Unlock instant, AI-driven research and patent intelligence for your innovation.

Private data distributed storage system and method of marginalized architecture

A privacy data and distributed storage technology, applied in the field of privacy protection, can solve the problems of increasing communication load and delay, affecting the accuracy of user information, and unable to verify in time, so as to meet high concurrency and massive calls, reduce the degree of diffusion, and protect users Privacy Effects

Active Publication Date: 2020-08-14
重庆特斯联智慧科技股份有限公司
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, centralizing user information and increasing timeliness restrictions will increase the communication load and delay in the application process of user information, which cannot meet the needs of high concurrency and massive invocation of user information in big data analysis
Fuzzifying user information may affect the accuracy of user information in big data analysis, and the impact of fuzzification on big data analysis cannot be verified in time
[0004] To sum up, the existing technology provides a distributed storage system and method for private data with a marginalized architecture, which can solve the problem: in the existing user information collection process, in order to protect user privacy to the greatest extent, user information is centralized and increased Timeliness limits the increased communication load and delay in the application of user information, which cannot meet the needs of high concurrency and massive invocation of user information in big data analysis; fuzzing user information may affect the accuracy of user information in big data analysis The impact of fuzzification on big data analysis cannot be verified in time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private data distributed storage system and method of marginalized architecture
  • Private data distributed storage system and method of marginalized architecture
  • Private data distributed storage system and method of marginalized architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the objectives, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention will be described in more detail below in conjunction with the drawings in the embodiments of the present invention.

[0034] It should be noted that: in the drawings, the same or similar symbols represent the same or similar elements or elements with the same or similar functions. The described embodiments are part of the embodiments of the present invention, but not all of the embodiments. In the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0035] In describing the present invention, it is to be understood that...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a private data distributed storage system of a marginalized architecture. User information is acquired through an acquisition terminal, the privacy normal form edge node provides a normal form template for the privacy protection terminal, the privacy protection terminal executes privacy protection calculation on the user information according to the normal form template so as to obtain normal form features of the user, therefore, the normal form features of the user can be uploaded to the information storage edge node to be stored so as to be called by the big data application end, and the big data application end can execute user-oriented big data analysis. The invention further provides a method of the system. On the basis of meeting a big data analysis function, user privacy can be protected to the maximum extent, and the diffusion degree of user information is reduced; the communication load and delay in the user information application process cannot be increased, and the requirements for high concurrency and massive calling of user information in big data analysis can be met; and the accuracy of the user information in the aspect of big data analysis isnot influenced.

Description

technical field [0001] The invention relates to the technical field of privacy protection, in particular to a distributed storage system and method for private data with a marginalized architecture. Background technique [0002] With the development of intelligent Internet of Things and big data technology, the collection of user information has gradually shifted from online to offline. For example, the collection of user face information can be realized through various face recognition camera devices. The collected user information can be used for big data analysis, thereby improving the operating efficiency of the intelligent Internet of Things and providing users with more personalized services. [0003] As users pay more and more attention to data rights and personal privacy rights, how to protect user privacy to the greatest extent and reduce The degree of diffusion of user information has become an urgent problem to be solved. At present, the main methods of privacy ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F16/27
CPCG06F21/6245G06F16/27
Inventor 不公告发明人
Owner 重庆特斯联智慧科技股份有限公司