Big data safe integration method capable of protecting privacy

A fusion method and big data technology, applied in the direction of digital data protection, can solve problems such as privacy data leakage, and achieve the effect of ensuring data security, simple implementation, and promoting information sharing

Active Publication Date: 2016-05-18
CHINA UNIONPAY
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, on the one hand, different organizations welcome the sharing of big data. The introduction of fusion of different types of data can produce new analysis results, and the value of data will thus have a multiplier effect; There are concerns about the leakage of private data in the Internet, because the final analysis result is often only a statistical conclusion, but in the process of big data fusion calculation, all the entry details of the data have to be exposed to the other party
This problem has become a major obstacle to big data collaboration and sharing among industries

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data safe integration method capable of protecting privacy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] It should be noted that, according to various embodiments disclosed in the present invention, the first party stores the first data set in the first database, and the second party stores the second data set in the second database.

[0012] The first and second data sets respectively record different information, such as activity information of multiple users on different occasions. The first and second data sets have an intersection of information, for example, user identity information, which can be extracted as an associated field.

[0013] The present invention provides various implementation modes for performing big data fusion on the first and second data sets.

[0014] like figure 1 As shown, the first embodiment of the present invention provides a big data security fusion method, which includes the following steps:

[0015] Step S10, the first party and the second party negotiate on the associated fields, data items required by each, and sorting rules.

[0016...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to a big data safe integration method. The method comprises the following steps: a first party and a second party negotiate about associated fields, data items required by the first party and the second party and a sorting rule; based on the data items required by the first party and the second party, screening a first to-be-integrated data set and a second to-be-integrated data set from a first data set and a second data set; according to the sorting rule, sorting the first to-be-integrated data set and the second to-be-integrated data, and removing the data corresponding to the associated fields from the first to-be-integrated data set and the second to-be-integrated data; submitting the first to-be-integrated data set and the second to-be-integrated data to a third party computing platform to form an integrated data set; and generating a result data set after the third party computing platform analyzes and calculates the integrated data set. By adopting the method, the big data is integrated, and simultaneously the private data is effectively prevented from being leaked; thus, the information is shared on the premise of ensuring the data security.

Description

technical field [0001] The invention relates to a big data security fusion method. Background technique [0002] With the introduction of the national "Internet +" strategy, the demand for big data integration among various industries is becoming more and more urgent. However, on the one hand, different organizations welcome the sharing of big data. The introduction of fusion of different types of data can produce new analysis results, and the value of data will thus have a multiplier effect; There are concerns about the leakage of private data in the Internet, because the final analysis result is often only a statistical conclusion, but in the process of big data fusion calculation, all the entry details of the data have to be exposed to the other party. This problem has become a major obstacle to inter-industry collaboration and sharing of big data. [0003] Therefore, those skilled in the art desire to obtain a reliable big data security fusion method that effectively s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
Inventor 周雍恺柴洪峰何朔何东杰刘国宝才华
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products