CN110795757B - Method, device, system and storage medium for personal information disclosure management - Google Patents

Method, device, system and storage medium for personal information disclosure management Download PDF

Info

Publication number
CN110795757B
CN110795757B CN201910912372.4A CN201910912372A CN110795757B CN 110795757 B CN110795757 B CN 110795757B CN 201910912372 A CN201910912372 A CN 201910912372A CN 110795757 B CN110795757 B CN 110795757B
Authority
CN
China
Prior art keywords
personal information
code
field
personal
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910912372.4A
Other languages
Chinese (zh)
Other versions
CN110795757A (en
Inventor
杨明
刘合翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Yilian Technology Co ltd
Original Assignee
Hangzhou Yilian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Yilian Technology Co ltd filed Critical Hangzhou Yilian Technology Co ltd
Priority to CN201910912372.4A priority Critical patent/CN110795757B/en
Publication of CN110795757A publication Critical patent/CN110795757A/en
Application granted granted Critical
Publication of CN110795757B publication Critical patent/CN110795757B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a method, a device, a system and a storage medium for disclosing and managing personal information, wherein the method comprises the following steps: receiving request information sent by an information demand party; extracting field codes corresponding to the request information from the pre-generated personal string codes according to the request information; and sending the field code corresponding to the request information, the field mapping table and the code reading file corresponding to the field code to the requiring party. By the method, a user can participate in setting the coding rule by himself to generate the personal serial code corresponding to the personal information. The configurability of the user to disclose the personal information is realized; the user-defined encoding rule may be set as a dynamic randomization operation. The associativity between the information is reduced, and the risk that the personal information is compared and cracked in a large scale is further reduced. For lawbreakers, regular cracking is not easy to seek, so that personal information is easily acquired, the eavesdropping difficulty of coded information is increased, and the directional disclosure of the personal information is ensured.

