Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

System for realizing safe user data acquisition and authorization processing and method thereof

A user data and data collection technology, which is applied in user data collection and the Internet field, can solve problems such as increasing data, relying on data automatic sorting, and target websites to obtain customized data, so as to achieve the effect of protecting user data and reducing the risk of data leakage

Active Publication Date: 2019-08-30
上海富数科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] (1) The third-party data demand company does not have the ability to collect big data, data mining, and automatic correctness verification of a large amount of data, and cannot directly access the target website to obtain customized data. A fourth-party company is required to provide data technology services
[0012] (2) Users cannot complete a large amount of data filling in third-party data companies, nor can they directly connect with third-party data companies, relying on the ability of fourth-party companies to automatically organize data
[0013] (3) The website where user data is stored has a single data format and cannot provide the customized data format required by each third-party data demand company
[0014] However, the existence of the fourth-party data collection service company violates the original intention of the user. In this business process, the user originally only hoped that his data would be used by the target website and the third-party company he wanted, and did not want the data to flow via other sites, as this increases the risk of data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System for realizing safe user data acquisition and authorization processing and method thereof
  • System for realizing safe user data acquisition and authorization processing and method thereof
  • System for realizing safe user data acquisition and authorization processing and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to describe the technical content of the present invention more clearly, further description will be given below in conjunction with specific embodiments.

[0053] The system for realizing safe user data collection and authorization processing of the present invention includes:

[0054] User modules, including SDK units, are used to locally load and run scripts that implement data collection, analysis, and processing functions;

[0055] The fourth-party data acquisition module is connected to the SDK unit and is used to check the update status of the SDK without receiving data streams;

[0056] The user data storage module is connected with the user module and used for storing user data.

[0057] As a preferred embodiment of the present invention, the system also includes:

[0058] The third-party data demand module is connected with the user module and is used to directly request data from the user module and obtain authorization data.

[0059] As a preferr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a system for realizing safe user data acquisition and authorization processing. The system comprises a user module including an SDK unit for locally loading and running a script for realizing data acquisition, analysis and processing functions, a fourth-party data acquisition module which is used for checking the SDK updating state without receiving the data stream, and auser data storage module. The invention also relates to a method for realizing safe user data acquisition and authorization processing. By adopting the system for realizing safe user data acquisitionand authorization processing and the method thereof, the problem that the data of the fourth-party company cannot be directly connected with the third-party data company due to automatic arrangement of the data of the fourth-party company is avoided; and the situation that a customized data format required by each third-party data requirement company cannot be provided for each third-party data requirement company due to a single stored data format is avoided, so that, the user data flow is prevented from passing through other websites, and the data leakage risk is reduced, and the user data is protected.

Description

technical field [0001] The present invention relates to the field of the Internet, in particular to the field of user data collection, and specifically refers to a system and method for realizing safe user data collection and authorization processing. Background technique [0002] In the Internet environment, user data is provided to third-party data demand companies, and fourth-party data collection companies are usually required to provide data-related services such as data collection, cleaning, and mining. [0003] In the prior art, when a user requests a service from a third-party data demand company, the company needs to obtain the user's input process as follows: [0004] (1) The third-party data demand company applies to the fourth-party data collection company to collect user data; [0005] (2) The fourth-party data collection company applies for authorization from the user: authorizes the use of user data; [0006] (3) The user authorizes the data collection compa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62G06F8/65G06F16/2458G06F16/25
CPCG06F21/602G06F21/604G06F21/6227G06F21/6245G06F8/65G06F16/258G06F16/2462
Inventor 曾维朱学政伊世林
Owner 上海富数科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products