发送隐私标签判断出所述第二节点有对所述信息进行延伸控制操作的权限时,所述第二节点对所述信息进行所述延伸控制操作。
一个示例性的实施例中,其他节点的发送隐私标签包括:第二约束访问控制条件、第二延伸访问控制条件、第二隐私保护需求。
当第二节点接收到第一节点的信息和发送隐私标签时,第二约束访问控制条件、第二延伸访问控制条件、第二隐私保护需求与前述实施例的第一约束访问控制条件、第一延伸访问控制条件、第一隐私保护需求相同,这里不再赘述。
当第二节点接收到除第一节点之外的其他节点的信息和发送隐私标签时,第二约束访问控制条件、第二延伸访问控制条件、第二隐私保护需求与前述 实施例的第一约束访问控制条件、第一延伸访问控制条件、第一隐私保护需求可能相同也可能不同。
一个示例性的实施例中,处理模块402还设置成:
当根据其他节点的发送隐私标签判断出第二节点没有对信息进行延伸控制操作的权限时,第二节点不对信息进行延伸控制操作。
一个示例性的实施例中,处理模块402设置成采用以下方式实现根据其他节点的发送隐私标签判断所述第二节点是否有对所述信息进行延伸控制操作的权限:
获取所述发送隐私标签中的第二延伸访问控制条件;其中,所述第二延伸访问控制条件用于描述接收信息的节点接收到信息后所能完成的延伸控制操作及需要满足的条件,包括:延伸控制操作、操作条件、延伸控制操作和操作条件之间的对应关系;其中,所述操作条件为进行所述延伸控制操作所要满足的条件;
判断第二节点是否满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件;
当第二节点满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件时,确定第二节点有对信息进行需要进行的延伸控制操作的权限;
当第二节点不满足所述第二延伸访问控制条件中进行的延伸控制操作对应的操作条件,或所述第二延伸访问控制条件中不包括第二节点需要进行的延伸控制操作时,确定第二节点没有对信息进行需要进行的延伸控制操作的权限。
一个示例性的实施例中,操作条件包括以下一个或多个的任意组合:允许进行延伸控制操作的接收信息的节点的属性、不允许进行延伸控制操作的接收信息的节点的属性、允许进行延伸控制操作的接收信息的节点所处的环境、不允许进行延伸控制操作的接收信息的节点所处的环境。
一个示例性的实施例中,处理模块402设置成采用以下方式实现判断所述第二节点是否满足第二延伸访问控制条件中第二节点需要进行的延伸控制 操作对应的操作条件:
当第二节点满足以下至少之一时,判断出第二节点满足第二延伸访问控制条件:
所述第二节点的属性符合所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的允许进行延伸控制操作的接收信息的节点的属性;
所述第二节点的属性不符合所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的不允许进行延伸控制操作的接收信息的节点的属性;
所述第二节点所处的环境满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的允许进行延伸控制操作的接收信息的节点所处的环境;
所述第二节点所处的环境不满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的不允许进行延伸控制操作的接收信息的节点所处的环境。
当第二节点满足以下至少之一时,判断出第二节点不满足第二延伸访问控制条件:
所述第二节点的属性符合所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的不允许进行延伸控制操作的接收信息的节点的属性;
所述第二节点的属性不符合所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的允许进行延伸控制操作的接收信息的节点的属性;
所述第二节点所处的环境满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的不允许进行延伸控制操作的接收信息的节点所处的环境;
所述第二节点所处的环境不满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的允许进行延伸控制操作的接收 信息的节点所处的环境。
一个示例性的实施例中,延伸控制操作包括以下至少之一:运算操作、传播操作。
一个示例性的实施例中,运算操作用于描述信息可被执行的运算操作,包括以下一个或多个的任意组合:读、写、加密、模糊、泛化、差分、签名、验签、计算摘要。
一个示例性的实施例中,传播操作用于描述接收信息的节点在得到信息访问权限后对信息可执行的传播操作,包括以下一个或多个的任意组合:
保存、复制、粘贴、转发、剪切、修改、删除。
当延伸控制操作为转发时,处理模块402设置成采用以下方式实现对信息进行延伸控制操作:
将信息和发送隐私标签转发给其他节点;
或者,生成信息的本节点的发送隐私标签,根据本节点的发送隐私标签和其他节点的发送隐私标签生成本节点的新的发送隐私标签,将信息和本节点的新的发送隐私标签发送给其他节点;其中,所述本节点的新的发送隐私标签用于表示对接收到所述信息的其他节点进行的延伸控制。
一个示例性的实施例中,本节点的新的发送隐私标签包括以下一个或多个的任意组合:
第四约束访问控制条件、第四延伸访问控制条件、第四隐私保护需求、第四隐私保护效果;
一个示例性的实施例中,第四约束访问控制条件用于描述下一个接收信息的节点接收信息所需要满足的条件,包括以下一个或多个的任意组合:
允许接收信息的节点的属性、不允许接收信息的节点的属性、允许接收信息的节点所处的环境、不允许接收信息的节点所处的环境;
一个示例性的实施例中,节点所处的环境包括以下一个或多个的任意组合:时间、空间位置、网络、设备。
其中,第四延伸访问控制条件用于描述下一个接收信息的节点接收到信 息后所能完成的延伸控制操作及需要满足的条件,包括:
延伸控制操作、操作条件、延伸控制操作和操作条件之间的对应关系;其中,所述操作条件为进行所述延伸控制操作所要满足的条件。
