Privacy-removing processing method and device using the same

A technology of de-privacy and processing methods, which is applied in the field of data warehouse privacy data protection and de-privacy processing, which can solve the problems of poor privacy data de-privacy processing and achieve the effect of ensuring uniformity and security

Inactive Publication Date: 2013-06-26
CHINA MOBILE COMM GRP CO LTD
View PDF2 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The purpose of the present invention is to propose a method and device for de-privacy processing of private data, aiming at the defect that the de-privacy processing effect of private data is not good in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy-removing processing method and device using the same
  • Privacy-removing processing method and device using the same
  • Privacy-removing processing method and device using the same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049]According to an embodiment of the present invention, a de-privacy processing method is provided. Embodiment 1 of this method includes:

[0050] Step S102, data acquisition: after the data acquisition layer extracts data (Extract) from systems such as CRM (customer relationship management), BOSS (business operation support system), VGOP (value-added business integrated operation platform), these source data contain a lot of customer privacy data. Before the source data enters the data warehouse, it is necessary to determine whether the data to be imported contains the customer's private information. If so, the private information needs to be de-privatized. Otherwise, skip the privacy processing step and continue to follow the original process. deal with;

[0051] Step S104, de-privacy processing: In the data conversion processing stage (Translate), continue to perform various inspections and normalization processing on the data. For customer data that contains privacy, ...

Embodiment 2

[0060] Embodiment 2 of this method includes:

[0061] Step S202: the data warehouse obtains a new data file ( figure 2 table on the right), found that the mobile phone number in the data file is customer privacy data, and needs to use the set mapping relationship table V1.0 ( figure 2 Table on the left) to perform mapping transformation processing;

[0062] Step S204: According to the mapping conversion method called from the de-privacy method library, according to the mapping rule V1.0, the mobile phone number in the data file is converted into the mapping code in the mapping relationship table V1.0, and the customer in the data file is completed. De-privacy processing of private data, such as image 3 shown.

[0063] In the de-privacy processing method of this embodiment, the customer privacy data in the source data is de-privacy processing in the ETL conversion stage, so that the data saved in the data warehouse no longer contains customer privacy data, even if data le...

Embodiment 3

[0065] Embodiment three of this method includes:

[0066] Step S302: For the data file ( Figure 4 The mobile phone number in the table on the right), if in the mapping relationship table ( Figure 4 The corresponding mapping rule cannot be found in the table on the left), and the exception handling process needs to be started. First, add the mapping rule in the mapping relationship table V1.0, and then perform mapping transformation processing according to the new mapping rule, such as Figure 4 shown;

[0067] Step S304: According to the mapping rule maintenance plan, add a new mapping rule to the mapping relationship table V1.0 for the mobile phone number 13500000005, such as Figure 5 shown;

[0068] Step S306: According to the mapping rule V1.0, the mobile phone number in the data file is transformed into the mapping code in the new mapping relationship table V1.0, and the abnormal processing of de-privacy of the customer privacy data in the data file is completed, suc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a privacy-removing processing method and a device using the privacy-removing processing method. The privacy-removing processing method comprises the following steps: extracting an index field of client privacy data obtained from a data source and calling a privacy-removing mapping relation chart; mapping the index field into mapping codes in the privacy-removing mapping chart according to the mapping rules of the privacy-removing mapping relation chart and finishing the privacy-removing process of the client privacy data. According to the privacy-removing processing method and the device using the privacy-removing processing method, a privacy-removing processing engine is designed to be arranged inside the an extract transform and load (ETL) module, on one hand, existing system resources of the ETL module is sufficiently used and occupation of system resources of a data cabin and a data mart is avoided; on the other hand, due to the fact that the ETL module is an united inlet of all data of an business analysis system, the ETL module carries out all the client privacy-removing process, and therefore uniformity of all the operations can be ensured.

Description

technical field [0001] The present invention relates to data warehouse privacy data protection technology in the communication field, in particular, to a method and device for de-privacy processing. Background technique [0002] The operator's business analysis system data warehouse concentrates the data of each production system of the operator, including a large amount of customer privacy data. For the protection of these private data, we can learn from the following technologies used in the protection of customer private data in other industry application systems: [0003] Based on data anonymization technology: Anonymize part of the data according to the specific situation, and then release the information conditionally. For example, it is an irreversible processing technology to generalize these data without publishing certain domain values. Make a compromise between privacy disclosure risk and data accuracy, selectively release sensitive data and information that may...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30
Inventor 何鸿凌魏春辉陶涛龙国荣陈彰
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products