CN105260937A - Audience data safe and controllable transaction method - Google Patents

Audience data safe and controllable transaction method Download PDF

Info

Publication number
CN105260937A
CN105260937A CN201510784079.6A CN201510784079A CN105260937A CN 105260937 A CN105260937 A CN 105260937A CN 201510784079 A CN201510784079 A CN 201510784079A CN 105260937 A CN105260937 A CN 105260937A
Authority
CN
China
Prior art keywords
data
user
request
demand
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510784079.6A
Other languages
Chinese (zh)
Inventor
汤奇峰
宁绍军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zamplus Technology Development Co Ltd
Original Assignee
Shanghai Zamplus Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zamplus Technology Development Co Ltd filed Critical Shanghai Zamplus Technology Development Co Ltd
Priority to CN201510784079.6A priority Critical patent/CN105260937A/en
Publication of CN105260937A publication Critical patent/CN105260937A/en
Pending legal-status Critical Current

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides an audience data safe and controllable transaction method. The method comprises the steps of transmitting a data agreement key from a data provider to a data demand side, conducting the irreversible label treatment on user data by the data provider, initiating a data request to a data transaction platform by the data demand side, sending the data request to the data provider by the data transaction platform, searching the user data to conduct the dual encryption on the user data based on the data agreement key and a random key by the data provider, transmitting the encrypted user data and the random key to the data transaction platform by the data provider, transmitting the data to the data demand side by the data transaction platform, sending the reception acknowledgement information to the data transaction platform by the data demand side, sending the random key to the data demand side by the data transaction platform, and decrypting the user data based on the data agreement key and the random key by the data demand side. The above method is safe in data transmission. Meanwhile, the problem that the above two parties are usually not inconsistent in the number of transaction can be solved.

Description

The controlled method of commerce of a kind of audience data safety
Technical field
The present invention relates to data transmission, data sharing, data trade field, the audience data method of commerce that particularly a kind of general safety is controlled.
Background technology
Based on property, strategic assets large data, both for economic base transformation, also for superstructure transformation, become the strategic action of the world's multinational General Promotion state treatment ability.
Along with the application and development of the new networks such as Internet of Things, cloud computing, mobile Internet is with universal, social informatization process enters data age, and generation and the circulation of mass data become normality.Following 20 years, realization was networked by the whole world 5,000,000,000 people " everybody has terminal, can surf the Net, constantly in link everywhere ", and this will make global metadata amount be geometric quick growth.Expect the year two thousand twenty, global metadata use amount will reach about 40ZB (1ZB,=10 hundred million TB) will contain socio-economic development every field, become new important driving force.
Large data age, most data is all uncorrected data, these uncorrected data major embodiments are that user's internet log detail (comprises the timestamp of online, ID account, source IP address, target ip address, browse network address, concrete longitude and latitude address etc.), under subscribers feeder, transaction details (comprises ID account during customer transaction, timestamp, concrete longitude and latitude address, website, buy merchandise news, the amount of money etc.), user trajectory detail (comprises the browsed webpage of user and content thereof, information to be transacted, Cancel Transaction information, complete transaction information etc.), these data all relate to privacy of user, transaction can not be used for.And also there is much unsafe hidden danger in available data transaction.
Summary of the invention
The object of the invention is the privacy of user problem that the deficiency in order to solve due to existing method, technology causes and problem data sharing being caused to obstruction.
The invention provides the controlled method of commerce of a kind of audience data safety, at least comprise the following steps:
Step 1, data supplier by offline mode by data convention key delivery to demand data side, and set the key term of validity with demand data side.
Step 2, data supplier carries out irreversible labeling process to user data; Labeling process to refer to sensitive datas such as the behavior events of user by processing process, be converted into dimension, the description label of recapitulative, finite segmenting, but a concrete people can not be orientated as by these labels; Irreversible referring to can not go out raw data according to the results presumption of label, and irreversible labeling is a kind of process to private data, sensitive data desensitization DecryptDecryption.Privacy-sensitive data are carried out to the distortion of data by desensitization rule, realize the reliably protecting to privacy-sensitive.
Common private data, sensitive data have: name, ID (identity number) card No., address, telephone number, Bank Account Number, email address, cipher type dealing money, concrete personal behavior detail (such as positional information, concrete consumer record, concrete network access behavior).These data all cannot directly be shared, transaction.In order to data can be made to produce maximum value, need these original sensitive datas to be carried out DecryptDecryption, irreversible labeling process.
Step 3, demand data directional data transaction platform initiates request of data.
Step 4, after data trade platform receives request of data, sends to data supplier by request of data.
Step 5, after data supplier receives request of data, resolution data required parameter, and according to data request parameter, inquire about corresponding user data.
Step 6, the random key that data supplier uses the data convention key in step 1 and random algorithm to generate carries out double-encryption to the user data inquired, and by online mode, the user data after encryption and random key is transferred to data trade platform.
Step 7, after data trade platform receives the user data after encryption and random key, by the user data transmission after encryption to demand data side.
Step 8, after demand data side receives the user data after encryption, to data trade platform transmission and reception confirmation.
Step 9, random key is sent to demand data side by online mode after receiving confirmation of receipt information by data trade platform.
Step 10, demand data side uses the data convention key in step 1 and random key to be decrypted user data.
The above-mentioned controlled method of commerce of a kind of audience data safety, wherein, in described step 2, data supplier to the method that user data carries out labeling process is:
Step 2.1, collects the detailed raw data of whole users of own business, includes but not limited to that on subscribers feeder, under data detail, subscribers feeder, data are detailed, customer location track is detailed, business datum.
Wherein, on described subscribers feeder, data detail comprises click, collection on submission form data, line in account, cookie, device number, time, ip, access url, ua, website or app, buys all data item being recorded or retaining such as product is detailed, service detail.
Under described subscribers feeder, data detail comprises purchase-transaction data, property data, membership information under event data under subscribers feeder, line, and under subscribers feeder, event data comprises but is not limited to user's on-line time, geographic position, Activity Type; Under line, purchase-transaction data include but not limited under subscribers feeder purchase-transaction time, geographic position, purchase product information, information on services.
The detailed time interocclusal record for the change of user geographic location of described customer location track.
Described business datum is the form information filled in by website or app or fills in user basic information by business management system.
Step 2.2, according to the user data collected, setting user ID, and carry out tag computation process to user data, use tag attributes to describe user.Described tag attributes includes but not limited to the ascribed characteristics of population, family's attribute, property attributes, inhabitation attribute, social attribute, behavior property, hobby attribute, level of consumption attribute.
Wherein, the ascribed characteristics of population includes but not limited to sex, age bracket, income section, education degree, occupational group; Family's attribute includes but not limited to number of members, teenage quantity, family income section, family's property attribute etc.; Property attributes includes but not limited to that house property grade, car produce grade, financial asset grade etc.; Inhabitation attribute includes but not limited to location classification, cell categories; Social attribute includes but not limited to social degree, social hobby; Behavior property includes but not limited to medium type, the duration paid close attention to.
Step 2.3, by for subsequent use in the storage of subscriber data of labeling to database.
The above-mentioned controlled method of commerce of a kind of audience data safety, wherein, have label dimension values in each tag attributes, described label dimension values is value range or the occurrence at tag attributes place.
The above-mentioned controlled method of commerce of a kind of audience data safety, wherein, in described step 3, the parameter of the request of data that demand data side initiates comprises user ID and tag attributes, the ID quantity of one secondary data request is one or more, and the number of requests of the tag attributes of each ID is one or more.
The above-mentioned controlled method of commerce of a kind of audience data safety, wherein, in described step 4, also comprise: data trade platform resolution data required parameter, judge whether user ID and the tag attributes of request of data meet the requirements, if undesirable, be then converted into satisfactory user ID and tag attributes.
The above-mentioned controlled method of commerce of a kind of audience data safety, wherein, the conversion of user ID is based on ID mapping library, and the different I D type association of same user maps by described ID mapping library.
The above-mentioned controlled method of commerce of a kind of audience data safety, wherein, described step 6 also comprises: data supplier does not inquire corresponding user data, replys demand data side and there is not its user data needed.
Present invention also offers a kind of system for the controlled method of commerce of above-mentioned audience data safety, comprise data supply module, demand data module, data trade module, data transmission module, log analysis statistical module, system-monitoring module, described data supply module comprises database.
Described data supply module is used for user data is carried out to irreversible labeling process, receives request of data, resolution data required parameter, inquiring user data, is encrypted user data; Described demand data module is for initiating request of data, being decrypted user data; Data trade module be used for receiving and transmit request of data, translation data required parameter, request of data count, provide the channel of communication for both parties; Described data transmission module is used for transmission, the record data trade process of user data, and log analysis statistical module is for analyzing transaction implementation status, and system-monitoring module is for monitoring the ruuning situation of this system.
In sum, the present invention compared with prior art, has following advantage:
The present invention adopts the method for double-encryption to user data, respectively by two kinds of different channel modes separately transmission data convention key and random key, and and in double-encryption, data trade platform there is no data convention key, so data trade platform cannot retain the real data in transaction, improve the security of audience data.
Demand data side of the present invention is by data trade platform purchase data, demand data side must to data trade platform request random key after receiving user data, to determine this Transaction Success, solve the problem that both parties (party in request and supplier) transaction count is inconsistent.
The present invention, by by the process of user data labeling, can not touch in privacy of user situation, carries out data transmission safely, shares, and is a kind of online audience data transmission requesting method of real-time, low delay.Demand data can supplement the portrait information of own user easily, according to corresponding user's representation data information, formulates marketing strategy etc.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of the controlled method of commerce of a kind of audience data of the present invention safety.
Fig. 2 is the system schematic realizing the inventive method.
Embodiment
Below in conjunction with accompanying drawing, the specific embodiment of the present invention is described in detail, refer to Fig. 1.
