Unlock instant, AI-driven research and patent intelligence for your innovation.

Private information protection system based on big data

A technology for private information and protection systems, applied in digital data protection, electronic digital data processing, instruments, etc., can solve problems such as inconvenient viewing, inconvenient, inconvenient information, and direct click to view

Pending Publication Date: 2021-03-12
冉令峻
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the continuous progress of society and the continuous development of science and technology, the information age has gradually integrated into our lives. Under the current social environment, we have to receive and send hundreds of messages a day, and some of these messages are related to Our privacy is related, but in daily life and work, whether it is computer information or mobile phone information, there will be situations where it is inadvertently viewed by others or when you are with others, the pop-up information is inconvenient to directly click to view, because of this If we check the information directly from time to time, it is easy for others to view our private information, which is extremely inconvenient. However, how to judge the private information and prevent the private information from being pushed when it is inconvenient to view the private information has become a huge problem. The problem to be solved, therefore, the present invention provides a private information protection system based on big data. When it is inconvenient to view the private information, the private information is temporarily stored, and when it is judged that the user can view the private information, it is pushed again. User's private information is protected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private information protection system based on big data
  • Private information protection system based on big data
  • Private information protection system based on big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0098] The data analysis unit retrieves the private information from the storage database to form a set of private information storage times Q={5,3,8,12,6,8,5,3};

[0099] The data analysis unit calculates the average times according to the following formula:

[0100]

[0101] Wherein, Z=6.25 represents the average number of occurrences of the marked keywords in the storage database;

[0102] When Z≥z=5, it indicates that the user pays attention to the protection of private information, and the verification unit completes the verification of private information, and z=5 represents the set threshold value, so that further analysis can be carried out according to the user's recent situation Is it necessary to protect private information so that it can be more in line with the current usage habits of users.

Embodiment 2

[0104] After the two-dimensional model building unit establishes the two-dimensional model, the position judgment smart bracelet performs real-time positioning on the coordinate values ​​(X, Y) of the user in the plane rectangular coordinate system of the two-dimensional model to form the coordinates of the user in the plane rectangular coordinate system Value set P={(X 1 ,Y 1 ),(X 2 ,Y 2 ),(X 3 ,Y 3 ),...,(X n ,Y n )}, predict the user's trajectory and direction according to the following formula:

[0105]

[0106] Among them, θ=33.7° represents the acute angle value of the angle between the user's travel trajectory and the X-axis or Y-axis, and X i Indicates the coordinate value on the X axis at the i-th positioning, Y i Indicates the coordinate value on the Y axis at the i-th positioning, X i+1 Indicates the coordinate value on the X axis during the i+1th positioning, Y i+1 Indicates the coordinate value on the Y axis during the i+1th positioning;

[0107] Cal...

Embodiment 3

[0117] The time recorded by the time recording unit for the user to view the private information after decrypting the private information is T 1 , the time recording unit stores the time of each user viewing the decrypted private information into the storage database to form a set T of viewing private information time 1集 ={15,25,18,28,30,15,12,16,19,21,30,15};

[0118] Calculate the average time for each user to view the decrypted private information according to the following formula

[0119]

[0120] It indicates that the user has not checked the private information in time, and the private information storage unit stores the private information again, wherein b=10 represents the set range threshold.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a private information protection system based on big data, which belongs to the technical field of big data, and is characterized in that a private information judgment moduleis used for judging whether currently received information is private information or not; the current scene judgment module is used for judging whether a user can conveniently and directly check private information or not under the current condition; the private information protection module is used for temporarily storing the information after the private information judgment module judges that the private information is the private information; the private information protection inquiry system is scientific and reasonable, safe and convenient to use, and capable of effectively preventing theembarrassing situation that private information received by a user is unintentionally checked by other people or is inconvenient to check immediately when other people are on the scene; the private information of the user can be effectively protected, and unintentional leakage of the private information is avoided.

Description

technical field [0001] The invention relates to the technical field of big data, in particular to a private information protection system based on big data. Background technique [0002] With the continuous progress of society and the continuous development of science and technology, the information age has gradually integrated into our lives. Under the current social environment, we have to receive and send hundreds of messages a day, and some of these messages are related to Our privacy is related, but in daily life and work, whether it is computer information or mobile phone information, there will be situations where it is inadvertently viewed by others or when you are with others, the pop-up information is inconvenient to directly click to view, because of this If we check the information directly from time to time, it is easy for others to view our private information, which is extremely inconvenient. However, how to judge the private information and prevent the privat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6245
Inventor 冉令峻
Owner 冉令峻