CN111967037A - Data-value-oriented personal data asset management method - Google Patents
Data-value-oriented personal data asset management method Download PDFInfo
- Publication number
- CN111967037A CN111967037A CN201910415442.5A CN201910415442A CN111967037A CN 111967037 A CN111967037 A CN 111967037A CN 201910415442 A CN201910415442 A CN 201910415442A CN 111967037 A CN111967037 A CN 111967037A
- Authority
- CN
- China
- Prior art keywords
- data
- personal
- information
- electronic
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007726 management method Methods 0.000 title abstract description 10
- 238000013523 data management Methods 0.000 claims abstract description 11
- 238000000034 method Methods 0.000 claims abstract description 8
- 230000003993 interaction Effects 0.000 claims abstract description 3
- 230000001360 synchronised effect Effects 0.000 claims abstract 4
- 238000012795 verification Methods 0.000 claims description 10
- 238000013475 authorization Methods 0.000 claims description 8
- 238000012550 audit Methods 0.000 claims description 6
- 238000013500 data storage Methods 0.000 claims description 4
- 230000015572 biosynthetic process Effects 0.000 claims description 2
- 230000002860 competitive effect Effects 0.000 claims description 2
- 230000000694 effects Effects 0.000 claims description 2
- 238000005516 engineering process Methods 0.000 claims description 2
- 238000011156 evaluation Methods 0.000 claims description 2
- 230000002452 interceptive effect Effects 0.000 claims description 2
- 238000011160 research Methods 0.000 claims description 2
- 238000012217 deletion Methods 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 4
- 238000013524 data verification Methods 0.000 description 3
- 239000000047 product Substances 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000009825 accumulation Methods 0.000 description 1
- 230000003190 augmentative effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000013479 data entry Methods 0.000 description 1
- 238000007418 data mining Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002688 persistence Effects 0.000 description 1
- 230000008929 regeneration Effects 0.000 description 1
- 238000011069 regeneration method Methods 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- Tourism & Hospitality (AREA)
- Computing Systems (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Human Resources & Organizations (AREA)
- General Business, Economics & Management (AREA)
- Economics (AREA)
- Primary Health Care (AREA)
- Databases & Information Systems (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to the technical field of data valuation, and discloses a personal data management method for data valuation, which comprises the following steps: the system comprises a personal database PDB, a user data center UDP, a user data bank UDB and data interaction relations with applications such as an E-government affair EG, an E-business EC, a network bank EF, a network social SNS, various APPs and the like. The invention adopts a management method of relatively isolating data information from network application, personal data is mainly stored in a personal database, has an anti-deletion function and can be partially or completely synchronous with a user data center; the personal value-added data can be synchronized to a personal database through the user data bank record; the personal data use condition is recorded, the inquiry and the tracing are convenient, the personal mastery of the data use right is emphasized, the data value is enjoyed, and the personal data record system has the advantages of convenience in use, high safety, high reliability, easiness in implementation and popularization.
Description
Technical Field
The invention relates to the technical field of data valuation, in particular to a data-valuating-oriented personal data asset management method.
Background
With the arrival of the internet big data era, more and more data are needed to be used, formed, managed and published by each person, the basic personal information, the registration information, the account information and the license information are more and more common, and especially, the management of the personal data is not centralized, the data is dispersed in different applications, and the public and private data are mixed, so that the problems of data legal acquisition, user data security, personal data value protection and electronic evidence credit collection are difficult. The general data protection regulation GDPR of the European Union and the personal data protection method DPA of the Netherlands are continuously refined, and increasingly stricter requirements are put forward on personal data security protection. At present, the strong national pace of data in China is advancing rapidly, the problems of user data security, data control right, data value attribution and the like are prominent, and situations such as data counterfeiting, network infringement, illegal application (embezzlement, abuse, tampering and deletion) and the like need to be restrained and solved urgently.
Disclosure of Invention
The invention aims to solve the technical problems that aiming at the technical current situation, the method emphasizes that individuals grasp the data use right and enjoy the data value, provides a new personal data management mode, changes the data query and trace mode, highlights the data value and the electronic evidence, fundamentally inhibits the illegal application of personal information, tracks and protects the personal privacy and realizes the data asset management value.
The technical scheme adopted by the invention for solving the technical problems is as follows: a user data asset management method facing data valuation comprises the following steps: personal database PDB (personal Data base), user Data center UDP (user Data pool), user Data bank UDB (user Data bank), and Data interaction relation with various APPs such as E-government EG (E-government), E-business EC (E-Commerce), Network Finance EF (E-Finance), Network social SNS (social Network service).