Description

Method, device, system and storage medium for personal information disclosure management
Technical Field
The embodiment of the invention relates to the technical field of data processing, in particular to a method, a device, a system and a storage medium for disclosing and managing personal information.
Background
The existing privacy protection and management technology mainly focuses on: identity protection, information encryption, data obfuscation, communication security, access control, authorization management, trusted third party agents, blockchain techniques, etc., and are generally directed to centralized holders of personal information (e.g., enterprises, authorities, agencies, etc.). The specific application fields are also generally in specific business fields (e.g., financial business fields), specific media scenes, specific devices (e.g., electronic devices for entering information in banks), and the like.
In these fields, the encryption of personal information is generally protected and managed in an encoding manner, and the related encoding manner generally includes two-dimensional codes, gray codes, masks, messy codes, multimedia encoding and the like, but such encoding technical schemes generally lack personal intervention and control, and are easily reverse encoded or cannot be decoded at all.
In fact, when the centralized holder of the personal information obtains the source of the personal information, the data source may be from the main body of the personal information or from another channel. The personal information body may provide different personal information to different organizations or websites at different occasions. Therefore, the channel for collecting the personal information by the centralized personal information holder is not limited to the personal information main body, and can be obtained by other methods, such as web crawlers.
Based on the above situation, the disclosed range and the disclosed content of the personal information of the user are not controlled by the user, and the personal privacy cannot be effectively guaranteed.
How to realize the disclosure, disclosure range, etc. of the personal information of the user can be freely controlled by the user, which becomes a technical problem to be solved urgently.
Disclosure of Invention
Therefore, embodiments of the present invention provide a method, an apparatus, a system, and a storage medium for disclosure management of personal information, so as to solve the technical problem in the prior art that the disclosure content and disclosure range of the personal information of a user are not freely controlled by the user, so that the privacy of the personal information cannot be effectively guaranteed.
In order to achieve the above object, the embodiments of the present invention provide the following technical solutions:
according to a first aspect of embodiments of the present invention, there is provided a method of personal information disclosure management, the method including:
receiving request information sent by an information demand party;
extracting field codes corresponding to the request information from pre-generated personal serial codes according to the request information, wherein the personal serial codes are generated according to a coding rule set by a user, each personal serial code comprises at least one field code, and each field code is respectively used for representing one item of personal information;
and sending the field code corresponding to the request information, the field mapping table and the code reading file corresponding to the field code to a demand party so that the demand party can read the field code according to the field mapping table and the code reading file to obtain personal information corresponding to the field code.
Further, generating the personal string code includes:
acquiring at least one item of personal information data;
coding the ith personal information data according to an ith data coding rule corresponding to the ith personal information data, and acquiring an ith field code for expressing the ith personal information data; wherein i is a positive integer which is greater than or equal to 1 and less than or equal to the total number of the personal information data items, i is sequentially subjected to progressive value taking, and the initial value taking is 1;
and sequencing all the field codes according to a preset field sequencing sequence to form the personal information string code.
Further, the request information comprises a personal information identifier corresponding to the personal information to be acquired by the demand party; according to the request information, extracting a field code corresponding to the request information from the pre-generated personal string code, specifically comprising:
matching the personal information identification with a field mapping table, and determining a field code corresponding to the request information;
and extracting a field code corresponding to the request information from the pre-generated personal string code, wherein the personal information identifier is used for indicating the personal information to be acquired.
Furthermore, the request information also comprises identity authentication information corresponding to the demand party; before extracting the field code corresponding to the request information from the pre-generated personal string code according to the request information, the method further comprises the following steps:
determining whether a demand party has the authority to acquire personal information corresponding to the personal information identifier according to the identity authentication information;
and when the demander is determined to have the authority to acquire the personal information corresponding to the personal information identifier, extracting a field code corresponding to the request information from the pre-generated personal serial code according to the request information.
Further, when the field code corresponding to the request information includes at least one, the method sends the field code corresponding to the request information, the field mapping table, and the code interpretation file corresponding to the field code to the requesting party, specifically including:
encoding at least one field to generate a new personal string code;
and sending the new personal serial code, the field mapping table and the code reading file corresponding to the field code to the demand side.
Further, the method further comprises:
and encoding fields with different numbers to form a new personal serial code, and setting open authority to adapt to the requirements of different demanders.
According to a second aspect of the embodiments of the present invention, there is provided an apparatus for personal information disclosure management, the apparatus including:
the receiving unit is used for receiving request information sent by an information demand party;
the processing unit is used for extracting a field code corresponding to the request information from a pre-generated personal serial code according to the request information, wherein the personal serial code is generated according to a coding rule set by a user, the personal serial code comprises at least one field code, and each field code is respectively used for representing one item of personal information;
and the sending unit is used for sending the field codes corresponding to the request information, the field mapping table and the code reading files corresponding to the field codes to the requiring party so that the requiring party can read the field codes according to the field mapping table and the code reading files to obtain the personal information corresponding to the field codes.
Further, the apparatus further comprises: an acquisition unit for acquiring at least one item of personal information data;
the processing unit is also used for coding the ith personal information data according to an ith data coding rule corresponding to the ith personal information data to acquire an ith field code for expressing the ith personal information data; wherein i is a positive integer which is greater than or equal to 1 and less than or equal to the total number of the personal information data items, i is sequentially subjected to progressive value taking, and the initial value taking is 1;
and sequencing all the field codes according to a preset field sequencing sequence to form the personal information string code.
Further, the request information comprises a personal information identifier corresponding to the personal information to be acquired by the demand party; the processing unit is specifically configured to match the personal information identifier with a field mapping table, and determine a field code corresponding to the request information;
and extracting a field code corresponding to the request information from the pre-generated personal string code, wherein the personal information identifier is used for indicating the personal information to be acquired.
Furthermore, the request information also comprises identity authentication information corresponding to the demand party; the processing unit is also used for determining whether the demander has the authority to acquire the personal information corresponding to the personal information identifier according to the identity authentication information;
and when the demander is determined to have the authority to acquire the personal information corresponding to the personal information identifier, extracting a field code corresponding to the request information from the pre-generated personal serial code according to the request information.
Further, when the field code corresponding to the request message includes at least one field code, the processing unit is specifically configured to generate a new personal string code from the at least one field code;
and sending the new personal serial code, the field mapping table and the code reading file corresponding to the field code to the demand side.
Furthermore, the processing unit is also used for encoding fields with different numbers of items to form a new personal serial code and setting open authority to adapt to the requirements of different demanders.
According to a third aspect of the embodiments of the present invention, there is provided a system for disclosure management of personal information, the system including: a processor and a memory;
the memory is used for storing one or more program instructions;
a processor for executing one or more program instructions to perform any of the method steps of the above method for personal information disclosure management.
According to a fourth aspect of embodiments of the present invention, there is provided a computer storage medium having one or more program instructions embodied therein for use by a system for personal information disclosure management to perform any of the method steps of a method of personal information disclosure management as above.
The embodiment of the invention has the following advantages: the personal serial code is generated according to a coding rule set by a user. When a demand party needs to acquire certain personal information of a user, the system extracts a field code corresponding to the request information from the pre-generated personal serial code according to the demand information, and then sends a code reading file corresponding to the field code, the field mapping table and the field code to the demand party. And the convenience requiring party decodes the field codes according to the field mapping table and the code reading file to acquire personal information corresponding to the field codes. By the method, a user can participate in setting the coding rule by himself to generate the personal serial code corresponding to the personal information. The configurability of the user to disclose the personal information is realized; the user-defined encoding rule may be set as a dynamic randomization operation. The associativity between the information is reduced, and the risk that the personal information is compared and cracked in a large scale is further reduced. For lawbreakers, regular cracking is not easy to seek, so that personal information is easily acquired, the eavesdropping difficulty of coded information is increased, and the directional disclosure of the personal information is ensured. For the demanding party, the personal information of the user can still be obtained by conventional means. And the disclosure of the personal information is limited to the data required by the demander, and the disclosure range of the personal information is minimized.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It should be apparent that the drawings in the following description are merely exemplary, and that other embodiments can be derived from the drawings provided by those of ordinary skill in the art without inventive effort.
The structures, ratios, sizes, and the like shown in the present specification are only used for matching with the contents disclosed in the specification, so as to be understood and read by those skilled in the art, and are not used to limit the conditions that the present invention can be implemented, so that the present invention has no technical significance, and any structural modifications, changes in the ratio relationship, or adjustments of the sizes, without affecting the effects and the achievable by the present invention, should still fall within the range that the technical contents disclosed in the present invention can cover.