一个示例性的实施例中,延伸控制操作包括以下至少之一:运算操作、传播操作。
一个示例性的实施例中,运算操作用于描述信息可被执行的运算操作,包括以下一个或多个的任意组合:读、写、加密、模糊、泛化、差分、签名、验签、计算摘要。
一个示例性的实施例中,传播操作用于描述接收信息的节点在得到信息访问权限后对信息可执行的传播操作,包括以下一个或多个的任意组合:
保存、复制、粘贴、转发、剪切、修改、删除。
一个示例性的实施例中,操作条件包括以下一个或多个的任意组合:允许进行延伸控制操作的接收信息的节点的属性、不允许进行延伸控制操作的接收信息的节点的属性、允许进行延伸控制操作的接收信息的节点所处的环境、不允许进行延伸控制操作的接收信息的节点所处的环境。
一个示例性的实施例中,本节点的发送隐私标签包括以下一个或多个的任意组合:
第三约束访问控制条件、第三延伸访问控制条件、第二隐私保护需求、第三隐私保护效果;
所述生成本节点的发送隐私标签包括:
所述第二节点根据以下至少之一生成所述第三约束访问控制条件:第三场景信息、第三隐私保护需求;
所述第二节点根据以下一个或多个的任意组合生成所述第三延伸访问控制条件:第三场景信息、第三隐私保护需求、第三约束访问控制条件;
所述第二节点根据以下一个或多个的任意组合生成所述第三隐私保护效果:第三隐私保护需求、第二节点所进行的延伸控制操作、第二节点的属性、第二节点环境。
一个示例性的实施例中,第三约束访问控制条件用于描述下一个接收信息的节点接收信息所需要满足的条件,包括以下一个或多个的任意组合:
允许接收信息的节点的属性、不允许接收信息的节点的属性、允许接收信息的节点所处的环境、不允许接收信息的节点所处的环境;
一个示例性的实施例中,节点所处的环境包括以下一个或多个的任意组合:时间、空间位置、网络、设备。
其中,第三延伸访问控制条件用于描述下一个接收信息的节点接收到信息后所能完成的延伸控制操作及需要满足的条件,包括:
延伸控制操作、操作条件、延伸控制操作和操作条件之间的对应关系;其中,所述操作条件为进行所述延伸控制操作所要满足的条件。
一个示例性的实施例中,延伸控制操作包括以下至少之一:运算操作、传播操作。
一个示例性的实施例中,运算操作用于描述信息可被执行的运算操作,包括以下一个或多个的任意组合:读、写、加密、模糊、泛化、差分、签名、验签、计算摘要。
一个示例性的实施例中,传播操作用于描述下一个接收信息的节点在得到信息访问权限后对信息可执行的传播操作,包括以下一个或多个的任意组合:
保存、复制、粘贴、转发、剪切、修改、删除。
一个示例性的实施例中,操作条件包括以下一个或多个的任意组合:允许进行延伸控制操作的接收信息的节点的属性、不允许进行延伸控制操作的接收信息的节点的属性、允许进行延伸控制操作的接收信息的节点所处的环境、不允许进行延伸控制操作的接收信息的节点所处的环境。
一个示例性的实施例中,处理模块402设置成采用以下方式实现根据其他节点的发送隐私标签和本节点的发送隐私标签生成本节点的新的发送隐私标签:将其他节点的发送隐私标签和本节点的发送隐私标签的并集作为本节点的新的发送隐私标签。
例如,将第二约束访问控制条件和第三约束访问控制条件的并集作为第 四约束访问控制条件,其他的参数以此类推,这里不再赘述。
一个示例性的实施例中,处理模块402还设置成:
根据以下一个或多个的任意组合生成第三隐私保护效果:第一隐私保护需求、第二节点所进行的延伸控制操作、第二节点的属性、第二节点所处的环境;根据本节点的发送隐私标签中的第三隐私保护效果和其他节点的发送隐私标签中的第二隐私保护需求判断延伸访问效果。
所述的隐私保护效果代表对信息进行隐私保护后所达到的保护效果,即为对隐私保护前后的信息调用隐私度量函数,将两次调用隐私度量函数得到的值做差得到的值即为隐私保护效果。
所述的隐私度量函数可以采用条件熵、互信息、时间序列数据的隐私度量标准、差分的概念等方法对隐私信息进行度量。
隐私效果评估主要包括保护过后的信息的可用性、隐私保护的不可逆性、在可受控环境下的可逆性。
隐私信息的可用性指隐私信息在经过隐私保护算法作用后的新信息对系统功能或性能的影响。
隐私保护的不可逆性指第三方或攻击者基于其能力,从其所获取的隐私保护算法和信息中无法推断出原始的信息。
在可受控环境下的可逆性指第三方在某些信息已知情况下可以对隐私保护后的信息进行全部或部分还原。
所述的隐私度量包括但不限于包括采用条件熵和互信息进行隐私度量、基于混淆技术的隐私保护方案进行隐私度量、差分的概念进行隐私度量。
一个示例性的实施例中,可以采用定性或定量的方法判断延伸访问效果。
一个示例性的实施例中,定性的方法直接给出延伸访问效果好或不好,当第二节点在满足第一延伸访问控制条件中延伸控制操作对应的操作条件时进行了对应的延伸控制操作时,延伸访问控制效果为好;当第二节点在不满足第一延伸访问控制条件中延伸控制操作对应的操作条件时进行了对应的延伸控制操作,或进行了其他节点的发送隐私标签中的第二延伸访问控制条件中不包含的延伸控制操作时,延伸访问控制效果为不好。
一个示例性的实施例中,定量的方法采用访问控制效果评估函数计算出延伸访问控制效果值,函数不用于限定本发明实施例的保护范围,这里不再赘述。其中,第二节点可以根据第一隐私保护需求、第二节点所进行的延伸控制操作、第二节点的属性、第二节点所处的环境中的一个或多个的任意组合采用隐私保护效果生成函数生成第三隐私保护效果,函数不用于限定本发明实施例的保护范围,这里不再赘述。
本发明实施例基于其他节点的发送隐私标签实现对第二节点对信息的延伸控制操作进行控制,第一节点和第二节点可以是同一个系统,也可以是不同的系统,可以是同一个域内,也可以是不同的域内,信息的发送可以节点之间直接发送或通过一个或多个服务器发送。因此,实现了对信息在随机访问和流转过程中进行统一的访问控制,特别是跨系统、跨域随机访问和流转过程中进行统一的访问控制。
本发明实施例的信息流转装置实现过程与前述实施例的信息流转方法的实现过程相同,这里不再赘述。
本申请另一个实施例提出了一种信息流转装置,包括处理器和计算机可读存储介质,所述计算机可读存储介质中存储有指令,当所述指令被所述处理器执行时,实现上述任一种信息流转方法。
本申请另一个实施例提出了一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现上述任一种信息流转方法的步骤。
参见图5,本申请另一个实施例提出了一种信息流转系统,包括:
第一节点501,设置成生成信息的本节点的发送隐私标签;其中,本节点的发送隐私标签用于表示对接收到所述信息的其他节点进行的延伸控制;发送信息和本节点的发送隐私标签;
第二节点502,设置成接收到其他节点发送的信息和所述信息的其他节点的发送隐私标签;其中,其他节点的发送隐私标签用于表示对接收到所述信息的其他节点进行的延伸控制;当第二节点需要对所述信息进行延伸控制操作,且根据所述其他节点的发送隐私标签判断出所述第二节点有对所述信息进行延伸控制操作的权限时,所述第二节点对所述信息进行所述延伸控制 操作。
一个示例性的实施例中,第一节点501设置成采用以下方式实现生成信息的本节点的发送隐私标签:
根据以下至少之一生成信息的本节点的发送隐私标签:第一场景信息、第一隐私保护需求。
一个示例性的实施例中,第一场景信息包括以下一个或多个的任意组合:
生成信息的节点、发送信息的节点、接收信息的节点、生成信息的节点属性、发送信息的节点属性、接收信息的节点属性、信息生成的环境、对信息进行的操作、信息发送的环境、信息接收的环境;
一个示例性的实施例中,信息生成的环境或信息发送的环境或信息接收的环境包括以下一个或多个的任意组合:时间、空间位置、网络、设备。
一个示例性的实施例中,第一隐私保护需求包括以下一个或多个的任意组合:
允许的操作、不允许的操作、允许操作的节点、不允许操作的节点、允许操作的节点属性、不允许操作的节点属性、允许操作的环境、不允许操作的环境;
所述的环境包括以下一个或多个的任意组合:时间、空间位置、网络、设备。
所述的属性包括但不限于以下一个或多个的任意组合:身份、角色、关系、地址、手机号、ID号、电话号码、职业。
一个示例性的实施例中,本节点的发送隐私标签包括以下一个或多个的任意组合:
第一约束访问控制条件、第一延伸访问控制条件、第一隐私保护需求;
一个示例性的实施例中,所述第一约束访问控制条件包括以下一种或多种判断条件:允许接收信息的节点的属性、不允许接收信息的节点的属性、允许接收信息的节点所处的环境、不允许接收信息的节点所处的环境;其中,待接收信息的节点成功接收信息要满足的条件是满足第一约束访问控制条件;满足第一约束访问控制条件是符合相应的判断条件,或不符合相应的判断条 件。
一个示例性的实施例中,节点所处的环境包括以下一个或多个的任意组合:时间、空间位置、网络、设备。
一个示例性的实施例中,第一延伸访问控制条件用于描述接收信息的节点接收到信息后所能完成的延伸控制操作及需要满足的条件,包括以下一个或多个的任意组合:
延伸控制操作、操作条件、延伸控制操作和操作条件的对应关系,所述操作条件为进行延伸控制操作所要满足的条件。
一个示例性的实施例中,延伸控制操作包括以下至少之一:运算操作、传播操作。
一个示例性的实施例中,运算操作用于描述信息可被执行的运算操作,包括以下一个或多个的任意组合:读、写、加密、模糊、泛化、差分、签名、验签、计算摘要。
一个示例性的实施例中,传播操作用于描述接收信息的节点在得到信息访问权限后对信息可执行的传播操作,包括以下一个或多个的任意组合:
保存、复制、粘贴、转发、剪切、修改、删除。
一个示例性的实施例中,操作条件包括以下一个或多个的任意组合:允许进行延伸控制操作的接收信息的节点的属性、不允许进行延伸控制操作的接收信息的节点的属性、允许进行延伸控制操作的接收信息的节点所处的环境、不允许进行延伸控制操作的接收信息的节点所处的环境。
一个示例性的实施例中,生成信息的节点、发送信息的节点、接收信息的节点可以属于同一个域的节点,也可以是不同的域的节点;可以属于一个系统,也可以属于不同的系统。信息的发送可以节点之间直接发送或通过一个或多个服务器发送。
一个示例性的实施例中,第一节点501设置成采用以下方式实现生成本节点的发送隐私标签:
根据以下至少之一生成本节点的发送隐私标签中的第一约束访问控制条件:第一场景信息、第一隐私保护需求;
根据以下一个或多个的任意组合生成本节点的发送隐私标签中的第一延伸访问控制条件:第一场景信息、第一隐私保护需求、第一约束访问控制条件。
一个示例性的实施例中,第一场景信息和第一隐私保护需求可以采用自然语言和/或形式化的方式描述,所述的形式化的方式包括但不限于包括以下一个或多个的任意组合:集合、可扩展标记语言(XML,Extensible Markup Language)。
一个示例性的实施例中,第一约束访问控制条件和第一延伸访问控制条件可以采用自然语言和/或形式化的方式描述。第一约束访问控制条件和第一延伸访问控制条件包括但不限于包括以下一个或多个的任意组合:基于角色的访问控制条件、基于属性的访问控制条件、基于关系的访问控制条件、强制性的访问控制条件、自主性的访问控制条件等;
一个示例性的实施例中,生成信息的本节点的发送隐私标签中第一约束访问控制条件、第一延伸访问控制条件可以采用人工输入的方式生成,或根据预先设计的规则生成。
一个示例性的实施例中,预先设计规则用于描述根据第一场景信息和第一隐私保护需求生成第一约束访问控制条件和第一延伸访问控制条件的方法,可以采用等自然语言和/或形式化语言方式描述。
预先设计规则可以采用下面方法,但不限于下面方法:可以将第一隐私保护需求和/或第一场景信息的集合与第一约束访问控制条件中集合直接映射,或者通过函数进行映射,或者将第一隐私保护需求和/或第一场景信息的集合与第一延伸访问控制条件中集合直接映射,或者通过函数进行映射。
例如,将第一场景信息中的接收信息的节点和第一隐私保护需求中的允许操作的节点属性进行映射得到第一约束访问控制条件中的允许接收信息的节点的属性,将第一场景信息中的接收信息的节点和第一隐私保护需求中的不允许操作的节点属性进行映射得到第一约束访问控制条件中的不允许接收信息的节点的属性,将第一场景信息中的接收信息的节点和第一隐私保护需求中的允许操作的环境进行映射得到第一约束访问控制条件中的允许接收信息的节点所处的环境,将第一场景信息中的接收信息的节点和第一隐私保护 需求中的不允许操作的环境进行映射得到第一约束访问控制条件中的不允许接收信息的节点所处的环境。
又如,将第一场景信息中的接收信息的节点、接收信息的节点属性、发送信息的节点、发送信息节点属性、信息发送的环境、信息接收的环境和第一隐私保护需求中的允许的操作、允许操作的节点属性和允许操作的环境进行映射得到第一延伸访问控制条件中的延伸控制操作对应的操作条件中的允许进行延伸控制操作的接收信息的节点的属性和允许进行延伸控制操作的接收信息的节点所处的环境,将第一场景信息中的接收信息的节点、接收信息的节点属性、发送信息的节点、发送信息节点属性、信息发送的环境、信息接收的环境和第一隐私保护需求中的不允许的操作、不允许操作的节点属性和不允许操作的环境进行映射得到第一延伸访问控制条件中的延伸控制操作对应的操作条件中的不允许进行延伸控制操作的接收信息的节点的属性和不允许进行延伸控制操作的接收信息的节点所处的环境。
一个示例性的实施例中,第一节点501将所述信息和所述本节点的发送隐私标签发送给服务器;
或者,当判断出第二节点满足所述本节点的发送隐私标签的第一约束访问控制条件时,将所述信息和所述本节点的发送隐私标签发送给所述第二节点或通过服务器转发给第二节点;当判断出第二节点不满足本节点的发送隐私标签中的第一约束访问控制条件时,不将信息和本节点的发送隐私标签发送给第二节点。
一个示例性的实施例中,信息和本节点的发送隐私标签可以同时发送给第二节点或服务器,也可以分别发送,本实施例对发送方式不作限定。
一个示例性的实施例中,第一节点501设置成采用以下方式实现判断第二节点是否满足第一约束访问控制条件:
当第二节点满足以下时,判断出第二节点满足第一约束访问控制条件:
第二节点的属性符合第一约束访问控制条件中的允许接收信息的节点的属性;
第二节点的属性不符合第一约束访问控制条件中的不允许接收信息的节 点的属性;
第二节点的所处的环境满足第一约束访问控制条件中的允许接收信息的节点所处的环境包括第二节点或应用服务器所处的环境;
第二节点的所处的环境不满足第一约束访问控制条件中的不允许接收信息的节点所处的环境。
当第二节点满足以下至少之一时,判断出第二节点不满足第一约束访问控制条件:
第二节点的属性符合第一约束访问控制条件中的不允许接收信息的节点的属性;
第二节点的属性不符合第一约束访问控制条件中的允许接收信息的节点的属性;
第二节点的所处的环境满足第一约束访问控制条件中的不允许接收信息的节点所处的环境;
第二节点的所处的环境不满足第一约束访问控制条件中的允许接收信息的节点所处的环境。
一个示例性的实施例中,第二节点502还设置成:
当根据其他节点的发送隐私标签判断出第二节点没有对信息进行延伸控制操作的权限时,第二节点不对信息进行延伸控制操作。
一个示例性的实施例中,第二节点502设置成采用以下方式实现根据其他节点的发送隐私标签判断所述第二节点是否有对所述信息进行延伸控制操作的权限:
获取所述其他节点的发送隐私标签中的第二延伸访问控制条件;其中,所述第二延伸访问控制条件用于描述接收信息的节点接收到信息后所能完成的延伸控制操作及需要满足的条件,包括:延伸控制操作、操作条件、延伸控制操作和操作条件之间的对应关系;其中,所述操作条件为进行所述延伸控制操作所要满足的条件;
判断第二节点是否满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件;
当第二节点满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件时,确定第二节点有对信息进行需要进行的延伸控制操作的权限;
当第二节点不满足所述第二延伸访问控制条件中进行的延伸控制操作对应的操作条件,或所述第二延伸访问控制条件中不包括第二节点需要进行的延伸控制操作时,确定第二节点没有对信息进行需要进行的延伸控制操作的权限。
一个示例性的实施例中,操作条件包括以下一个或多个的任意组合:允许进行延伸控制操作的接收信息的节点的属性、不允许进行延伸控制操作的接收信息的节点的属性、允许进行延伸控制操作的接收信息的节点所处的环境、不允许进行延伸控制操作的接收信息的节点所处的环境。
一个示例性的实施例中,第二节点502设置成采用以下方式实现判断所述第二节点是否满足第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件:
当第二节点满足以下至少之一时,判断出第二节点满足第二延伸访问控制条件:
所述第二节点的属性符合所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的允许进行延伸控制操作的接收信息的节点的属性;
所述第二节点的属性不符合所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的不允许进行延伸控制操作的接收信息的节点的属性;
所述第二节点所处的环境满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的允许进行延伸控制操作的接收信息的节点所处的环境;
所述第二节点所处的环境不满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的不允许进行延伸控制操作的接收信息的节点所处的环境。
当第二节点满足以下至少之一时,判断出第二节点不满足第二延伸访问控制条件:
所述第二节点的属性符合所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的不允许进行延伸控制操作的接收信息的节点的属性包括第二节点的属性;
所述第二节点的属性不符合所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的允许进行延伸控制操作的接收信息的节点的属性;
所述第二节点所处的环境满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的不允许进行延伸控制操作的接收信息的节点所处的环境;
所述第二节点所处的环境不满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的允许进行延伸控制操作的接收信息的节点所处的环境。
一个示例性的实施例中,延伸控制操作包括以下至少之一:运算操作、传播操作。
一个示例性的实施例中,运算操作用于描述信息可被执行的运算操作,包括以下一个或多个的任意组合:读、写、加密、模糊、泛化、差分、签名、验签、计算摘要。
一个示例性的实施例中,传播操作用于描述接收信息的节点在得到信息访问权限后对信息可执行的传播操作,包括以下一个或多个的任意组合:
保存、复制、粘贴、转发、剪切、修改、删除。
当延伸控制操作为转发时,第二节点502设置成采用以下方式实现对信息进行延伸控制操作:
将信息和其他节点的发送隐私标签转发给其他节点;
或者,生成信息的本节点的发送隐私标签,根据本节点的发送隐私标签和其他节点的发送隐私标签生成本节点的新的发送隐私标签,将信息和本节点的新的发送隐私标签发送给其他节点;其中,所述本节点的新的发送隐私 标签用于表示对接收到所述信息的其他节点进行的延伸控制。
一个示例性的实施例中,本节点的新的发送隐私标签包括以下一个或多个的任意组合:
第四约束访问控制条件、第四延伸访问控制条件、第四隐私保护需求、第四隐私保护效果;
一个示例性的实施例中,第四约束访问控制条件用于描述下一个接收信息的节点接收信息所需要满足的条件,包括以下一个或多个的任意组合:
允许接收信息的节点的属性、不允许接收信息的节点的属性、允许接收信息的节点所处的环境、不允许接收信息的节点所处的环境;
一个示例性的实施例中,节点所处的环境包括以下一个或多个的任意组合:时间、空间位置、网络、设备。
一个示例性的实施例中,第四延伸访问控制条件用于描述下一个接收信息的节点接收到信息后所能完成的延伸控制操作及需要满足的条件,包括:
延伸控制操作、操作条件、延伸控制操作和操作条件之间的对应关系;其中,所述操作条件为进行所述延伸控制操作所要满足的条件。
一个示例性的实施例中,延伸控制操作包括以下至少之一:运算操作、传播操作。
一个示例性的实施例中,运算操作用于描述信息可被执行的运算操作,包括以下一个或多个的任意组合:读、写、加密、模糊、泛化、差分、签名、验签、计算摘要。
一个示例性的实施例中,传播操作用于描述接收信息的节点在得到信息访问权限后对信息可执行的传播操作,包括以下一个或多个的任意组合:
保存、复制、粘贴、转发、剪切、修改、删除。
一个示例性的实施例中,操作条件包括以下一个或多个的任意组合:允许进行延伸控制操作的接收信息的节点的属性、不允许进行延伸控制操作的接收信息的节点的属性、允许进行延伸控制操作的接收信息的节点所处的环境、不允许进行延伸控制操作的接收信息的节点所处的环境。
一个示例性的实施例中,本节点的发送隐私标签包括以下一个或多个的任意组合:
第三约束访问控制条件、第三延伸访问控制条件、第三隐私保护需求、第三隐私保护效果;
所述生成信息的本节点的发送隐私标签包括:
所述第二节点根据以下至少之一生成所述第三约束访问控制条件:第三场景信息、第三隐私保护需求;
所述第二节点根据以下一个或多个的任意组合生成所述第三延伸访问控制条件:第三场景信息、第三隐私保护需求、第三约束访问控制条件;
所述第二节点根据以下一个或多个的任意组合生成所述第三隐私保护效果:第三隐私保护需求、第二节点所进行的延伸控制操作、第二节点的属性、第二节点环境。
一个示例性的实施例中,第三约束访问控制条件用于描述下一个接收信息的节点接收信息所需要满足的条件,包括以下一个或多个的任意组合:
允许接收信息的节点的属性、不允许接收信息的节点的属性、允许接收信息的节点所处的环境、不允许接收信息的节点所处的环境;
一个示例性的实施例中,节点所处的环境包括以下一个或多个的任意组合:时间、空间位置、网络、设备。
一个示例性的实施例中,第三延伸访问控制条件用于描述下一个接收信息的节点接收到信息后所能完成的延伸控制操作及需要满足的条件,包括以下一个或多个的任意组合:
延伸控制操作、操作条件、延伸控制操作和操作条件之间的对应关系;其中,所述操作条件为进行所述延伸控制操作所要满足的条件。
一个示例性的实施例中,延伸控制操作包括以下至少之一:运算操作、传播操作。
一个示例性的实施例中,运算操作用于描述信息可被执行的运算操作,包括以下一个或多个的任意组合:读、写、加密、模糊、泛化、差分、签名、验签、计算摘要。
一个示例性的实施例中,传播操作用于描述接收信息的节点在得到信息访问权限后对信息可执行的传播操作,包括以下一个或多个的任意组合:
保存、复制、粘贴、转发、剪切、修改、删除。
一个示例性的实施例中,操作条件包括以下一个或多个的任意组合:允许进行延伸控制操作的接收信息的节点的属性、不允许进行延伸控制操作的接收信息的节点的属性、允许进行延伸控制操作的接收信息的节点所处的环境、不允许进行延伸控制操作的接收信息的节点所处的环境。
一个示例性的实施例中,第二节点502设置成采用以下方式实现根据其他节点的发送隐私标签和本节点的发送隐私标签生成本节点的新的发送隐私标签:将其他节点的发送隐私标签和本节点的发送隐私标签的并集作为本节点的新的发送隐私标签。
例如,将第二约束访问控制条件和第三约束访问控制条件的并集作为第四约束访问控制条件,其他的参数以此类推,这里不再赘述。
一个示例性的实施例中,第二节点502还设置成:
根据以下一个或多个的任意组合生成第三隐私保护效果:第一隐私保护需求、第二节点所进行的延伸控制操作、第二节点的属性、第二节点环境;
根据本节点的发送隐私标签中的第三隐私保护效果和其他节点的发送隐私标签中的第二隐私保护需求判断延伸访问效果。
所述的隐私保护效果代表对信息进行隐私保护后所达到的保护效果,即为对隐私保护前后的信息调用隐私度量函数,将两次调用隐私度量函数得到的值做差得到的值即为隐私保护效果。
所述的隐私度量函数可以采用条件熵、互信息、时间序列数据的隐私度量标准、差分的概念等方法对隐私信息进行度量。
隐私效果评估主要包括保护过后的信息的可用性、隐私保护的不可逆性、在可受控环境下的可逆性。
隐私信息的可用性指隐私信息在经过隐私保护算法作用后的新信息对系统功能或性能的影响。
