Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information privacy protection method oriented to DIKW model driving

A privacy protection, model-driven technology, applied in the direction of digital data protection, can solve frequent privacy, privacy theft, harm and other problems, to achieve the effect of protecting user privacy

Pending Publication Date: 2022-04-15
HAINAN UNIVERSITY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, there may be a lot of sensitive content in these resources, including important personal privacy data and information, for example, patient health data collected by major hospitals, user location information collected by using GPS protocol applications, etc., these Sensitive resources themselves and the new sensitive resources formed after the correlation and fusion of related resources may lead to more frequent privacy leaks and privacy theft with more concealed and diverse data collection, storage and data mining, resulting in greater harm and impact , sparking widespread concerns and concerns about privacy
In the existing technology, the original type of resources released through the network and other channels without any processing has great risks in privacy protection. At present, the way to protect private resources is mostly manual decision-making. For example, by Administrators of virtual communities manually encrypt and protect private resources, which is less efficient and prone to errors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information privacy protection method oriented to DIKW model driving
  • Information privacy protection method oriented to DIKW model driving

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the objects, technical solutions, and advantages of the present invention, an example embodiment according to the present invention will be described in detail below with reference to the accompanying drawings. Obviously, the described embodiments are merely embodiments of the invention, rather than all embodiments of the present invention, which will be appreciated that the present invention is not limited by the example embodiments described herein. Based on the embodiments described in the present invention, those skilled in the art should fall within the scope of the present invention without paying creative labor.

[0025] In the following description, a large amount of specific details are given to provide a more thorough understanding of the present invention. However, it will be apparent to those skilled in the art that the present invention can be implemented without one or more of these details. In other examples, in order to avoid confusion with ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an information privacy protection method for DIKW model driving, which comprises the following steps: S1, according to contents directly or indirectly generated by a target individual object in a network, establishing a DIKWP model of the target individual object, the DIKWP model of the target individual object comprising a DIKWP model of a visitor and a DIKWP model of a visited person; s2, performing essential calculation or differential calculation on the type resources in the visited person, judging whether the corresponding type resources are privacy resources or not based on a calculation result, executing a privacy protection strategy based on the privacy resources, and establishing a privacy DIKWP model; s3, the access request of the visitor is analyzed based on the DIKWP model of the visitor, the intention of the visitor is obtained, the DIKWP model of the interviewee judges whether the visitor has the corresponding privacy access permission or not based on the intention of the visitor, and if yes, privacy resources are searched for in the privacy DIKWP model.

Description

Technical field [0001] The present invention relates to the field of data privacy protection, in particular to information privacy protection methods driven for DIKW models. Background technique [0002] With the broad popularity of the Internet and the advent of big data age, there has been a variety of resources with huge commercial value and social value, people can get huge benefits from these resources, but with increasing amounts of accumulation, people are increasing It is necessary to work hard to achieve a variety of purposes, including sharing content resources and corresponding privacy protection. At the same time, there may be a large number of sensitive content in these resources, including important personal privacy data and information, such as patient health care data collected by major hospitals, using the user location information collected by the Global Positioning System Protocol application, these Sensitive resources itself and new sensitive resources formed ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
Inventor 段玉聪宋蒙蒙
Owner HAINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products