Big data correlation analysis method and system for protecting consumer privacies in electronic transaction

A correlation analysis, electronic transaction technology, applied in the direction of electronic digital data processing, digital data protection, data processing applications, etc., can solve problems such as consumer sensitive information crisis

Active Publication Date: 2018-06-15
深圳市崇晸实业有限公司
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The current solution is to divide consumer information into multiple data blocks through a secure channel, encrypt them separately, and then transmit them to multiple data servers and store them. Consumer information stored in data servers is provided by administrators, merchants, researchers, insurance companies, etc. Different users share and access, and finally decrypt the encrypted data blocks stored in each data server before performing statistical analysis. In this way, the security of consumer data during transmission can be protected, and as long as multiple data The server has not been compromised at the same time, and the consumer data stored in the data server is safe, but there are still some serious problems: in this system, consumer information is stored in the data server, because it is stored in each data server The encrypted data blocks are decrypted before data analysis, which means that the data blocks distributed to each data server have been integrated before data processing, so users (for example, administrators, merchants, researchers) can Once all sensitive information of consumers is obtained, once malicious users use consumer information for personal purposes, it will cause a crisis of consumer sensitive information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data correlation analysis method and system for protecting consumer privacies in electronic transaction
  • Big data correlation analysis method and system for protecting consumer privacies in electronic transaction
  • Big data correlation analysis method and system for protecting consumer privacies in electronic transaction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.

[0018] please see figure 1 A big data correlation analysis method for protecting consumer privacy in electronic transactions provided by the present invention, comprising the following steps:

[0019] Step 1: data storage;

[0020] Step 1.1: generate preprocessing parameters;

[0021] Responsible for selecting the parameters required for the scheme, using the Pailler encryption system to generate the parameter algorithm in each data server to generate the user's public key and private key (pk, sk) required for encryption, and at the same time select a signa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a big data correlation analysis method and system for protecting consumer privacies in electronic transaction. The method comprises the steps of data storage, data statisticalprocessing, access query and the like; the system comprises a data storage module used for initializing the system, randomly dispersing data, secretly processing the data, converting the data into ciphertexts and storing the ciphertexts in data servers, a data statistical processing module used for performing data processing of related statistical analysis calculation on the ciphertexts, and an access query module used for performing decryption calculation on the ciphertexts in a client after a user passes an access request. By using the big data correlation analysis method and system for protecting the consumer privacies in the electronic transaction, consumer information is subjected to correlation analysis favorable for market adjustment under the condition of not harming the consumer privacies. The big data correlation analysis method and system assists the user (such as, an administrator, a merchant and a researcher) to analyze the data and does not leak the data.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a big data correlation analysis method and system for protecting consumer privacy in electronic transactions. By combining cryptography technology and statistical mathematics, it strictly controls the management of consumer information that can enter the electronic transaction process. The crowd of the system does not disclose the privacy of consumers, and can carry out correlation statistical analysis of privacy protection on consumer data. Background technique [0002] As Internet technology penetrates more and more comprehensively into the political, economic, cultural and other fields of human society, digital business has become what everyone and every organization must face. E-commerce and online shopping are no longer a kind of choice, and become a necessity. However, under such a background, cases of leakage and illegal infringement of customers'...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60G06Q20/38
CPCG06F21/602G06F21/6245G06Q20/38215G06Q20/3823G06Q20/3825G06Q20/3829
Inventor 张明武陈文倩黄嘉骏冷文韬阮鸥沈华陈效张旭
Owner 深圳市崇晸实业有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products