Unlock instant, AI-driven research and patent intelligence for your innovation.

Privacy data protection method and device

A privacy data, data technology, applied in the field of network security, can solve the problem of inability to reliably guarantee the security of user privacy data

Pending Publication Date: 2021-03-23
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the process of Internet application, a large amount of indirect identity data related to users, such as address information, will be involved. Some lawless persons will comprehensively analyze the direct identity data of users through these indirect identity data. The method cannot reliably guarantee the security of the user's private data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy data protection method and device
  • Privacy data protection method and device
  • Privacy data protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0100]In recent years, with the development of the Internet, it has become easier and easier to obtain user data. For example, on various social platforms, face images, location data, nicknames, etc. posted by users can be obtained. Although the user's identity data (name, ID card, etc.) cannot be obtained directly from data such as face images and positioning data, but if a certain amount of such data is obtained, the attacker can infer the user's identity with a high probability data. For example, once an assailant has mastered some identity data-non-identity data (such as mastering a person's ID card, he knows the person's address, and at this time the ID card-address forms a data pair) associated database. Combined with the non-identity data crawled from the Internet, the user's identity data can be reversely located and queried. For example, the attacker knows that Zhang San lives in community A, works as a staff member in company B and often goes to restaurant C for co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a privacy data protection method and device. The method of the embodiment includes: firstly, obtaining historical data uploaded by a target user on a target platform; then, extracting identity data and identity correlation data from the historical data, the identity data are data uniquely corresponding to the identity of the user, and the identity correlation data are data capable of speculating the identity of the user; then, analyzing the extracted identity data and the identity correlation data, and determining a privacy disclosure risk level of thetarget user on the target platform according to an analysis result; and finally, according to the privacy disclosure risk level, performing data desensitization processing on the data uploaded by thetarget user on the target platform.

Description

technical field [0001] One or more embodiments of this specification relate to the technical field of network security, and in particular, to a method and device for protecting private data. Background technique [0002] Internet technology is an important pillar for social development and progress. However, while Internet technology brings high-quality services to people, the problem of user privacy data leakage has become more and more serious, which not only greatly reduces the user experience, but also brings economic losses to users, and even threatens users. personal safety. Therefore, in Internet technologies, it is of great significance to protect the privacy data of users. [0003] At present, the method for protecting private data usually adopts a strong privacy data protection method, that is, to protect the direct identity data of the user such as the ID number. However, in the process of Internet application, a large amount of indirect identity data related t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06K9/00G06K9/62
CPCG06F21/6254G06V40/172G06V40/168G06F18/23G06F18/214
Inventor 曹佳炯丁菁汀
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD