Data processing method and device for realizing privacy protection

A privacy protection and data processing technology, applied in the field of data security, can solve problems such as leaking user identities, and achieve the effects of preventing leakage, high availability, and ensuring user privacy and security.

Active Publication Date: 2020-09-29
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the abundance of raw sensor data also brings the risk of revealing user identities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and device for realizing privacy protection
  • Data processing method and device for realizing privacy protection
  • Data processing method and device for realizing privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The solutions provided in this specification will be described below in conjunction with the accompanying drawings.

[0021] The embodiment of this specification discloses a data processing method for realizing privacy protection. By anonymizing raw sensor data, the protection of user identity privacy can be realized. Specifically, with the rise of machine learning, the inventor thought that machine learning technology can be applied to the technical field of data privacy and security, and by training a machine learning model for anonymizing raw sensor data (hereinafter referred to as data anonymity model ) to protect user privacy.

[0022] figure 1 An implementation architecture diagram showing a data processing method according to an embodiment, such as figure 1 As shown, first input the acquired sensor data into the data anonymous model to obtain anonymous data; then, on the one hand, input the anonymous data into the pre-trained user identification model to obtain...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of this specification provides a data processing method for realizing privacy protection. The method includes: acquiring the sensor data to be processed, and the corresponding identity category label and service label, and the service label corresponds to the service prediction task for the user; then, the The sensor data is input into the data anonymous model to obtain anonymous data; further, on the one hand, the anonymous data is input into the pre-trained user identity recognition model to obtain the identity prediction result, which is used to determine the identity prediction loss in combination with the identity category label; On the one hand, the anonymous data is input into the pre-trained business prediction model to obtain the business prediction result, which is used to determine the business prediction loss in combination with the above business labels; then, the comprehensive loss is used to train the data anonymous model; the comprehensive loss is combined with the The identity prediction loss is negatively correlated and positively correlated with the business prediction loss; the trained data anonymity model is used to anonymize the target sensor data.

Description

technical field [0001] One or more embodiments of this specification relate to the technical field of data security, and in particular, to a data processing method and device for realizing privacy protection. Background technique [0002] At present, there are many sensors embedded in personal smart devices, including accelerometers, gyroscopes, and magnetometers. The application APP installed on smart devices can access the raw data collected by these sensors and process the raw sensor data to Realize the interaction with the user, or calculate the indicator data displayed to the user to help the user understand their own activity or physical state. [0003] However, the abundance of raw sensor data also brings the risk of revealing user identities. Therefore, there is a need for a solution that can prevent leakage of user identity information while the number of sensors can be normally used for subsequent business processing, so as to effectively protect user privacy and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06N3/04G06N3/08G06N20/00
CPCG06F21/6245G06N3/084G06N20/00G06N3/045
Inventor 李龙飞周俊
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products