Unlock instant, AI-driven research and patent intelligence for your innovation.

Privacy data protection method with self-adjustment of access time

A technology of access time and privacy data, which is applied in the field of information security, can solve the problems that users cannot access data, cannot satisfy users, cannot automatically extend, etc., and achieve the effect of protecting sensitive information

Active Publication Date: 2020-07-28
睿智合创(北京)科技有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In the above invention 1, the time is used to lock the data, and the data can only be accessed within a specified time, within a time period, or after a certain time. However, the specified time here is artificially set and cannot be automatically extended, which cannot satisfy users in real time. The requirement that the available time can be automatically extended when accessing sensitive information; and the user cannot access the data outside the specified time, which cannot meet the requirement that the user sometimes only needs to view the desensitized private data, but is not willing to enter the password

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy data protection method with self-adjustment of access time
  • Privacy data protection method with self-adjustment of access time
  • Privacy data protection method with self-adjustment of access time

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0062] Example 1: If the current client program is a shopping platform, after user James logs in the client, he clicks to view all order pages, which is a privacy information page, and the client program checks that he has not logged in to this page before, and then go to step 2- 2 continue to execute;

example 2

[0063] Example 2: If the current client program is a shopping platform, after the user Joy logs in to the client, clicks to view all order pages, the client program checks that Joy has logged in to the private page before, and proceeds to steps 2-4 to continue.

[0064] Step 2-2: The user logs in and enters the password. If the user identity verification is passed, go to step 2-3 to continue; otherwise, the user needs to log in again to verify the identity;

example 1

[0065] Example 1: The user James logs in and enters the password, and the identity verification is successful. Go to steps 2-3 to continue.

[0066] Step 2-3: Determine whether the current temporary parameter temp is empty, if it is empty, set the old temporary parameter variable oldTemp=null; if it is not empty, set oldTemp=temp. The client program generates a new temporary parameter newTemp, go to steps 2-7 to continue execution;

[0067] Example 1: The user James generates a new temporary parameter of 650cf9febcac76ed, sets oldTemp=null, and proceeds to step 2-7 to continue.

[0068] Step 2-4: The client program checks whether the temporary parameter (temp) has expired. If the current time is within the validity period of the temporary parameter, it is said that the temporary parameter (temp) has not expired and proceeds to step 2-5; otherwise, proceeds to step 2- 6 continue to execute;

[0069] Example 2: The client checks whether the temporary parameter temp has expired...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of information security, and provides a privacy data protection method and a privacy data protection system with automatically-adjusted access time. The privacy data protection system comprises a client program, a service providing unit, a temporary storage unit and a user level setting unit. The invention further discloses a privacy data protection method. The service providing unit updates a temporary parameter list, processes a query result and returns a temporary parameter validity period and the processed query result according to states of temporary parameters submitted by the client program; and the client program times according to the temporary parameter validity period after acquiring the data, and makes real-time response according to a user behavior. The privacy data protection method and the privacy data protection system realize the protection of sensitive information of the user, and ensure the security of the sensitive information when the user does not jump out of a page and the database data acquisition is not conducted.

Description

technical field [0001] The invention belongs to the field of information security, and relates to a database sensitive information protection technology, in particular to a privacy data protection method and system with self-adjusting access time. Background technique [0002] With the rapid development of the network, users rely more and more on the network after feeling the convenience of life brought by the computer. In order to identify individuals, record individual behaviors, and provide them with individual services, computers collect and store user privacy information that can verify user identities. When the user requests his private information again, he obtains the unlimited right to use the data, that is, he can access it for any length of time at any time, so that after the user's identity is leaked or the user's mobile device is lost, the private information in it will also be lost. The leakage will bring troubles to the lives of users. [0003] In order to e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/105H04L63/108
Inventor 付海涛赵小录梁辰芦效峰
Owner 睿智合创(北京)科技有限公司