CN110138792B - Public health geographic data privacy removal processing method and system - Google Patents

Public health geographic data privacy removal processing method and system Download PDF

Info

Publication number
CN110138792B
CN110138792B CN201910421196.4A CN201910421196A CN110138792B CN 110138792 B CN110138792 B CN 110138792B CN 201910421196 A CN201910421196 A CN 201910421196A CN 110138792 B CN110138792 B CN 110138792B
Authority
CN
China
Prior art keywords
data
server
public health
privacy
level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910421196.4A
Other languages
Chinese (zh)
Other versions
CN110138792A (en
Inventor
付晨
夏天
范爱晶
孙靖
戚方圆
刘诚
魏礼君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI DISEASE PREVENTION AND CONTROL CENTRE
Original Assignee
SHANGHAI DISEASE PREVENTION AND CONTROL CENTRE
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI DISEASE PREVENTION AND CONTROL CENTRE filed Critical SHANGHAI DISEASE PREVENTION AND CONTROL CENTRE
Priority to CN201910421196.4A priority Critical patent/CN110138792B/en
Publication of CN110138792A publication Critical patent/CN110138792A/en
Application granted granted Critical
Publication of CN110138792B publication Critical patent/CN110138792B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a public health geographic data privacy-removing processing method and a system thereof, comprising the following steps: the login account information is encrypted in the first stage and then sent to the server side so that the server side can decrypt and authenticate the login account information, and each user endows corresponding operation authority according to different system roles; screening out private data from the public health geographic data when the public health geographic data need to be input, and grading according to a preset grading rule to obtain the private data of different grades; secondly encrypting the private data according to the level and sending the encrypted private data to the server, and storing the correctly decrypted private data by the server; when the public health geographic data needs to be acquired at the server, the preset query conditions are encrypted at the third stage and are sent to the server, and the server acquires the query conditions which can be correctly decrypted and feeds back the public health geographic data corresponding to the query conditions. The method has the technical advantage that the security of the data is ensured by adopting a multi-level encryption mode.