隐私保护的不可逆性指第三方或攻击者基于其能力,从其所获取的隐私 保护算法和信息中无法推断出原始的信息。
在可受控环境下的可逆性指第三方在某些信息已知情况下可以对隐私保护后的信息进行全部或部分还原。
所述的隐私度量包括但不限于包括采用条件熵和互信息进行隐私度量、基于混淆技术的隐私保护方案进行隐私度量、差分的概念进行隐私度量。
一个示例性的实施例中,可以采用定性或定量的方法判断延伸访问效果。
一个示例性的实施例中,定性的方法直接给出延伸访问效果好或不好,当第二节点在满足第一延伸访问控制条件中延伸控制操作对应的操作条件时进行了对应的延伸控制操作时,延伸访问控制效果为好;当第二节点在不满足第一延伸访问控制条件中延伸控制操作对应的操作条件时进行了对应的延伸控制操作,或进行了其他节点的发送隐私标签中的第二延伸访问控制条件中不包含的延伸控制操作时,延伸访问控制效果为不好。
一个示例性的实施例中,定量的方法采用访问控制效果评估函数计算出延伸访问控制效果值,所述函数不用于限定本发明实施例的保护范围,这里不再赘述。其中,第二节点可以根据第一隐私保护需求、第二节点所进行的延伸控制操作、第二节点的属性、第二节点所处的环境中的一个或多个的任意组合采用隐私保护效果生成函数生成第三隐私保护效果,所述函数不用于限定本实施例的保护范围,这里不再赘述。
下面通过应用中的实例对本申请技术方案进行示例性说明。
实例1
本实例通过例子来说明如何生成本节点的发送隐私标签中的约束访问控制条件、延伸访问控制条件。
社交系统S中用户u 1生成信息M,生成时间2018/8/10,10:00,并将信息M上传至社交系统中,访问信息M的用户为u 2,用户u 2将信息M转发给用户u 3
用户u 1制定的隐私保护需求:
只有系统S中用户,并且与发送信息M的用户为朋友关系的用户,在系统S中才可以访问信息M;
访问信息M的用户只可以转发给系统S中自己的朋友,而不能转发给其 他人;
访问信息M的用户只有读的权限,而没有修改的权限,也没有备份的权限。
根据上述例子中,生成的场景信息为:
系统信息:社交系统S;
信息M的生成者:用户u 1
生成时间:2018/8/10,10:00;
信息M的访问者和转发者:用户u 2
转发的信息M的接收者:用户u 3
隐私保护需求包括:
只有系统S中用户,并且与用户u 1为朋友关系,才可以访问信息M;
访问信息M的用户只可以转发给系统S中自己的朋友,而不能转发给其他人;
访问信息M的用户只有读的权限,而没有修改的权限,也没有备份的权限。
根据上述场景信息和隐私保护需求生成的约束访问控制条件:
允许接收信息的节点的属性:信息M的访问者属于社交系统S,且信息M的访问者u 2与用户u 1的关系为朋友关系;
根据上述场景信息和隐私保护需求生成的延伸访问控制条件:
延伸控制操作:转发,读;
转发的操作条件:信息M的转发者u 2、转发的信息M的接收者u 3都属于社交系统S,且待u 2与u 3之间的关系为朋友关系;
上述实例中的场景信息、隐私保护需求、约束访问控制条件和延伸控制条件描述可以采用自然语言、形式化描述等任何一种方法。
实例2
本实例通过例子来说明如何根据发送隐私标签进行延伸控制操作的权限的判断。
在上述应用场景中,根据用户u 1生成发送隐私标签中约束访问控制条件、延伸访问控制条件,用户u 2与用户u 1为朋友关系,且都属于社交系统S,所以用户u 2对信息M有读、转发的操作权限,没有写的权限,如果用户u 2对 信息M进行读操作,判断结果为可以进行延伸控制操作,如果用户u 2对信息M进行写操作,判断结果为不可以进行延伸控制操作。用户u 2对信息M进行转发操作,如果用户u 3属于该社交系统S,用户u 3与用户u 2为朋友关系,判断结果为可以进行延伸控制操作,否则如果用户u 3不属于该社交系统S,或者用户u 3与用户u 2为朋友关系,则不可以进行延伸控制操作。
实例3
本实例通过例子来说明如何进行隐私保护效果的生成。
假设用户u 2接收到信息M后,采用隐私保护算法S对信息M进行隐私运算操作,得到新的信息M′,调用隐私度量算法得到信息M的隐私度量值为C 1,信息M′的隐私度量值为C 2,C 2与C 1为隐私保护效果。
上述实施例通过量化的方法采用隐私保护效果生成函数计算生成隐私保护效果。
实例4
本实例通过例子来说明如何进行延伸访问效果的判断。
在上述实例中,延伸控制条件要求信息M只能给社交系统S内用户,且为自己的朋友转发消息,如果用户u 2接收到信息M转发给系统外其它用户,或者转发给系统内除了自己朋友外的其它用户,延伸访问效果为不好。如果用户u 2接收到信息M后只能转发给本系统内自己朋友,延伸访问效果好。如果信息转发后,其它用户接收到消息后,可以对消息进行任意修改、删除、备份等操作,延伸访问效果不好。本实例只是通过定性的方法对延伸访问控制效果进行判断。
本领域普通技术人员可以理解,上文中所公开方法中的全部或某些步骤、系统、装置中的功能模块/单元可以被实施为软件、固件、硬件及其适当的组合。在硬件实施方式中,在以上描述中提及的功能模块/单元之间的划分不一定对应于物理组件的划分;例如,一个物理组件可以具有多个功能,或者一个功能或步骤可以由若干物理组件合作执行。某些组件或所有组件可以被实施为由处理器,如数字信号处理器或微处理器执行的软件,或者被实施为硬件,或者被实施为集成电路,如专用集成电路。这样的软件可以分布在计算机可读介质上,计算机可读介质可以包括计算机存储介质(或非暂时性介质) 和通信介质(或暂时性介质)。如本领域普通技术人员公知的,术语计算机存储介质包括在设置成存储信息(诸如计算机可读指令、数据结构、程序模块或其他数据)的任何方法或技术中实施的易失性和非易失性、可移除和不可移除介质。计算机存储介质包括但不限于RAM、ROM、EEPROM、闪存或其他存储器技术、CD-ROM、数字多功能盘(DVD)或其他光盘存储、磁盒、磁带、磁盘存储或其他磁存储装置、或者可以设置成存储期望的信息并且可以被计算机访问的任何其他的介质。此外,本领域普通技术人员公知的是,通信介质通常包含计算机可读指令、数据结构、程序模块或者诸如载波或其他传输机制之类的调制数据信号中的其他数据,并且可包括任何信息递送介质。

