Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for optimizing data extraction

A technology for optimizing data and data, applied in the field of data processing, can solve problems such as long maintenance time, and achieve the effect of avoiding direct output

Active Publication Date: 2019-08-20
INSPUR SOFTWARE CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When configuring encrypted fields in the data desensitization stage, the input and output of the fields need to be maintained one-to-one. If there is a large amount of data and a large number of fields, the maintenance time will be longer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for optimizing data extraction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] combined with figure 1 , this embodiment proposes a method for optimizing data extraction,

[0046] A method of optimizing data extraction, the method comprising:

[0047] 1) The credit information platform collects data;

[0048] 2) Determine whether the collected data is non-private data or private data:

[0049] 2a) The collected data is non-private data, perform step 3);

[0050] 2b) The collected data is private data, and it is further judged whether there is an associated requirement for the private data:

[0051] 2b-1) If there is an association requirement, use data encryption to encrypt the private data, and perform step 3);

[0052] 2b-2) There is no association requirement, use the data desensitization method to desensitize the private data, and perform step 3);

[0053] 3) The data is output and a result set is generated, and the data in the result set can be exported externally.

[0054] In this embodiment, the specific process of encrypting private d...

Embodiment 2

[0076] combined with figure 1 , this embodiment proposes a method for optimizing data extraction, the method comprising:

[0077] 1) collect data;

[0078] 2) Determine whether the collected data is non-private data or private data:

[0079] 2a) The collected data is non-private data, perform step 3);

[0080] 2b) The collected data is private data, and it is further judged whether there is an associated requirement for the private data:

[0081] 2b-1) If there is an association requirement, use data encryption to encrypt the private data, and perform step 3);

[0082] 2b-2) There is no association requirement, use the data desensitization method to desensitize the private data, and perform step 3);

[0083] 3) The data is output and a result set is generated, and the data in the result set can be exported externally.

[0084] In this embodiment, the specific process of encrypting private data includes:

[0085] Read all field information of private data through JAVA;

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for optimizing data extraction, relates to the technical field of data processing, and the method comprises the following steps: collecting data; judging whether the acquired data is non-private data or private data; if the data are non-private data, directly outputting and generating a result set; if the data is the privacy data, further judging whether the privacy data has an association requirement or not, if yes, performing encryption operation on the privacy data in a data encryption mode, and if not, performing desensitization operation on the privacy data in a data desensitization mode, and after encryption or desensitization operation is performed, outputting the data and generating a result set. And data in the result set can be output to the outside. While complete data is collected, the collected privacy data can be encrypted, and the privacy of the user is prevented from being leaked due to direct output of the privacy data.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a method for optimizing data extraction. Background technique [0002] The credit information platform needs to use a large amount of corporate and personal data. As the credit information platform collects more and more data, it is inevitable that some private data related to personal privacy will be collected. For this part of the data, we usually directly transfer all the extracted data to the fields that need to be used in the process of collection and use, which may easily cause the leakage of personal privacy. [0003] Of course, with the development of network technology, our protection of private data is becoming more and more obvious. Now, credit information platforms usually perform data desensitization operations on private data. Data desensitization operations generally provide desensitization methods for a total of eleven types of common private data such as...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6227G06F21/6245
Inventor 王冠中杨超
Owner INSPUR SOFTWARE CO LTD