CN110263575B - Method for realizing data fusion and data privacy protection based on Hash algorithm and session control - Google Patents
Method for realizing data fusion and data privacy protection based on Hash algorithm and session control Download PDFInfo
- Publication number
- CN110263575B CN110263575B CN201910540892.7A CN201910540892A CN110263575B CN 110263575 B CN110263575 B CN 110263575B CN 201910540892 A CN201910540892 A CN 201910540892A CN 110263575 B CN110263575 B CN 110263575B
- Authority
- CN
- China
- Prior art keywords
- data
- mapping
- providing module
- user
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2228—Indexing structures
- G06F16/2255—Hash tables
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2455—Query execution
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0251—Targeted advertisements
- G06Q30/0255—Targeted advertisements based on user history
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0277—Online advertisement
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Development Economics (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- Game Theory and Decision Science (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Software Systems (AREA)
- Economics (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- Entrepreneurship & Innovation (AREA)
- Computational Linguistics (AREA)
- Medical Informatics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Telephonic Communication Services (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention relates to a method for realizing data fusion and data privacy protection based on a Hash algorithm and session control, which comprises a demand module sending a query request after Hash calculation to a mapping data providing module; the mapping data providing module inquires whether data exists; the demand module queries the image data providing module for provider data; the image data providing module inquires a previous n-bit hash value list to obtain; the mapping data providing module returns hit information to the portrait data providing module; the image data providing module queries data. By adopting the method for realizing data fusion and data privacy protection based on the Hash algorithm and the session control, disclosed by the invention, the leakage of high-sensitivity information caused by the query of low-sensitivity information is avoided, and the data derviation caused by data diffusion is also avoided. This patent implementation scheme makes the three parties all expect the user to portrait the information, all can not leak user privacy information, has ensured individual user and enterprise user's data privacy and data security.
Description
Technical Field
The invention relates to the field of data protection, in particular to the field of user data fusion protection, and specifically relates to a method for realizing data fusion and data privacy protection based on a hash algorithm and session control.
Background
Data incompleteness problem:
in fact, enterprises providing services for individual users all have user data with different dimensions, and the user data owned by each enterprise is incomplete. Such as:
a company providing a fixed point service for apps only has information about mobile phone devices and which apps have been installed by users (user interest characteristics can be derived from a user installation list), and information about user activity time;
an application providing H5 business services through handset registration, which only knows the handset number of the user and the data of the self service content;
app providing services in Native mode, which has mobile phone number and equipment number, and information of service field;
the mobile service company knows the user's phone number and some user characteristics associated with the call, etc.
There are many business scenario enterprises that it is not enough to know information in their own domain, for example, if an App needs to push advertisements to users, he needs to have wider user characteristics to achieve the best advertisement effect, and at this time, he needs to merge more characteristics to serve higher quality technical services.
Data leakage during data fusion:
to illustrate how data leaks occur, in one example, the example roles are as follows:
(1) a demand side: the method comprises the steps that a user mobile phone number is available, and a batch of Apps of user tag data are expected to be obtained;
(2) a user portrait provider: having a collection of user tag data and associated mobile phone device numbers (e.g., a company providing a point-of-purchase service);
(3) a mapping data providing module: and the corresponding relation between the mobile phone number and the mobile phone equipment number is possessed.
The query scene is shown in the description and the attached fig. 1 to fig. 3, and the description and the attached fig. 1 illustrate that the user equipment information is leaked to a demand side in the scene; description figure 2 illustrates that this scenario leaks user pictorial information to the mapping data providing module; description fig. 3 illustrates that in this scenario, information relating to the mobile phone number and the device is leaked to the image provider.
Problems caused by data leakage:
data compliance issues: the equipment information and the mobile phone number belong to high-sensitivity information, and the user characteristics belong to low-sensitivity information, so that the leakage of the high-sensitivity information is generated due to the inquiry of the low-sensitivity information in the case;
data derogation caused by data diffusion allows other parties to obtain data which is not required to be obtained in different query scenes, and a data provider can accumulate and exchange the data, so that the data value of the original provider is reduced.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a method for realizing data fusion and data privacy protection based on a Hash algorithm and session control, which meets the requirements of completeness, safety and privacy.
In order to achieve the above purpose, the method for implementing data fusion and data privacy protection based on the hash algorithm and session control of the present invention comprises:
the method for realizing data fusion and data privacy protection based on the Hash algorithm and session control is mainly characterized by comprising the following steps of:
(1) the demand module sends a query request of the mobile phone number hash value to the mapping data providing module;
(2) the mapping data providing module inquires whether the same mobile phone number hash data exists, and if so, returns a result to the demand module; otherwise, not returning the result;
(3) the requirement module initiates a query request to the portrait data providing module;
(4) the portrait data providing module locally inquires a data list matched with the first n-bit hash value of the request and sends an inquiry request to the mapping data providing module;
(5) the mapping data providing module inquires whether the corresponding session data has a data list of hit requests, if so, the hit data is returned, otherwise, the data is not returned;
(6) the representation data providing module determines whether there is return data, and if so, queries locally the user representation data for return to the user, otherwise, does not return data.
Preferably, the step (2) specifically comprises the following steps:
(2.1) inquiring corresponding mapping data according to the requested hash value;
(2.2) if the corresponding mapping data exists, returning the corresponding equipment number of the mobile phone to the demand module, carrying out hash calculation, then taking the front n-bit numerical value, simultaneously creating a conference locally and providing a temporary token for the demand module; otherwise, no data is returned.
Preferably, the provider data in step (3) includes the first n-bit value after the device hash calculation and the temporary token.
Preferably, the step (4) specifically includes the following steps:
(4.1) the portrait data providing module searches the front n-bit matched data in the user portrait library according to the n-bit equipment hash value requested by the demand module;
(4.2) if the data is matched to be more than or equal to 1, sending a query request to the mapping data providing module; otherwise, directly returning an empty result to the demand module.
Preferably, the mapping data is mapping information of the user, including a corresponding relationship between a mobile phone number and an equipment number.
Preferably, the temporary token is generated by the mapping service provider server, is associated with the user information, and is stored by the server in session control within a limited time.
By adopting the method for realizing data fusion and data privacy protection based on the Hash algorithm and the session control, disclosed by the invention, the leakage of high-sensitivity information caused by the query of low-sensitivity information is avoided, and the data derviation caused by data diffusion is also avoided. This patent implementation scheme makes the three parties all expect the user to portrait the information, all can not leak user privacy information, has ensured individual user and enterprise user's data privacy and data security.
Drawings
Fig. 1 is a schematic diagram of a first query scenario in the prior art.
Fig. 2 is a diagram illustrating a second query scenario in the prior art.
Fig. 3 is a diagram illustrating a third query scenario in the prior art.
Fig. 4 is a structural diagram of a method for implementing data fusion and data privacy protection based on a hash algorithm and session control according to the present invention.
Fig. 5 is a sequence diagram of a method for implementing data fusion and data privacy protection based on a hash algorithm and session control according to the present invention.
Detailed Description
In order to more clearly describe the technical contents of the present invention, the following further description is given in conjunction with specific embodiments.
The method for realizing data fusion and data privacy protection based on the Hash algorithm and session control comprises the following steps:
(1) the demand module sends a query request of the mobile phone number hash value to the mapping data providing module;
(2) the mapping data providing module inquires whether the same mobile phone number hash data exists, and if so, returns a result to the demand module; otherwise, not returning the result;
(2.1) inquiring corresponding mapping data according to the requested hash value;
(2.2) if the corresponding mapping data exists, returning the corresponding equipment number of the mobile phone to the demand module, carrying out hash calculation, then taking the front n-bit numerical value, simultaneously creating a conference locally and providing a temporary token for the demand module; otherwise, no data is returned.
(3) The requirement module initiates a query request to the portrait data providing module;
(4) the portrait data providing module locally inquires a data list matched with the first n-bit hash value of the request and sends an inquiry request to the mapping data providing module;
(4.1) the portrait data providing module searches the front n-bit matched data in the user portrait library according to the n-bit equipment hash value requested by the demand module;
(4.2) if the data is matched to be more than or equal to 1, sending a query request to the mapping data providing module; otherwise, directly returning an empty result to the demand module.
(5) The mapping data providing module inquires whether the corresponding session data has a data list of hit requests, if so, the hit data is returned, otherwise, the data is not returned;
(6) the representation data providing module determines whether there is return data, and if so, queries locally the user representation data for return to the user, otherwise, does not return data.
As a preferred embodiment of the present invention, the provider data in step (3) includes the first n-bit value after the device hash calculation and the temporary token.
As a preferred embodiment of the present invention, the mapping data is mapping information of a user, and includes a correspondence between a mobile phone number and an equipment number.
In a preferred embodiment of the present invention, the temporary token is generated by the server, associated with the user information, and stored by the server in session control for a limited time.
In the claims and the description of the present invention, the Hash refers to an algorithm that performs hashing and hashing on an input content with an arbitrary length and converts the input content into an irreversible output with a fixed length, such as MD5, which is a simple Hash algorithm. Irreversible means you cannot restore the output value to the input value again through the algorithm. Session is called "Session control" in network applications, and the attributes and configuration information required for a user Session are stored in this Session. In this patent, the information of a user is stored in a server when the request of the user is limited, so that the information of the corresponding user can be quickly found in the next request, and the specifically stored information is as follows: token, and Mapping information of the user corresponding to the token. Token is a temporary Token generated by the server and providing the access end, and the Token is stored in the Session within a limited time, and is associated with the user information. Mapping refers to Mapping information (Mapping data) of a user, and in the case of the patent, a corresponding relationship between a mobile phone number and an equipment number is referred to as Mapping relationship, and in addition, as follows: the corresponding relationship between the user identity card and the mobile phone number is also called Mapping and the like.
The query sent by the demand direction mapping data providing module is a query after Hash, and the mapping data providing module can only be matched in a library of the demand direction mapping data providing module and cannot be decompiled. If the mapping data providing module has the user information to be queried, a Session is maintained and a token is returned to the user, wherein the token has a different value even if the same user queries for multiple times. The mapping data providing module only returns the first n bits after the Hash of the device number to prevent the Hash data leakage problem.
In an embodiment of the present invention, the image data is user tag data. In the specification of the present invention, fig. 4 is divided into a demander, a mapping data provider, and a label provider, where the demander is a demand module, the label provider is a portrait data providing module, and the mapping data provider is a mapping data providing module. In the description of the present invention, fig. 5 is divided into a demander, a provider 1, and a provider 2, where the demander is a demand module, the provider 1 is a mapping data providing module, and the provider 2 is a portrait data providing module.
1. A demand side:
token: because the value is a session value, the long-term effectiveness is not achieved;
n bits before the hash of the device: since the hash is not complete, there is no hash leakage;
user portrait: service requirement data.
2. A mapping data providing module:
inquiring the mobile phone number Hash: the mapping data providing module can record the hash of the query user, but the data does not generate actual value;
device hash list information requested by a portrait provider: the information is similar to the hash of the mobile phone number of the inquiring party, and no additional value is generated.
The execution description is as follows:
matching the n front bits of the hash of the equipment of the demand side in a user portrait library, and returning to null if the n front bits of the hash of the equipment of the demand side cannot be matched; and if the m pieces are matched, sending a request to the mapping data providing module. If the mapping data providing module has a returned result, the portrait information is extracted.
3. Image provider:
token: the same as the demand side;
n bits before the hash of the device: the same as the demand side;
mapping return information: returning the information hit in the send list, there is no added value to the image side.
The execution description is as follows:
inquiring corresponding equipment information according to the token, matching whether equipment corresponding to the token exists in the sent hash list, and returning to null if the equipment corresponding to the token does not exist in the sent hash list; if there is a match, the hash value of the device is returned.
In conclusion, the scheme of the figure 4 in the specification does not generate information leakage.
The timing diagram for implementing the invention is shown in fig. 5, and omits the query ending part if the data cannot be found in the request.
The invention provides data privacy protection, and sends information hash values including mobile phone numbers and equipment numbers instead of sending plain texts in all request processes. The requesting party may not obtain other data than the user representation data, but may obtain other data in the data leakage scenario. The mapping data providing module may not obtain additional data other than the service, and may obtain user portrait data in the data leakage scenario 2. The image provider cannot obtain other user information in addition to the service, and Mapping information is obtained in the data leakage scenario 3. This patent implementation scheme makes three parties all expect the user to portrait the information, all can not leak user's privacy information.
By adopting the method for realizing data fusion and data privacy protection based on the Hash algorithm and the session control, disclosed by the invention, the leakage of high-sensitivity information caused by the query of low-sensitivity information is avoided, and the data derviation caused by data diffusion is also avoided. This patent implementation scheme makes the three parties all expect the user to portrait the information, all can not leak user privacy information, has ensured individual user and enterprise user's data privacy and data security.
In this specification, the invention has been described with reference to specific embodiments thereof. It will, however, be evident that various modifications and changes may be made thereto without departing from the broader spirit and scope of the invention. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.
Claims (6)
1. A method for realizing data fusion and data privacy protection based on a hash algorithm and session control is characterized by comprising the following steps:
(1) the demand module sends a query request after the hash value is calculated by the query parameter to the mapping data providing module;
(2) the mapping data providing module inquires whether the mapping data which is obtained by calculating the hash value according to the inquiry parameters exists or not, and if the mapping data exists, the mapping data providing module returns a corresponding mapping data result and a temporary token for carrying out the conversation to the demand module; otherwise, not returning the result;
(3) the requirement module initiates a query request comprising the mapping data result and a temporary token for carrying out the session to the portrait data providing module;
(4) the portrait data providing module locally inquires a data list matched with the first n-bit hash value of the request, and sends an inquiry request comprising the matched data list and a temporary token for carrying out the session to the mapping data providing module;
(5) the mapping data providing module inquires whether the corresponding session data has a matching data list of a hit request, if so, the hit data is returned, otherwise, the data is not returned;
(6) and the portrait data providing module judges whether returned data exist or not, if so, the user tag data corresponding to the hit data is inquired locally and returned to the user, otherwise, the data are not returned.
2. The method for realizing data fusion and data privacy protection based on a hash algorithm and session control according to claim 1, wherein the step (2) specifically comprises the following steps:
(2.1) inquiring corresponding mapping data according to the requested hash value;
(2.2) if the corresponding mapping data exists, returning a mapping value corresponding to the input to the demand module, performing hash calculation, taking a first n-digit value, creating a session locally, and providing the session with a temporary token for the demand module; otherwise, no data is returned.
3. The method for implementing data fusion and data privacy protection based on hash algorithm and session control as claimed in claim 1, wherein the query request in step (3) includes the first n-bit value of the mapped data hash value and the temporary token.
4. The method for realizing data fusion and data privacy protection based on a hash algorithm and session control according to claim 1, wherein the step (4) specifically comprises the following steps:
(4.1) the portrait data providing module searches the first n matched data in the user tag library according to the n hash values requested by the demand module;
(4.2) if the data is matched to be more than or equal to 1, sending a query request to the mapping data providing module; otherwise, directly returning an empty result to the demand module.
5. The method for realizing data fusion and data privacy protection based on the hash algorithm and the session control as claimed in claim 1, wherein the mapping data is mapping information of a user, including a corresponding relationship between a mobile phone number and a mobile phone device number or a corresponding relationship between a mobile phone number and an identification number.
6. The method for implementing data fusion and data privacy protection based on hash algorithm and session control as claimed in claim 2, wherein the temporary token is generated by the mapping data provider server, associated with the user information, and stored by the server in session control within a limited time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910540892.7A CN110263575B (en) | 2019-06-21 | 2019-06-21 | Method for realizing data fusion and data privacy protection based on Hash algorithm and session control |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910540892.7A CN110263575B (en) | 2019-06-21 | 2019-06-21 | Method for realizing data fusion and data privacy protection based on Hash algorithm and session control |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110263575A CN110263575A (en) | 2019-09-20 |
CN110263575B true CN110263575B (en) | 2020-11-13 |
Family
ID=67920175
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910540892.7A Active CN110263575B (en) | 2019-06-21 | 2019-06-21 | Method for realizing data fusion and data privacy protection based on Hash algorithm and session control |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110263575B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112231746B (en) * | 2020-09-10 | 2024-02-02 | 杭州锘崴信息科技有限公司 | Joint data analysis method, device, system and computer readable storage medium |
CN112966168B (en) * | 2021-03-11 | 2022-05-17 | 支付宝(杭州)信息技术有限公司 | Business label query method and device for realizing privacy protection |
CN113536379B (en) * | 2021-07-19 | 2022-11-29 | 建信金融科技有限责任公司 | Private data query method and device and electronic equipment |
CN114219052A (en) * | 2022-02-23 | 2022-03-22 | 富算科技(上海)有限公司 | Graph data fusion method and device, electronic equipment and storage medium |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9727751B2 (en) * | 2010-10-29 | 2017-08-08 | Nokia Technologies Oy | Method and apparatus for applying privacy policies to structured data |
CN102546532B (en) * | 2010-12-07 | 2016-03-30 | 中国移动通信集团公司 | Capacity calling method, request unit, platform and system |
US20180189753A1 (en) * | 2017-01-05 | 2018-07-05 | Beskatta, LLC | Infrastructure for obligation management and validation |
-
2019
- 2019-06-21 CN CN201910540892.7A patent/CN110263575B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN110263575A (en) | 2019-09-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110263575B (en) | Method for realizing data fusion and data privacy protection based on Hash algorithm and session control | |
CN112804354B (en) | Method and device for data transmission across chains, computer equipment and storage medium | |
US8756657B2 (en) | Mobile or user device authentication and tracking | |
CN108537046A (en) | A kind of online contract signature system and method based on block chain technology | |
US9438609B2 (en) | Device verification prior to registration | |
CN108777750A (en) | A kind of user mobile phone security privacy guard method based on Quick Response Code | |
WO2021135602A1 (en) | Number privacy protection method, network device and computer storage medium | |
US20170270561A1 (en) | Method, terminal and server for monitoring advertisement exhibition | |
CN111260475B (en) | Data processing method, block link point equipment and storage medium | |
CN109088812A (en) | Information processing method, device, computer equipment and storage medium | |
EP3637737A1 (en) | Method and system for synchronizing user identities | |
CN111597060B (en) | Data calling method and device, computer equipment and storage medium | |
WO2019148795A1 (en) | Value transfer method, apparatus, computer device, and storage medium | |
CN112131535B (en) | Integrated small program authorization method for multi-deployment environment | |
CN106936816B (en) | Method and system for query and positioning | |
KR102169265B1 (en) | Checking Method for Information about Client's Mobile Phone Number, Information Providing Server, Client Managing Server, and Telecommunications Company Server Used Therein | |
CN108769436A (en) | It is a kind of that guard method is customized based on the user mobile phone security privacy of USSD and Quick Response Code | |
US9825970B2 (en) | Managing access to content for a sponsored data campaign | |
CN103944987A (en) | Method and device for integrating individual resources for users | |
CN116095081A (en) | Event processing method and device based on block chain system, equipment and medium | |
CN105025000A (en) | Data access internal audit method oriented to virtual desktop and information safety apparatus | |
WO2018001227A1 (en) | Number display control method and device, and click to dial-up system | |
CN105376727A (en) | Data card processing method and device | |
CN116151903B (en) | Service processing method and device based on sales promotion management system | |
CN111212062B (en) | Information completion method and device, storage medium and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |