CN104009911B - Link method for secret protection in social networkies and system - Google Patents
Link method for secret protection in social networkies and system Download PDFInfo
- Publication number
- CN104009911B CN104009911B CN201410262716.9A CN201410262716A CN104009911B CN 104009911 B CN104009911 B CN 104009911B CN 201410262716 A CN201410262716 A CN 201410262716A CN 104009911 B CN104009911 B CN 104009911B
- Authority
- CN
- China
- Prior art keywords
- attribute
- user
- secret protection
- link
- social networkies
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses the link method for secret protection in a kind of social networkies and system, wherein method includes step:Derivation relation between the secret protection grade to user property and attribute sets;Read the association user attribute being associated in social networkies operating, record secret protection grade is set as the attribute of " disclosure ", is designated as set A;And reading the attribute of associated user in social networkies, record secret protection grade is set as the attribute of " protection ", is designated as set B;Judge the element whether having in set B in set A;And judge element in set B in the preceding paragraph in derivation relation whether in set A, if making the collection of these preceding paragraphes be combined into C;If set B or therein element in set A, does not establish the link in the preceding paragraph in derivation relation, or establish the link but do not show the association attributes of association user, or the attribute only association attributes being changed to random identification.The present invention can be prevented effectively from user and reveal other people privacies by operation associated.
Description
Technical field
The present invention relates to mobile security and social secret protection field, the link privacy in more particularly, to a kind of social networkies
Guard method and system.
Background technology
With the popularization of the mobile Internets such as social networkies such as microblogging application, the leakage to individual subscriber privacy for the social networkies
Problem is increasingly subject to pay attention to.In social networkies(Such as microblogging etc.)Would generally pay close attention to mutually between user, forward, mutual powder etc., formed
Incidence relation between user, this relation may leak the privacy of user.For example, certain user to be shown, might as well be referred to as A
User, this user is not intended to certain attribute of oneself, and such as " professional " is compromised, but this attribute of party A-subscriber may be by it
It is compromised after his user's concern, the user of such as concern A has 10, wherein has 8 users " professional " this attribute to oneself
Privacy and pay no attention to, that is, disclose " professional " attribute of oneself it is assumed that for " student " occupation, may derive from this 8 users
Going out A is " teacher ".Here it is a kind of example leading to individual privacy leakage by concern.Meanwhile, " professional " of party A-subscriber is likely to
Leak in paying close attention to other people situation, in the people that such as A has paid close attention to, major part is " teacher ", then the occupational information of A may be compromised.
Therefore, operation associated in social networkies, either by other people associate, or active correlation other people, be all likely to result in itself quick
The privacy compromise of sense information.
Therefore, social networkies are protected(As microblogging)Because the behavior such as mutual concern, forwarding leads to privacy compromise between middle user
Safety problem, be urgent problem in a current social networkies safety.
Current the problems referred to above are also generally ignored, and therefore solution is also rare, and the present invention proposes in a kind of social networkies
Method for secret protection, the method can make up present in above-mentioned current method not enough.
Content of the invention
Association between the technical problem to be solved in the present invention is for user in social networkies such as microblogging leads to user hidden
The problem that private attribute is compromised, present invention proposition is a kind of to be prevented from leading to the secret protection of privacy leakage because of the operation in social networkies
Method and system.
The technical solution adopted for the present invention to solve the technical problems is:
A kind of method for secret protection in social networkies is provided, comprises the following steps:
S1, the secret protection grade to user property set, and the derivation relation between attribute sets;
It is associated the association user attribute operating, record wherein secret protection grade sets in S2, reading social networkies
For the attribute of " disclosure ", it is designated as set A;And read the attribute of associated user in social networkies, record wherein secret protection etc.
Level is set as the attribute of " protection ", is designated as set B;
Whether there is the element in set B in S3, judgement set A;And before judging element in set B in derivation relation
Whether in set A, if making the collection of these preceding paragraphes be combined into C;
If preceding paragraph in the derivation relation setting for the element in S4 set B or set B, in set A, is not set up
From the link of associated user to association user, or the genus in establishing the link but not showing the set B and C set of association user
Property, or establish the link the attribute still union of set B and set C being changed to random identification.
In method of the present invention, described operation associated inclusion " concern ", " forwarding ", " point is praised ", " message ".
