CN111967037A - Data-value-oriented personal data asset management method - Google Patents

Data-value-oriented personal data asset management method Download PDF

Info

Publication number
CN111967037A
CN111967037A CN201910415442.5A CN201910415442A CN111967037A CN 111967037 A CN111967037 A CN 111967037A CN 201910415442 A CN201910415442 A CN 201910415442A CN 111967037 A CN111967037 A CN 111967037A
Authority
CN
China
Prior art keywords
data
personal
information
electronic
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910415442.5A
Other languages
Chinese (zh)
Inventor
刘杰
刘佳鑫
袁健鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201910415442.5A priority Critical patent/CN111967037A/en
Publication of CN111967037A publication Critical patent/CN111967037A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Computing Systems (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Human Resources & Organizations (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Primary Health Care (AREA)
  • Databases & Information Systems (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of data valuation, and discloses a personal data management method for data valuation, which comprises the following steps: the system comprises a personal database PDB, a user data center UDP, a user data bank UDB and data interaction relations with applications such as an E-government affair EG, an E-business EC, a network bank EF, a network social SNS, various APPs and the like. The invention adopts a management method of relatively isolating data information from network application, personal data is mainly stored in a personal database, has an anti-deletion function and can be partially or completely synchronous with a user data center; the personal value-added data can be synchronized to a personal database through the user data bank record; the personal data use condition is recorded, the inquiry and the tracing are convenient, the personal mastery of the data use right is emphasized, the data value is enjoyed, and the personal data record system has the advantages of convenience in use, high safety, high reliability, easiness in implementation and popularization.

Description

Data-value-oriented personal data asset management method
Technical Field
The invention relates to the technical field of data valuation, in particular to a data-valuating-oriented personal data asset management method.
Background
With the arrival of the internet big data era, more and more data are needed to be used, formed, managed and published by each person, the basic personal information, the registration information, the account information and the license information are more and more common, and especially, the management of the personal data is not centralized, the data is dispersed in different applications, and the public and private data are mixed, so that the problems of data legal acquisition, user data security, personal data value protection and electronic evidence credit collection are difficult. The general data protection regulation GDPR of the European Union and the personal data protection method DPA of the Netherlands are continuously refined, and increasingly stricter requirements are put forward on personal data security protection. At present, the strong national pace of data in China is advancing rapidly, the problems of user data security, data control right, data value attribution and the like are prominent, and situations such as data counterfeiting, network infringement, illegal application (embezzlement, abuse, tampering and deletion) and the like need to be restrained and solved urgently.
Disclosure of Invention
The invention aims to solve the technical problems that aiming at the technical current situation, the method emphasizes that individuals grasp the data use right and enjoy the data value, provides a new personal data management mode, changes the data query and trace mode, highlights the data value and the electronic evidence, fundamentally inhibits the illegal application of personal information, tracks and protects the personal privacy and realizes the data asset management value.
The technical scheme adopted by the invention for solving the technical problems is as follows: a user data asset management method facing data valuation comprises the following steps: personal database PDB (personal Data base), user Data center UDP (user Data pool), user Data bank UDB (user Data bank), and Data interaction relation with various APPs such as E-government EG (E-government), E-business EC (E-Commerce), Network Finance EF (E-Finance), Network social SNS (social Network service).
The personal data assets are stored in a personal database PDB, and data are stored in an encrypted mode and are isolated from a data terminal and a network. Through a data interface and a network interface of a PC, a data terminal or a mobile phone, a basic Application function BAF (base Application function) is used for data management, synchronization with UDP (user Datagram protocol) data and acquisition of data records of the UDB.
The personal database PDB (personal Data base) is an independent Data storage system, has the characteristics of portability, encryption, easy access and the like, supports hard encryption and soft encryption, and has an independent Data encryption function; the basic application function BAF includes: adding, deleting and modifying data records; setting and recording data synchronization; accessing, certificate, statistics downloading, and uploading data and results; data asset update, etc.
A user Data center UDP (user Data pool) is a supplement of public information resources, can be built by an entity based on national Data center Service or a virtual (cloud) Data center platform DSP (Data Service platform), stores personal Data types including basic information, important Data, a verification certificate, an account list, a digital twin and the like, and supports individuals to store, inquire, update and synchronize Data; the data center platform DSP provides service functions of authentication and authentication, data verification, use tracing and the like of the PDB.
User Data Bank UDB (user Data Bank) is a special functional area for controlling, protecting and delivering personal valuable information (such as research results, credit records, asset information, consumption traces, travel records and the like) in UDP. According to the authorization, the information changes of electronic money, virtual money, electronic points and the like caused by electronic payment are recorded and stored.
Compared with the prior art, the invention is a management method for relatively isolating data information and network application, meets the requirements of national information safety, personal data management, privacy protection, information disclosure, tracking and tracing, data mining and the like, realizes personal data accumulation and data asset valuization, and further promotes digital regeneration and holographic persistence of human individuals based on an information network.
Drawings
Fig. 1 is an architecture diagram of the data-value-oriented personal data asset management method of the present invention.
Fig. 2 is a functional structure diagram of the PDB.
Fig. 3 is a schematic diagram of the functional structure of the DSP.
Fig. 4 is a functional diagram of an application scenario.
Detailed Description
Embodiments of the present invention will be described in further detail below with reference to the accompanying drawings. It will be apparent to one skilled in the art that the present invention may be practiced without these specific details.
Referring to fig. 1, there is shown a data-value-oriented personal data asset management method of the present invention: 1) personal data assets are stored in the PDB and used when identity verification or data updating is needed; 2) the USP is responsible for confirming the legal verification and safety audit of the PDB, the website and the APP, providing warning, a public list and remarking events for the access with risks, storing access and use logs and ensuring fairness, independence and safety; the system is responsible for data verification in UDP and data transmission or data synchronization after authorization; 3) after authorization verification, partial or all data in the personal database PDB can be uploaded to UDP and kept consistent with UDP storage data; 4) when the user or UDP obtains the valuable information of the data, the attribute identifier of the UDP data is changed, the corresponding data is copied to the UDB, and the data related to the value record is stored, recorded or adjusted in the UDB to form log record and storage information change.
The method mainly comprises the following steps: step 101, a user puts forward a network data access or query requirement, and can query and use data in UDP after USP legal verification and security audit; 102, a user links the PDB with a network, and data management and synchronization can be performed through USP verification; 103, when each APP needs to check or use personal data, after USP legal verification and safety audit, sending the data and forming and using logs for related parties to inquire; step 104, after the UDB data changes, the user can perform data query or synchronization after connecting the PDBs.
Referring to fig. 2, the PDB is composed of functional modules such as input/output, electronic identification, data encryption, data storage, BAF application, and the like. The data stored in the PDB includes structured data and unstructured information, and each item of data may be augmented with 5 special attributes: sensitive data si (sensitive information), public data oi (open information), proof mark pm (proof mark), value mark vm (value mark), timing mark tq (time sequence). The basic operations include: 1) inputting data: data entry or voice input is made through the BAF. 2) Storing data: each item of data has 5 specific attribute items such as sensitivity, openness, verifiability, value, time sequence and the like, and the data is defaulted as follows: sensitive, unpublished, unverified, worthless, system time. 3) And (3) maintaining data: data in the PDB can be read, newly added and marked and deleted through the BAF after being decrypted; when a particular attribute item changes, a TQ change is triggered, forming a record. 4) Releasing data: issuing UDP storage data to a required internet information system by authorization, modifying OI identification of PDB data to be public, and increasing log records; and storing a system time sequence identification TQ, and recording information such as a website credible identification, an application software copyright, an ICP license and the like. 5) Synchronizing data: the personal data is subjected to data verification or synchronization with the UDP through the network, and the updated personal data is uploaded to the UDP to be published; performing PM marking on the data passing the verification; and performing VM marking on the value record data.
Referring to fig. 3, the DSP is an entity or virtual (cloud) data center, is composed of functional modules such as authorization authentication, security audit, data management, a database, and log record, and can perform ETL (Extract, transpose, Load) with data. The database is divided into: UDP data area, UDB data area. The main functions include: 1) the personal PDB data is valueless in a UDP (user Datagram protocol) data area, is valuably copied and transferred to a UDB data area, and records data value items, information related to websites or APP (application) and the like. 2) An individual may have 1 or more PDBs with different data information via UDP authorization. 3) In the internet mode, a person uses functions such as EG, EC, EF, SNS, APP, etc. through a PC, a mobile phone, a mobile terminal, and needs to be authenticated through UDP. 4) The requirements of user login, registration, data access and the like are recorded to form a log; the user can issue and announce the loss credit name list through log recording and electronic proof data illegal application and UDP audit verification, thereby avoiding situation expansion and informing related departments to carry out loss credit combined punishment.
Referring to fig. 4, the application scenario includes: the method has the advantages of five aspects of information filling, work creation, media participation, electronic entertainment, product (service) consumption and the like, and two environments of a network and a non-network are considered. The personal data assets formed include: 1) the information filling type means that recorded information is formed by using the requirements of registration, registration application, information filling, questionnaire survey and the like; 2) the work creation category refers to the formation of electronic achievements including characters, sounds, music, images, programs, etc. by using an information system; 3) the media participation category refers to electronic information such as characters, voice and the like issued on a specific platform, and attention, reward and the like are obtained; 4) the electronic entertainment category refers to participating in ranking, competitive and interactive games or activities by ICT, intelligence, multimedia and other technologies to obtain related rewards and points; 5) the product (service) consumption means that the product or service is purchased through an electronic payment mode, and record information such as orders, evaluations, points, credits and consumption is formed. The above scenario requires that the request of personal data should include ICP license information of a website or APP, and requirements for personal data and information; after the user confirms, the formed personal data assets are timely or periodically sent to UDP or PDB for storage in the form of electronic files such as characters, tables, audio and video.
The above is only a preferred embodiment of the present invention, and the protection scope of the present invention is not limited to the above-mentioned embodiments, and all technical solutions belonging to the idea of the present invention belong to the protection scope of the present invention. It should be understood that any modifications, equivalents and improvements within the spirit and principle of the present invention by those skilled in the art should be included within the scope of the present invention.

Claims (6)

1. A personal data management method facing data value is characterized in that: the personal data information is stored in a personal database and can be partially or completely synchronized with the user data center; the personal value-added data can be synchronized to a personal database through the user data bank record; personal data information is relatively isolated from network applications.
2. The personal data management method for data pricing according to claim 1, characterized in that: the personal data management method comprises a personal database PDB, a user data center UDP, a user data bank UDB and data interaction relations with applications such as E-government affairs EG, E-business EC, network finance EF, network social SNS, various APPs and the like.
3. The personal database PDB of claim 2, wherein: the system is composed of functional modules such as input and output, electronic identification, data encryption, data storage, BAF application and the like, and is an independent data storage system; the data comprises structured data and unstructured information, and each item of data can be added with 5 special attributes: sensitive data SI, public data OI, verification identification PM, value identification VM and time sequence identification TQ; the personal database uses a basic application function BAF to perform data management, synchronizes with UDP data and acquires data records of the UDB; the encryption device has the characteristics of portability, encryption, easy access and the like, supports hard encryption and soft encryption, and has an independent data encryption function; the basic application function BAF includes: adding, deleting and modifying data records; setting and recording data synchronization; accessing, certificate, statistics downloading, and uploading data and results; data asset update, etc.
4. The data center platform DSP of claim 2, wherein: the system consists of functional modules such as authorization authentication, security audit, data management, a database, log record and the like, and can be provided with data ETL; the stored personal data category comprises basic information, important data, a certificate of authenticity, an account list, a digital twin and the like, wherein the database is divided into: a UDP data area and a UDB data area; the functions of storing, inquiring, updating and synchronizing data, authenticating and identifying PDBs, verifying data, tracing use and the like of the PDBs are supported.
5. The user data banking, UDB, according to claim 2, wherein: the special function area for controlling, protecting and delivering personal valuable information (such as information of research results, credit records, asset information, consumption traces, travel records and the like) in UDP (user datagram protocol); according to the authorization, the information changes of electronic money, virtual money, electronic points and the like caused by electronic payment are recorded and stored.
6. The personal data asset of claim 3, wherein: the system is formed from five aspects of information filling, work creation, media participation, electronic entertainment, product (service) consumption and the like, and comprises the following components: 1) the information filling type means that recorded information is formed by using the requirements of registration, registration application, information filling, questionnaire survey and the like; 2) the work creation category refers to the formation of electronic achievements including characters, sounds, music, images, programs, etc. by using an information system; 3) the media participation category refers to electronic information such as characters, voice and the like issued on a specific platform, and attention, reward and the like are obtained; 4) the electronic entertainment category refers to participating in ranking, competitive and interactive games or activities by ICT, intelligence, multimedia and other technologies to obtain related rewards and points; 5) the product (service) consumption means that the product or service is purchased through an electronic payment mode, and record information such as orders, evaluations, points, credits and consumption is formed.
CN201910415442.5A 2019-05-18 2019-05-18 Data-value-oriented personal data asset management method Pending CN111967037A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910415442.5A CN111967037A (en) 2019-05-18 2019-05-18 Data-value-oriented personal data asset management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910415442.5A CN111967037A (en) 2019-05-18 2019-05-18 Data-value-oriented personal data asset management method

