System information encryption protection method

A system information and pseudo-information technology, applied in digital data protection, retrieval of Web data using information identifiers, retrieval of other databases, etc., can solve the problems of uncertain delay time, untimely data update, and easy leakage of data disclosure process. Achieve increased efficiency, fast and accurate location, and reduced likelihood of leaks

Pending Publication Date: 2020-11-24
XIEHE HOSPITAL ATTACHED TO TONGJI MEDICAL COLLEGE HUAZHONG SCI & TECH UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In order to solve the above problems, the present invention provides a system information encryption protection method, which mainly solves the problems of uncertain delay time, untimely data update, and easy leakage of data disclosure in the existing protection methods.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System information encryption protection method
  • System information encryption protection method
  • System information encryption protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0083] The present invention will be further described below in conjunction with accompanying drawing:

[0084] For the original information set M 0 , the original information set M 0 The obtained privacy information set M', the information set M' includes n equivalence classes; it contains three modules: adding module I, deleting module II, and modifying module III;

[0085] system information encryption protection method,

[0086] Obtain the original information set M0, and obtain the private information set M', the information set M' includes j equivalence classes;

[0087] and the following step modules,

[0088] Information adding step module Ⅰ of privacy information set:

[0089] When an information set M is added to the privacy information set M', the information set M includes m tuples t, and its execution is as follows:

[0090] S11 Determine the equivalence class with the largest semantic similarity with the tuple t, and perform the addition operation,

[0091]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a system information encryption protection method. The method aims at an original information set, and comprises the following steps: obtaining an original data set, and obtaining a privacy information set, wherein the privacy information set comprises j equivalence classes. An information adding step module I of the privacy information set, an information deleting step module II of the privacy information set and an information modifying step module III of the privacy information set are included. The method has the beneficial effects that by calculating the semanticsimilarity, quick and accurate positioning is realized, and the efficiency is improved to a great extent; and the final result is published by adopting a two-dimensional code, so that the possibilityof information leakage in the publishing process is further reduced.

Description

technical field [0001] The invention belongs to the technical field of privacy protection, and in particular relates to a privacy protection technology in data publishing. Background technique [0002] A social network is a social structure composed of many nodes and edges. Nodes usually refer to individuals or organizations, and the connections between nodes, namely edges, represent the mutual relationship between individuals or organizations. With the rapid development of economy, the application of social network is becoming more and more popular. For example, Tencent, Facebook, etc., through the research on social networks, relevant data researchers can better carry out data mining and analysis. However, some sensitive information may be leaked during the process of publishing the original social network data, which may have a certain impact on users and the social network to some extent. There are a variety of sensitive information in social networks, such as individu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F16/955G06F16/33
CPCG06F21/602G06F21/6254G06F16/9554G06F16/3344
Inventor 王俊伟苏玉永李杰曹景超曹捷
Owner XIEHE HOSPITAL ATTACHED TO TONGJI MEDICAL COLLEGE HUAZHONG SCI & TECH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products