Step 1, data supplier by offline mode by data convention key delivery to demand data side, and set the key term of validity with demand data side, such as one hour, one day, one week, one month, one year etc.Transmission and the user data transmission of data convention key are separated, and can improve the security of data.
Step 2, data supplier carries out irreversible labeling process to user data; Labeling process to refer to sensitive datas such as the behavior events of user by processing process, be converted into dimension, the description label of recapitulative, finite segmenting, but a concrete people can not be orientated as by these labels; Irreversible referring to can not go out raw data according to the results presumption of label.Irreversible labeling is a kind of process to private data, sensitive data desensitization DecryptDecryption.Privacy-sensitive data are carried out to the distortion of data by desensitization rule, realize the reliably protecting to privacy-sensitive.
The concrete grammar of labeling process comprises:
Step 2.1, collects the detailed data of whole users of own business, includes but not limited to that on subscribers feeder, under data detail, subscribers feeder, data are detailed, customer location track is detailed, business datum.
Wherein, on subscribers feeder, data detail comprises click, collection on submission form data, line in account, cookie, device number, time, ip, access url, ua, website or app, buys all data item being recorded or retaining such as product is detailed, service detail.
Under subscribers feeder, data detail comprises purchase-transaction data, property data, membership information etc. under event data under subscribers feeder, line, and under subscribers feeder, event data comprises but is not limited to user's on-line time, geographic position, Activity Type; Under line, purchase-transaction data include but not limited under subscribers feeder purchase-transaction time, geographic position, purchase product information, information on services.
The detailed time interocclusal record for the change of user geographic location of customer location track.
Business datum is the form information filled in by website or app or fills in user basic information etc. by business management system.
Step 2.2, according to the user data collected, setting user ID, carries out tag computation process to user data, uses tag attributes to describe user.
User ID can adopt encryption phone number or email address to represent, also can adopt the cookie in certain territory concrete, concrete device number (as imei, idfa) represents.
Tag attributes includes but not limited to the ascribed characteristics of population, family's attribute, property attributes, inhabitation attribute, social attribute, behavior property, hobby attribute, level of consumption attribute.
Wherein, the ascribed characteristics of population includes but not limited to sex, age bracket, income section, education degree, occupational group; Family's attribute includes but not limited to number of members, teenage quantity, family income section, family's property attribute etc.; Property attributes includes but not limited to that house property grade, car produce grade, financial asset grade etc.; Inhabitation attribute includes but not limited to location classification, cell categories; Social attribute includes but not limited to social degree, social hobby; Behavior property includes but not limited to medium type, the duration paid close attention to.
Have label dimension values in each tag attributes, described label dimension values is value range or the occurrence at user tag attribute place.
Tag expression form is: I-K-V.Wherein, I:ID, represents a concrete audient (user); K:KEY, tag attributes; V:VALUE, label dimension values, can not backstepping raw data, particularly private data by this value value.
Such as pay close attention to according to user, click, buying behavior is translated into the hobby tag attributes of user, label dimension values comprises mountain-climbing, reading, tourism etc.; Concrete occupancy information is converted into inhabitation type tag attributes, label dimension values comprises ordinary residence, high-end residential etc.; According to the tag attributes of user's purchase product information setting customer consumption level, it is low, medium, high that label dimension values comprises the level of consumption.
Again such as, the VALUE at age may be 1,2,3,4. wherein 1 represent 0-19 year, 2 represent 20-25 year, 3 represent 36-45 year, 4 represent more than 45 years old.
According to the requirement setting user tag of demand data side, foregoing can be not limited to.
Step 2.3, by for subsequent use in the storage of subscriber data of labeling to database.
Step 3, demand data directional data transaction platform initiates request of data.
Demand data side is when initiating request of data, and specifically can indicate user ID, can only have a user ID in the ID parameter of single request, also can be multiple user ID, carries out single or searches in batches; Also need the concrete tag attributes such as age bracket, income section, the hobby etc. that provide the user wanting to search simultaneously.
Demand data side adopts online API requesting method, and interface protocol adopts https-secure agreement, and submit to data acquisition POST to submit to, parameter is all placed in inclusion.
Step 4, after data trade platform receives request of data, sends to data supplier by request of data.After data trade platform receives request of data, data trade platform resolution data required parameter, judges whether data request parameter meets the requirements, if meet the requirements, then request of data is sent to data supplier; If undesirable, then after being converted into satisfactory data request parameter, request of data is sent to data supplier.
First data trade platform judges that whether the ID type of asking is consistent with the ID type that data supplier can supply.If consistent, then will send request of data to data supplier; If inconsistent, need the ID value ID value under Source Type (the ID type of demand data side's request) transferred under target type (the ID type that data supply can provide), request of data is sent again to data supplier, ID type conversion is based on ID mapping library, ID mapping library realizes the relationship maps for all kinds of ID of actual nature person, and can realize using one of them ID to go to inquire about another ID.
Data trade platform judges whether user tag attribute exists in a database, if exist, then request of data is transferred to data supplier; If do not exist, then judge whether interesting same or analogous user tag attribute, if having, be then converted into corresponding user tag attribute, if do not have, then required parameter returned to demand data side.
Step 5, after data supplier receives request of data, resolution data required parameter, and according to data request parameter, inquire about corresponding user data.
Step 6, if data supplier does not inquire corresponding user data, then replys demand data side and there is not its user data needed.If data supplier inquires corresponding user data, the random key then using the data convention key in step 1 and random algorithm to generate carries out double-encryption to the user data inquired, and by online mode, the user data after encryption and random key is transferred to data trade platform.Random key is a stochastic production, and every secondary data request generates once.
Step 7, after data trade platform receives the user data after encryption and random key, by the user data transmission after encryption to demand data side.
Step 8, after demand data side receives the user data after encryption, to data trade platform transmission and reception confirmation.
Step 9, random key is sent to demand data side by online mode after receiving confirmation of receipt information by data trade platform, and confirms this data trade success.
Step 10, demand data side uses the data convention key in step 1 and random key to be decrypted user data.
Present invention also offers a kind of system for the controlled method of commerce of above-mentioned audience data safety, refer to Fig. 2, comprise data supply module, demand data module, data trade module, data transmission module, log analysis statistical module, system-monitoring module, data supply module comprises database.
Data supply module realizes detailed for business raw data to carry out irreversible labeling process, is desensitized by data DecryptDecryption, the basis based on irreversible tag processes provides data-query interfaces to transaction platform, and to data double-encryption etc.
Demand data module is for initiating request of data, being decrypted user data.
Data trade module provides data trade market, for data supplier, demand data side provide communication exchange channel, realizes trade contract and reaches.Data providing uses commodity, the order of transaction platform management oneself and carries out data configuration; Demand data side uses transaction platform to search oneself demand data commodity, and can place an order.
Data transmission module in data supplier and demand data side after data trade module reaches order contract, really realize order contract established data transaction transmission, for data providing and demand data side set up data transfer channel, and log recording is carried out in concrete operations in whole process, this module is that the main of the inventive method realizes carrier.
Log analysis statistical module, according to the log recording of data distribution overall process, analyzes transaction implementation status, for both parties provide Data support, statistical study and clearing.
System-monitoring module is for monitoring the ruuning situation of this system.
The present invention adopts the method for double-encryption to user data, respectively by two kinds of different channel modes separately transmission data convention key and random key, and and in double-encryption, data trade platform there is no data convention key, so data trade platform cannot retain the real data in transaction, improve the security of audience data.
Demand data side of the present invention is by data trade platform purchase data, demand data side must to data trade platform request random key after receiving user data, to determine this Transaction Success, solve the problem that both parties (party in request and supplier) transaction count is inconsistent.
The present invention, by by the process of user data labeling, can not touch in privacy of user situation, carries out data transmission safely, shares, and is a kind of online audience data transmission requesting method of real-time, low delay.Demand data can supplement the portrait information of own user easily, according to corresponding user's representation data information, formulates marketing strategy etc.
Above-described embodiment is only for illustration of technological thought of the present invention and feature, its object is to enable those skilled in the art understand content of the present invention and implement according to this, only can not limit the scope of the claims of the present invention with the present embodiment, namely all equal changes of doing according to disclosed spirit or modification, still drop in the scope of the claims of the present invention.

Claims (10)

1. the controlled method of commerce of audience data safety, is characterized in that, at least comprise the following steps:
Step 1, data supplier by offline mode by data convention key delivery to demand data side, and arrange the key term of validity with demand data side's setting data;
Step 2, data supplier carries out irreversible labeling process to user data;
Step 3, demand data directional data transaction platform initiates request of data;
Step 4, after data trade platform receives request of data, sends to data supplier by request of data;
Step 5, after data supplier receives request of data, resolution data required parameter, and according to data request parameter, inquire about corresponding user data;
Step 6, the random key that data supplier uses the data convention key in step 1 and random algorithm to generate carries out double-encryption to the user data inquired, and by online mode, the user data after encryption and random key is transferred to data trade platform;
Step 7, after data trade platform receives the user data after encryption and random key, by the user data transmission after encryption to demand data side;
Step 8, after demand data side receives the user data after encryption, to data trade platform transmission and reception confirmation;
Step 9, random key is sent to demand data side by online mode after receiving confirmation of receipt information by data trade platform;
Step 10, demand data side uses the data convention key in step 1 and random key to be decrypted user data.
2. the controlled method of commerce of a kind of audience data safety according to claim 1, it is characterized in that, in described step 2, data supplier to the method that user data carries out labeling process is:
Step 2.1, collects the detailed raw data of whole users of own business, includes but not limited to that on subscribers feeder, under data detail, subscribers feeder, data are detailed, customer location track is detailed, business datum;
Step 2.2, according to the user data collected, setting user ID, and tag computation process is carried out to user data, use tag attributes to describe user;
Step 2.3, by for subsequent use in the storage of subscriber data of labeling to database.
3. the controlled method of commerce of a kind of audience data safety according to claim 2, it is characterized in that, in described step 2.2, described tag attributes includes but not limited to the ascribed characteristics of population, family's attribute, property attributes, inhabitation attribute, social attribute, behavior property, hobby attribute, level of consumption attribute.
4. the safe controllable transmission of a kind of audience data according to claim 3, is characterized in that, have label dimension values in each tag attributes, and described label dimension values is value range or the occurrence at tag attributes place.
5. the safe controllable transmission of a kind of audience data according to claim 1, it is characterized in that, in described step 3, the parameter of the request of data that demand data side initiates comprises user ID and tag attributes, the ID quantity of one secondary data request is one or more, and the number of requests of the tag attributes of each ID is one or more.
6. the controlled method of commerce of a kind of audience data safety according to claim 5, it is characterized in that, in described step 4, also comprise: data trade platform resolution data required parameter, judge whether user ID and the tag attributes of request of data meet the requirements, if undesirable, be then converted into satisfactory user ID and tag attributes.
7. the controlled method of commerce of a kind of audience data safety according to claim 6, it is characterized in that, the conversion of user ID is based on ID mapping library, and the different I D type association of same user maps by described ID mapping library.
8. the controlled method of commerce of a kind of audience data safety according to claim 1, it is characterized in that, described step 6 also comprises: data supplier does not inquire corresponding user data, replys demand data side and there is not its user data needed.
9. one kind for realize audience data according to claim 1 safety controlled method of commerce system, it is characterized in that, comprise data supply module, demand data module, data trade module, data transmission module, log analysis statistical module, system-monitoring module.
10. system according to claim 8, is characterized in that, described data supply module is used for user data is carried out to irreversible labeling process, receives request of data, resolution data required parameter, inquiring user data, is encrypted user data; Described demand data module is for initiating request of data, being decrypted user data; Data trade module be used for receiving and transmit request of data, translation data required parameter, request of data count, provide the channel of communication for both parties; Described data transmission module is used for transmission, the record data trade process of user data, and log analysis statistical module is for analyzing transaction implementation status, and system-monitoring module is for monitoring the ruuning situation of this system.
CN201510784079.6A 2015-11-16 2015-11-16 Audience data safe and controllable transaction method Pending CN105260937A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510784079.6A CN105260937A (en) 2015-11-16 2015-11-16 Audience data safe and controllable transaction method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510784079.6A CN105260937A (en) 2015-11-16 2015-11-16 Audience data safe and controllable transaction method

Publications (1)

Publication Number Publication Date
CN105260937A true CN105260937A (en) 2016-01-20

Family

ID=55100612

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510784079.6A Pending CN105260937A (en) 2015-11-16 2015-11-16 Audience data safe and controllable transaction method

Country Status (1)

Country Link
CN (1) CN105260937A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105761081A (en) * 2016-02-18 2016-07-13 流量海科技成都有限公司 Data transaction method and data transaction apparatus
CN106203140A (en) * 2016-07-15 2016-12-07 上海数据交易中心有限公司 Data circulation method based on data structure, device and terminal
CN106228084A (en) * 2016-07-19 2016-12-14 北京同余科技有限公司 Data guard method that the sensitive field of based role dynamically adjusts and system
CN107025591A (en) * 2017-03-21 2017-08-08 天津数集科技有限公司 Data trade platform
CN107346511A (en) * 2017-07-04 2017-11-14 贵州数据宝网络科技有限公司 A kind of big data method for secure transactions
CN111062705A (en) * 2019-12-25 2020-04-24 东华理工大学 Online English education big data platform
CN112215619A (en) * 2019-06-24 2021-01-12 徐海波 Traceable data commodity transaction method and transaction platform for protecting data content

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080103982A1 (en) * 2006-06-19 2008-05-01 Ayman Hammad Terminal Data Encryption
CN102075542A (en) * 2011-01-26 2011-05-25 中国科学院软件研究所 Cloud computing data security supporting platform
CN103957109A (en) * 2014-05-22 2014-07-30 武汉大学 Cloud data privacy protection security re-encryption method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080103982A1 (en) * 2006-06-19 2008-05-01 Ayman Hammad Terminal Data Encryption
CN102075542A (en) * 2011-01-26 2011-05-25 中国科学院软件研究所 Cloud computing data security supporting platform
CN103957109A (en) * 2014-05-22 2014-07-30 武汉大学 Cloud data privacy protection security re-encryption method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
乔爱锋 等: "面向大数据服务的数据管理平台体系架构研究", 《第十一届中国通信学会学术年会论文集》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105761081A (en) * 2016-02-18 2016-07-13 流量海科技成都有限公司 Data transaction method and data transaction apparatus
CN105761081B (en) * 2016-02-18 2019-07-05 流量海科技成都有限公司 Data trade method and data trade device
CN106203140A (en) * 2016-07-15 2016-12-07 上海数据交易中心有限公司 Data circulation method based on data structure, device and terminal
CN106203140B (en) * 2016-07-15 2019-03-26 上海数据交易中心有限公司 Data circulation method, device and terminal based on data structure
CN106228084A (en) * 2016-07-19 2016-12-14 北京同余科技有限公司 Data guard method that the sensitive field of based role dynamically adjusts and system
CN107025591A (en) * 2017-03-21 2017-08-08 天津数集科技有限公司 Data trade platform
CN107346511A (en) * 2017-07-04 2017-11-14 贵州数据宝网络科技有限公司 A kind of big data method for secure transactions
CN112215619A (en) * 2019-06-24 2021-01-12 徐海波 Traceable data commodity transaction method and transaction platform for protecting data content
CN112215619B (en) * 2019-06-24 2023-12-22 徐海波 Traceable data commodity transaction method and transaction platform for protecting data content
CN111062705A (en) * 2019-12-25 2020-04-24 东华理工大学 Online English education big data platform

Similar Documents

Publication Publication Date Title
CN105260937A (en) Audience data safe and controllable transaction method
US20110022312A1 (en) Generating and Tracking Activity Patterns for Mobile Devices
US20110022540A1 (en) Location-Based Address Determination and Real Estate Valuation
CN102301362B (en) Requesting offline profile data for online use in a privacy-sensitive manner
US10600088B2 (en) Targeting online ads based on healthcare demographics
JP6391853B1 (en) System and method for improving the accuracy of a position sensor
US9076153B2 (en) Method, medium, and system for detecting data misuse
CN101583937A (en) Developing customer relationships with a network access point
US20130325607A1 (en) Mobile-2-web retargeting
AU2010276134A1 (en) Location-based information retrieval and analysis
WO2023134496A1 (en) Object recommendation method and apparatus, electronic device, and storage medium
US9807150B2 (en) System and method for inserting owned media content into mobile applications
US20240086897A1 (en) Hybrid organizational system for data management and tracking
US10970741B2 (en) Method and system for integrating audience data with a social media site
EP2955879B1 (en) A method and system for providing electronic information to a virtual mailbox based on a geographical address
CN110580637A (en) advertisement putting method, demander platform and computer storage medium
CN105282177A (en) Safe and controllable transmission method of audience data
CN106716401A (en) Data interaction processing method, device and system
KR101530203B1 (en) System and method for panel survey research using network
KR102170016B1 (en) Service Device, System and Method for Providing the Lowest Price Comparison List based on Purchase History Information
CA3026523A1 (en) Information interaction processing method, system and terminal
JP2015197861A (en) Data processing server and computer program
Al-Ani E-Commerce in Arab world and the innovation road to globalization
Almahameed et al. Risk Management of Mobile Commerce Using Social Networks in Jordan
Babic Rethinking online privacy litigation as Google expands use of tracking: Giving meaning to our online browsing and the Federal Wiretap Act

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160120

RJ01 Rejection of invention patent application after publication