Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A real-time privacy exposure monitoring method for data publishing

A real-time monitoring, data-oriented technology, applied in the field of information security technology and privacy protection, can solve the problem that the data collector cannot obtain valuable information from it, and achieve the effect of avoiding leakage and preventing malicious acquisition.

Inactive Publication Date: 2019-02-05
NANJING UNIV OF POSTS & TELECOMM
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Therefore, the purpose of the present invention is to protect the user's private information from the source, monitor the user's private information during the information release stage, and prevent irreversible impacts, so that the data collector cannot obtain valuable information from it.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A real-time privacy exposure monitoring method for data publishing
  • A real-time privacy exposure monitoring method for data publishing
  • A real-time privacy exposure monitoring method for data publishing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be further described below in conjunction with the accompanying drawings and examples.

[0034] A data release-oriented real-time monitoring method for privacy exposure of the present invention comprises the following steps:

[0035] S1: Obtain user input content;

[0036] S2: Search and match the user input content and obtain the required keywords: decompose the user input content into several individual words according to the grammatical features of Chinese characters, and obtain the corresponding keywords through fuzzy matching and KMP algorithm.

[0037] Among them, the fuzzy matching algorithm is to calculate the edit distance between the sound and the shape of the two Chinese characters respectively. The pinyin of the Chinese character can be obtained directly from the pinyin database. Items with different weights can be accumulated to obtain the editing distance of the word sound; while the glyph is obtained by using the four-corner nu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a privacy exposure real-time monitoring method oriented to data release, the method comprises steps of recording contents input by a user, comparison of characters and judgment of sensitivity;in the first stage, the user input content is obtained through the keyboard interaction interface, In the second stage, the user terminal obtains the corresponding sensitivity level through the keyword searching database and feeds back to the terminal; in the third stage, the user terminal obtains the result returned by the server and executes the corresponding operation, therebyprotecting the privacy information of the user. The invention monitors the input behavior of the user, synthesizes the historical information in the server end database, obtains the corresponding security level and makes the corresponding operation, thereby realizing the effective protection of the user information in the data release stage.

Description

technical field [0001] The invention belongs to the field of information security technology and privacy protection technology, and in particular designs a method for real-time monitoring of data release-oriented privacy exposure. Background technique [0002] With the advancement of science and technology, our society is entering the big data era of data explosion. Everything speaks with data, and data has become the foundation of Internet companies. What is big data? In a general sense, big data refers to the collection of data that cannot be sensed, acquired, managed, processed and served by traditional IT technology and software and hardware tools within a tolerable time. The characteristics of big data can be summarized as four Vs, namely Volume (large volume), Variety (many modes), Velocity (rapid generation) and Value (huge value but low density). [0003] Big data has an extremely important impact in many aspects. In the financial industry, compared with the traditi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/23G06F16/24G06F21/62
CPCG06F21/6245
Inventor 柯昌博陈成张力中吴佳挺
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products