Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A data fusion method and device

A data fusion and data technology, applied in the computer field to prevent leakage, reduce trust costs, and improve efficiency

Active Publication Date: 2021-09-24
TONGDUN HLDG CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, in the scenario of big data fusion computing, when performing data fusion computing on the confidential data of parties with confidential resources and data, a third-party organization with mutual credit must be endorsed to realize the data transmission. The risk that a non-data owner can obtain non-owned confidential resource data by obtaining the endorsement of a third-party organization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data fusion method and device
  • A data fusion method and device
  • A data fusion method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] refer to figure 1 , shows a flow chart of the steps of an embodiment of a data fusion method of the present invention, the method may specifically include the following steps:

[0062] Step 101, the security fusion platform receives a data fusion task sent by a first terminal.

[0063] In the embodiment of the present invention, the data fusion task is configured based on actual needs when the first terminal needs to obtain fusion data, wherein the data fusion task includes a plurality of resource data for query Identification information and fusion configuration information for determining fusion parameters. The security fusion platform is a server dedicated to data fusion set up by technicians in an isolated deployment environment to realize the embodiment of the present invention. The first terminal is a data provider that communicates with the security fusion platform and has data fusion service requirements. The data fusion platform is connected to multiple data ...

Embodiment 2

[0071] refer to figure 2 , which shows a flow chart of the steps of another data fusion method embodiment of the present invention, the method may specifically include the following steps:

[0072] In step 201, the security fusion platform receives a data fusion task sent by a first terminal.

[0073] For step 201, refer to step 101, which will not be repeated here.

[0074] Step 202, obtain corresponding resource data in the blockchain according to the data fusion task.

[0075] For step 202, refer to step 102, which will not be repeated here.

[0076] refer to image 3 , the step 202 may include:

[0077] Step 2021, obtain corresponding data fingerprints according to the data fusion task.

[0078] In the embodiment of the present invention, the data fingerprint is a hash value corresponding to the resource data. The data fusion task includes an identifier of the resource data that needs to be fused, and the corresponding data fingerprint is searched and queried accord...

Embodiment 3

[0107] refer to Figure 6 , which shows a structural block diagram of an embodiment of a data fusion device 30 of the present invention, which may specifically include the following modules:

[0108] The receiving module 301 is used for the security fusion platform to receive the data fusion task sent by the first terminal.

[0109] The acquiring module 302 is configured to acquire corresponding resource data in the blockchain according to the data fusion task.

[0110] The fusion module 303 is configured to perform data fusion on the resource data to obtain fusion data. And delete said resource data.

[0111] An embodiment of the present invention provides a data fusion device, which includes: a receiving module, used for a security fusion platform to receive a data fusion task sent by a first terminal. An acquisition module, configured to acquire corresponding resource data in the blockchain according to the data fusion task. A fusion module, configured to perform data f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention provides a data fusion method and device, the method includes: the security fusion platform receives the data fusion task sent by the first terminal; obtains the corresponding resource data in the block chain according to the data fusion task; performing data fusion on the resource data to obtain fused data, and deleting the resource data. The embodiment of the present invention builds a secure computing environment through the blockchain, provides effective credible proof for data fusion, makes confidential data and fusion processing programs available and invisible, prevents data leakage, and reduces the trust of data fusion participants Cost, improve the efficiency of data fusion.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a data fusion method and device. Background technique [0002] In recent years, big data computing has brought revolutionary breakthroughs in various fields such as scientific research, business, and industry, and the related technologies and services of big data have also made great progress. [0003] At present, in the scenario of big data fusion computing, when performing data fusion computing on the confidential data of parties with confidential resources and data, a third-party organization with mutual credit must be endorsed to realize the data transmission. A risk that a non-data owner can obtain non-owned confidential resource data by obtaining the endorsement of a third-party organization. Therefore, how to prevent multi-party confidential resource data from being obtained by non-data owners during the data fusion process is an urgent problem to be solved in this indu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06Q20/38
Inventor 贺小佼
Owner TONGDUN HLDG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products