In method of the present invention, user passes through to exchange the secret protection grade of interface setting user property;System pipes
Reason person sets the derivation relation between attribute by administration interface, and records preceding paragraph in derivation relation and consequent.
Intimacy protection system in also a kind of social networkies is provided, including:
Setup module, for setting to the secret protection grade of user property, and the derivation relation between attribute is entered
Row sets;
Attribute reads and sort module, for reading the association user attribute being associated operating in social networkies, record
Wherein secret protection grade is set as the attribute of " disclosure ", is designated as set A;And read the genus of associated user in social networkies
Property, record wherein secret protection grade is set as the attribute of " protection ", is designated as set B;
Determination module, for judging the element whether having in set B in set A;And judge that the element in set B is being derived
Whether the preceding paragraph in relation occurs in set A, if occurring, makes the collection of these preceding paragraphes be combined into C;
Secret protection module, for the element in set B or set B in the preceding paragraph in derivation relation in set A,
Then do not set up the link from associated user to association user, or establish the link but do not show set B and the C set of association user
In attribute, or establish the link but the union of set B and set C be changed to the attribute of random identification.
The beneficial effect comprise that:Present invention pass between the attribute to association user and attribute in social networkies
Connection relation is preset, and in operation associated, it is judged, and hides association attributes according to result of determination, thus having
Effect avoids user to reveal other people privacies by operation associated.Versatility of the present invention is good, low cost, easily use, easily by user
Accept.
Brief description
Below in conjunction with drawings and Examples, the invention will be further described, in accompanying drawing:
Fig. 1 is the flow chart of the method for secret protection in embodiment of the present invention social networkies;
Fig. 2 is the structural representation of the intimacy protection system in embodiment of the present invention social networkies.
Specific embodiment
In order that the objects, technical solutions and advantages of the present invention become more apparent, below in conjunction with drawings and Examples, right
The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only in order to explain the present invention, not
For limiting the present invention.
The present invention proposes the method for secret protection in a kind of social networkies, and versatility is good, low cost, easily use, easily
It is easily accepted by a user, as shown in figure 1, the method comprises the following steps:
S1, the secret protection grade to user property set, and the derivation relation between attribute sets;User
The user property of oneself can be set by the interactive interface with system, such as the secret protection of " professional ", " age ", " residence " etc.
Grade, including:Protection, disclosure etc..System manager can be by the derivation relation between system relationship interface setting attribute.For example,
" professional " can derive " age ", and by this derivation relation, " professional " is called preceding paragraph, and " age " is consequent.System is generally given tacit consent to
Derivation relation is reflexive, and that is, " professional " derives " professional ".Derivation relation is transferable, and that is, " professional " derives " year
In age ", " age " derives " hobby ", then " professional " derives " hobby ".
It is associated the association user attribute operating, record wherein secret protection grade sets in S2, reading social networkies
For the attribute of " disclosure ", it is designated as set A;And read the attribute of associated user in social networkies, record wherein secret protection etc.
Level is set as the attribute of " protection ", is designated as set B;
Whether there is the element in set B in S3, judgement set A, if there are then making result of determination R be Y, otherwise make R be N;
And judge whether the element in set B occurs in the preceding paragraph in derivation relation in set A, if occurring, make these preceding paragraphes
Collection is combined into C, makes result of determination R be Y, otherwise makes R be N;
Might as well set operation associated as " concern ", " forwarding ", " point is praised ", " message " etc. operation, operation after the completion of, judge close
" protection " attribute of associated user whether is comprised, for example in " disclosure " attribute of user of connection operation:Operation associated user
For U, " pay close attention to " associated user V, " disclosure " attribute of U includes " professional ", " age ", that is, set A is " professional " and " year
In age ", " protection " attribute of V is " professional ", and that is, set B is " professional ", and A includes element in B, therefore, is considered as the operation associated of U
The privacy leading to " professional " attribute of V is compromised, and S3 module output result of determination R is Y;If assuming, " protection " attribute of V is " to occupy
Residence ", that is, assume that set B is " residence ", then A does not comprise the element in B, then S3 module output result of determination R is N.
If preceding paragraph in the derivation relation setting for the element in S4 set B or set B, in set A, will not be built
The vertical link from associated user to association user, or the genus in establishing the link but not showing the set B and C set of association user
Property, or establish the link the attribute still respective attributes of the association user i.e. union of set B and C being changed to random identification.
Might as well set has the relation to be in derivation relation:" professional "->" residence ", because " protection " attribute of V is " to occupy
Residence ", " disclosure " attribute of U is " professional ", and then preceding paragraph set C is " professional ", and forward direction set occurs in A, therefore in step
Result of determination R in rapid S3 is Y;It is otherwise N;
The result of determination R process that step S4 obtains according to step S3, if it is determined that result R is N, is not then processed, if sentencing
Determining result R is Y, then processed, including:The mark of association user is changed to random identification, does not show the set B of association user
With the attribute in C set.
Intimacy protection system in the social networkies of the embodiment of the present invention, based on above-mentioned method for secret protection, as Fig. 2 institute
Show, this system includes:
Setup module, for setting to the secret protection grade of user property, and the derivation relation between attribute is entered
Row sets;
Attribute reads and sort module, for reading the association user attribute being associated operating in social networkies, record
Wherein secret protection grade is set as the attribute of " disclosure ", is designated as set A;And read the genus of associated user in social networkies
Property, record wherein secret protection grade is set as the attribute of " protection ", is designated as set B;
Determination module, mainly for detection of and judge the currently operation associated privacy compromise with the presence or absence of user property.Tool
Body is used for the element judging whether to have in set B in set A;And judge that element in the set B preceding paragraph in derivation relation is
Occurring in the no A in set, if occurring, making the collection of these preceding paragraphes be combined into C;
Secret protection module, for the element in set B or set B in the preceding paragraph in derivation relation in set A,
Then do not set up the link from associated user to association user, or establish the link but do not show set B and the C set of association user
In attribute, or establish the link but the respective attributes of the association user i.e. union of set B and C be changed to the genus of random identification
Property.
To sum up, present invention incidence relation between the attribute to association user and attribute in social networkies is set in advance
Fixed, in operation associated, it is judged, and association attributes is hidden according to result of determination, thus be prevented effectively from user to pass through to close
Other people privacies are revealed in connection operation.Versatility of the present invention is good, low cost, easily use, be easily easily accepted by a user.
It should be appreciated that for those of ordinary skills, can be improved according to the above description or be converted,
And all these modifications and variations all should belong to the protection domain of claims of the present invention.
Claims (4)
1. the link method for secret protection in a kind of social networkies is it is characterised in that comprise the following steps:
S1, the secret protection grade to user property set, and the derivation relation between attribute sets;
It is associated the association user attribute operating, record wherein secret protection grade is set as " public in S2, reading social networkies
Open " attribute, be designated as set A;And reading the attribute of associated user in social networkies, record wherein secret protection grade sets
For the attribute of " protection ", it is designated as set B;
Whether there is the element in set B in S3, judgement set A;And judge that element in the set B preceding paragraph in derivation relation is
In the no A in set, if making the collection of these preceding paragraphes be combined into C;
If preceding paragraph in the derivation relation setting for the element in S4 set B or set B, in set A, is not set up from quilt
Association user is to the link of association user, or the attribute in establishing the link but not showing the set B and C set of association user, or
Establish the link the attribute still union of set B and set C being changed to random identification.
2. method according to claim 1 is it is characterised in that described operation associated inclusion " concern ", " forwarding ", " point
Praise ", " message ".
3. method according to claim 1 is it is characterised in that user is protected by the privacy that interactive interface sets user property
Shield grade;System manager sets the derivation relation between attribute by administration interface, and record preceding paragraph in derivation relation and after
?.
