Unlock instant, AI-driven research and patent intelligence for your innovation.

Privacy protection-based budget processing method and device

A privacy protection and processing method technology, applied in the field of budget processing methods and devices based on privacy protection, can solve problems such as consumption of budgets, unavailability of data sets, and unavailability of products, and achieves the effect of ensuring protection strength and continuous availability.

Pending Publication Date: 2022-04-22
ALIBABA GRP HLDG LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

where each query consumes a certain amount of budget
When the total budget is exhausted, the data set corresponding to the total budget is usually unavailable, which in turn leads to the unavailability of the product to which the data set is applied

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection-based budget processing method and device
  • Privacy protection-based budget processing method and device
  • Privacy protection-based budget processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The specification will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. The described embodiments are only some of the embodiments in this specification, not all of them. Based on the embodiments in this specification, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present application.

[0044] It should be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings. In the case of no conflict, the embodiments in this specification and the features in the embodiments can be combined with each other.

[0045] As mentioned above, in differential privacy protection, in order to limit the number of queries on the dataset ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a budget processing method and device based on privacy protection, and one specific implementation mode of the method comprises the steps that a budget recovery request for a target data set is received, and the target data set corresponds to a budget consumption accumulated value of privacy protection; according to the budget recovery request, at least one budget consumption record corresponding to the target data set is obtained, and a single budget consumption record comprises a budget consumption value generated by single query for the target data set; and for the obtained budget consumption record, if the budget consumption record meets the budget recovery condition, reducing the budget consumption value in the budget consumption record from the budget consumption accumulated value.

Description

technical field [0001] The embodiments of this specification relate to the field of information security, and in particular, relate to a budget processing method and device based on privacy protection. Background technique [0002] With the rapid development of information technology and Internet technology, personal data is continuously collected, used and analyzed. Data analysis and data mining applications can help people better understand business and data, but the adverse effect is that individual private data is leaked in the process. In order to prevent personal privacy data from being leaked during the process of data collection and analysis, it is necessary to protect the individual privacy of the data collector when publishing and analyzing the data. [0003] In practice, various privacy protection algorithms with budget control and management capabilities can be used to protect individual privacy, such algorithms may include but not limited to differential privac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06Q10/06
CPCG06F21/6245G06Q10/063
Inventor 高爱强梁爱平张信媛刘巍然原攀峰宋百灵
Owner ALIBABA GRP HLDG LTD