Publications (1)

Publication Number Publication Date
CN111967037A true CN111967037A (en) 2020-11-20

Family

ID=73357640

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910415442.5A Pending CN111967037A (en) 2019-05-18 2019-05-18 Data-value-oriented personal data asset management method

Country Status (1)

Country Link
CN (1) CN111967037A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001055921A1 (en) * 2000-01-28 2001-08-02 Fundamo (Proprietary) Limited Personal information data storage system and its uses
CN101587526A (en) * 2009-05-20 2009-11-25 北京易路联动技术有限公司 Real-time authentication method of Internet personal data bank and network-side device
CN104125290A (en) * 2014-08-05 2014-10-29 奥盈琦信信息技术(上海)有限公司 System and method for realizing collection, management and authorization of personal big data
CN108596628A (en) * 2018-04-20 2018-09-28 黄绍进 A kind of personal information capitalization implementation method and device
CN109741800A (en) * 2018-12-20 2019-05-10 李秦豫 The method for security protection of medical data intranet and extranet interaction based on block chain technology

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001055921A1 (en) * 2000-01-28 2001-08-02 Fundamo (Proprietary) Limited Personal information data storage system and its uses
CN101587526A (en) * 2009-05-20 2009-11-25 北京易路联动技术有限公司 Real-time authentication method of Internet personal data bank and network-side device
CN104125290A (en) * 2014-08-05 2014-10-29 奥盈琦信信息技术(上海)有限公司 System and method for realizing collection, management and authorization of personal big data
CN108596628A (en) * 2018-04-20 2018-09-28 黄绍进 A kind of personal information capitalization implementation method and device
CN109741800A (en) * 2018-12-20 2019-05-10 李秦豫 The method for security protection of medical data intranet and extranet interaction based on block chain technology

Similar Documents

Publication Publication Date Title
US11593761B2 (en) Distributed data store for managing media
US20190155997A1 (en) Content licensing platform, system, and method
Konashevych General concept of real estate tokenization on blockchain: The right to choose
JP5383830B2 (en) Methods for protecting user privacy
CN102833346B (en) Based on cloud sensitive data safety system and the method for storing metadata
EP2625820B1 (en) Private data sharing system
US8256014B2 (en) Content processing device, server device, communication method, and storage medium containing computer program
TWI827867B (en) Blockchain-based file storage device and file access authorization system and method thereof
US20080167994A1 (en) Digital Inheritance
US20040221118A1 (en) Control of access to data content for read and/or write operations
KR20050045883A (en) Content sharing system, content processing apparatus, information processing apparatus, program, recording medium, and content sharing method
US11526906B2 (en) System and method for secure content streaming, governance, fraud prevention, and the embedding artificial intelligence into content
CN106055997A (en) Method and system for applying parental-control policy to media file
US20120259635A1 (en) Document Certification and Security System
KR20190041784A (en) System and method for controlling distribution synchronization access based on blockchain in multicloud environment
CN111061982B (en) News information publishing and managing system based on block chain
KR20210037274A (en) Apparatus and method for managing contents
CN110866222A (en) Digital content asset right confirming system and method
Zhang et al. A blockchain-based privacy-preserving framework for cross-social network photo sharing
CN111967037A (en) Data-value-oriented personal data asset management method
CN107766700A (en) Digital publishing system and method for copyright protection
CN115514523A (en) Data security access system, method, device and medium based on zero trust system
CN115795405A (en) Scientific research academic union service system based on union chain and operation method thereof
Mendelson-Shwartz et al. Protecting Street Art Rights Using an NFT-Based System
Ramani et al. Blockchain for digital rights management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20201120