Natural person database privacy security protection method and device and terminal equipment

A technology for natural person privacy and terminal equipment, which is applied in the fields of natural person database privacy security protection method, terminal equipment and storage medium, and device fields, and can solve problems such as personal privacy information protection.

Active Publication Date: 2021-09-03
北京东方通软件有限公司 +2
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the embodiment of the present invention provides a natural person database privacy security protection method, device, terminal equipment and storage medium to solve the problem of personal privacy information protection in the existing data processing process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Natural person database privacy security protection method and device and terminal equipment
  • Natural person database privacy security protection method and device and terminal equipment
  • Natural person database privacy security protection method and device and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present invention. It will be apparent, however, to one skilled in the art that the invention may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.

[0040] In order to illustrate the technical solutions of the present invention, specific examples are used below to illustrate.

[0041] See figure 1 , shows the system architecture to which the method for protecting the privacy and security of the natural person database or the device for protecting the privacy and security of the natural person database of the present invention can be applied. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applicable to the technical field of data processing, and provides a natural person database privacy security protection method and device and terminal equipment, and the method is applied to a system comprising a data center, an access party and the terminal equipment. The natural person database privacy security protection method the following steps that a data center negotiates with terminal equipment to generate a temporary session key so as to safely obtain real-time data generated when a natural person uses the terminal equipment, and the real-time data is encrypted by the terminal equipment by using the session key and then is uploaded to the data center through an access party; and when the real-time data of the data center needs to be used, the access authority to the real-time data is controlled based on a zero-trust security system, and the natural person privacy information in the real-time data is encrypted at least by using a data desensitization algorithm and / or a homomorphic encryption algorithm. According to the method, the privacy information about the natural person in the data can be effectively prevented from being leaked in any link of using the data.

Description

technical field [0001] The invention belongs to the technical field of data processing, and in particular relates to a method, a device, a terminal device and a storage medium for protecting the privacy and security of a natural person database. Background technique [0002] With the development and application of computing devices such as mobile terminals, more and more data information is generated by users on computing devices such as mobile terminals, and applications such as big data analysis on these data can make these data generate higher value. However, in the prior art, the personal privacy information contained in these data has been leaked and illegally used. For this reason, how to protect the personal privacy information contained in the data in the process of data processing has become a technical problem that needs to be solved urgently. Contents of the invention [0003] In view of this, the embodiments of the present invention provide a method, device, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/6245G06F21/602
Inventor 朱静熹李朋林江何张春林李利军王庆丰常江波
Owner 北京东方通软件有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products