Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A fraudulent data sharing method, system and medium

A data sharing and data technology, applied in database management systems, data processing applications, structured data retrieval, etc., can solve problems such as inappropriate data sharing and exchange involving fraud, avoid short-board effects, enhance governance effectiveness, and improve governance effect of the system

Active Publication Date: 2022-03-04
CHINA ACADEMY OF INFORMATION & COMM
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, existing solutions are mainly designed for sharing and exchanging systems based on data characteristics in their respective fields, such as Internet of Things data, agricultural data, etc., or shared data platforms using blockchain technology, but they are not suitable for fraudulent data sharing and exchange. Requirements, such as data security, privacy protection, heterogeneous real-time concurrent input, content availability, personalized sharing and exchange methods, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A fraudulent data sharing method, system and medium
  • A fraudulent data sharing method, system and medium
  • A fraudulent data sharing method, system and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024]In order to enable those skilled in the art to better understand the technical solutions of the present disclosure, the present disclosure will be described in detail below in conjunction with the accompanying drawings and specific embodiments. Embodiments of the present disclosure will be described in further detail below in conjunction with the accompanying drawings and specific embodiments, but are not intended to limit the present disclosure. For the various steps described herein, if there is no need for a contextual relationship between each other, the order described herein as an example should not be considered as a limitation, and those skilled in the art will know that the order can be adjusted, as long as It is enough not to destroy the logic between them so that the whole process cannot be realized.

[0025] figure 1 A schematic diagram showing a fraud-related data sharing and exchange platform according to an embodiment of the present disclosure, as shown i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure relates to a fraud-related data sharing method, system and medium. The method includes: step S1, receiving in parallel the fraud-related data uploaded by the first user via multiple nodes in real time; step S2, analyzing the fraud-related data, and performing an analysis on the fraud-related data based on the metadata of the fraud-related data Store; step S3, receive the query request of the second user in parallel in real time via the multiple nodes, and find the fraud-related data corresponding to the query request based on the query request; and step S4, according to the query request corresponding to the Metadata of fraudulent data, credit rating of the second user, and send fraudulent data meeting predetermined conditions to the second user; wherein, both the first user and the second user are authenticated users, and the The metadata includes the privacy level and encryption level of the fraud-related data, and the query request includes the identity information of the second user.

Description

technical field [0001] The present disclosure relates to the field of data sharing, and more specifically, to a fraud-related data sharing method, system and medium. Background technique [0002] At present, telecom network fraud is increasingly shifting to the Internet side, but the current prevention and governance models of the telecom and Internet industries remain relatively independent. Fraudsters have integrated the application of mobile Internet, artificial intelligence and other technical means, and adopted fraud methods such as high confrontation, strong concealment, and fast transfer to form fraudulent networks across borders, making prevention and governance increasingly difficult. In order to improve the governance system and enhance the effectiveness of governance, artificial intelligence and big data technologies are comprehensively used to break through the bottleneck of data circulation in the telecommunications and Internet industries. The big data anti-fra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/176G06F16/25G06F16/27G06Q50/30
CPCG06F16/176G06F16/252G06F16/27G06Q50/30
Inventor 魏薇吴荻杜伟崔现东董亚萍万晓玥
Owner CHINA ACADEMY OF INFORMATION & COMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products