Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for protecting user privacy data in application program

A technology for application programs and user privacy, applied in digital data protection, digital transmission systems, transmission systems, etc., can solve problems such as difficult to meet the security sharing and privacy protection requirements of massive data, affect data sharing efficiency, and low performance, and achieve security Security of ownership and privacy, realization of secure sharing, reduction of computing and storage burdens

Active Publication Date: 2022-08-02
SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although some scholars have proposed many user privacy protection schemes, in the face of the application scenarios of massive distributed data, these schemes either have low performance, which seriously affects the efficiency of data sharing; or are only suitable for small-scale data scenarios, which are difficult to meet. Security sharing and privacy protection requirements for massive data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting user privacy data in application program
  • Method and system for protecting user privacy data in application program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] This embodiment provides a method for protecting user privacy data in an application;

[0038] like figure 1 As shown, the protection methods for user privacy data in the application include:

[0039] S100: The data provider encrypts the shareable content of the user's private data in its own application, and uploads it to the blockchain after encryption;

[0040] S200: The data demand side uploads the selected machine learning model and data demand list to the blockchain;

[0041] S300: The blockchain selects matching data from the data provided by the data provider according to the data requirement list, and sends the machine learning model and the matching data to the trusted execution environment;

[0042] S400: The trusted execution environment uses user data to train the machine learning model, and obtains the model training result; the model training result is fed back to the blockchain; the blockchain feeds back the model training result to the data demand sid...

Embodiment 2

[0078] This embodiment provides a protection system for user privacy data in an application;

[0079] like figure 2 As shown in the figure, the protection system for user privacy data in the application program includes: data provider, data demander, blockchain and trusted execution environment;

[0080] The data provider encrypts the shareable content of the user's private data in its own application, and uploads it to the blockchain after encryption;

[0081] The data demand side uploads the selected machine learning model and data demand list to the blockchain;

[0082] According to the list of data requirements, the blockchain selects matching data from the data provided by the data provider, and sends the machine learning model and matching data to the trusted execution environment;

[0083] The trusted execution environment uses user data to train the machine learning model and obtains the model training result; the model training result is fed back to the blockchain;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of secure communication, and discloses a method and a system for protecting user privacy data in an application program, including: a data provider encrypts and processes the shareable content of user privacy data in its own application program, and uploads it to a region after encryption. Block chain; the data demand side uploads the selected machine learning model and data demand list to the block chain; the block chain selects the matching data from the data provided by the data provider according to the data demand list, and matches the machine learning model with the matching data. The trusted execution environment uses the user data to train the machine learning model to obtain the model training results; the model training results are fed back to the blockchain; the blockchain feeds back the model training results to the data requirements end; the data demand end receives the model training results.

Description

technical field [0001] The invention relates to the technical field of secure communication, in particular to a method and system for protecting user privacy data in an application program. Background technique [0002] The statements in this section merely provide background related to the present disclosure and do not necessarily constitute prior art. [0003] In the era of digital economy, network information transmission has become a part of people's lives, and information is more and more inseparable from our lives. In the era of big data, almost everyone is connected through data and networks. APP has flourished with the momentum of the mobile Internet, and has collected a large amount of data, including personal privacy such as personal shopping records, social information, and personal health information. APP operators improve service quality, increase the number of new downloads, and avoid user loss by analyzing user data, product iteration, new function launch, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/14H04L9/08G06N20/00G06F21/62
CPCH04L63/0407H04L63/045H04L9/14H04L9/0825G06F21/6263G06N20/00
Inventor 王连海孟令云王英龙徐淑奖
Owner SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN