[go: up one dir, main page]

CN112883416A - Travel tracking data privacy protection method and device - Google Patents

Travel tracking data privacy protection method and device Download PDF

Info

Publication number
CN112883416A
CN112883416A CN202110132580.XA CN202110132580A CN112883416A CN 112883416 A CN112883416 A CN 112883416A CN 202110132580 A CN202110132580 A CN 202110132580A CN 112883416 A CN112883416 A CN 112883416A
Authority
CN
China
Prior art keywords
client software
password
server
travel path
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110132580.XA
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huaihang
Original Assignee
Huaihang
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huaihang filed Critical Huaihang
Priority to CN202110132580.XA priority Critical patent/CN112883416A/en
Publication of CN112883416A publication Critical patent/CN112883416A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H50/00ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics
    • G16H50/80ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for detecting, monitoring or modelling epidemics or pandemics, e.g. flu

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Public Health (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Epidemiology (AREA)
  • Pathology (AREA)
  • Primary Health Care (AREA)
  • Data Mining & Analysis (AREA)
  • Biomedical Technology (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本申请公开了行程追踪数据隐私保护方法和装置,该方法包括:第一客户端软件获取第一用户的健康信息变为警告;第一客户端软件响应于警告,获取第一用户预定时间段内的第一行程路径;第一客户端软件将第一行程路径发送至服务器;服务器将第一行程路径发送至第二客户端软件;第二客户端软件从密码服务器获取密码并根据获取到的密码得到解密后的第一行程路径信息;第二客户端软件获取本地保存的预定时间段内的第二行程路径,在第一行程路径和第二行程路径存在交叉点的情况下,将第二用户的健康信息变为警告。通过本申请解决了流调和个人隐私保护之间的平衡问题,在确保流调作用的基础上提高了个人隐私的保护。

Figure 202110132580

The present application discloses a method and device for protecting the privacy of travel tracking data. The method includes: the first client software obtains the health information of the first user and becomes a warning; the first client software responds to the warning and obtains the first user within a predetermined time period. The first client software sends the first travel path to the server; the server sends the first travel path to the second client software; the second client software obtains the password from the password server and according to the obtained password Obtain the decrypted first travel path information; the second client software obtains the locally stored second travel path within the predetermined time period, and in the case of an intersection between the first travel path and the second travel path, the second user 's health information becomes a warning. The present application solves the problem of balance between mediation and personal privacy protection, and improves the protection of personal privacy on the basis of ensuring the role of mediation.

