Method for protecting privacy of identity information based on sensitive information measurement

A technology of identity information and sensitive information, applied in the field of privacy protection of user identity information, to achieve a comprehensive effect of protection

Active Publication Date: 2017-07-11
湖南宸瀚科技有限公司
View PDF3 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The present invention can solve the problem that the existing privacy protection method is difficult to effectively deal with the privacy information attack method based on the background knowledge attack, so that the protection of key identity and identity sensitive information is more comprehensive and effective

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting privacy of identity information based on sensitive information measurement
  • Method for protecting privacy of identity information based on sensitive information measurement
  • Method for protecting privacy of identity information based on sensitive information measurement

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0107] The present invention will be further described below in conjunction with the accompanying drawings. It should be noted that this embodiment is based on the technical solution, and provides detailed implementation and specific operation process, but the protection scope of the present invention is not limited to the present invention. Example.

[0108] Such as figure 1 As shown, a privacy protection method of identity information based on sensitive information measurement in the present invention is as follows:

[0109] S1, determine the input and output;

[0110] S11. First record the identity information database as D id , the application database is A id ;

[0111] S12. Define identity information reference: suppose c is a specific identity information, A is a specific application, F A It is a collection of all applications in the current application environment; If A references c, then there is a reference from A to c with identity information and a back refe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for protecting privacy of identity information based on sensitive information measurement. The method comprises the comprises the following steps of S1, determining input and output; S2, defining and calculating identity importance degree; S3, optimizing the identity importance; S4, calculating a sensitive information disclosing matrix, a minimum attack set and an information disclosing probability; S5, determining a generalizing function, and generalizing a dataset; S6, establishing a background knowledge attack-avoidance privacy protection model; S7, describing a (gamma, eta)-Risk anonymity algorithm, inputting an original dataset D, and outputting an anonymity dataset D'; S8, introducing a confidence interval, controlling the high-probability inference attack of an attacking party within the specified confidence interval, so as to avoid a user using an attribute distribution function to calculate the identity information of the user, calculate features, and perform high-probability inference attack. The method has the advantages that the problem of difficulty in effectively treating the privacy information attack based on background knowledge attack in the existing privacy protection method is solved, and the key identity and identity sensitive information are more comprehensively and effectively protected.

Description

technical field [0001] The invention relates to a privacy protection method for user identity information in cyberspace security, in particular to a privacy protection method for identity information based on sensitive information measurement. Background technique [0002] With the rapid development of network applications, the threats of identity theft and identity information leakage faced by users, as well as the external and internal identity security threats faced by applications and services are becoming more and more serious. How to solve identity theft and identity information leakage is a current research hotspot. To solve the problem of identity information leakage, it is not enough to provide a complete identity authentication and authorization process and secure information transmission. It is also necessary to protect the information disclosed between applications and between applications and users. [0003] Privacy protection is an important means to solve the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6254G06F2221/2135
Inventor 曹宇
Owner 湖南宸瀚科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products