Unlock instant, AI-driven research and patent intelligence for your innovation.

Personal information de-identification method and device and electronic equipment

A technology of personal and biometric information, applied in the field of information security, can solve problems such as link attacks, background knowledge attacks, and personal information leakage, and achieve the effects of preventing leakage, protecting usability, and resisting re-identification attacks

Pending Publication Date: 2022-01-14
CHINA MOBILE COMM GRP CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing technology has the following two problems: First, although the current de-identification technology makes it difficult to identify the individual corresponding to the information, the availability of quasi-identifiers and sensitive data is also damaged, which is not conducive to data analysis; second, the current The de-identification technology has a high risk of re-identification, that is, personal information after de-identification is vulnerable to re-identification attacks, such as link attacks, background knowledge attacks, etc., resulting in personal information leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Personal information de-identification method and device and electronic equipment
  • Personal information de-identification method and device and electronic equipment
  • Personal information de-identification method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to better understand the technical solutions of the present application, the embodiments of the present application will be described in detail below in conjunction with the accompanying drawings.

[0023] It should be clear that the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0024] The terms used in the embodiments of the present application are only for the purpose of describing specific embodiments, and are not intended to limit the present application. The singular forms "a", "said" and "the" used in the embodiments of this application and the appended claims are also intended to include plural forms unless the context clearly indicates otherwise.

[0025] figure 1 It is a flowchar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a personal information de-identification method and device and electronic equipment, and relates to the technical field of information security. According to the method, biological characteristic information of a user accessing target data is acquired, and a biological characteristic value is generated; the method also includes segmenting the biological characteristic value according to an association relationship among data included in the target data to obtain a plurality of sub biological characteristic values; and respectively establishing a corresponding relationship between each data in the target data and the plurality of sub-biological characteristic values, determining a data transformation position according to a data position mapped by the sub-biological characteristic values, and performing position transformation on each data in the target data. Through data position transformation, the relevance between the data with the association relationship is kept, so that the availability of the data is protected, and meanwhile, the relevance between the data without the association relationship is broken, so that the personal information de-identification is realized, the re-identification attack is effectively resisted, and the leakage of the personal information of the user is prevented.

Description

【Technical field】 [0001] The present application relates to the technical field of information security, and in particular to a personal information de-identification method, device and electronic equipment. 【Background technique】 [0002] With the rapid development of information technology and big data applications, more and more people realize the value of data and realize the great significance of data open sharing. However, the open sharing of data also brings about the issue of personal information security protection. The data collected by government agencies, enterprises, and other organizations usually contains information such as personal names, phone numbers, and ID numbers. If the collected original data is directly released, it will lead to serious personal information leakage. [0003] De-identification of personal information refers to the process of removing a set of identifiable data and the associated relationship between individuals corresponding to the d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32
CPCG06F21/32
Inventor 于乐江为强袁捷张峰李祥军
Owner CHINA MOBILE COMM GRP CO LTD