Figure 202110132580

Description

Travel tracking data privacy protection method and device
Technical Field
The application relates to the field of data privacy protection, in particular to a method and a device for protecting travel tracking data privacy.
Background
Epidemiological investigation (abbreviated as epidemiological investigation) refers to the investigation and research conducted by the epidemiological method. Mainly used for studying the distribution of disease, health and hygiene events and their determinants. Reasonable preventive care countermeasures and health service measures will be proposed through these studies, and the effects of these countermeasures and measures will be evaluated.
Epidemiological investigation is an important work carried out according to law and regulations, such as the infectious disease prevention and treatment law of the people's republic of China and the emergency regulations of public health incidents.
The purpose of the flow modulation is to understand: in the past, the action tracks of key groups, the persons encountered and the events happened. The exposure, contact, motion track and medical condition are clarified for the health of the case or the people in close contact with the case. The spider silk traces related to the infection source and the transmission path are searched, the transmission chain is cleared, and a basis is provided for judging close contacts, taking isolation measures and defining a disinfection range. Therefore, the circulation is also to protect other people from infection and to control the spread of epidemic.
After the stream is adjusted, the track information of the adjusted person is generally published through a public network, which causes the privacy of the adjusted person to be revealed, and how to balance the stream and the privacy becomes an important problem at present, for which, no suitable solution is provided in the prior art.
Disclosure of Invention
The embodiment of the application provides a method and a device for protecting the privacy of travel tracking data, so as to at least solve the balance problem between flow regulation and personal privacy protection.
According to one aspect of the application, a travel tracking data privacy protection method is provided, and comprises the following steps: the method comprises the steps that first client software acquires health information of a first user to become an alarm, wherein the alarm is used for indicating that the first user contacts an infection source of a preset type of infectious diseases, and the first user is a user logged in the first client software; the first client software responds to the warning and acquires a first travel path within a preset time period of the first user, wherein the first travel path is acquired from a first mobile terminal used by the first user, the first travel path is only stored on the first mobile terminal before being acquired, and the first client software is installed on the first mobile terminal; the first client software sends the first travel path to a server; the server sends the first travel path to the second client software, wherein the first travel path information is encrypted and then sent to the second client software; the second client software acquires a password from a password server and obtains the decrypted first travel path information according to the acquired password; and the second client software acquires a second travel path which is locally stored within the preset time period, and changes the health information of a second user into a warning when the first travel path and the second travel path have an intersection, wherein the second client software is installed on a second mobile terminal, and the second user is a user logged in the second client software.
Further, before the first client software acquires the first travel path within the predetermined time period of the first user, the method further includes: the first client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; the first client software receives the value of the preset time period sent by the server; before the second client software acquires a second travel path within the predetermined time period saved locally, the method further includes: the second client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; and the second client software receives the value of the preset time period sent by the server.
Further, the server sending the first travel path to the second client software includes: the server sends a message of requesting the password to the password server; the password server acquires a password from pre-stored passwords according to the password requesting message, and sends the password and the identification information of the password to the server; the server encrypts the first travel path using the password; and the server sends the encrypted first path to the second client software.
Further, the second client software obtaining the password from the password server includes: the second client software acquires the identification information of the password from the server; the second client software sends the identification information of the password to the password server; and the second client software receives the password corresponding to the identification information sent by the password server.
According to another aspect of the present application, there is also provided a travel tracking data privacy protecting apparatus, including: the system comprises first client software, second client software, a server and a password server, wherein the first client software acquires health information of a first user and changes the health information into an alarm, the alarm is used for indicating that the first user contacts an infection source of a preset type of infectious diseases, and the first user is a user logged in the first client software; the first client software responds to the warning and acquires a first travel path within a preset time period of the first user, wherein the first travel path is acquired from a first mobile terminal used by the first user, the first travel path is only stored on the first mobile terminal before being acquired, and the first client software is installed on the first mobile terminal; the first client software sends the first travel path to a server; the server sends the first travel path to the second client software, wherein the first travel path information is encrypted and then sent to the second client software; the second client software acquires a password from a password server and obtains the decrypted first travel path information according to the acquired password; and the second client software acquires a second travel path which is locally stored within the preset time period, and changes the health information of a second user into a warning when the first travel path and the second travel path have an intersection, wherein the second client software is installed on a second mobile terminal, and the second user is a user logged in the second client software.
Further, before the first client software acquires the first travel path within the predetermined time period of the first user, the method further includes: the first client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; the first client software receives the value of the preset time period sent by the server; before the second client software acquires a second travel path within the predetermined time period saved locally, the method further includes: the second client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; and the second client software receives the value of the preset time period sent by the server.
Further, the server sending the first travel path to the second client software includes: the server sends a message of requesting the password to the password server; the password server acquires a password from pre-stored passwords according to the password requesting message, and sends the password and the identification information of the password to the server; the server encrypts the first travel path using the password; and the server sends the encrypted first path to the second client software.
Further, the second client software obtaining the password from the password server includes: the second client software acquires the identification information of the password from the server; the second client software sends the identification information of the password to the password server; and the second client software receives the password corresponding to the identification information sent by the password server.
According to another aspect of the present application, there is also provided a memory for storing software for performing the above method.
According to another aspect of the present application, there is also provided a processor for executing software, wherein the software is configured to perform the above method.
In the embodiment of the application, the first client software is adopted to acquire the health information of the first user and change the health information into an alarm, wherein the alarm is used for indicating that the first user contacts an infection source of a preset type of infectious diseases, and the first user is a user logged in the first client software; the first client software responds to the warning and acquires a first travel path within a preset time period of the first user, wherein the first travel path is acquired from a first mobile terminal used by the first user, the first travel path is only stored on the first mobile terminal before being acquired, and the first client software is installed on the first mobile terminal; the first client software sends the first travel path to a server; the server sends the first travel path to the second client software, wherein the first travel path information is encrypted and then sent to the second client software; the second client software acquires a password from a password server and obtains the decrypted first travel path information according to the acquired password; and the second client software acquires a second travel path which is locally stored within the preset time period, and changes the health information of a second user into a warning when the first travel path and the second travel path have an intersection, wherein the second client software is installed on a second mobile terminal, and the second user is a user logged in the second client software. The method and the device solve the balance problem between stream modulation and individual privacy protection, and improve the individual privacy protection on the basis of ensuring the stream modulation effect.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate embodiments of the application and, together with the description, serve to explain the application and are not intended to limit the application. In the drawings:
fig. 1 is a flow chart of a trip tracking data privacy protection method according to an embodiment of the application.
Detailed Description
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In this embodiment, an electronic device is provided, comprising a memory in which a computer program is stored and a processor arranged to run the computer program to perform the method in the following embodiments.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
In this embodiment, a method for protecting privacy of travel tracking data is provided, and fig. 1 is a flowchart of a method for protecting privacy of travel tracking data according to an embodiment of the present invention, as shown in fig. 1, the method includes the following steps:
step S102, acquiring health information of a first user by first client software to become an alarm, wherein the alarm is used for indicating that the first user contacts an infection source of a preset type of infectious disease, and the first user is a user logged in the first client software;
step S104, the first client software responds to the warning and acquires a first travel path within a preset time period of the first user, wherein the first travel path is acquired from a first mobile terminal used by the first user, the first travel path is only stored on the first mobile terminal before being acquired, and the first client software is installed on the first mobile terminal;
step S106, the first client software sends the first travel path to a server;
step S108, the server sends the first travel path to the second client software, wherein the first travel path information is sent to the second client software after being encrypted;
as an optional implementation manner that can be added, the second client software receives a selection of a second user, where the selection is used to instruct the second client software to report the path information of the second user to the server, and the reporting time is in units of days. The server acquires the path information of the second user and records that the second user is a preset user, the server marks the path information of the second user as a first grade, and the server also marks the path information of the user with the health information as a warning as a second grade; and after receiving the first travel path, the server sends the first travel path to all the preset users. And the path information of the user with the health information as the warning is forcibly reported to the server. And when the second user does not select to report the second path information to the server, sending indication information to the second client software every time the server receives second-level path information, wherein the indication information is used for indicating that a risk path is received, and the second client software performs path comparison. And the server sends the indication information at preset time intervals, and then sends the first travel path to the second client software.
By the processing mode, the first journey paths can be sent in batches, so that the stress of the server is relieved.
Step S110, the second client software acquires a password from a password server and obtains the decrypted first travel path information according to the acquired password;
step S112, the second client software obtains a second travel route stored locally within the predetermined time period, and changes the health information of a second user into an alert when the first travel route and the second travel route have an intersection, where the second client software is installed on a second mobile terminal, and the second user is a user logged in to the second client software.
As an optional implementation manner, the second travel path information acquired by the second client software includes the longitude and latitude of each path information point and the time of the path time point, and the second client software draws the longitude and latitude information into a second path line according to a predetermined ratio. The first travel path information acquired by the second client software comprises the longitude and latitude of each path point and the time of the path time point, the second client software connects the longitude and latitude according to a preset proportion and draws the first travel path information into a first path line, wherein the proportion and the mode of drawing the first path line and the second path line are the same, the first path line and the second path line are prevented from being on a map with the same preset proportion, the coincident point in the first path line and the second path line is found, the first time of the coincident point in the first travel path information and the second time of the coincident point in the second travel path information are determined, and if the difference between the first time and the second time is smaller than a threshold value, the coincident point is determined to be the intersection point.
As another optional implementation manner that can be added, the threshold value corresponds to an epidemic category for performing streaming, an existing cross-infection case of the epidemic category is obtained, a known time of cross-infection is obtained, and a first model is trained by using a neural network machine learning manner, wherein the first model is obtained by using multiple sets of training data, each set of training data includes first input data and first output data, the first input data is a symptom corresponding to the epidemic, and the first output data is a cross-infection time corresponding to the symptom. After the first model is trained, symptoms of another epidemic are input into the first model, which outputs a time to cross-infection. The threshold value is determined after the cross-infection time is reduced by a predetermined percentage. The predetermined percentage of reduction is determined by the number of people already infected, and if the number of infected people in a region exceeds 1% of the total number of people in the region, the cross-infection time is reduced by 1% as the threshold.