Fig. 1 is a flowchart illustrating a method for disclosure management of personal information according to embodiment 1 of the present invention;
fig. 2 is a schematic structural diagram of a device for disclosure management of personal information according to embodiment 2 of the present invention;
fig. 3 is a schematic structural diagram of a system for disclosure management of personal information according to embodiment 3 of the present invention.
Detailed Description
The present invention is described in terms of particular embodiments, other advantages and features of the invention will become apparent to those skilled in the art from the following disclosure, and it is to be understood that the described embodiments are merely exemplary of the invention and that it is not intended to limit the invention to the particular embodiments disclosed. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Embodiment 1 of the present invention provides a method for disclosure and management of personal information, which specifically includes the following steps as shown in fig. 1:
step 110, receiving the request information sent by the information demand side.
Specifically, when the demander needs to acquire the personal information of the user, the demander gives a specifically needed information indication in the request information. Alternatively, the information indication may be a personal information identification, e.g. giving an identification card, a name, a nationality, etc.
And step 120, extracting a field code corresponding to the request information from the pre-generated personal serial code according to the request information.
Specifically, the personal string code is generated according to a coding rule set by a user, and the personal string code comprises at least one field code, and each field code is used for representing one item of personal information.
The pre-generated personal serial code mainly comprises the following steps:
acquiring at least one item of personal information data;
coding the ith personal information data according to an ith data coding rule corresponding to the ith personal information data, and acquiring an ith field code for expressing the ith personal information data; wherein i is a positive integer which is greater than or equal to 1 and less than or equal to the total number of the personal information data items, i is sequentially subjected to progressive value taking, and the initial value taking is 1;
and sequencing all the field codes according to a preset field sequencing sequence to form the personal information string code.
The personal information data may include, but is not limited to, one or more of the following: name information (e.g., dawn), identification number (211), woman, age 29, student history, etc., relate to some data of personal information.
Then, encoding is performed once for each item of data, respectively. Different data coding rules can be different, coding can be reversible coding or non-reversible coding, and specific conditions can be customized by users. The encoding rules may also be modified periodically or aperiodically. That is, as described above, the ith personal information data is encoded according to the ith data encoding rule corresponding to the ith personal information data, and the ith field code representing the ith personal information data is acquired. During encoding, identity information, interference information, non-identity information and the like can be dynamically arranged in mixed sequence code bits, and the connectivity among information is reduced. Thereby reducing the risk of privacy being compromised on a large scale.
After the field codes corresponding to each item of personal information data are formed, the field codes are sorted. The sorting order can be adjusted manually, automatically randomly or non-randomly, and the like. If automatic sequence adjustment is adopted, a user can also define a sequence adjustment program (including adjustment time) and store the sequence adjustment program in the system. It may also be subsequently modified again.
After the field codes are sequenced according to a certain sequence, the personal information string code can be formed. And the eavesdropping difficulty of the coded information can be improved just by the dynamic randomization operation of the personal information string codes through the coding rule and the sequencing mapping.
Further, the method also comprises the step of generating a field mapping table while generating the personal information string code. To be used as an index for subsequent search of field codes corresponding to personal information identifications.
Step 120 may specifically include: matching the personal information identification with a field mapping table, and determining a field code corresponding to the request information;
and extracting a field code corresponding to the request information from the pre-generated personal string code, wherein the personal information identifier is used for indicating the personal information to be acquired.
Step 130, sending the field code corresponding to the request information, the field mapping table and the code interpretation file corresponding to the field code to the requesting party.
Specifically, after extracting the field code corresponding to the request information from the pre-generated personal serial code, if the demander wants to decode the field code, the demander needs to decode the file according to the coding rule. Therefore, when information is transmitted to a requester, the information includes a field code corresponding to the requested information, a field mapping table, and a code interpretation file corresponding to the field code. The field mapping table is convenient for a demand party to determine the meaning of each field code and find the decoding rule corresponding to the field code in the code interpretation file. For example, if a field code is known to represent the information of the identity card through the field mapping table, the demander can decode the field code according to the decoding rule of the identity card.
Further optionally, in order to verify whether the demander has the right to acquire some field encoding information, the request information sent by the demander needs to include the identity verification information corresponding to the demander. Determining whether a demand party has the authority to acquire personal information corresponding to the personal information identifier according to the identity authentication information;