Claims (13)

  1. 一种信息流转方法,包括:
    第一节点生成信息的本节点的发送隐私标签;其中,本节点的发送隐私标签用于表示对接收到所述信息的其他节点进行的延伸控制;
    第一节点发送所述信息和所述本节点的发送隐私标签。
  2. 根据权利要求1所述的信息流转方法,其中,所述本节点的发送隐私标签包括:
    第一约束访问控制条件、第一延伸访问控制条件;或包括第一约束访问控制条件、第一延伸访问控制条件以及第一隐私保护需求;
    所述生成信息的本节点的发送隐私标签包括:
    所述第一节点根据以下至少之一生成所述第一约束访问控制条件:第一场景信息、第一隐私保护需求;
    所述第一节点根据以下一个或多个的任意组合生成所述第一延伸访问控制条件:第一场景信息、第一隐私保护需求、第一约束访问控制条件。
  3. 根据权利要求2所述的信息流转方法,其中,所述第一约束访问控制条件包括以下一种或多种判断条件:允许接收信息的节点的属性、不允许接收信息的节点的属性、允许接收信息的节点所处的环境、不允许接收信息的节点所处的环境;其中,待接收信息的节点成功接收信息要满足的条件是满足第一约束访问控制条件;满足第一约束访问控制条件是符合相应的判断条件,或不符合相应的判断条件;
    所述环境包括以下一个或多个的任意组合:时间、空间位置、网络、设备;
    所述第一延伸访问控制条件用于描述接收信息的节点接收到信息后所能完成的延伸控制操作及需要满足的条件,包括:延伸控制操作、操作条件、延伸控制操作和操作条件之间的对应关系;其中,所述操作条件为进行所述延伸控制操作所要满足的条件。
  4. 根据权利要求1所述的信息流转方法,其中,所述第一节点发送信息 和所述本节点的发送隐私标签包括:
    第一节点将所述信息和所述本节点的发送隐私标签发送给服务器;
    或者,当判断出第二节点满足所述本节点的发送隐私标签的第一约束访问控制条件时,将所述信息和所述本节点的发送隐私标签发送给所述第二节点或通过服务器转发给第二节点。
  5. 根据权利要求4所述的信息流转方法,其中,所述判断第二节点是否满足本节点的发送隐私标签的第一约束访问控制条件包括:
    当第二节点满足以下至少之一时,判断出第二节点满足第一约束访问控制条件:
    第二节点的属性符合第一约束访问控制条件中的允许接收信息的节点的属性;
    第二节点的属性不符合第一约束访问控制条件中的不允许接收信息的节点的属性;
    第二节点所处的环境满足第一约束访问控制条件中的允许接收信息的节点所处的环境;
    第二节点所处的环境不满足第一约束访问控制条件中的不允许接收信息的节点所处的环境;
    当第二节点满足以下至少之一时,判断出第二节点不满足第一约束访问控制条件:
    第二节点的属性符合第一约束访问控制条件中的不允许接收信息的节点的属性;
    第二节点的属性不符合第一约束访问控制条件中的允许接收信息的节点的属性;
    第二节点所处的环境满足第一约束访问控制条件中的不允许接收信息的节点所处的环境;
    第二节点所处的环境不满足第一约束访问控制条件中的允许接收信息的节点所处的环境。
  6. 一种信息流转方法,包括:
    第二节点从其他节点接收信息和所述信息的其他节点的发送隐私标签;其中,其他节点的发送隐私标签用于表示对接收到所述信息的其他节点进行的延伸控制;
    当第二节点需要对所述信息进行延伸控制操作,且根据所述其他节点的发送隐私标签判断出所述第二节点有对所述信息进行延伸控制操作的权限时,所述第二节点对所述信息进行所述延伸控制操作。
  7. 根据权利要求6所述的信息流转方法,其中,所述根据所述其他节点的发送隐私标签判断所述第二节点是否有对所述信息进行延伸控制操作的权限包括:
    获取所述其他节点的发送隐私标签中的第二延伸访问控制条件;其中,所述第二延伸访问控制条件用于描述接收信息的节点接收到信息后所能完成的延伸控制操作及需要满足的条件,包括:延伸控制操作、操作条件、延伸控制操作和操作条件之间的对应关系;其中,所述操作条件为进行所述延伸控制操作所要满足的条件;
    判断第二节点是否满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件;
    当第二节点满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件时,确定第二节点有对信息进行需要进行的延伸控制操作的权限;
    当第二节点不满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件,或所述第二延伸访问控制条件中不包括第二节点需要进行的延伸控制操作时,确定第二节点没有对信息进行需要进行的延伸控制操作的权限。
  8. 根据权利要求7所述的信息流转方法,其中,所述操作条件包括以下一个或多个的任意组合:
    允许进行延伸控制操作的接收信息的节点的属性、不允许进行延伸控制操作的接收信息的节点的属性、允许进行延伸控制操作的接收信息的节点所 处的环境、不允许进行延伸控制操作的接收信息的节点所处的环境;
    判断所述第二节点是否满足第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件包括:
    当所述第二节点满足以下至少之一时,判断出所述第二节点满足所述第二延伸访问控制条件:
    所述第二节点的属性符合所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的允许进行延伸控制操作的接收信息的节点的属性;
    所述第二节点的属性不符合所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的不允许进行延伸控制操作的接收信息的节点的属性;
    所述第二节点所处的环境满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的允许进行延伸控制操作的接收信息的节点所处的环境;
    所述第二节点所处的环境不满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的不允许进行延伸控制操作的接收信息的节点所处的环境;
    当所述第二节点满足以下至少之一时,判断出所述第二节点不满足所述第二延伸访问控制条件:
    所述第二节点的属性符合所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的不允许进行延伸控制操作的接收信息的节点的属性;
    所述第二节点的属性不符合所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的允许进行延伸控制操作的接收信息的节点的属性;
    所述第二节点所处的环境满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的不允许进行延伸控制操作的接收信息的节点所处的环境;
    所述第二节点所处的环境不满足所述第二延伸访问控制条件中第二节点需要进行的延伸控制操作对应的操作条件中的允许进行延伸控制操作的接收信息的节点所处的环境。
  9. 根据权利要求6所述的信息流转方法,其中,当所述延伸控制操作为转发时,所述第二节点对信息进行延伸控制操作包括:
    第二节点将所述信息和所述发送隐私标签转发给其他节点;
    或者,第二节点生成信息的本节点的发送隐私标签,根据本节点的发送隐私标签和其他节点的发送隐私标签生成本节点的新的发送隐私标签,将信息和本节点的新的发送隐私标签发送给其他节点;其中,所述本节点的新的发送隐私标签用于表示对接收到所述信息的其他节点进行的延伸控制。
  10. 根据权利要求9所述的信息流转方法,其中,所述根据本节点的发送隐私标签和其他节点的发送隐私标签生成本节点的新的发送隐私标签包括:将所述其他节点的发送隐私标签和所述本节点的发送隐私标签的并集作为所述本节点的新的发送隐私标签。
  11. 一种计算机可读存储介质,其上存储有计算机程序,其中,所述计算机程序被处理器执行时实现如权利要求1~10任一项所述的信息流转方法的步骤。
  12. 一种信息流转系统,包括:
    第一节点,设置成生成信息的本节点的发送隐私标签;其中,本节点的发送隐私标签用于表示对接收到所述信息的其他节点进行的延伸控制;发送信息和所述本节点的发送隐私标签;
    第二节点,设置成从其他节点接收信息和所述信息的其他节点的发送隐私标签;其中,所述其他节点的发送隐私标签用于表示对接收到所述信息的其他节点进行的延伸控制;当需要对所述信息进行延伸控制操作,且根据所述其他节点的发送隐私标签判断出所述第二节点有对所述信息进行延伸控制操作的权限时,对所述信息进行所述延伸控制操作。
  13. 根据权利要求12所述的信息流转系统,其中,当所述延伸控制操作为转发时,所述第二节点设置成采用以下方式实现所述对信息进行延伸控制 操作:
    第二节点将信息和其他节点的发送隐私标签转发给其他节点;
    或者,第二节点生成信息的本节点的发送隐私标签,根据本节点的发送隐私标签和其他节点的发送隐私标签生成本节点的新的发送隐私标签,将信息和本节点的新的发送隐私标签发送给其他节点;其中,所述本节点的新的发送隐私标签用于表示对接收到所述信息的其他节点进行的延伸控制。
PCT/CN2019/083045 2018-10-30 2019-04-17 一种信息流转方法、装置及系统 WO2020087876A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811272632.8 2018-10-30
CN201811272632.8A CN109583228B (zh) 2018-10-30 2018-10-30 一种隐私信息管理方法、装置和系统

Publications (1)

Publication Number Publication Date
WO2020087876A1 true WO2020087876A1 (zh) 2020-05-07

Family

ID=65920823

Family Applications (3)

Application Number Title Priority Date Filing Date
PCT/CN2019/083045 WO2020087876A1 (zh) 2018-10-30 2019-04-17 一种信息流转方法、装置及系统
PCT/CN2019/083048 WO2020087878A1 (zh) 2018-10-30 2019-04-17 一种隐私信息管理方法、装置和系统
PCT/CN2019/083050 WO2020087879A1 (zh) 2018-10-30 2019-04-17 一种隐私信息保护方法、装置及系统

Family Applications After (2)

Application Number Title Priority Date Filing Date
PCT/CN2019/083048 WO2020087878A1 (zh) 2018-10-30 2019-04-17 一种隐私信息管理方法、装置和系统
PCT/CN2019/083050 WO2020087879A1 (zh) 2018-10-30 2019-04-17 一种隐私信息保护方法、装置及系统

Country Status (2)

Country Link
CN (1) CN109583228B (zh)
WO (3) WO2020087876A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210099524A1 (en) * 2019-01-10 2021-04-01 Google Llc Enhanced online privacy

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109583228B (zh) * 2018-10-30 2021-05-07 中国科学院信息工程研究所 一种隐私信息管理方法、装置和系统
CN112926089B (zh) * 2021-03-25 2023-03-17 支付宝(杭州)信息技术有限公司 一种基于隐私保护的数据风险防控方法、装置及设备
CN112989425B (zh) * 2021-04-26 2021-08-13 南京审计大学 基于差分隐私的信用数据隐私保护方法及其系统

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100017870A1 (en) * 2008-07-18 2010-01-21 Agnik, Llc Multi-agent, distributed, privacy-preserving data management and data mining techniques to detect cross-domain network attacks
CN103391192A (zh) * 2013-07-16 2013-11-13 国家电网公司 一种基于隐私保护的跨安全域访问控制系统及其控制方法
CN104318171A (zh) * 2014-10-09 2015-01-28 中国科学院信息工程研究所 基于权限标签的Android隐私数据保护方法及系统
CN107944299A (zh) * 2017-12-29 2018-04-20 西安电子科技大学 一种隐私信息的处理方法、装置及系统
CN109347845A (zh) * 2018-10-30 2019-02-15 中国科学院信息工程研究所 一种信息流转方法、装置及系统
CN109583228A (zh) * 2018-10-30 2019-04-05 中国科学院信息工程研究所 一种隐私信息管理方法、装置和系统

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9563771B2 (en) * 2014-01-22 2017-02-07 Object Security LTD Automated and adaptive model-driven security system and method for operating the same
CN104375836B (zh) * 2014-11-19 2018-08-17 深圳市腾讯计算机系统有限公司 一种展示锁屏窗口的方法及装置
CN108197453B (zh) * 2018-01-19 2020-02-04 中国科学院信息工程研究所 一种图像隐私保护方法及系统
CN109583227B (zh) * 2018-10-30 2020-08-07 中国科学院信息工程研究所 一种隐私信息保护方法、装置及系统

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100017870A1 (en) * 2008-07-18 2010-01-21 Agnik, Llc Multi-agent, distributed, privacy-preserving data management and data mining techniques to detect cross-domain network attacks
CN103391192A (zh) * 2013-07-16 2013-11-13 国家电网公司 一种基于隐私保护的跨安全域访问控制系统及其控制方法
CN104318171A (zh) * 2014-10-09 2015-01-28 中国科学院信息工程研究所 基于权限标签的Android隐私数据保护方法及系统
CN107944299A (zh) * 2017-12-29 2018-04-20 西安电子科技大学 一种隐私信息的处理方法、装置及系统
CN109347845A (zh) * 2018-10-30 2019-02-15 中国科学院信息工程研究所 一种信息流转方法、装置及系统
CN109583228A (zh) * 2018-10-30 2019-04-05 中国科学院信息工程研究所 一种隐私信息管理方法、装置和系统

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210099524A1 (en) * 2019-01-10 2021-04-01 Google Llc Enhanced online privacy
US11659044B2 (en) * 2019-01-10 2023-05-23 Google Llc Enhanced online privacy
US11949744B2 (en) 2019-01-10 2024-04-02 Google Llc Enhanced online privacy

Also Published As

Publication number Publication date
WO2020087879A1 (zh) 2020-05-07
CN109583228A (zh) 2019-04-05
CN109583228B (zh) 2021-05-07
WO2020087878A1 (zh) 2020-05-07

Similar Documents

Publication Publication Date Title
WO2020087876A1 (zh) 一种信息流转方法、装置及系统
Dorri et al. Blockchain in internet of things: challenges and solutions
Wei et al. Federated learning empowered end-edge-cloud cooperation for 5G HetNet security
US10554630B2 (en) Systems and methods for secure password transmission and verification
CN109583227B (zh) 一种隐私信息保护方法、装置及系统
KR101783339B1 (ko) 사용자 프로필을 확립할 수 없는 소셜 네트워킹 시스템 사용자를 위한 제한 사용자 프로필 유지
US20210281412A1 (en) Verifiable computation for cross-domain information sharing
CN104917761A (zh) 一种通用的访问控制方法及装置
Ali et al. Uplifting healthcare cyber resilience with a multi-access edge computing zero-trust security model
US20190044796A1 (en) Dead drop network architecture
Rong‐na et al. Provenance‐based data flow control mechanism for Internet of things
CN109347845B (zh) 一种信息流转方法、装置及系统
Deb et al. CovChain: Blockchain-enabled identity preservation and anti-infodemics for COVID-19
Poolsappasit et al. Towards Achieving Personalized Privacy for Location-Based Services.
US20170053136A1 (en) Policy-based trusted peer-to-peer connections
US20170041408A1 (en) Systems and methods for managing shared content
KR102271201B1 (ko) 블록체인을 이용한 개인정보 관리 방법 및 그 방법이 적용된 블록체인 네트워크 관리자
Kourtellis On the design of socially-aware distributed systems
US20220037035A1 (en) Geospatial-temporal pathogen tracing
JP7207114B2 (ja) 情報処理装置および認証情報処理方法
US9699192B2 (en) True-ownership of shared data
Kaur et al. Securing network communication between motes using hierarchical group key management scheme using threshold cryptography in smart home using internet of things
Bhatti et al. Access control in social enterprise applications: An empirical evaluation
Parra-Arnau et al. Shall I post this now? Optimized, delay-based privacy protection in social networks
KR101614448B1 (ko) 통합화 의료정보시스템 환경의 접근제어 소프트웨어 설계 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19880728

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19880728

Country of ref document: EP

Kind code of ref document: A1