Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data processing method and device for realizing privacy protection

A privacy protection and data processing technology, applied in the field of data security, can solve problems such as leakage of user privacy, leakage of user privacy, illegal raw sensor data, etc., and achieve the effects of ensuring user privacy security, high availability, and preventing leakage

Active Publication Date: 2020-07-31
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the abundance of raw sensor data also brings the risk of leaking user privacy. For example, users want to protect their privacy, such as gender, age, and certain personal behaviors (such as smoking), but some apps may Illegal or malicious use and speculation of raw sensor data, resulting in leakage of user privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and device for realizing privacy protection
  • Data processing method and device for realizing privacy protection
  • Data processing method and device for realizing privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The solutions provided in this specification will be described below in conjunction with the accompanying drawings.

[0030] The embodiment of this specification discloses a data processing method for realizing privacy protection. By desensitizing raw sensor data, the protection of user-specific private information can be realized. Specifically, with the rise of machine learning, the inventor thought that machine learning technology can be applied to the technical field of data privacy and security, by training a machine learning model for desensitizing raw sensor data (hereinafter referred to as data desensitization sensitive model) to protect data privacy.

[0031] figure 1 A diagram showing a training implementation architecture diagram of a data desensitization model according to an embodiment, such as figure 1 As shown, for multiple sensors included in the user terminal ( figure 1 N is shown in , N is an integer greater than 1), each sensor performs data collect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a data processing method for realizing privacy protection, which comprises the following steps of: firstly obtaining a plurality of pieces of original sensor data collected by a plurality of terminal sensors to form an original data record, and obtaining a corresponding service label for a user; then, judging whether the original data record contains sensitive sensor data for reflecting a specific privacy behavior of the user or not; if yes, performing corresponding local replacement by utilizing neutral data to obtain a desensitized data record, and inputting the original data record into a data desensitization model to obtain a desensitization processing result; further, on one hand, based on the desensitization processing result and the desensitized data record, determining desensitization processing loss, and on the other hand, inputting the desensitization processing result into a pre-trained service prediction model to obtain a service prediction result, and determining service prediction loss according to the service prediction result and the service label; and training the data desensitization model based on the desensitization processing loss and the service prediction loss.

Description

technical field [0001] One or more embodiments of this specification relate to the technical field of data security, and in particular, to a data processing method and device for realizing privacy protection. Background technique [0002] At present, there are many sensors embedded in personal smart devices, including accelerometers, gyroscopes, and magnetometers. The application APP installed on smart devices can access the raw data collected by these sensors and process the raw sensor data to Realize the interaction with the user, or calculate the indicator data displayed to the user to help the user understand their own activity or physical state. [0003] However, the abundance of raw sensor data also brings the risk of leaking user privacy. For example, users want to protect their privacy, such as gender, age, and certain personal behaviors (such as smoking), but some apps may Illegal or malicious use and speculation of raw sensor data, resulting in leakage of user pri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62
CPCG06F21/6245
Inventor 李龙飞周俊
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products