Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protection system and method based on big data analysis and trusted computing

A privacy protection system and trusted computing technology, applied in the direction of digital data protection, computing, electronic digital data processing, etc., can solve the problems of users' personal information cannot be guaranteed and safe protection, user privacy leakage, inconvenience, etc., to improve Strong privacy protection, reasonable module design, and simple operation

Pending Publication Date: 2019-10-25
武汉东湖大数据交易中心股份有限公司
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, during this process, the system collects and analyzes a large amount of user personal information, which can easily lead to the leakage of user privacy, and the user's personal information cannot be guaranteed and safely protected, which brings us inconvenience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection system and method based on big data analysis and trusted computing
  • Privacy protection system and method based on big data analysis and trusted computing
  • Privacy protection system and method based on big data analysis and trusted computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0050] Such as Figure 1-Figure 7 As shown, a privacy protection system based on big data analysis and trusted computing, the privacy protection system includes a client, an authentication server and an access terminal, and the client is wirelessly connected to the authentication server and the access terminal respectively; the privacy The protection system also includes an alarm module, which is wirelessly connected to the authentication server and the access...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privacy protection system and method based on big data analysis and trusted computing. The privacy protection system comprises a user side, an authentication server and an access terminal, the user side is in wireless connection with the authentication server and the access terminal, the authentication server is in wireless connection with the access terminal, the privacyprotection system further comprises an alarm module, and the alarm module is in wireless connection with the authentication server and the access terminal. The user side comprises a login module, a first receiving module, an analysis module, an encryption module and a first output module, the login module and the first receiving module are electrically connected with the analysis module, and theanalysis module, the encryption module and the first output module are electrically connected in sequence; the module is reasonable in design, the privacy protection strength is improved by endowing the pseudonym operation through the authentication server, meanwhile, during network access, the situation that a user reduces the privacy leakage risk can be effectively avoided, and high practicability is achieved.

Description

technical field [0001] The invention relates to the technical field of big data analysis, in particular to a privacy protection system and method based on big data analysis and trusted computing. Background technique [0002] With the rapid development of wireless communication technology, Internet technology and Web resources are becoming more and more abundant. During the process of network access, more and more Internet information retrieval applications provide personalized information by analyzing user behavior and learning user preferences to optimize the retrieval mechanism. Retrieval service. [0003] However, during this process, the system collects and analyzes a large amount of user personal information, which can easily lead to the leakage of user privacy, and the user's personal information cannot be guaranteed and safely protected, which brings us inconvenience. [0004] In response to the above problems, we designed a privacy protection system and method base...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6245
Inventor 杜乐杜小军
Owner 武汉东湖大数据交易中心股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products