Unlock instant, AI-driven research and patent intelligence for your innovation.
Method for optimizing data extraction
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology for optimizing data and data, applied in the field of data processing, can solve problems such as long maintenance time, and achieve the effect of avoiding direct output
Active Publication Date: 2019-08-20
INSPUR SOFTWARE CO LTD
View PDF4 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
When configuring encrypted fields in the data desensitization stage, the input and output of the fields need to be maintained one-to-one. If there is a large amount of data and a large number of fields, the maintenance time will be longer
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0045] combined with figure 1 , this embodiment proposes a method for optimizing data extraction,
[0046] A method of optimizing data extraction, the method comprising:
[0047] 1) The credit information platform collects data;
[0048] 2) Determine whether the collected data is non-private data or private data:
[0049] 2a) The collected data is non-private data, perform step 3);
[0050] 2b) The collected data is private data, and it is further judged whether there is an associated requirement for the private data:
[0051] 2b-1) If there is an association requirement, use data encryption to encrypt the private data, and perform step 3);
[0052] 2b-2) There is no association requirement, use the data desensitization method to desensitize the private data, and perform step 3);
[0053] 3) The data is output and a result set is generated, and the data in the result set can be exported externally.
[0054] In this embodiment, the specific process of encrypting private d...
Embodiment 2
[0076] combined with figure 1 , this embodiment proposes a method for optimizing data extraction, the method comprising:
[0077] 1) collect data;
[0078] 2) Determine whether the collected data is non-private data or private data:
[0079] 2a) The collected data is non-private data, perform step 3);
[0080] 2b) The collected data is private data, and it is further judged whether there is an associated requirement for the private data:
[0081] 2b-1) If there is an association requirement, use data encryption to encrypt the private data, and perform step 3);
[0082] 2b-2) There is no association requirement, use the data desensitization method to desensitize the private data, and perform step 3);
[0083] 3) The data is output and a result set is generated, and the data in the result set can be exported externally.
[0084] In this embodiment, the specific process of encrypting private data includes:
[0085] Read all field information of private data through JAVA;
...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a method for optimizing data extraction, relates to the technical field of data processing, and the method comprises the following steps: collecting data; judging whether the acquired data is non-private data or private data; if the data are non-private data, directly outputting and generating a result set; if the data is the privacy data, further judging whether the privacy data has an association requirement or not, if yes, performing encryption operation on the privacy data in a data encryption mode, and if not, performing desensitization operation on the privacy data in a data desensitization mode, and after encryption or desensitization operation is performed, outputting the data and generating a result set. And data in the result set can be output to the outside. While complete data is collected, the collected privacy data can be encrypted, and the privacy of the user is prevented from being leaked due to direct output of the privacy data.
Description
technical field [0001] The invention relates to the technical field of data processing, in particular to a method for optimizing data extraction. Background technique [0002] The credit information platform needs to use a large amount of corporate and personal data. As the credit information platform collects more and more data, it is inevitable that some private data related to personal privacy will be collected. For this part of the data, we usually directly transfer all the extracted data to the fields that need to be used in the process of collection and use, which may easily cause the leakage of personal privacy. [0003] Of course, with the development of network technology, our protection of private data is becoming more and more obvious. Now, credit information platforms usually perform data desensitization operations on private data. Data desensitization operations generally provide desensitization methods for a total of eleven types of common private data such as...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.