The personal data assets are stored in a personal database PDB, and data are stored in an encrypted mode and are isolated from a data terminal and a network. Through a data interface and a network interface of a PC, a data terminal or a mobile phone, a basic Application function BAF (base Application function) is used for data management, synchronization with UDP (user Datagram protocol) data and acquisition of data records of the UDB.
The personal database PDB (personal Data base) is an independent Data storage system, has the characteristics of portability, encryption, easy access and the like, supports hard encryption and soft encryption, and has an independent Data encryption function; the basic application function BAF includes: adding, deleting and modifying data records; setting and recording data synchronization; accessing, certificate, statistics downloading, and uploading data and results; data asset update, etc.
A user Data center UDP (user Data pool) is a supplement of public information resources, can be built by an entity based on national Data center Service or a virtual (cloud) Data center platform DSP (Data Service platform), stores personal Data types including basic information, important Data, a verification certificate, an account list, a digital twin and the like, and supports individuals to store, inquire, update and synchronize Data; the data center platform DSP provides service functions of authentication and authentication, data verification, use tracing and the like of the PDB.
User Data Bank UDB (user Data Bank) is a special functional area for controlling, protecting and delivering personal valuable information (such as research results, credit records, asset information, consumption traces, travel records and the like) in UDP. According to the authorization, the information changes of electronic money, virtual money, electronic points and the like caused by electronic payment are recorded and stored.
Compared with the prior art, the invention is a management method for relatively isolating data information and network application, meets the requirements of national information safety, personal data management, privacy protection, information disclosure, tracking and tracing, data mining and the like, realizes personal data accumulation and data asset valuization, and further promotes digital regeneration and holographic persistence of human individuals based on an information network.
Drawings
Fig. 1 is an architecture diagram of the data-value-oriented personal data asset management method of the present invention.
Fig. 2 is a functional structure diagram of the PDB.
Fig. 3 is a schematic diagram of the functional structure of the DSP.
Fig. 4 is a functional diagram of an application scenario.
Detailed Description
Embodiments of the present invention will be described in further detail below with reference to the accompanying drawings. It will be apparent to one skilled in the art that the present invention may be practiced without these specific details.
Referring to fig. 1, there is shown a data-value-oriented personal data asset management method of the present invention: 1) personal data assets are stored in the PDB and used when identity verification or data updating is needed; 2) the USP is responsible for confirming the legal verification and safety audit of the PDB, the website and the APP, providing warning, a public list and remarking events for the access with risks, storing access and use logs and ensuring fairness, independence and safety; the system is responsible for data verification in UDP and data transmission or data synchronization after authorization; 3) after authorization verification, partial or all data in the personal database PDB can be uploaded to UDP and kept consistent with UDP storage data; 4) when the user or UDP obtains the valuable information of the data, the attribute identifier of the UDP data is changed, the corresponding data is copied to the UDB, and the data related to the value record is stored, recorded or adjusted in the UDB to form log record and storage information change.
The method mainly comprises the following steps: step 101, a user puts forward a network data access or query requirement, and can query and use data in UDP after USP legal verification and security audit; 102, a user links the PDB with a network, and data management and synchronization can be performed through USP verification; 103, when each APP needs to check or use personal data, after USP legal verification and safety audit, sending the data and forming and using logs for related parties to inquire; step 104, after the UDB data changes, the user can perform data query or synchronization after connecting the PDBs.
Referring to fig. 2, the PDB is composed of functional modules such as input/output, electronic identification, data encryption, data storage, BAF application, and the like. The data stored in the PDB includes structured data and unstructured information, and each item of data may be augmented with 5 special attributes: sensitive data si (sensitive information), public data oi (open information), proof mark pm (proof mark), value mark vm (value mark), timing mark tq (time sequence). The basic operations include: 1) inputting data: data entry or voice input is made through the BAF. 2) Storing data: each item of data has 5 specific attribute items such as sensitivity, openness, verifiability, value, time sequence and the like, and the data is defaulted as follows: sensitive, unpublished, unverified, worthless, system time. 3) And (3) maintaining data: data in the PDB can be read, newly added and marked and deleted through the BAF after being decrypted; when a particular attribute item changes, a TQ change is triggered, forming a record. 4) Releasing data: issuing UDP storage data to a required internet information system by authorization, modifying OI identification of PDB data to be public, and increasing log records; and storing a system time sequence identification TQ, and recording information such as a website credible identification, an application software copyright, an ICP license and the like. 5) Synchronizing data: the personal data is subjected to data verification or synchronization with the UDP through the network, and the updated personal data is uploaded to the UDP to be published; performing PM marking on the data passing the verification; and performing VM marking on the value record data.
Referring to fig. 3, the DSP is an entity or virtual (cloud) data center, is composed of functional modules such as authorization authentication, security audit, data management, a database, and log record, and can perform ETL (Extract, transpose, Load) with data. The database is divided into: UDP data area, UDB data area. The main functions include: 1) the personal PDB data is valueless in a UDP (user Datagram protocol) data area, is valuably copied and transferred to a UDB data area, and records data value items, information related to websites or APP (application) and the like. 2) An individual may have 1 or more PDBs with different data information via UDP authorization. 3) In the internet mode, a person uses functions such as EG, EC, EF, SNS, APP, etc. through a PC, a mobile phone, a mobile terminal, and needs to be authenticated through UDP. 4) The requirements of user login, registration, data access and the like are recorded to form a log; the user can issue and announce the loss credit name list through log recording and electronic proof data illegal application and UDP audit verification, thereby avoiding situation expansion and informing related departments to carry out loss credit combined punishment.
Referring to fig. 4, the application scenario includes: the method has the advantages of five aspects of information filling, work creation, media participation, electronic entertainment, product (service) consumption and the like, and two environments of a network and a non-network are considered. The personal data assets formed include: 1) the information filling type means that recorded information is formed by using the requirements of registration, registration application, information filling, questionnaire survey and the like; 2) the work creation category refers to the formation of electronic achievements including characters, sounds, music, images, programs, etc. by using an information system; 3) the media participation category refers to electronic information such as characters, voice and the like issued on a specific platform, and attention, reward and the like are obtained; 4) the electronic entertainment category refers to participating in ranking, competitive and interactive games or activities by ICT, intelligence, multimedia and other technologies to obtain related rewards and points; 5) the product (service) consumption means that the product or service is purchased through an electronic payment mode, and record information such as orders, evaluations, points, credits and consumption is formed. The above scenario requires that the request of personal data should include ICP license information of a website or APP, and requirements for personal data and information; after the user confirms, the formed personal data assets are timely or periodically sent to UDP or PDB for storage in the form of electronic files such as characters, tables, audio and video.
The above is only a preferred embodiment of the present invention, and the protection scope of the present invention is not limited to the above-mentioned embodiments, and all technical solutions belonging to the idea of the present invention belong to the protection scope of the present invention. It should be understood that any modifications, equivalents and improvements within the spirit and principle of the present invention by those skilled in the art should be included within the scope of the present invention.
Claims (6)
1. A personal data management method facing data value is characterized in that: the personal data information is stored in a personal database and can be partially or completely synchronized with the user data center; the personal value-added data can be synchronized to a personal database through the user data bank record; personal data information is relatively isolated from network applications.
2. The personal data management method for data pricing according to claim 1, characterized in that: the personal data management method comprises a personal database PDB, a user data center UDP, a user data bank UDB and data interaction relations with applications such as E-government affairs EG, E-business EC, network finance EF, network social SNS, various APPs and the like.
3. The personal database PDB of claim 2, wherein: the system is composed of functional modules such as input and output, electronic identification, data encryption, data storage, BAF application and the like, and is an independent data storage system; the data comprises structured data and unstructured information, and each item of data can be added with 5 special attributes: sensitive data SI, public data OI, verification identification PM, value identification VM and time sequence identification TQ; the personal database uses a basic application function BAF to perform data management, synchronizes with UDP data and acquires data records of the UDB; the encryption device has the characteristics of portability, encryption, easy access and the like, supports hard encryption and soft encryption, and has an independent data encryption function; the basic application function BAF includes: adding, deleting and modifying data records; setting and recording data synchronization; accessing, certificate, statistics downloading, and uploading data and results; data asset update, etc.
4. The data center platform DSP of claim 2, wherein: the system consists of functional modules such as authorization authentication, security audit, data management, a database, log record and the like, and can be provided with data ETL; the stored personal data category comprises basic information, important data, a certificate of authenticity, an account list, a digital twin and the like, wherein the database is divided into: a UDP data area and a UDB data area; the functions of storing, inquiring, updating and synchronizing data, authenticating and identifying PDBs, verifying data, tracing use and the like of the PDBs are supported.
5. The user data banking, UDB, according to claim 2, wherein: the special function area for controlling, protecting and delivering personal valuable information (such as information of research results, credit records, asset information, consumption traces, travel records and the like) in UDP (user datagram protocol); according to the authorization, the information changes of electronic money, virtual money, electronic points and the like caused by electronic payment are recorded and stored.
6. The personal data asset of claim 3, wherein: the system is formed from five aspects of information filling, work creation, media participation, electronic entertainment, product (service) consumption and the like, and comprises the following components: 1) the information filling type means that recorded information is formed by using the requirements of registration, registration application, information filling, questionnaire survey and the like; 2) the work creation category refers to the formation of electronic achievements including characters, sounds, music, images, programs, etc. by using an information system; 3) the media participation category refers to electronic information such as characters, voice and the like issued on a specific platform, and attention, reward and the like are obtained; 4) the electronic entertainment category refers to participating in ranking, competitive and interactive games or activities by ICT, intelligence, multimedia and other technologies to obtain related rewards and points; 5) the product (service) consumption means that the product or service is purchased through an electronic payment mode, and record information such as orders, evaluations, points, credits and consumption is formed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910415442.5A CN111967037A (en) | 2019-05-18 | 2019-05-18 | Data-value-oriented personal data asset management method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910415442.5A CN111967037A (en) | 2019-05-18 | 2019-05-18 | Data-value-oriented personal data asset management method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111967037A true CN111967037A (en) | 2020-11-20 |
Family
ID=73357640
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910415442.5A Pending CN111967037A (en) | 2019-05-18 | 2019-05-18 | Data-value-oriented personal data asset management method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111967037A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001055921A1 (en) * | 2000-01-28 | 2001-08-02 | Fundamo (Proprietary) Limited | Personal information data storage system and its uses |
CN101587526A (en) * | 2009-05-20 | 2009-11-25 | 北京易路联动技术有限公司 | Real-time authentication method of Internet personal data bank and network-side device |
CN104125290A (en) * | 2014-08-05 | 2014-10-29 | 奥盈琦信信息技术(上海)有限公司 | System and method for realizing collection, management and authorization of personal big data |
CN108596628A (en) * | 2018-04-20 | 2018-09-28 | 黄绍进 | A kind of personal information capitalization implementation method and device |
CN109741800A (en) * | 2018-12-20 | 2019-05-10 | 李秦豫 | The method for security protection of medical data intranet and extranet interaction based on block chain technology |
-
2019
- 2019-05-18 CN CN201910415442.5A patent/CN111967037A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001055921A1 (en) * | 2000-01-28 | 2001-08-02 | Fundamo (Proprietary) Limited | Personal information data storage system and its uses |
CN101587526A (en) * | 2009-05-20 | 2009-11-25 | 北京易路联动技术有限公司 | Real-time authentication method of Internet personal data bank and network-side device |
CN104125290A (en) * | 2014-08-05 | 2014-10-29 | 奥盈琦信信息技术(上海)有限公司 | System and method for realizing collection, management and authorization of personal big data |
CN108596628A (en) * | 2018-04-20 | 2018-09-28 | 黄绍进 | A kind of personal information capitalization implementation method and device |
CN109741800A (en) * | 2018-12-20 | 2019-05-10 | 李秦豫 | The method for security protection of medical data intranet and extranet interaction based on block chain technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11593761B2 (en) | Distributed data store for managing media | |
US20190155997A1 (en) | Content licensing platform, system, and method | |
Konashevych | General concept of real estate tokenization on blockchain: The right to choose | |
JP5383830B2 (en) | Methods for protecting user privacy | |
CN102833346B (en) | Based on cloud sensitive data safety system and the method for storing metadata | |
EP2625820B1 (en) | Private data sharing system | |
US8256014B2 (en) | Content processing device, server device, communication method, and storage medium containing computer program | |
TWI827867B (en) | Blockchain-based file storage device and file access authorization system and method thereof | |
US20080167994A1 (en) | Digital Inheritance | |
US20040221118A1 (en) | Control of access to data content for read and/or write operations | |
KR20050045883A (en) | Content sharing system, content processing apparatus, information processing apparatus, program, recording medium, and content sharing method | |
US11526906B2 (en) | System and method for secure content streaming, governance, fraud prevention, and the embedding artificial intelligence into content | |
CN106055997A (en) | Method and system for applying parental-control policy to media file | |
US20120259635A1 (en) | Document Certification and Security System | |
KR20190041784A (en) | System and method for controlling distribution synchronization access based on blockchain in multicloud environment | |
CN111061982B (en) | News information publishing and managing system based on block chain | |
KR20210037274A (en) | Apparatus and method for managing contents | |
CN110866222A (en) | Digital content asset right confirming system and method | |
Zhang et al. | A blockchain-based privacy-preserving framework for cross-social network photo sharing | |
CN111967037A (en) | Data-value-oriented personal data asset management method | |
CN107766700A (en) | Digital publishing system and method for copyright protection | |
CN115514523A (en) | Data security access system, method, device and medium based on zero trust system | |
CN115795405A (en) | Scientific research academic union service system based on union chain and operation method thereof | |
Mendelson-Shwartz et al. | Protecting Street Art Rights Using an NFT-Based System | |
Ramani et al. | Blockchain for digital rights management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20201120 |