and only when the demander is determined to have the authority to acquire the personal information corresponding to the personal information identifier, the system extracts the field code corresponding to the request information from the pre-generated personal serial code according to the request information, and then subsequently sends the field code to the demander.
Further optionally, when the field code corresponding to the request information includes at least one, the method sends the field code corresponding to the request information, the field mapping table, and the code interpretation file corresponding to the field code to the requesting party, specifically includes:
encoding at least one field to generate a new personal string code;
and sending the new personal serial code, the field mapping table and the code reading file corresponding to the field code to the demand side.
Further optionally, the demanders may be classified, different customers may all belong to a class of demanders, and the required personal information is the same. In order to improve efficiency, the steps of steps 110 and 120 are repeated to extract when each demand side seeks personal information, so that the field codes with different numbers can be encoded to form a new personal string code, and open permissions are set to adapt to the demands of different demand sides.
It should be noted that all the above-mentioned contents of the personal serial codes, the encoding rules, the encoding and reading files, the serial code sorting order, the personal information, the field mapping table, and the like, which are formed above, can be saved in the personal data management terminal for backup.
In the method for disclosure management of personal information provided by the embodiment of the invention, the personal serial code is generated according to the coding rule set by the user. When a demand party needs to acquire certain personal information of a user, the system extracts a field code corresponding to the request information from the pre-generated personal serial code according to the demand information, and then sends a code reading file corresponding to the field code, the field mapping table and the field code to the demand party. And the convenience requiring party decodes the field codes according to the field mapping table and the code reading file to acquire personal information corresponding to the field codes. By the method, a user can participate in setting the coding rule by himself to generate the personal serial code corresponding to the personal information. The configurability of the user to disclose the personal information is realized; the user-defined encoding rule may be set as a dynamic randomization operation. The associativity between the information is reduced, and the risk that the personal information is compared and cracked in a large scale is further reduced. For lawbreakers, regular cracking is not easy to seek, so that personal information is easily acquired, the eavesdropping difficulty of coded information is increased, and the directional disclosure of the personal information is ensured. For the demanding party, the personal information of the user can still be obtained by conventional means. And the disclosure of the personal information is limited to the data required by the demander, and the disclosure range of the personal information is minimized.
Corresponding to the foregoing embodiment 1, embodiment 2 of the present invention further provides an apparatus for disclosure management of personal information, specifically as shown in fig. 2, the apparatus includes: a receiving unit 201, a processing unit 202 and a transmitting unit 203.
A receiving unit 201, configured to receive request information sent by an information demander;
the processing unit 202 is configured to extract, according to the request information, a field code corresponding to the request information from a pre-generated personal string code, where the personal string code is generated according to a coding rule set by a user, the personal string code includes at least one field code, and each field code is used for representing one item of personal information;
a sending unit 203, configured to send the field code corresponding to the request information, the field mapping table, and the code reading file corresponding to the field code to the requesting party, so that the requesting party reads the field code according to the field mapping table and the code reading file, and obtains personal information corresponding to the field code.
Optionally, the apparatus further comprises: an acquisition unit 204 for acquiring at least one item of personal information data;
the processing unit 202 is further configured to encode the ith personal information data according to an ith data encoding rule corresponding to the ith personal information data, and acquire an ith field code representing the ith personal information data; wherein i is a positive integer which is greater than or equal to 1 and less than or equal to the total number of the personal information data items, i is sequentially subjected to progressive value taking, and the initial value taking is 1;
and sequencing all the field codes according to a preset field sequencing sequence to form the personal information string code.
Optionally, the request information includes a personal information identifier corresponding to the personal information to be acquired by the demander; the processing unit 202 is specifically configured to match the personal information identifier with a field mapping table, and determine a field code corresponding to the request information;
and extracting a field code corresponding to the request information from the pre-generated personal string code, wherein the personal information identifier is used for indicating the personal information to be acquired.
Optionally, the request information further includes identity authentication information corresponding to the requesting party; the processing unit 202 is further configured to determine whether the demander has an authority to acquire personal information corresponding to the personal information identifier according to the identity authentication information;
and when the demander is determined to have the authority to acquire the personal information corresponding to the personal information identifier, extracting a field code corresponding to the request information from the pre-generated personal serial code according to the request information.