4. the intimacy protection system in a kind of social networkies is it is characterised in that include:
Setup module, for setting to the secret protection grade of user property, and the derivation relation between attribute sets
Fixed;
Attribute reads and sort module, and for reading the association user attribute being associated operating in social networkies, record is wherein
Secret protection grade is set as the attribute of " disclosure ", is designated as set A;And read the attribute of associated user in social networkies, note
Record wherein secret protection grade is set as the attribute of " protection ", is designated as set B;
Determination module, for judging the element whether having in set B in set A;And judge element in set B in derivation relation
In preceding paragraph whether in set A, if making the collection of these preceding paragraphes be combined into C;
Secret protection module, for the element in set B or set B in the preceding paragraph in derivation relation in set A, then not
Set up from the link of associated user to association user, or establish the link but do not show the set B and C set of association user
Attribute, or establish the link the attribute still union of set B and set C being changed to random identification.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410262716.9A CN104009911B (en) | 2014-06-13 | 2014-06-13 | Link method for secret protection in social networkies and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410262716.9A CN104009911B (en) | 2014-06-13 | 2014-06-13 | Link method for secret protection in social networkies and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104009911A CN104009911A (en) | 2014-08-27 |
CN104009911B true CN104009911B (en) | 2017-03-08 |
Family
ID=51370406
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410262716.9A Expired - Fee Related CN104009911B (en) | 2014-06-13 | 2014-06-13 | Link method for secret protection in social networkies and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104009911B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108681749B (en) * | 2018-05-21 | 2021-11-23 | 中国科学院计算技术研究所 | Privacy information discrimination method based on network social platform |
CN111460505A (en) * | 2020-04-02 | 2020-07-28 | 深圳前海微众银行股份有限公司 | Modeling method, device, equipment and storage medium based on privacy protection |
CN112765659B (en) * | 2021-01-20 | 2021-09-21 | 曙光星云信息技术(北京)有限公司 | Data leakage protection method for big data cloud service and big data server |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103279713A (en) * | 2013-06-08 | 2013-09-04 | 广西师范大学 | Optimized SNS (social network service) graph data publication privacy protection method |
CN103685271A (en) * | 2013-12-13 | 2014-03-26 | 南京信息工程大学 | Sensitive property privacy protective method for social network data |
-
2014
- 2014-06-13 CN CN201410262716.9A patent/CN104009911B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103279713A (en) * | 2013-06-08 | 2013-09-04 | 广西师范大学 | Optimized SNS (social network service) graph data publication privacy protection method |
CN103685271A (en) * | 2013-12-13 | 2014-03-26 | 南京信息工程大学 | Sensitive property privacy protective method for social network data |
Non-Patent Citations (2)
Title |
---|
抗复合攻击的社会网络( k,l) 匿名方法;吴宏伟;《哈尔滨理工大学学报》;20130630;第18卷(第3期);全文 * |
社交网络中个人信息与人际关系的隐私保护研究;孔庆江;《中国优秀硕士论文电子期刊网》;20120615;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN104009911A (en) | 2014-08-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104468611B (en) | The data safety processing method and device switched based on dual system | |
CN103095890B (en) | The encryption method of associated person information and communication terminal | |
WO2016045192A1 (en) | Notification processing method, notification processing device, and terminal | |
CN103841262A (en) | Method and device for displaying privacy information | |
TW201815122A (en) | Method and system for private communication | |
CN105119799A (en) | Instant communication message processing method and client | |
CN104506711A (en) | Communication information processing method and device for terminal | |
CN104009911B (en) | Link method for secret protection in social networkies and system | |
CN110708663B (en) | Bluetooth-based social contact method and device | |
CN106571998A (en) | Parking contact method and system capable of protecting privacy and convenient to contact | |
CN105573623A (en) | Help seeking method based on fingerprint identification | |
AU2010218193A1 (en) | User challenge using information based on geography or user identity | |
WO2017128545A1 (en) | Message notification method and apparatus | |
CN107908974A (en) | A kind of method and terminal for protecting privacy of user | |
Saha et al. | Indian women at risk in the cyber space: A conceptual model of reasons of victimization. | |
CA2831527A1 (en) | Computer-implemented system and method for validating call connections | |
Vaziripour et al. | A survey of the privacy preferences and practices of iranian users of telegram | |
US20160234147A1 (en) | Integrated Digital Filtering System | |
CN104994209A (en) | Contact information obtaining method based on communication software chatting records and system | |
WO2017020598A1 (en) | Contact information management method, apparatus and terminal | |
CN106254226A (en) | A kind of information synchronization method and device | |
US20170195482A1 (en) | Processing Method and Processing Device for Communication Information of Terminal and Terminal | |
CN105915709A (en) | Communication connection establishing method and terminal | |
CN106888229B (en) | Call management method and server | |
CN106791208A (en) | Method and terminal of a kind of pushed information to call request interface display |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170308 Termination date: 20190613 |
|
CF01 | Termination of patent right due to non-payment of annual fee |