Sensor data protection method and system, computer equipment and intelligent terminal

A data protection and sensor technology, applied in the field of information and data security, can solve problems such as application crashes, reduced availability recognition accuracy and accuracy, and realistic data distortion, to eliminate the ability to infer, improve poor real-time performance, and prevent The effect of malicious inference

Pending Publication Date: 2022-07-29
XIDIAN UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (1) The current defense strategies all provide false random data or distorted data such as resampling to the application program, which will inevitably reduce the precision and accuracy of its usability identification, so that the provided data and the real data have a large gap difference, and the false random data is easy to be identified by the service provider, which may cause the crash of the application
Moreover, the current defense strategies are all carried out on the premise of ensuring usability, without considering the privacy protection of the whole life cycle. If the user also needs to protect user background knowledge such as motion information, the current defense strategy cannot effectively protect
[0007] (2) The current simulation data generation method is limited to the use of generative confrontation network to solve the generation problem, and cannot effectively solve the problem of small generated data space; when the number of iterations reaches a certain number, simulation data with high similarity will appear
Moreover, the current simulation data generation method only targets a single sensor when generating data. When the application requires multi-sensor joint judgment, the coordination of multiple sensors cannot be completed, resulting in distortion of the simulation data of the target behavior.
[0008] (3) The existing technology does not consider complete anonymity. When the attacker obtains certain background knowledge, it will affect the protection of user privacy to a certain extent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensor data protection method and system, computer equipment and intelligent terminal
  • Sensor data protection method and system, computer equipment and intelligent terminal
  • Sensor data protection method and system, computer equipment and intelligent terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0098] The sensor data protection method provided by the present invention achieves the privacy protection effect of full life cycle and full anonymity by using the sensor simulation data sequence to replace the sensor data in an all-round way at all times. The sensor data privacy protection method based on multi-sensor immersive data replacement and the multi-sensor immersive data generation method are improved.

[0099] The sensor data privacy protection method of the present invention analyzes the existing differential privacy protection methods for privacy protection, and aims at the limitation of possible user background leakage risks caused by the use of real data processing in the current scheme, and uses highly realistic multi-sensor data for mobile data. Equipment sensors are replaced all the time and in all directions. During the whole process, the server cannot obtain the real data of the user. The server can perform classification tasks such as action classificatio...

Embodiment 2

[0103] The invention is based on the Android terminal sensor data protection method based on multi-sensor simulation data replacement. o The sensor data replacement of the id platform is combined with the simulation data generation method to protect the privacy and security of sensor data from the data generation process of the mobile terminal, and at the same time prevent the malicious theft and analysis of user privacy by third parties on the application server side; the details include the following step:

[0104] Step 1, action sequence generation: use the random walk algorithm based on the Markov chain Monte Carlo method to construct a state transition matrix according to the action ratio preset by the user, so as to realize the generation of false action action sequences; use the Monte Carlo method to construct The Markov transition matrix adopts the transition kernel formula as:

[0105] p(x,x')=q(x,x')α(x,x');

[0106] where q(x, x') is called the proposal distributi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of information data security, and discloses a sensor data protection method and system, a computer device and an intelligent terminal, a random walk algorithm and a training method of a generative adversarial network are adopted, a user does not need to define a specific action sequence or consume local computing resources to perform data synthesis, and the user experience is improved. A user only needs to define the proportion of each action before use and then submits predefined data to a cloud server, the cloud server completes action sequence construction and multi-sensor simulation data generation, and a simulation data set formed by combination of the simulation data and the action sequence is submitted to a request initiator, so that the action sequence and the multi-sensor simulation data are generated. And decomposing the simulated data set by the request initiator, and replacing local sensor interface data by using a Hook method, thereby finally achieving the effect of complete anonymization on the multiple sensors of the mobile equipment.

Description

technical field [0001] The invention belongs to the technical field of information data security, and in particular relates to a sensor data protection method, system, computer equipment and intelligent terminal. Background technique [0002] With the development of the mobile Internet, the integration of new technologies such as smart terminals and location services has spawned unprecedented development of mobile applications and services. Sensors embedded in personal smart devices bring users a convenient experience in customized mobile applications. Like accelerometers, gyroscopes, and magnetometers, the data produced can be used to monitor the user's physical activity, interactions, and emotions. Apps installed on wearable devices can obtain raw sensor data to make inferences for tasks such as gesture recognition or activity recognition. Existing research shows that motion sensors can be used as a medium for side-channel attacks to steal sensitive user input, obtain us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06K9/62G06N3/04G06N3/08
CPCG06F21/6254G06N3/088G06N3/044G06F18/213G06F18/22G06F18/24
Inventor 朱辉文浩斌李晖王枫为薛行策张璇
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products