Private information protection system based on big data
A technology for private information and protection systems, applied in digital data protection, electronic digital data processing, instruments, etc., can solve problems such as inconvenient viewing, inconvenient, inconvenient information, and direct click to view
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0098] The data analysis unit retrieves the private information from the storage database to form a set of private information storage times Q={5,3,8,12,6,8,5,3};
[0099] The data analysis unit calculates the average times according to the following formula:
[0100]
[0101] Wherein, Z=6.25 represents the average number of occurrences of the marked keywords in the storage database;
[0102] When Z≥z=5, it indicates that the user pays attention to the protection of private information, and the verification unit completes the verification of private information, and z=5 represents the set threshold value, so that further analysis can be carried out according to the user's recent situation Is it necessary to protect private information so that it can be more in line with the current usage habits of users.
Embodiment 2
[0104] After the two-dimensional model building unit establishes the two-dimensional model, the position judgment smart bracelet performs real-time positioning on the coordinate values (X, Y) of the user in the plane rectangular coordinate system of the two-dimensional model to form the coordinates of the user in the plane rectangular coordinate system Value set P={(X 1 ,Y 1 ),(X 2 ,Y 2 ),(X 3 ,Y 3 ),...,(X n ,Y n )}, predict the user's trajectory and direction according to the following formula:
[0105]
[0106] Among them, θ=33.7° represents the acute angle value of the angle between the user's travel trajectory and the X-axis or Y-axis, and X i Indicates the coordinate value on the X axis at the i-th positioning, Y i Indicates the coordinate value on the Y axis at the i-th positioning, X i+1 Indicates the coordinate value on the X axis during the i+1th positioning, Y i+1 Indicates the coordinate value on the Y axis during the i+1th positioning;
[0107] Cal...
Embodiment 3
[0117] The time recorded by the time recording unit for the user to view the private information after decrypting the private information is T 1 , the time recording unit stores the time of each user viewing the decrypted private information into the storage database to form a set T of viewing private information time 1集 ={15,25,18,28,30,15,12,16,19,21,30,15};
[0118] Calculate the average time for each user to view the decrypted private information according to the following formula
[0119]
[0120] It indicates that the user has not checked the private information in time, and the private information storage unit stores the private information again, wherein b=10 represents the set range threshold.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