Optionally, when at least one field code corresponding to the request information is included, the processing unit 202 is specifically configured to generate a new personal string code from the at least one field code;
and sending the new personal serial code, the field mapping table and the code reading file corresponding to the field code to the demand side.
Optionally, the processing unit 202 is further configured to encode fields with different numbers to form a new personal string code, and set an open permission to meet the requirements of different demanders.
The functions performed by each component in the apparatus for disclosing and managing personal information according to the embodiment of the present invention are described in detail in the above embodiment 1, and therefore, redundant description is not repeated here.
According to the device for disclosing and managing the personal information, the personal serial code is generated according to the coding rule set by the user. When a demand party needs to acquire certain personal information of a user, the system extracts a field code corresponding to the request information from the pre-generated personal serial code according to the demand information, and then sends a code reading file corresponding to the field code, the field mapping table and the field code to the demand party. And the convenience requiring party decodes the field codes according to the field mapping table and the code reading file to acquire personal information corresponding to the field codes. By the method, a user can participate in setting the coding rule by himself to generate the personal serial code corresponding to the personal information. The configurability of the user to disclose the personal information is realized; the user-defined encoding rule may be set as a dynamic randomization operation. The associativity between the information is reduced, and the risk that the personal information is compared and cracked in a large scale is further reduced. For lawbreakers, regular cracking is not easy to seek, so that personal information is easily acquired, the eavesdropping difficulty of coded information is increased, and the directional disclosure of the personal information is ensured. For the demanding party, the personal information of the user can still be obtained by conventional means. And the disclosure of the personal information is limited to the data required by the demander, and the disclosure range of the personal information is minimized.
Corresponding to the above embodiment, embodiment 3 of the present invention further provides a system for disclosure management of personal information, specifically as shown in fig. 3, the system includes: a processor 301 and a memory 302;
the memory 302 is used to store one or more program instructions;
processor 301 is configured to execute one or more program instructions to perform any method steps of a method for personal information disclosure management as described in the above embodiments.
In the system for disclosure and management of personal information provided by the embodiment of the invention, the personal serial code is generated according to the coding rule set by the user. When a demand party needs to acquire certain personal information of a user, the system extracts a field code corresponding to the request information from the pre-generated personal serial code according to the demand information, and then sends the field code, the field mapping table and the code reading file corresponding to the field code to the demand party. And the convenience requiring party decodes the field codes according to the field mapping table and the code reading file to acquire personal information corresponding to the field codes. By the method, a user can participate in setting the coding rule by himself to generate the personal serial code corresponding to the personal information. The configurability of the user to disclose the personal information is realized; the user-defined encoding rule may be set as a dynamic randomization operation. The associativity between the information is reduced, and the risk that the personal information is compared and cracked in a large scale is further reduced. For lawbreakers, regular cracking is not easy to seek, so that personal information is easily acquired, the eavesdropping difficulty of coded information is increased, and the directional disclosure of the personal information is ensured. For the demanding party, the personal information of the user can still be obtained by conventional means. And the disclosure of the personal information is limited to the data required by the demander, and the disclosure range of the personal information is minimized.
In correspondence with the above embodiments, embodiments of the present invention also provide a computer storage medium containing one or more program instructions therein. Wherein one or more program instructions are for executing a method of personal information disclosure management as introduced above by a system of personal information disclosure management.
In an embodiment of the invention, the processor may be an integrated circuit chip having signal processing capability. The Processor may be a general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete Gate or transistor logic device, discrete hardware component.
The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The processor reads the information in the storage medium and completes the steps of the method in combination with the hardware.
The storage medium may be a memory, for example, which may be volatile memory or nonvolatile memory, or which may include both volatile and nonvolatile memory.
The nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory.
The volatile Memory may be a Random Access Memory (RAM) which serves as an external cache. By way of example, and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), SLDRAM (SLDRAM), and Direct Rambus RAM (DRRAM).
The storage media described in connection with the embodiments of the invention are intended to comprise, without being limited to, these and any other suitable types of memory.
Those skilled in the art will appreciate that the functionality described in the present invention may be implemented in a combination of hardware and software in one or more of the examples described above. When software is applied, the corresponding functionality may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
The above embodiments are only for illustrating the embodiments of the present invention and are not to be construed as limiting the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made on the basis of the embodiments of the present invention shall be included in the scope of the present invention.