As another optional implementation manner that may be added, a related user preset by the second user is obtained, where the related user is a user in the same residence or the same work place as the second user, and the second client software sends information to the related user, where the information is used to indicate that the health information of the second user becomes an alert. The software client of the associated user changes the health information of the associated user to be associated with the user whose health information is an alert.
Through the steps, the flow-adjusted path information is published from a public channel, the flow-adjusted path information is changed into software of the mobile terminal to be compared by self, when the comparison is successful, the health information of the second user is changed into a warning, the second user knows that the second user has infection risks, but does not disclose the intersection point of the first travel path and the second travel path, namely the first travel path, the second travel path and the intersection point are not disclosed on any client software. Therefore, the balance problem between the flow regulation and the personal privacy protection is solved, and the personal privacy protection is improved on the basis of ensuring the flow regulation effect.
Preferably, before the first client software acquires the first travel path within the predetermined time period of the first user, the method further includes: the first client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; the first client software receives the value of the preset time period sent by the server; before the second client software acquires a second travel path within the predetermined time period saved locally, the method further includes: the second client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; and the second client software receives the value of the preset time period sent by the server.
Preferably, the server sending the first travel path to the second client software includes: the server sends a message of requesting the password to the password server; the password server acquires a password from pre-stored passwords according to the password requesting message, and sends the password and the identification information of the password to the server; the server encrypts the first travel path using the password; and the server sends the encrypted first path to the second client software.
Preferably, the second client software obtaining the password from the password server includes: the second client software acquires the identification information of the password from the server; the second client software sends the identification information of the password to the password server; and the second client software receives the password corresponding to the identification information sent by the password server.
In this embodiment, a device for protecting privacy of trip tracking data is further provided, where the device corresponds to the steps in the above method, and the description has been made in the method, and is not repeated herein, and the device includes: the system comprises first client software, second client software, a server and a password server, wherein the first client software acquires health information of a first user and changes the health information into an alarm, the alarm is used for indicating that the first user contacts an infection source of a preset type of infectious diseases, and the first user is a user logged in the first client software; the first client software responds to the warning and acquires a first travel path within a preset time period of the first user, wherein the first travel path is acquired from a first mobile terminal used by the first user, the first travel path is only stored on the first mobile terminal before being acquired, and the first client software is installed on the first mobile terminal; the first client software sends the first travel path to a server; the server sends the first travel path to the second client software, wherein the first travel path information is encrypted and then sent to the second client software; the second client software acquires a password from a password server and obtains the decrypted first travel path information according to the acquired password; and the second client software acquires a second travel path which is locally stored within the preset time period, and changes the health information of a second user into a warning when the first travel path and the second travel path have an intersection, wherein the second client software is installed on a second mobile terminal, and the second user is a user logged in the second client software.
Preferably, before the first client software acquires the first travel path within the predetermined time period of the first user, the method further includes: the first client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; the first client software receives the value of the preset time period sent by the server; before the second client software acquires a second travel path within the predetermined time period saved locally, the method further includes: the second client software sends request information to the server, wherein the request information is used for acquiring the numerical value of the preset time period; and the second client software receives the value of the preset time period sent by the server.
Preferably, the server sending the first travel path to the second client software includes: the server sends a message of requesting the password to the password server; the password server acquires a password from pre-stored passwords according to the password requesting message, and sends the password and the identification information of the password to the server; the server encrypts the first travel path using the password; and the server sends the encrypted first path to the second client software.
Preferably, the second client software obtaining the password from the password server includes: the second client software acquires the identification information of the password from the server; the second client software sends the identification information of the password to the password server; and the second client software receives the password corresponding to the identification information sent by the password server.
There is also provided in this embodiment a memory for storing software for performing the above method.
There is also provided in this embodiment a processor for executing software for performing the above method.
The embodiment of the application provides a storage medium, on which a program or software is stored, and the program realizes the method when being executed by a processor. The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1.一种行程追踪数据隐私保护方法,其特征在于,包括:1. a travel tracking data privacy protection method, is characterized in that, comprises: 第一客户端软件获取第一用户的健康信息变为警告,其中,所述警告用于指示所述第一用户接触过预定类型传染病的传染源,所述第一用户为登陆到所述第一客户端软件的用户;The first client software obtains the health information of the first user and turns it into a warning, wherein the warning is used to indicate that the first user has been in contact with a source of infection of a predetermined type of infectious disease, and the first user logs in to the first user. a user of the client software; 所述第一客户端软件响应于所述警告,获取所述第一用户预定时间段内的第一行程路径,其中,从所述第一用户使用的第一移动终端上获取所述第一行程路径,所述第一行程路径在被获取之前仅保存在所述第一移动终端上,所述第一客户端软件安装在所述第一移动终端上;The first client software, in response to the warning, obtains a first travel path of the first user within a predetermined time period, wherein the first travel path is obtained from a first mobile terminal used by the first user path, the first travel path is only saved on the first mobile terminal before being acquired, and the first client software is installed on the first mobile terminal; 所述第一客户端软件将所述第一行程路径发送至服务器;The first client software sends the first travel path to the server; 所述服务器将所述第一行程路径发送至所述第二客户端软件,其中,所述第一行程路径信息被加密后发送所述第二客户端软件;The server sends the first travel path to the second client software, wherein the first travel path information is encrypted and sent to the second client software; 所述第二客户端软件从密码服务器获取密码并根据获取到的密码得到解密后的所述第一行程路径信息;The second client software obtains the password from the password server and obtains the decrypted first travel path information according to the obtained password; 所述第二客户端软件获取本地保存的所述预定时间段内的第二行程路径,在所述第一行程路径和所述第二行程路径存在交叉点的情况下,将第二用户的健康信息变为警告,其中,所述第二客户端软件安装在第二移动终端上,所述第二用户为登陆到所述第二客户端软件的用户。The second client software acquires the locally saved second travel path within the predetermined time period, and in the case of an intersection between the first travel path and the second travel path, the health of the second user is The message becomes a warning, wherein the second client software is installed on the second mobile terminal, and the second user is the user logged into the second client software. 2.根据权利要求1所述的方法,其特征在于,2. The method according to claim 1, wherein 所述第一客户端软件获取所述第一用户预定时间段内的第一行程路径之前,所述方法还包括:所述第一客户端软件向所述服务器发送请求信息,其中,所述请求信息用于获取所述预定时间段的数值;所述第一客户端软件接收所述服务器发送的所述预定时间段的数值;Before the first client software acquires the first travel path within a predetermined time period of the first user, the method further includes: the first client software sends request information to the server, wherein the request The information is used to obtain the numerical value of the predetermined time period; the first client software receives the numerical value of the predetermined time period sent by the server; 所述第二客户端软件获取本地保存的所述预定时间段内的第二行程路径之前,所述方法还包括:所述第二客户端软件向所述服务器发送请求信息,其中,所述请求信息用于获取所述预定时间段的数值;所述第二客户端软件接收所述服务器发送的所述预定时间段的数值。Before the second client software obtains the locally saved second travel path within the predetermined time period, the method further includes: the second client software sends request information to the server, wherein the request The information is used to obtain the numerical value of the predetermined time period; the second client software receives the numerical value of the predetermined time period sent by the server. 3.根据权利要求1或2所述的方法,其特征在于,所述服务器将所述第一行程路径发送至所述第二客户端软件包括:3. The method according to claim 1 or 2, wherein the sending, by the server, the first travel path to the second client software comprises: 所述服务器向所述密码服务器发送索取密码的消息;The server sends a password requesting message to the password server; 所述密码服务器根据所述索取密码的消息从预先保存的密码中获取一个密码,并将所述密码和所述密码的标识信息发送给所述服务器;The password server obtains a password from a pre-stored password according to the password requesting message, and sends the password and the identification information of the password to the server; 所述服务器使用所述密码对所述第一行程路径进行加密;the server encrypts the first travel path using the password; 所述服务器将加密后的所述第一路径发送至所述第二客户端软件。The server sends the encrypted first path to the second client software. 4.根据权利要求1至3中任一项所述的方法,其特征在于,所述第二客户端软件从所述密码服务器获取所述密码包括:4. The method according to any one of claims 1 to 3, wherein obtaining the password from the password server by the second client software comprises: 所述第二客户端软件从所述服务器获取所述密码的标识信息;The second client software obtains the identification information of the password from the server; 所述第二客户端软件将所述密码的标识信息发送至所述密码服务器;The second client software sends the identification information of the password to the password server; 所述第二客户端软件接收所述密码服务器发送的所述标识信息对应的所述密码。The second client software receives the password corresponding to the identification information sent by the password server. 5.一种行程追踪数据隐私保护装置,其特征在于,包括:第一客户端软件、第二客户端软件、服务器和密码服务器,其中,5. A trip tracking data privacy protection device, comprising: a first client software, a second client software, a server and a password server, wherein, 所述第一客户端软件获取第一用户的健康信息变为警告,其中,所述警告用于指示所述第一用户接触过预定类型传染病的传染源,所述第一用户为登陆到所述第一客户端软件的用户;The first client software acquires the health information of the first user and turns it into a warning, wherein the warning is used to indicate that the first user has been in contact with a source of infection of a predetermined type of infectious disease, and the first user is logged in to any the user of the first client software; 所述第一客户端软件响应于所述警告,获取所述第一用户预定时间段内的第一行程路径,其中,从所述第一用户使用的第一移动终端上获取所述第一行程路径,所述第一行程路径在被获取之前仅保存在所述第一移动终端上,所述第一客户端软件安装在所述第一移动终端上;The first client software, in response to the warning, obtains a first travel path of the first user within a predetermined time period, wherein the first travel path is obtained from a first mobile terminal used by the first user path, the first travel path is only saved on the first mobile terminal before being acquired, and the first client software is installed on the first mobile terminal; 所述第一客户端软件将所述第一行程路径发送至服务器;The first client software sends the first travel path to the server; 所述服务器将所述第一行程路径发送至所述第二客户端软件,其中,所述第一行程路径信息被加密后发送所述第二客户端软件;The server sends the first travel path to the second client software, wherein the first travel path information is encrypted and sent to the second client software; 所述第二客户端软件从密码服务器获取密码并根据获取到的密码得到解密后的所述第一行程路径信息;The second client software obtains the password from the password server and obtains the decrypted first travel path information according to the obtained password; 所述第二客户端软件获取本地保存的所述预定时间段内的第二行程路径,在所述第一行程路径和所述第二行程路径存在交叉点的情况下,将第二用户的健康信息变为警告,其中,所述第二客户端软件安装在第二移动终端上,所述第二用户为登陆到所述第二客户端软件的用户。The second client software acquires the locally saved second travel path within the predetermined time period, and in the case of an intersection between the first travel path and the second travel path, the health of the second user is The message becomes a warning, wherein the second client software is installed on the second mobile terminal, and the second user is the user logged into the second client software. 6.根据权利要求5所述的装置,其特征在于,6. The device of claim 5, wherein: 所述第一客户端软件获取所述第一用户预定时间段内的第一行程路径之前,所述方法还包括:所述第一客户端软件向所述服务器发送请求信息,其中,所述请求信息用于获取所述预定时间段的数值;所述第一客户端软件接收所述服务器发送的所述预定时间段的数值;Before the first client software acquires the first travel path within a predetermined time period of the first user, the method further includes: the first client software sends request information to the server, wherein the request The information is used to obtain the numerical value of the predetermined time period; the first client software receives the numerical value of the predetermined time period sent by the server; 所述第二客户端软件获取本地保存的所述预定时间段内的第二行程路径之前,所述方法还包括:所述第二客户端软件向所述服务器发送请求信息,其中,所述请求信息用于获取所述预定时间段的数值;所述第二客户端软件接收所述服务器发送的所述预定时间段的数值。Before the second client software obtains the locally saved second travel path within the predetermined time period, the method further includes: the second client software sends request information to the server, wherein the request The information is used to obtain the numerical value of the predetermined time period; the second client software receives the numerical value of the predetermined time period sent by the server. 7.根据权利要求5或6所述的装置,其特征在于,所述服务器将所述第一行程路径发送至所述第二客户端软件包括:7. The apparatus according to claim 5 or 6, wherein the sending, by the server, the first travel path to the second client software comprises: 所述服务器向所述密码服务器发送索取密码的消息;The server sends a password requesting message to the password server; 所述密码服务器根据所述索取密码的消息从预先保存的密码中获取一个密码,并将所述密码和所述密码的标识信息发送给所述服务器;The password server obtains a password from a pre-stored password according to the password requesting message, and sends the password and the identification information of the password to the server; 所述服务器使用所述密码对所述第一行程路径进行加密;the server encrypts the first travel path using the password; 所述服务器将加密后的所述第一路径发送至所述第二客户端软件。The server sends the encrypted first path to the second client software. 8.根据权利要求5至7中任一项所述的装置,其特征在于,所述第二客户端软件从所述密码服务器获取所述密码包括:8. The apparatus according to any one of claims 5 to 7, wherein the obtaining, by the second client software, the password from the password server comprises: 所述第二客户端软件从所述服务器获取所述密码的标识信息;The second client software obtains the identification information of the password from the server; 所述第二客户端软件将所述密码的标识信息发送至所述密码服务器;The second client software sends the identification information of the password to the password server; 所述第二客户端软件接收所述密码服务器发送的所述标识信息对应的所述密码。The second client software receives the password corresponding to the identification information sent by the password server. 9.一种存储器,其特征在于,用于存储软件,其中,所述软件用于执行权利要求1至4中任一项所述的方法。9. A memory, characterized by being used for storing software, wherein the software is used to perform the method of any one of claims 1 to 4. 10.一种处理器,其特征在于,用于执行软件,其中,所述软件用于执行权利要求1至4中任一项所述的方法。10. A processor for executing software, wherein the software is used for executing the method of any one of claims 1 to 4.
CN202110132580.XA 2021-01-31 2021-01-31 Travel tracking data privacy protection method and device Pending CN112883416A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110132580.XA CN112883416A (en) 2021-01-31 2021-01-31 Travel tracking data privacy protection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110132580.XA CN112883416A (en) 2021-01-31 2021-01-31 Travel tracking data privacy protection method and device

Publications (1)

Publication Number Publication Date
CN112883416A true CN112883416A (en) 2021-06-01

Family

ID=76052053

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110132580.XA Pending CN112883416A (en) 2021-01-31 2021-01-31 Travel tracking data privacy protection method and device

Country Status (1)

Country Link
CN (1) CN112883416A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116138757A (en) * 2023-02-07 2023-05-23 歌尔股份有限公司 Target marking method, device, smart wearable device and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070106775A1 (en) * 2005-03-01 2007-05-10 Wong Chon M System and method for creating a proximity map of plurality of living beings and objects
CN105740615A (en) * 2016-01-28 2016-07-06 中山大学 Method for tracking infection sources and predicting trends of infectious diseases by utilizing mobile phone tracks
CN108986921A (en) * 2018-07-04 2018-12-11 泰康保险集团股份有限公司 Disease prediction method, device, medium and electronic equipment
CN111446006A (en) * 2020-04-08 2020-07-24 陈恬慧 Method for tracking close contact person in epidemic situation of infectious disease
CN111586586A (en) * 2020-05-14 2020-08-25 深圳力维智联技术有限公司 Tracking method and system
CN111629340A (en) * 2020-07-30 2020-09-04 北京大学第三医院(北京大学第三临床医学院) A privacy-preserving method and system for personal contact tracking
CN111812688A (en) * 2020-06-05 2020-10-23 中南大学湘雅二医院 A GPS-based tracking method for potential carriers of respiratory infectious diseases
CN111954151A (en) * 2020-07-28 2020-11-17 捷德(中国)科技有限公司 Target object determination method, device, system and storage medium
CN111984992A (en) * 2020-07-31 2020-11-24 鹏城实验室 Infectious disease tracking method and system for preventing user leakage and terminal equipment
CN112153575A (en) * 2020-09-27 2020-12-29 深圳前海微众银行股份有限公司 Method, device and equipment for tracking contact person and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070106775A1 (en) * 2005-03-01 2007-05-10 Wong Chon M System and method for creating a proximity map of plurality of living beings and objects
CN105740615A (en) * 2016-01-28 2016-07-06 中山大学 Method for tracking infection sources and predicting trends of infectious diseases by utilizing mobile phone tracks
CN108986921A (en) * 2018-07-04 2018-12-11 泰康保险集团股份有限公司 Disease prediction method, device, medium and electronic equipment
CN111446006A (en) * 2020-04-08 2020-07-24 陈恬慧 Method for tracking close contact person in epidemic situation of infectious disease
CN111586586A (en) * 2020-05-14 2020-08-25 深圳力维智联技术有限公司 Tracking method and system
CN111812688A (en) * 2020-06-05 2020-10-23 中南大学湘雅二医院 A GPS-based tracking method for potential carriers of respiratory infectious diseases
CN111954151A (en) * 2020-07-28 2020-11-17 捷德(中国)科技有限公司 Target object determination method, device, system and storage medium
CN111629340A (en) * 2020-07-30 2020-09-04 北京大学第三医院(北京大学第三临床医学院) A privacy-preserving method and system for personal contact tracking
CN111984992A (en) * 2020-07-31 2020-11-24 鹏城实验室 Infectious disease tracking method and system for preventing user leakage and terminal equipment
CN112153575A (en) * 2020-09-27 2020-12-29 深圳前海微众银行股份有限公司 Method, device and equipment for tracking contact person and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
网易首页: "各国新冠密切接触者追踪器哪家强?我们做了个研究", pages 2, Retrieved from the Internet <URL:https://www.163.com/dy/article/FABJGQRL05129QAF.html> *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116138757A (en) * 2023-02-07 2023-05-23 歌尔股份有限公司 Target marking method, device, smart wearable device and storage medium

Similar Documents

Publication Publication Date Title
Whaiduzzaman et al. A privacy-preserving mobile and fog computing framework to trace and prevent COVID-19 community transmission
Conyon et al. Lockdowns and COVID-19 deaths in Scandinavia
Achaiah et al. R0 and re of COVID-19: can we predict when the pandemic outbreak will be contained?
Martinez‐Martin et al. Digital contact tracing, privacy, and public health
Whitaker et al. Investigating the assumptions of the self‐controlled case series method
CN111462918B (en) Epidemic situation monitoring method and system based on block chain
Stein et al. Who evacuates when hurricanes approach? The role of risk, information, and location
WO2022034572A1 (en) Methods and systems of prioritizing treatments, vaccination, testing and/or activities while protecting the privacy of individuals
US12406090B2 (en) Data management system to track and distribute public data collection with user privacy protection and event token exchange
Alshawi et al. Data privacy during pandemics: A systematic literature review of COVID-19 smartphone applications
US12326962B2 (en) Privacy preserving location tracking
CN111403047A (en) Epidemic alert method, device, computer equipment and storage medium
Gaire et al. Crowdsensing and privacy in smart city applications
Gamboa et al. Measures to assess a warning vaccination level in a stochastic SIV model with imperfect vaccine
CN112883416A (en) Travel tracking data privacy protection method and device
Hailemichael et al. Effect of vaccination and culling on the dynamics of rabies transmission from stray dogs to domestic dogs
Hoy et al. Parents' perceptions of the sensitivity of their children's personal information and willingness to share with social media marketers: Implications for sharenting
Akpan et al. COVID-19 reinfection in Liberia: Implication for improving disease surveillance
JP6530856B2 (en) Monitoring system
CN115051952A (en) Current limiting processing method, device, equipment and storage medium
CN112287397B (en) System and method for improving and guaranteeing safety of patient information transmission
Mamiya et al. Online public health intelligence: ethical considerations at the big data era
CN111431918B (en) Method and system for determining state label of target user based on block chain
Janagama et al. Utility of prehospital call center ambulance dispatch data for COVID‐19 cluster surveillance: A retrospective analysis
CN115841879A (en) Accurate monitoring method for group book implementing personnel based on city codes

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210601