Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing data fusion and data privacy protection based on Hash algorithm and session control

A technology of session control and data fusion, applied in digital data protection, database indexing, data processing applications, etc., can solve the problems of provider data value decline and highly sensitive information leakage, so as to ensure data privacy and data security, avoid data Depreciation, the effect of avoiding leakage

Active Publication Date: 2019-09-20
上海富数科技有限公司
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] Data compliance issues: Device information and mobile phone numbers are highly sensitive information, while user characteristics are low-sensitive information. In this case, a query of low-sensitive information resulted in the leakage of highly sensitive information;
[0017] Data depreciation caused by data diffusion, in these different query scenarios, allows other parties to obtain unnecessary data, and the data provider will be able to accumulate and exchange data, reducing the value of the original provider's data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing data fusion and data privacy protection based on Hash algorithm and session control
  • Method for realizing data fusion and data privacy protection based on Hash algorithm and session control
  • Method for realizing data fusion and data privacy protection based on Hash algorithm and session control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to describe the technical content of the present invention more clearly, further description will be given below in conjunction with specific embodiments.

[0043] The method for realizing data fusion and data privacy protection based on hash algorithm and session control of the present invention comprises the following steps:

[0044] (1) The demand module sends a query request for the hash value of the mobile phone number to the mapping data providing module;

[0045] (2) The mapping data providing module queries whether there is the same mobile phone number hash data, and if it exists, returns the result to the demand module; otherwise, does not return the result;

[0046] (2.1) Query the corresponding mapping data according to the requested hash value;

[0047] (2.2) If there is corresponding mapping data, return the corresponding device number of the mobile phone to the demand module, and take the first n digits after hash calculation, and create a meetin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for realizing data fusion and data privacy protection based on a Hash algorithm and the session control. The method comprises the following steps that a demand module sends a query request after Hash calculation to a mapping data providing module; the mapping data providing module inquires whether the data exists or not; a demand module queries the provider data from the portrait data providing module; a portrait data providing module inquires the previous n hash value lists; the mapping data providing module returns the hit information to the portrait data providing module; and the portrait data providing module queries the data. By the adoption of the method for realizing data fusion and data privacy protection based on the Hash algorithm and the session control, the leakage of the high-sensitivity information caused by query of low-sensitivity information is avoided, and the data derogatory caused by the data diffusion is also avoided. According to the implementation scheme, the user privacy information of three parties cannot be leaked except the user portrait information, so that the data privacy and the data security of the individual users and the enterprise users are guaranteed.

Description

technical field [0001] The invention relates to the field of data protection, in particular to the field of user data fusion protection, and specifically refers to a method for realizing data fusion and data privacy protection based on a hash algorithm and session control. Background technique [0002] Data incompleteness issues: [0003] In fact, companies that provide services to individual users have user data of different dimensions. For each company, the user data it owns is incomplete. for example: [0004] ·A company that provides burying services for apps only has information about mobile devices and which apps the user has installed (the user’s interest characteristics can be deduced based on the user’s installation list) and the user’s active time; [0005] An application that provides H5 business services through mobile phone registration, he only knows the user's mobile phone number and the data of his own service content; [0006] · Apps that provide services...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F16/22G06F16/2455G06Q30/02
CPCG06F16/2255G06F16/2455G06F21/6245G06Q30/0255G06Q30/0277
Inventor 傅跃兵卞阳丁海莉
Owner 上海富数科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products