Claims (9)

1. A method of personal information disclosure management, the method comprising:
receiving request information sent by an information demand party; the request information comprises a personal information identifier corresponding to the personal information to be acquired by the demand party;
matching the personal information identification with a field mapping table, and determining a field code corresponding to the request information; extracting a field code corresponding to the request information from a pre-generated personal serial code, wherein the personal information identifier is used for indicating personal information to be acquired, the personal serial code is generated according to a coding rule set by a user, the personal serial code comprises at least one field code, and each field code is respectively used for representing one item of personal information;
and sending a field code corresponding to the request information, a field mapping table and a code reading file corresponding to the field code to the requiring party, so that the requiring party reads the field code according to the field mapping table and the code reading file and acquires personal information corresponding to the field code.
2. The method of claim 1, wherein generating the personal string code comprises:
acquiring at least one item of personal information data;
coding the ith item of personal information data according to an ith data coding rule corresponding to the ith item of personal information data, and acquiring an ith field code for expressing the ith item of personal information data; wherein i is a positive integer which is greater than or equal to 1 and less than or equal to the total number of the personal information data items, i is sequentially subjected to progressive value taking, and the initial value taking is 1;
and sequencing all the field codes according to a preset field sequencing sequence to form the personal information string code.
3. The method according to claim 1, wherein the request information further includes authentication information corresponding to the demanding party; before extracting a field code corresponding to the request information from the pre-generated personal serial code according to the request information, the method further comprises:
determining whether the demander has the authority to acquire the personal information corresponding to the personal information identifier according to the identity authentication information;
and when the demander is determined to have the authority to acquire the personal information corresponding to the personal information identifier, extracting a field code corresponding to the request information from the pre-generated personal serial code according to the request information.
4. The method according to claim 1 or 2, wherein when the field code corresponding to the request information includes at least one, the sending the field code corresponding to the request information, the field mapping table, and the code interpretation file corresponding to the field code to the demander includes:
encoding at least one field to generate a new personal string code;
and sending the new personal serial code, the field mapping table and the coding and reading file corresponding to the field code to the demander.
5. The method according to claim 1 or 2, characterized in that the method further comprises:
and encoding fields with different numbers to form a new personal serial code, and setting open authority to adapt to the requirements of different demanders.
6. An apparatus for disclosure management of personal information, the apparatus comprising:
the receiving unit is used for receiving request information sent by an information demand party; the request information comprises a personal information identifier corresponding to the personal information to be acquired by the demand party;
the processing unit is used for matching the personal information identifier with a field mapping table and determining a field code corresponding to the request information; extracting a field code corresponding to the request information from a pre-generated personal serial code, wherein the personal information identifier is used for indicating personal information to be acquired, the personal serial code is generated according to a coding rule set by a user, the personal serial code comprises at least one field code, and each field code is respectively used for representing one item of personal information;
and the sending unit is used for sending the field code corresponding to the request information, the field mapping table and the code reading file corresponding to the field code to the requiring party, so that the requiring party can read the field code according to the field mapping table and the code reading file to obtain the personal information corresponding to the field code.
7. The apparatus of claim 6, further comprising:
an acquisition unit for acquiring at least one item of personal information data;
the processing unit is further used for encoding the ith item of personal information data according to an ith data encoding rule corresponding to the ith item of personal information data, and acquiring an ith field code for representing the ith item of personal information data; wherein i is a positive integer which is greater than or equal to 1 and less than or equal to the total number of the personal information data items, i is sequentially subjected to progressive value taking, and the initial value taking is 1;
and sequencing all the field codes according to a preset field sequencing sequence to form the personal information string code.
8. A system for disclosure management of personal information, the system comprising: a processor and a memory;
the memory is to store one or more program instructions;
the processor, configured to execute one or more program instructions to perform the method of any of claims 1-5.
9. A computer storage medium containing one or more program instructions for performing the method of any one of claims 1-5 by a system for personal information disclosure management.
CN201910912372.4A 2019-09-25 2019-09-25 Method, device, system and storage medium for personal information disclosure management Active CN110795757B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910912372.4A CN110795757B (en) 2019-09-25 2019-09-25 Method, device, system and storage medium for personal information disclosure management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910912372.4A CN110795757B (en) 2019-09-25 2019-09-25 Method, device, system and storage medium for personal information disclosure management

