A player configuration method under privacy protection

A privacy protection and configuration method technology, applied in digital data protection, computer security devices, data processing applications, etc., can solve problems such as technology or confidential information leakage partners, and achieve reduced time overhead, high privacy protection security, and response fast effect

Active Publication Date: 2022-05-13
HUBEI UNIV OF TECH
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The current era is a golden age of win-win cooperation, but the cooperation process is also carried out under certain restrictions. It is impossible for a partner to disclose its private technology or confidential information to its partners without reservation.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A player configuration method under privacy protection
  • A player configuration method under privacy protection
  • A player configuration method under privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to facilitate those skilled in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention. invention.

[0029] Suppose there are n players in a certain team (User 1 , User 2 ,...,User n ), the owner knows the playing costs of all players (M 1 , M 2 ,...,M n ), and has a fixed budget cost B; the coach masters the physical fitness and training data of all players, including shooting percentage, free throw percentage, physical strength, etc., and separately uses these private data of each player according to the same established rules converted to an integer (V 1 ,V 2 ,...,V n ); There is obviously a certain correlation between each player's playin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a player allocation method under privacy protection. Assume that the team has n players, and the boss owns the playing fee M of each player. i and the established budget B of the entire game, and the coach has mastered the training data of all players, and the coach integrates multiple data of each player into a positive integer V according to the established rules i ; The coach and the owner jointly participate in the calculation of the benefit value of each player, and use the difference comparison protocol to sort the benefit value many times, and then select some players to get the best player configuration. At the same time, during the entire calculation process, private data such as the player's playing fee M held by the boss and the player's ability V held by the coach will not be leaked. The method includes system initialization, data encryption, generation of benefit value report, safe sorting of benefit value sequence, and generation of player configuration results. The invention has high privacy protection security, high calculation speed and high processing efficiency.

Description

technical field [0001] The invention belongs to the technical field of information security and relates to a player configuration method, in particular to a player configuration method aimed at user privacy protection requirements. Background technique [0002] The current era is a golden age of win-win cooperation, but the cooperation process is also carried out on a limited basis. It is impossible for partners to disclose their private technology or confidential information to partners without reservation. Therefore, there is a need for some degree of user privacy protection in any win-win cooperation scenario. [0003] Before a game, the team coach needs to select certain players to play. He must not only consider the probability of winning the game, but also the budget of the team owner and the influence of the player's worth. The coach has mastered the physical fitness and training level of all the players, which may contain multi-dimensional data. These data are confi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06Q10/06
CPCG06F21/602G06F21/6245G06Q10/06311
Inventor 张明武陈誉
Owner HUBEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products