Disclosure of Invention
The embodiment of the application provides a method and a device for protecting the privacy of travel tracking data, so as to at least solve the balance problem between flow regulation and personal privacy protection.
According to one aspect of the application, a travel tracking data privacy protection method is provided, and comprises the following steps: the method comprises the steps that first client software acquires health information of a first user to become an alarm, wherein the alarm is used for indicating that the first user contacts an infection source of a preset type of infectious diseases, and the first user is a user logged in the first client software; the first client software responds to the warning and acquires a first travel path within a preset time period of the first user, wherein the first travel path is acquired from a first mobile terminal used by the first user, the first travel path is only stored on the first mobile terminal before being acquired, and the first client software is installed on the first mobile terminal; the first client software sends the first travel path to a server; the server sends the first travel path to the second client software, wherein the first travel path information is encrypted and then sent to the second client software; the second client software acquires a password from a password server and obtains the decrypted first travel path information according to the acquired password; and the second client software acquires a second travel path which is locally stored within the preset time period, and changes the health information of a second user into a warning when the first travel path and the second travel path have an intersection, wherein the second client software is installed on a second mobile terminal, and the second user is a user logged in the second client software.
Further, before the first client software acquires the first travel path within the predetermined time period of the first user, the method further includes: the first client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; the first client software receives the value of the preset time period sent by the server; before the second client software acquires a second travel path within the predetermined time period saved locally, the method further includes: the second client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; and the second client software receives the value of the preset time period sent by the server.
Further, the server sending the first travel path to the second client software includes: the server sends a message of requesting the password to the password server; the password server acquires a password from pre-stored passwords according to the password requesting message, and sends the password and the identification information of the password to the server; the server encrypts the first travel path using the password; and the server sends the encrypted first path to the second client software.
Further, the second client software obtaining the password from the password server includes: the second client software acquires the identification information of the password from the server; the second client software sends the identification information of the password to the password server; and the second client software receives the password corresponding to the identification information sent by the password server.
According to another aspect of the present application, there is also provided a travel tracking data privacy protecting apparatus, including: the system comprises first client software, second client software, a server and a password server, wherein the first client software acquires health information of a first user and changes the health information into an alarm, the alarm is used for indicating that the first user contacts an infection source of a preset type of infectious diseases, and the first user is a user logged in the first client software; the first client software responds to the warning and acquires a first travel path within a preset time period of the first user, wherein the first travel path is acquired from a first mobile terminal used by the first user, the first travel path is only stored on the first mobile terminal before being acquired, and the first client software is installed on the first mobile terminal; the first client software sends the first travel path to a server; the server sends the first travel path to the second client software, wherein the first travel path information is encrypted and then sent to the second client software; the second client software acquires a password from a password server and obtains the decrypted first travel path information according to the acquired password; and the second client software acquires a second travel path which is locally stored within the preset time period, and changes the health information of a second user into a warning when the first travel path and the second travel path have an intersection, wherein the second client software is installed on a second mobile terminal, and the second user is a user logged in the second client software.
Further, before the first client software acquires the first travel path within the predetermined time period of the first user, the method further includes: the first client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; the first client software receives the value of the preset time period sent by the server; before the second client software acquires a second travel path within the predetermined time period saved locally, the method further includes: the second client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; and the second client software receives the value of the preset time period sent by the server.
Further, the server sending the first travel path to the second client software includes: the server sends a message of requesting the password to the password server; the password server acquires a password from pre-stored passwords according to the password requesting message, and sends the password and the identification information of the password to the server; the server encrypts the first travel path using the password; and the server sends the encrypted first path to the second client software.
Further, the second client software obtaining the password from the password server includes: the second client software acquires the identification information of the password from the server; the second client software sends the identification information of the password to the password server; and the second client software receives the password corresponding to the identification information sent by the password server.
According to another aspect of the present application, there is also provided a memory for storing software for performing the above method.
According to another aspect of the present application, there is also provided a processor for executing software, wherein the software is configured to perform the above method.
In the embodiment of the application, the first client software is adopted to acquire the health information of the first user and change the health information into an alarm, wherein the alarm is used for indicating that the first user contacts an infection source of a preset type of infectious diseases, and the first user is a user logged in the first client software; the first client software responds to the warning and acquires a first travel path within a preset time period of the first user, wherein the first travel path is acquired from a first mobile terminal used by the first user, the first travel path is only stored on the first mobile terminal before being acquired, and the first client software is installed on the first mobile terminal; the first client software sends the first travel path to a server; the server sends the first travel path to the second client software, wherein the first travel path information is encrypted and then sent to the second client software; the second client software acquires a password from a password server and obtains the decrypted first travel path information according to the acquired password; and the second client software acquires a second travel path which is locally stored within the preset time period, and changes the health information of a second user into a warning when the first travel path and the second travel path have an intersection, wherein the second client software is installed on a second mobile terminal, and the second user is a user logged in the second client software. The method and the device solve the balance problem between stream modulation and individual privacy protection, and improve the individual privacy protection on the basis of ensuring the stream modulation effect.
Detailed Description
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In this embodiment, an electronic device is provided, comprising a memory in which a computer program is stored and a processor arranged to run the computer program to perform the method in the following embodiments.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
In this embodiment, a method for protecting privacy of travel tracking data is provided, and fig. 1 is a flowchart of a method for protecting privacy of travel tracking data according to an embodiment of the present invention, as shown in fig. 1, the method includes the following steps:
step S102, acquiring health information of a first user by first client software to become an alarm, wherein the alarm is used for indicating that the first user contacts an infection source of a preset type of infectious disease, and the first user is a user logged in the first client software;
step S104, the first client software responds to the warning and acquires a first travel path within a preset time period of the first user, wherein the first travel path is acquired from a first mobile terminal used by the first user, the first travel path is only stored on the first mobile terminal before being acquired, and the first client software is installed on the first mobile terminal;
step S106, the first client software sends the first travel path to a server;
step S108, the server sends the first travel path to the second client software, wherein the first travel path information is sent to the second client software after being encrypted;
as an optional implementation manner that can be added, the second client software receives a selection of a second user, where the selection is used to instruct the second client software to report the path information of the second user to the server, and the reporting time is in units of days. The server acquires the path information of the second user and records that the second user is a preset user, the server marks the path information of the second user as a first grade, and the server also marks the path information of the user with the health information as a warning as a second grade; and after receiving the first travel path, the server sends the first travel path to all the preset users. And the path information of the user with the health information as the warning is forcibly reported to the server. And when the second user does not select to report the second path information to the server, sending indication information to the second client software every time the server receives second-level path information, wherein the indication information is used for indicating that a risk path is received, and the second client software performs path comparison. And the server sends the indication information at preset time intervals, and then sends the first travel path to the second client software.
By the processing mode, the first journey paths can be sent in batches, so that the stress of the server is relieved.
Step S110, the second client software acquires a password from a password server and obtains the decrypted first travel path information according to the acquired password;
step S112, the second client software obtains a second travel route stored locally within the predetermined time period, and changes the health information of a second user into an alert when the first travel route and the second travel route have an intersection, where the second client software is installed on a second mobile terminal, and the second user is a user logged in to the second client software.
As an optional implementation manner, the second travel path information acquired by the second client software includes the longitude and latitude of each path information point and the time of the path time point, and the second client software draws the longitude and latitude information into a second path line according to a predetermined ratio. The first travel path information acquired by the second client software comprises the longitude and latitude of each path point and the time of the path time point, the second client software connects the longitude and latitude according to a preset proportion and draws the first travel path information into a first path line, wherein the proportion and the mode of drawing the first path line and the second path line are the same, the first path line and the second path line are prevented from being on a map with the same preset proportion, the coincident point in the first path line and the second path line is found, the first time of the coincident point in the first travel path information and the second time of the coincident point in the second travel path information are determined, and if the difference between the first time and the second time is smaller than a threshold value, the coincident point is determined to be the intersection point.
As another optional implementation manner that can be added, the threshold value corresponds to an epidemic category for performing streaming, an existing cross-infection case of the epidemic category is obtained, a known time of cross-infection is obtained, and a first model is trained by using a neural network machine learning manner, wherein the first model is obtained by using multiple sets of training data, each set of training data includes first input data and first output data, the first input data is a symptom corresponding to the epidemic, and the first output data is a cross-infection time corresponding to the symptom. After the first model is trained, symptoms of another epidemic are input into the first model, which outputs a time to cross-infection. The threshold value is determined after the cross-infection time is reduced by a predetermined percentage. The predetermined percentage of reduction is determined by the number of people already infected, and if the number of infected people in a region exceeds 1% of the total number of people in the region, the cross-infection time is reduced by 1% as the threshold.
As another optional implementation manner that may be added, a related user preset by the second user is obtained, where the related user is a user in the same residence or the same work place as the second user, and the second client software sends information to the related user, where the information is used to indicate that the health information of the second user becomes an alert. The software client of the associated user changes the health information of the associated user to be associated with the user whose health information is an alert.
Through the steps, the flow-adjusted path information is published from a public channel, the flow-adjusted path information is changed into software of the mobile terminal to be compared by self, when the comparison is successful, the health information of the second user is changed into a warning, the second user knows that the second user has infection risks, but does not disclose the intersection point of the first travel path and the second travel path, namely the first travel path, the second travel path and the intersection point are not disclosed on any client software. Therefore, the balance problem between the flow regulation and the personal privacy protection is solved, and the personal privacy protection is improved on the basis of ensuring the flow regulation effect.
Preferably, before the first client software acquires the first travel path within the predetermined time period of the first user, the method further includes: the first client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; the first client software receives the value of the preset time period sent by the server; before the second client software acquires a second travel path within the predetermined time period saved locally, the method further includes: the second client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; and the second client software receives the value of the preset time period sent by the server.
Preferably, the server sending the first travel path to the second client software includes: the server sends a message of requesting the password to the password server; the password server acquires a password from pre-stored passwords according to the password requesting message, and sends the password and the identification information of the password to the server; the server encrypts the first travel path using the password; and the server sends the encrypted first path to the second client software.
Preferably, the second client software obtaining the password from the password server includes: the second client software acquires the identification information of the password from the server; the second client software sends the identification information of the password to the password server; and the second client software receives the password corresponding to the identification information sent by the password server.
In this embodiment, a device for protecting privacy of trip tracking data is further provided, where the device corresponds to the steps in the above method, and the description has been made in the method, and is not repeated herein, and the device includes: the system comprises first client software, second client software, a server and a password server, wherein the first client software acquires health information of a first user and changes the health information into an alarm, the alarm is used for indicating that the first user contacts an infection source of a preset type of infectious diseases, and the first user is a user logged in the first client software; the first client software responds to the warning and acquires a first travel path within a preset time period of the first user, wherein the first travel path is acquired from a first mobile terminal used by the first user, the first travel path is only stored on the first mobile terminal before being acquired, and the first client software is installed on the first mobile terminal; the first client software sends the first travel path to a server; the server sends the first travel path to the second client software, wherein the first travel path information is encrypted and then sent to the second client software; the second client software acquires a password from a password server and obtains the decrypted first travel path information according to the acquired password; and the second client software acquires a second travel path which is locally stored within the preset time period, and changes the health information of a second user into a warning when the first travel path and the second travel path have an intersection, wherein the second client software is installed on a second mobile terminal, and the second user is a user logged in the second client software.
Preferably, before the first client software acquires the first travel path within the predetermined time period of the first user, the method further includes: the first client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; the first client software receives the value of the preset time period sent by the server; before the second client software acquires a second travel path within the predetermined time period saved locally, the method further includes: the second client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; and the second client software receives the value of the preset time period sent by the server.
Preferably, the server sending the first travel path to the second client software includes: the server sends a message of requesting the password to the password server; the password server acquires a password from pre-stored passwords according to the password requesting message, and sends the password and the identification information of the password to the server; the server encrypts the first travel path using the password; and the server sends the encrypted first path to the second client software.
Preferably, the second client software obtaining the password from the password server includes: the second client software acquires the identification information of the password from the server; the second client software sends the identification information of the password to the password server; and the second client software receives the password corresponding to the identification information sent by the password server.
There is also provided in this embodiment a memory for storing software for performing the above method.
There is also provided in this embodiment a processor for executing software for performing the above method.
The embodiment of the application provides a storage medium, on which a program or software is stored, and the program realizes the method when being executed by a processor. The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.