Publications (2)

Publication Number Publication Date
CN110795757A CN110795757A (en) 2020-02-14
CN110795757B true CN110795757B (en) 2022-02-01

Family

ID=69439682

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910912372.4A Active CN110795757B (en) 2019-09-25 2019-09-25 Method, device, system and storage medium for personal information disclosure management

Country Status (1)

Country Link
CN (1) CN110795757B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113377898B (en) * 2021-08-16 2021-11-23 南京东大智能化***有限公司 Analysis method based on mass discrete data
CN113676290B (en) * 2021-09-27 2024-05-03 深圳市金斧子网络科技有限公司 Data transmission method and related equipment based on foundation system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103177007A (en) * 2011-12-22 2013-06-26 ***通信集团公司 Privacy-removing processing method and device using the same
CA3128840A1 (en) * 2015-10-09 2017-04-13 Wei Xu Server and information processing method based on unified code issuance
CN106650205B (en) * 2016-09-28 2019-03-19 西安电子科技大学 A kind of cloud medical data monitoring method of efficient secret protection
CN110147361A (en) * 2019-05-27 2019-08-20 普元信息技术股份有限公司 The system and method for master data coding rule maintenance function are realized under big data environment

Also Published As

Publication number Publication date
CN110795757A (en) 2020-02-14

Similar Documents

Publication Publication Date Title
US11523153B2 (en) System and techniques for digital data lineage verification
CN112383519A (en) Enterprise authentication and authentication tracing method, device and equipment based on block chain
CN109040082A (en) Certification, verification method and the device of the identity content information of user
CN110795757B (en) Method, device, system and storage medium for personal information disclosure management
SG182012A1 (en) System and method for verifying authenticity of documents
CN114710329B (en) Method and apparatus for managing access to accounts in a blockchain system
CN109040134A (en) A kind of design method and relevant apparatus of information encryption
US5481612A (en) Process for the authentication of a data processing system by another data processing system
CN113348455A (en) Apparatus and method for providing authentication, non-repudiation, managed access, and twin discrimination of data using data control signatures
US20230109369A1 (en) First copyright holder authentication system using blockchain, and method therefor
KR19980070017A (en) How to check encryption key for chip card
CN111881483A (en) Resource account binding method, device, equipment and medium based on block chain
CN111683064A (en) Block chain-based data transfer method, device, medium, equipment and application
CN113221142A (en) Authorization service processing method, device, equipment and system
CN115795538A (en) Desensitization document anti-desensitization method, apparatus, computer device and storage medium
CN115514585A (en) Database security management method and system
CN111079157A (en) Secret fragmentation trusteeship platform based on block chain, equipment and medium
WO2021012732A1 (en) Blockchain-based information verification apparatus and method, and storage medium
CN111078649A (en) Block chain-based on-cloud file storage method and device and electronic equipment
Szadeczky Enhanced functionality brings new privacy and security issues–an analysis of eID
CN113987446A (en) Authentication method and device
US10678468B2 (en) Method and system for dynamic dispersed saving
US10868882B1 (en) Methods and systems for facilitating redirecting of internet traffic to service providers of a particular location
KR101535952B1 (en) The method and apparatus of certificating an user using the recognition code
KR101620339B1 (en) The method and apparatus of certificating an user using the recognition code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant