Private data identification and processing method and device, equipment and readable medium

A technology of privacy data and identification method, which is applied in the computer field and can solve problems such as privacy data leakage, personal and public security issues, etc.

Active Publication Date: 2020-09-25
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF17 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The leakage and abuse of private data can easily cause various personal and public security issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private data identification and processing method and device, equipment and readable medium
  • Private data identification and processing method and device, equipment and readable medium
  • Private data identification and processing method and device, equipment and readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Privacy data protection can be roughly divided into two parts. First, it is necessary to identify potential private data from the massive data table, and then use various methods to encrypt the identified private data to effectively prevent the leakage of private data. It can be seen that how to effectively identify potential private data from massive data is a prerequisite for privacy data protection. For this reason, it is necessary to provide a method capable of identifying private data.

[0033] The storage form of data can include structured form, semi-structured form or unstructured form. Structured data can be represented and stored in a relational database, in a two-dimensional form, such as data in relational databases and object-oriented databases. Semi-structured data contains related tags to separate semantic elements and layer records and fields. Common semi-structured data, such as XML, JSON, HTML, etc. Unstructured data may be data without a fixed structur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a private data identification and processing method and device, equipment and a computer readable medium. According to the scheme, the method comprises the steps of determining position information and sequence privacy type information of a privacy sequence in multiple pieces of data of a target field by adopting a pre-trained named entity recognition model, wherein the privacy structure types comprise a non-privacy structure type, a single sequence privacy structure type and a composite sequence privacy structure type; further determining a privacy structure type of the target field; and then adding a label used for representing the privacy structure type of the target field to the target field, wherein the label can be used for indicating to adopt a data desensitization mode corresponding to the label to perform desensitization processing on the data of the target field.

Description

Technical field [0001] This application relates to the field of computer technology, and in particular to a method, device, equipment, and computer-readable medium for identifying and processing private data. Background technique [0002] With the rapid development of the Internet of Things and the mobile Internet, data has grown rapidly at a geometric rate, and the rapid development of crawler technology has also exposed data to an uncertain environment. As an important part of the Internet governance system, user information and data protection is the top priority for building a good Internet order. In recent years, user information security has gradually become the focus of public concern. For example, the sale of personal whereabouts record information, hotel accommodation record information, and theft of personal “moments of friends” information in recent years have all exposed the urgent need for user privacy data protection. The leakage and abuse of private data can easi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
CPCG06F21/6245G06F21/6254
Inventor 王德胜贾茜刘洋章鹏刘佳伟张谦
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products