Description

Public health geographic data privacy removal processing method and system
Technical Field
The invention relates to the technical field of communication, in particular to a public health geographic data privacy removal processing method and system.
Background
Under the background of current big data, the protection of private data in the public health industry is particularly important, the particularity and social influence of the service data of the disease control center are large, the data cover various disease cases or service information, and various adverse effects can be generated in case of leakage to the outside, so that the data protection is very important.
Meanwhile, a GIS sharing platform is built by a Shanghai market disease control center in 2015, and the platform collects data of different business lines for Shanghai market disease control until now through acceptance of a market health committee in 2017. Therefore, it is also very important to implement privacy data protection on the basis of a shared platform, wherein the technology for implementing privacy removal processing is a core technical problem to be solved by the present patent.
Disclosure of Invention
Aiming at the problems existing in the prior art of the leakage of the private data of various disease cases or service information in the public health industry, the privacy-removing processing method and the system are provided, which aim at encrypting the public health geographic data for storage and transmission, carrying out graded encryption storage on the private data, verifying the user identity of the obtained private data and effectively ensuring the public health geographic data.
The specific technical scheme is as follows:
a public health geographic data privacy removal processing method comprises the following steps:
step S1, the login account information is sent to the server after being encrypted for the first level, so that the server can pass decryption authentication, and each user endows corresponding operation authority according to different system roles;
step S2, screening out private data from the public health geographic data when the public health geographic data need to be input, and grading according to a preset grading rule to obtain private data of different grades;
step S3, second-level encryption is carried out on the private data according to the level and the private data are sent to the server, and the server stores the private data which can be correctly decrypted;
and step S4, when public health geographic data needs to be acquired at the client, a preset query condition is encrypted at the third stage and is sent to the server, and the server acquires the query condition which can be correctly decrypted and feeds back the public health geographic data corresponding to the query condition.
Preferably, in step S1, the first-level encryption method includes the following steps:
step S11, encrypting the login account information by adopting a first encryption algorithm to generate a first digest value, and sending the encrypted data and the first digest value to the server;
step S12, the server decrypts the encrypted data through a first encryption algorithm to generate a second digest value;
step S13, the server compares the first abstract value with the second abstract value, if the comparison result is consistent, the user identity authentication is passed;
and if the comparison result is inconsistent, refusing to log in the server.
Preferably, the first encryption algorithm is an MD5 encryption algorithm.
Preferably, in step S3, the second-level encrypting the private data according to the level and sending the encrypted private data to the server, and the step of storing the private data that can be correctly decrypted by the server includes the following steps:
the client side encrypts the privacy data of different levels by adopting a second encryption algorithm and an encryption key to form encrypted data;
sending the encrypted data to a server;
the server side decrypts the encrypted data by adopting a decryption algorithm corresponding to the second encryption algorithm and the encryption key so as to judge whether decryption is successful;
if the decryption is successful, the private data is saved;
and if the decryption fails, refusing to store the private data.
Preferably, the second encryption algorithm is a DES encryption algorithm.
Preferably, the third encryption algorithm is a DES encryption algorithm.
Preferably, the grade of the geographic data of public health comprises:
first order, non-desensitized data;
second-order, desensitized data;
third level, no difference data.
Preferably, the client provides two types of storage paths for the private data;
a first type of storage path to store first level non-desensitized data;
and the second-class storage path is used for storing desensitized data of the second level and non-differential data of the third level.
Preferably, the server is divided into a plurality of roles, and each role is associated with an operation authority for obtaining the private data of a corresponding level;
the roles include:
an audit group, a system management group and a service information group.
Also included is a public health geographic data privacy handling system, comprising;
the system comprises a client and a server connected with the client;
the client is used for sending login account information to the server after primary encryption so that the server can pass decryption authentication, and each user endows corresponding operation authority according to different system roles;
when public health geographic data need to be input, screening out private data from the public health geographic data through a client, and grading according to a preset grading rule to obtain different grades of private data;
the client encrypts the private data in a second level according to the level and sends the encrypted private data to the server, and the server stores the private data which can be decrypted correctly;
when the public health geographic data needs to be acquired by the client, the client encrypts a preset query condition through a third-level encryption and sends the preset query condition to the server, and the server acquires the query condition which can be correctly decrypted and feeds back the public health geographic data corresponding to the query condition to the client.
The technical scheme has the following advantages or beneficial effects: through the encryption modes of different levels, the public health geographic data can be classified and safely stored, and the safety of the private data in the transmission process is ensured while the user is controlled to safely access the server.
Drawings
Embodiments of the present invention will now be described more fully hereinafter with reference to the accompanying drawings. The drawings are, however, to be regarded as illustrative and explanatory only and are not restrictive of the scope of the invention.
FIG. 1 is a flow chart of an embodiment of a method for privacy elimination of geographic data of public health in accordance with the present invention;
FIG. 2 is a flow chart of a first level encryption method in an embodiment of a method for privacy elimination of public health geographic data in accordance with the present invention;
FIG. 3 is a schematic structural diagram of an embodiment of a public health geographic data privacy elimination processing system according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the embodiments and features of the embodiments may be combined with each other without conflict.
The invention is further described with reference to the following drawings and specific examples, which are not intended to be limiting.
The invention comprises a public health geographic data privacy removal processing method.
As shown in fig. 1, an embodiment of a public health geographic data privacy elimination processing method includes the following steps:
step S1, the login account information is sent to the server after being encrypted for the server to pass decryption authentication, and each user endows corresponding operation authority according to different system roles;
as shown in fig. 2, in step S1, the first-level encryption method includes the steps of:
step S11, encrypting the login account information by adopting a first encryption algorithm to generate a first digest value, and sending the encrypted data and the first digest value to the server;
step S12, the server decrypts the encrypted data through the first encryption algorithm to generate a second digest value;
step S13, the server compares the first abstract value with the second abstract value, if the comparison result is consistent, the user identity authentication is passed;
and if the comparison result is not consistent, the login of the server is refused, and the first encryption algorithm is the MD5 encryption algorithm.
In the technical scheme, the client needs to verify the identity information of the user before inputting the data or storing the input public health geographic data, and a generally adopted user identity verification mode is to directly input user account information (a user account and a corresponding password), so that the data is sent in a clear text in the sending process, namely, a third party obtains the account information of the user, so that the private data of the public health geographic data is leaked, and the authenticity of the logged user can be ensured by encrypting the account information of the user and decrypting the encrypted private data by the server.
Step S2, screening out private data from the public health geographic data when the public health geographic data need to be input, and grading according to a preset grading rule to obtain private data of different grades;
step S3, the private data are encrypted for the second level according to the level and are sent to the server, and the server stores the correctly decrypted private data;
after the public health geographic data is input into the client, classifying the privacy data of the public health geographic data into the following steps:
first order, non-desensitized data;
second, desensitized data;
third, no difference data;
the classified private data are stored, and specifically, the client provides two types of storage paths for the private data:
the first type of storage path, namely an desensitization-free database, namely the desensitization-free server is used for storing first-level desensitization-free data;
the second type of storage path, namely a desensitization database, namely the desensitization server, is used for storing the desensitized data of the second level and the non-difference data of the third level.
In the technical scheme, historical precipitation can be carried out on public health geographic data, namely data sources, wherein the public health geographic data mainly comprises four categories including data of disease monitoring and management, data of health related factor tracking and control, data of public health service and data of internal comprehensive management;
the public health geographic data often comprises privacy fields, and the specific privacy fields comprise names, sexes, ages, identification numbers, family addresses, telephones, disease types, birth dates, parents or relatives names and the like;
the technology can automatically identify privacy fields with names, sexes, ages, identification numbers, family addresses, telephones, disease types, birth dates, parents or relatives names for privacy protection.
The detailed process is as follows: when the public health geographic data is newly input, if the private information is contained, the technology automatically identifies the private field, confirms the field needing to be encrypted, marks the public health geographic data containing the private field, and stores the public health geographic data on the desensitized server for storage; if the public health geographic data (containing the privacy field) with the mark is encrypted for the second time, the public health geographic data is synchronized to the desensitized server (namely desensitized data), the desensitized server judges whether the encrypted data can be decrypted correctly or not, if the encrypted data can be decrypted correctly, the public health geographic data with the mark is stored in the desensitized server, otherwise, if the encrypted data cannot be decrypted correctly, error information is returned, and the data is not stored. Public health geographic data without privacy fields are subjected to label-free processing and directly stored in a desensitization server (namely, non-differential data).
It should be noted that the public health geographic data is judged according to the monitoring data and the threshold value (the threshold value rule is expert experience, industry standard and historical value), and the data is transferred into a desensitization database or an desensitization-free database.
For example:
if the newly-entered public health geographic data does not contain the private data, directly storing the data into a desensitization database;
if the newly entered public health geographic data contains private data, the data is compared with a threshold value after being stored in an unsensitized database:
(1) if the public health geographic data does not exceed the threshold value, the newly-entered public health geographic data is subjected to privacy removal processing and then stored in a desensitization database;
(2) and if the threshold value is exceeded, the newly-entered public health geographic data is used as an alarm prompt and is not stored in the desensitization database.
In the above technical solution, after the private data is stored, in step S3, the method for encrypting the private data includes the following steps:
the client side encrypts the privacy data of different levels by adopting a second encryption algorithm and an encryption key to form encrypted data;
sending the encrypted data to a server;
the server side decrypts the encrypted data by adopting a decryption algorithm corresponding to the second encryption algorithm and the encryption key so as to judge whether decryption is successful;
if the decryption is successful, the private data is saved;
and if the decryption fails, refusing to store the private data.
In a preferred embodiment, the second encryption algorithm is a DES encryption algorithm.
And step S4, when the public health geographic data needs to be acquired by the server, the preset query conditions are encrypted at the third level and are sent to the server, and the server acquires the query conditions which can be correctly decrypted and feeds back the public health geographic data corresponding to the query conditions.
After the private data are sent to the server side for storage, when a user of the client side needs to acquire the private data of the public health geographic data from the server side, the private data are safely acquired in the following mode
The client encrypts the generated query conditions by adopting a third encryption algorithm to form encrypted data;
sending the encrypted data to a server;
the server side decrypts the encrypted data by adopting a decryption algorithm and an encryption key corresponding to the third encryption algorithm to judge whether decryption is successful;
if the decryption is successful, returning the private data corresponding to the query condition;
and if the decryption fails, the access of the client is refused.
The third encryption algorithm is a DES encryption algorithm.
The grade of the privacy data of the public health geographic data is divided into three grades, but the grade of the privacy data of the public health geographic data is not invariable, and the real-time privacy data grade updating can be carried out according to a threshold value.
The setting rule of the threshold value is set according to expert experience, industry standard and historical average value. The expert experience has the highest priority, the industry standards are 'national emergency plan for public health incidents', the notification of 'national emergency report management work standard of relevant information of public health incidents' issued by office of health department's office, and' interpretation of grading connotation of public health incidents '(trial implementation)', and the like, the historical average value can be the historical average value in recent 5 years (or 10 years), and the specific steps are as follows:
expert experience value: the user enters an expert experience value for the public health event (noted as Z);
the second step, industry standard value: taking an industry standard value (marked as X) according to an industry standard;
third step, historical average: the system automatically calculates the monthly (or quarterly, time can be set by self) historical average value (marked as Y) of the last 5 years (or 10 years);
and fourthly, comparing the industry standard value, the historical average value and the expert experience value, and confirming the threshold value. The system automatically compares the industry standard value with the historical average value, and takes the minimum value as a preliminary threshold value. And comparing the preliminary threshold with the expert experience value, wherein if the preliminary threshold is equal to the expert experience value, the threshold is the expert experience value, if the preliminary threshold is greater than or less than the expert experience value, values of the preliminary threshold and the expert experience value are popped up, the expert value is marked with priority, and the final value of the threshold is determined by a user.
In the process of inputting the public health geographic data, whether the newly-input public health geographic data is marked privacy data or not is checked, if the data needs to be subjected to privacy protection, the newly-input public health geographic data is compared with a threshold value: if the newly-entered public health geographic data is smaller than the threshold value, storing the newly-entered public health geographic data into the desensitization database from the desensitization database (firstly, performing privacy protection processing); if the newly entered public health geographic data is greater than or equal to the threshold, then it is not stored to the desensitization database.
And if the newly-entered public health geographic data is not marked as privacy protection, storing the newly-entered public health geographic data to a desensitization database.
In a preferred embodiment, in steps S1-S3, the client sends login account information to the server, sends public health geographic data, and sends query conditions to the server to obtain public health geographic data;
in a preferred embodiment, the client provides two types of storage paths for private data;
a first type of storage path to store first level non-desensitized data;
and the second-class storage path is used for storing desensitized data of the second level and non-differential data of the third level.
The server is divided into a plurality of roles, and each role is associated with the operation authority of obtaining the privacy data of the corresponding level;
the roles include:
an audit group, a system management group and a service information group;
the auditing group is responsible for auditing the logs, and can only check the logs but not check any other data;
the system management group is user authority distribution and can not view any other data;
the service information group comprises an input member, a desensitizer, a non-desensitizer,
wherein the input personnel is responsible for inputting public health geographic data;
desensitizers can view desensitized data, no difference data;
the non-desensitizer can view non-desensitized data, desensitized data and non-difference data;
the authority of the entering person and the authority of the desensitizer can be overlapped, and the authority of the entering person and the authority of the desensitizer can be overlapped.
For example, a scholars of a study case needs to obtain desensitized public health geographic data case information so as to further study infection, interaction and other situations of patients, namely, the scholars can apply for users who are desensitizers from a system management group, so that the users log in the system to obtain the desensitized public health geographic data case information.
The data is obtained according to the authority, if the user needs to obtain the public health geographic data, namely after the user logs in the system, whether the user role is a service information group is judged firstly, if not, the user is prompted: if the data is viewed without permission, displaying the public health geographic data under the corresponding permission.
The technical scheme of the invention also comprises a public health geographic data privacy-removing processing system.
As shown in fig. 3, an embodiment of a public health geographic data de-privacy processing system, includes;
the system comprises a client 2 and a server 1 connected with the client 2;
the client 2 is used for sending the login account information to the server 1 after first-level encryption so that the server 1 can pass decryption authentication, and each user endows corresponding operation authority according to different system roles;
when the public health geographic data needs to be input, screening out the private data from the public health geographic data through the client 2, and grading according to a preset grading rule to obtain the private data of different grades;
the client 2 encrypts the private data for the second level according to the level and sends the encrypted private data to the server 1, and the server 1 stores the correctly decrypted private data;
when the public health geographic data needs to be acquired at the server 1, the client 2 encrypts the preset query condition through the third level and sends the preset query condition to the server 1, and the server acquires the query condition which can be correctly decrypted and feeds back the public health geographic data corresponding to the query condition to the client 2.
In the above technical solution, when a user at a client queries (exports, downloads or prints) data, the user needs to input a query condition, the query condition needs to be encrypted before being transmitted to a server, and the query condition is decrypted after receiving the encrypted data at the server, and then the query result is returned to the client for display, wherein the operations and methods executed by the client and the server are in one-to-one correspondence and are not repeated here.
While the invention has been described with reference to a preferred embodiment, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention.

Claims (10)

1. A public health geographic data privacy removal processing method is characterized by comprising the following steps:
step S1, the login account information is sent to the server after being encrypted for the first level, so that the server can pass decryption authentication, and each user endows corresponding operation authority according to different system roles;
step S2, screening out private data from the public health geographic data when the public health geographic data need to be input, and grading according to a preset grading rule to obtain private data of different grades;
step S3, second-level encryption is carried out on the private data according to the level of the private data and the private data are sent to the server, and the server stores the private data which can be correctly decrypted;
and step S4, when public health geographic data needs to be acquired at the client, a preset query condition is encrypted at the third stage and is sent to the server, and the server acquires the query condition which can be correctly decrypted and feeds back the public health geographic data corresponding to the query condition.
2. The privacy-elimination processing method according to claim 1, wherein in the step S1, the first-level encryption method includes the steps of:
step S11, encrypting the login account information by adopting a first encryption algorithm to generate a first digest value, and sending the encrypted data and the first digest value to the server;
step S12, the server decrypts the encrypted data through a first encryption algorithm to generate a second digest value;
step S13, the server compares the first abstract value with the second abstract value, if the comparison result is consistent, the user identity authentication is passed;
and if the comparison result is inconsistent, refusing to log in the server.
3. The privacy-free processing method of claim 2, wherein the first encryption algorithm is an MD5 encryption algorithm.
4. The privacy-elimination processing method of claim 1, wherein in the step S3, the privacy data are encrypted for the second level according to the level and sent to the server, and the step of storing the privacy data that can be decrypted correctly by the server includes the following steps:
the client side encrypts the privacy data of different levels by adopting a second encryption algorithm and an encryption key to form encrypted data;
sending the encrypted data to a server;
the server side decrypts the encrypted data by adopting a decryption algorithm corresponding to the second encryption algorithm and the encryption key so as to judge whether decryption is successful;
if the decryption is successful, the private data is saved;
and if the decryption fails, refusing to store the private data.
5. The privacy-elimination processing method of claim 4 wherein the second encryption algorithm is a DES encryption algorithm.
6. The privacy-removing processing method according to claim 1, wherein the encrypting the preset query condition at a third level and sending the preset query condition to the server includes:
the client encrypts the generated query conditions by adopting a third encryption algorithm to form encrypted data;
sending the encrypted data to a server;
the third encryption algorithm is a DES encryption algorithm.
7. The privacy-free processing method of any one of claims 1 to 6, wherein the ranking of the public health geographic data includes:
first order, non-desensitized data;
second-order, desensitized data;
third level, no difference data.
8. The privacy-elimination processing method of claim 7, wherein the client provides two types of storage paths for the privacy data;
a first type of storage path to store first level non-desensitized data;
and the second-class storage path is used for storing desensitized data of the second level and non-differential data of the third level.
9. The privacy-removing processing method according to claim 1, wherein the server is divided into a plurality of roles, and each role is associated with an operation authority for obtaining the privacy data of a corresponding level;
the roles include:
an audit group, a system management group and a service information group.
10. A public health geographic data de-privacy processing system comprising;
the system comprises a client and a server connected with the client;
the client is used for sending login account information to the server after primary encryption so that the server can pass decryption authentication, and each user endows corresponding operation authority according to different system roles;
when public health geographic data need to be input, screening out private data from the public health geographic data through a client, and grading according to a preset grading rule to obtain different grades of private data;
the client encrypts the private data in a second level according to the level and sends the encrypted private data to the server, and the server stores the private data which can be decrypted correctly;
when the public health geographic data needs to be acquired by the client, the client encrypts a preset query condition through a third-level encryption and sends the preset query condition to the server, and the server acquires the query condition which can be correctly decrypted and feeds back the public health geographic data corresponding to the query condition to the client.
CN201910421196.4A 2019-05-21 2019-05-21 Public health geographic data privacy removal processing method and system Active CN110138792B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910421196.4A CN110138792B (en) 2019-05-21 2019-05-21 Public health geographic data privacy removal processing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910421196.4A CN110138792B (en) 2019-05-21 2019-05-21 Public health geographic data privacy removal processing method and system

Publications (2)

Publication Number Publication Date
CN110138792A CN110138792A (en) 2019-08-16
CN110138792B true CN110138792B (en) 2020-01-14

Family

ID=67571639

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910421196.4A Active CN110138792B (en) 2019-05-21 2019-05-21 Public health geographic data privacy removal processing method and system

Country Status (1)

Country Link
CN (1) CN110138792B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115189966B (en) * 2022-09-06 2022-12-06 江苏荣泽信息科技股份有限公司 Block chain private data encryption and decryption service system
DE202022107224U1 (en) 2022-12-23 2023-03-29 Jalawi Sulaiman Alshudukhi System for secure storage and transaction of health data in interconnected implanted medical devices and control servers

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270465A (en) * 2014-10-23 2015-01-07 成都双奥阳科技有限公司 Cloud storage protection system
CN104866775A (en) * 2015-06-12 2015-08-26 四川友联信息技术有限公司 Bleaching method for financial data
CN105426445A (en) * 2015-11-06 2016-03-23 天津佳宁坤祥科技有限公司 Format-preserving data desensitization method
CN106228084A (en) * 2016-07-19 2016-12-14 北京同余科技有限公司 Data guard method that the sensitive field of based role dynamically adjusts and system
CN106407843A (en) * 2016-10-17 2017-02-15 深圳中兴网信科技有限公司 Data desensitization method and data desensitization device
CN108231147A (en) * 2017-12-29 2018-06-29 南京卫坤特信息技术有限公司 Generate the system and method for resident's Electronic Health Record
CN109033873A (en) * 2018-07-19 2018-12-18 四川长虹智慧健康科技有限公司 A kind of data desensitization method preventing privacy compromise
CN109740363A (en) * 2019-01-04 2019-05-10 贵州大学 Rating documents desensitization encryption method
CN109753811A (en) * 2018-12-28 2019-05-14 北京东方国信科技股份有限公司 A kind of data probe design method and device detecting sensitive information

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101561815B (en) * 2009-05-19 2010-10-13 华中科技大学 Distributed cryptograph full-text retrieval system
US20130036447A1 (en) * 2011-08-02 2013-02-07 Kenneth Martin Lassesen Attribution points for policy management
WO2013101723A1 (en) * 2011-12-27 2013-07-04 Wellpoint, Inc. Method and system for data pattern matching, masking and removal of sensitive data
CN103220141B (en) * 2012-01-18 2016-07-06 ***通信集团辽宁有限公司 A kind of protecting sensitive data method and system based on group key strategy
CN103997733B (en) * 2014-05-30 2018-08-28 李克 A kind of WiFi access-in resources sharing method and system
CN104182619B (en) * 2014-08-05 2017-06-06 上海市精神卫生中心 The system and method for emotional characteristics parameter acquisition and treatment is realized based on intelligent terminal

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270465A (en) * 2014-10-23 2015-01-07 成都双奥阳科技有限公司 Cloud storage protection system
CN104866775A (en) * 2015-06-12 2015-08-26 四川友联信息技术有限公司 Bleaching method for financial data
CN105426445A (en) * 2015-11-06 2016-03-23 天津佳宁坤祥科技有限公司 Format-preserving data desensitization method
CN106228084A (en) * 2016-07-19 2016-12-14 北京同余科技有限公司 Data guard method that the sensitive field of based role dynamically adjusts and system
CN106407843A (en) * 2016-10-17 2017-02-15 深圳中兴网信科技有限公司 Data desensitization method and data desensitization device
CN108231147A (en) * 2017-12-29 2018-06-29 南京卫坤特信息技术有限公司 Generate the system and method for resident's Electronic Health Record
CN109033873A (en) * 2018-07-19 2018-12-18 四川长虹智慧健康科技有限公司 A kind of data desensitization method preventing privacy compromise
CN109753811A (en) * 2018-12-28 2019-05-14 北京东方国信科技股份有限公司 A kind of data probe design method and device detecting sensitive information
CN109740363A (en) * 2019-01-04 2019-05-10 贵州大学 Rating documents desensitization encryption method

Also Published As

Publication number Publication date
CN110138792A (en) 2019-08-16

Similar Documents

Publication Publication Date Title
CN109194708B (en) Distributed storage system based on block chain technology and identity authentication method thereof
CN110868301B (en) Identity authentication system and method based on state cryptographic algorithm
CN111598574A (en) Intelligent service transaction oriented supervision method and supervision interface
CN112567716B (en) Secure data transmission system and method
CN110138792B (en) Public health geographic data privacy removal processing method and system
CN102143158A (en) Data anti-leakage method based on trusted platform module (TPM)
CN112187471A (en) Data copying method, system and medium based on block chain and intelligent contract
CN114091015A (en) Data processing method and system based on data security sandbox
CN116108472B (en) Data security processing method and system for power plant
CN117332391A (en) Power distribution network data asset security access method and system considering authority hierarchical management and control
CN110086796A (en) A kind of transmission method based on public private key encryption technology collection monitoring data
CN109245880A (en) One kind is based on to hadoop component safety reinforcement means
CN115423273A (en) Enterprise heterogeneous system integration method, device, equipment and storage medium
CN114154965A (en) Collaborative law enforcement and case handling management method and system based on block chain
CN114240349A (en) Ecological environment supervision method and system based on block chain
CN108769012B (en) Method for independently authenticating bank electronic credit archive
CN114722383A (en) Weak password monitoring method, device, equipment and storage medium
CN112751823A (en) Outgoing data generation method, outgoing safety control method and system
CN117353893B (en) Network information security verification method and system based on blockchain technology
CN117220992B (en) Cloud security management monitoring method and system supporting commercial cryptographic algorithm
CN113806778B (en) Data management method, system and storage medium based on big data platform
CN113111365B (en) Online psychological consultation privacy data protection method, storage medium and system based on envelope encryption
CN116523486B (en) Human resource sharing system and method based on big data
CN117034356B (en) Privacy protection method and device for multi-operation flow based on hybrid chain
Longzhu et al. Research and exploration of the data security compliance inspection technology based on the large-scale call platform of the customer service center

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant