Information processing method and device

A processing method and target technology, applied in the computer field, can solve problems such as not enough to ensure the security of private information, and achieve the effect of small amount of uploaded data, protection of private data, and good encryption performance

Active Publication Date: 2019-05-31
郑州阿帕斯科技有限公司
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, people's emphasis on privacy issues has promoted the research of privacy protection technology. Among them, deleting the identifier attribute of the data set is a means to protect personal privacy. However, although deleting the identifier attribute of the data set (such as name, ID number etc.) can protect personal privacy to a certain extent, but some attack cases show that the above-mentioned simple operation of deleting identifiers is far from enough to ensure the security of private information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information processing method and device
  • Information processing method and device
  • Information processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] Such as figure 1 As shown, the embodiment of the present application provides a method for processing information. The execution subject of the method may be a terminal device, wherein the terminal device may be a terminal device such as a personal computer, or a mobile terminal device such as a mobile phone or a tablet computer. . The method can be applied to processes such as privacy protection of user data. The method specifically may include the following steps:

[0047] In step S102, the target data input by the user is acquired.

[0048] Wherein, the target data may be any data. In the embodiment of the present application, the target data may be a search term (or hot search term, etc.) input by the user, such as "World Cup France" or the domain name "google".

[0049] In implementation, at present, various operators (such as communication operators, game operators, etc.) Integration and data fusion technologies are flourishing. At the same time, the convenien...

Embodiment 2

[0085] Such as image 3 As shown, the embodiment of the present application provides an information processing method, and the execution body of the method may be a server, wherein the server may be a single server or a server cluster composed of multiple servers. The method can be applied to processes such as privacy protection of user data. The method specifically may include the following steps:

[0086] In step S302, the data corresponding to the uploaded target part word is received, the data corresponding to the target part word is the target data input by the user as the whole word, and the whole word is hash-mapped by a predetermined hash operator Calculate and obtain the hash map value of the whole word, combine the hash map value of the whole word and some characters in the target data into part words, perform bit array mapping on the whole word and part words respectively, and project the mapped data, The corresponding projection matrix is ​​obtained, and after th...

Embodiment 3

[0098] Such as Figure 4 As shown, the embodiment of the present application provides a method for processing information, and the execution subject of the method may be a terminal device and a server, wherein the terminal device may be a terminal device such as a personal computer, or a mobile phone such as a mobile phone or a tablet computer. For the terminal device, the server may be a single server or a server cluster composed of multiple servers. The method can be applied to processes such as privacy protection of user data. The method specifically may include the following steps:

[0099] In step S402, the terminal device acquires the target data input by the user.

[0100] For the specific processing process of the above step S402, reference may be made to the relevant content of the step S102 in the first embodiment above, and details will not be repeated here.

[0101] In step S404, the terminal device takes the target data as the whole word, and performs hash mappin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an information processing method and device. The method comprises the steps of obtaining target data input by a user; Taking the target data as a whole word,and performing Hash mapping calculation on the whole word through a predetermined Hash operator to obtain a whole word Hash mapping value; Combining the whole word Hash mapping value and a part of characters in the target data into a part of words, and respectively carrying out bit array mapping on the whole word and the part of words; Projecting the mapped data to obtain a corresponding projection matrix; And obtaining a target part of words in the part of words, and uploading data corresponding to the target part of words according to the projection matrix corresponding to the target part ofwords. According to the embodiment of the invention, the client encrypts the data in a hash mapping and projection manner, and the encryption performance is good, so that the data is safer in the transmission process.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to an information processing method and device. Background technique [0002] In the current era of big data, while information technology brings convenience to human society, it also creates issues of data security and user privacy. In order to ensure the in-depth development of information technology, protecting personal data privacy has become a top priority. It is currently a major challenge to ensure that personal sensitive information is not leaked while analyzing. [0003] At present, peoples emphasis on privacy issues has promoted the research of privacy protection technology. Among them, deleting the identifier attribute of the data set is a means to protect personal privacy. However, although deleting the identifier attribute of the data set (such as name, ID number etc.) can protect personal privacy to a certain extent, but some attack cases show that the sim...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F17/27G06F16/35G06F16/31
Inventor 涂治国张旭李涛
Owner 郑州阿帕斯科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products