CN113326241A - Data security sharing method, system and storage medium based on data neutral country - Google Patents

Data security sharing method, system and storage medium based on data neutral country Download PDF

Info

Publication number
CN113326241A
CN113326241A CN202110760174.8A CN202110760174A CN113326241A CN 113326241 A CN113326241 A CN 113326241A CN 202110760174 A CN202110760174 A CN 202110760174A CN 113326241 A CN113326241 A CN 113326241A
Authority
CN
China
Prior art keywords
data
sharing
processing
party
shared
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110760174.8A
Other languages
Chinese (zh)
Inventor
梁晓龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Wenshi Data Co ltd
Original Assignee
Shenzhen Wenshi Data Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Wenshi Data Co ltd filed Critical Shenzhen Wenshi Data Co ltd
Priority to CN202110760174.8A priority Critical patent/CN113326241A/en
Publication of CN113326241A publication Critical patent/CN113326241A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/176Support for shared access to files; File sharing support
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/252Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/256Integrating or interfacing systems involving database management systems in federated or virtual databases

Abstract

The invention discloses a data security sharing method, a system and a storage medium based on a data neutral country, wherein the method comprises the following steps: the method comprises the steps that a data neutral country obtains shared data provided by a data sharing party, and the shared data are stored in a data storage space special for the data sharing party; at least a portion of the shared data is processed and processed data is generated that is available for sharing. The data security sharing method based on the data neutral country has the following effects: the data of the first and the data sharing parties are stored in respective dedicated data storage spaces, so that the risk of leakage of source data is not worried about; secondly, the processing data processed by the source data is finally shared, but not the source data, so that the problem that the source data is not controlled after being shared is solved, and the sharing efficiency of the shared processing data is high. Based on the method, the data sharing party can share the data without worry behind, and a foundation is laid for data sharing in the real sense.

Description

Data security sharing method, system and storage medium based on data neutral country
Technical Field
The invention relates to the technical field of information analysis, in particular to a data security sharing method and system based on a data neutral country and a storage medium.
Background
Data is the result of facts or observations, and is a logical generalization of objective things. In the modern society where information technology is increasingly developed, the importance of data to individuals, businesses, and even governments is self-evident.
In the traditional data acquisition, analysis and application, operators providing various network services generally acquire data through own channels and then analyze and apply the acquired data; however, due to the limitation of the data acquisition channel, the integrity of the data often cannot meet the application requirement, and the data of other channels needs to be borrowed for fusion analysis, and a common mode is to crawl the data of other people by using a web crawler.
Such as: the invention patent with the publication number of CN107463669B discloses a method and a device for analyzing webpage data crawled by a crawler, wherein the method comprises the following steps: step 1, extracting webpage data according to a table tag in a webpage HTML structure; step 2, according to the mapping relation between the preset class field name and the webpage data, analyzing and mapping the extracted webpage data into a predefined class field; wherein the step 1 specifically comprises: extracting data in a specified webpage HTML structure according to a table tag in the specified webpage HTML structure to generate a two-dimensional array, wherein the two-dimensional array comprises a title and detailed data of a table; the basic information of the two-dimensional array comprises a table title and information; the detail information of the two-dimensional array is a title of the table and a plurality of pieces of detail data; the step 2 specifically comprises the following steps: and analyzing the two-dimensional array according to the mapping relation between the preset class field name and the table title, and mapping the corresponding detail data into the corresponding class field.
The method can improve the analysis efficiency of the webpage data crawled by the crawler without repeatedly compiling analysis codes; however, it should be noted that crawling data by using web crawlers is always a controversial approach; legal disputes caused by crawling data in recent years are not rare. Although the internet is open in nature and is shared, facing a wide variety of data, "where the boundaries of data protection" has been a major concern and debate.
Therefore, the traditional data acquisition mode of self-crawling is not reasonable or even illegal, and each operator voluntarily and selectively shares the owned data is a reasonable and legal data sharing mode in a fitting situation.
In the prior art, a relatively safe data sharing mode is provided, specifically, a rare data fusion platform is used, specifically, common data is fused after sensitive data is removed by the data fusion platform, but in the method, the so-called common data still needs to be stored in one database, a data provider loses control over the fused data, and most operators cannot safely share the data.
Of course, there are also more secure data sharing methods in the prior art, which are implemented based on limited preset interfaces and complex transmission rules.
For example, the invention patent application with application publication number CN109710667A discloses a multi-source data fusion sharing implementation method and system based on a big data platform, wherein the multi-source data fusion sharing implementation method includes: step 1, configuring at least one data source information and a timing rule, and executing data access operation according to the configured timing rule, wherein the data access operation is to extract data from the acquired at least one data source, or to acquire internet data, or to convert data, or to load data to a big data platform; step 2, performing data fusion operation on the data accessed in the data access operation according to the configured timing rule; step 3, performing layered and database-divided storage on the data subjected to the data fusion operation to form a storage library, and constructing a secondary index library on the storage library; and 4, setting a uniform data exchange interface in the constructed big data platform to share data.
However, the multi-source data fusion sharing method realized by the preset interface and the complex transmission rule has the advantages of large delay, low speed and low efficiency; only sporadic, small data exchanges can take place.
Based on the respective disadvantages of the existing data sharing methods in the prior art, the current situation is still the best of the operators.
Disclosure of Invention
In view of the above-mentioned shortcomings of the prior art, the present invention is directed to a method, a system and a storage medium for secure sharing of data based on a data-oriented country, which are intended to solve the disadvantages of the existing data sharing methods in the prior art, and the current situation is still the problem that each large operator performs.
The technical scheme of the invention is as follows:
a data security sharing method based on a data neutral country comprises the following steps:
the method comprises the steps that a data neutral country obtains shared data provided by a data sharing party, and the shared data are stored in a data storage space special for the data sharing party;
and processing at least a part of the shared data to generate processing data which can be used for sharing.
The effect of above-mentioned scheme lies in: the data of the first and the data sharing parties are stored in respective dedicated data storage spaces, so that the risk of leakage of source data is not worried about; secondly, the processing data processed by the source data (without desensitization processing) is finally shared, but not the source data, so that the problem that the source data is lost in control after being shared is not needed, and the sharing efficiency of the shared processing data is higher than that of the data sharing efficiency of the preset interface. Based on the data, the data security sharing method based on the data neutral country can ensure that the data sharing party shares data quickly without worry, and lays a foundation for data sharing in the true sense.
The data sharing party and the data using party are neutral in terms of data processing party, and the definition of the data neutral country is the origin, so that the data sharing party does not need to worry about the problem that the data using party copies and retains the data after providing the data. Moreover, most data holders do not take processed data and shared data as main industries, but the processing requirements of the data are different according to different application fields and application modes of the data, and the data holders only need to provide the data and do not need to provide various processing requirements, even the data holders are annoying because the main business is influenced; namely, the data processing side can provide a uniform data sharing channel, process the shared data according to various requirements or respectively share the shared data after performing various different processes on the shared data in advance, and the data sharing efficiency is ensured.
In a further preferred embodiment, the step of processing at least a part of the shared data to generate processing data available for sharing further includes: and generating a data list according to the processing process, wherein the data list comprises basic identification information of shared data used for generating the processing data.
The effect of above-mentioned scheme lies in: the data list is automatically generated by the system, the data sharing party can determine which data provided by the data processing party is used by the data processing party through the data list, and can determine whether the data processing party processes the data according to the prearranged agreement by matching with the processing data, so that the use of the data can not be separated from the control of the data processing party (so that enterprise operation can be carried out according to the established decision, and the data can be prevented from being excessively used and processed, and the like). For example, originally, the data can be processed independently, and only the processing result is shared for other enterprises to simply integrate, but the processing result cannot be integrated with the data of other enterprises to uniformly generate the processing result; under the condition of no data list, some data processing parties have the possibility of freely calling data of the data processing parties and performing fusion processing on the data of other enterprises, so that the understanding of competitors on the market deviates from the forecast, the future market trend deviates from the forecast, and the market advantage is lost; on the contrary, the data sharing party can ensure that the use range and the use mode of the data do not deviate from the control and prediction.
In a further preferred embodiment, after the step of processing at least a part of the shared data and generating the processed data available for sharing, the method further includes: a charging permission data user uses the processing data or the analysis result of the processing data; the data list is used for determining data sharing profits respectively obtained by the data sharing party and the data processing party or determining the data sharing profits obtained by the data sharing party.
The effect of above-mentioned scheme lies in: in the analysis of producer behavior, it is generally assumed that the goal of the producer or business is to seek profit maximization. This basic assumption is that of "economists" assuming concretization in the producer and business theory (while in actual operation, the behavior of a producer or business may not fit perfectly into the theory of profit maximization, the basic direction is consistent). That is, in the assumption of the "economiser", even if the security of the shared data can be ensured, in the case where a profit cannot be generated, a producer or a company (in the present invention, various data holders including an operator) does not perform data sharing, which does not meet the behavior criterion of the "economiser" in pursuing the maximization of the profit; under the condition that the safety of the shared data can be ensured and meanwhile profits can be generated, a producer or an enterprise must share the data, otherwise, the data do not accord with the behavior criterion that the profit maximization is pursued by the 'economic person' (for the data which are owned by the producer or the enterprise and are shared out and do not influence the benefit of the producer or the enterprise, the sharing out and the generation of the profits are the correct operation mode that the profit maximization is pursued by the 'economic person'). Thus, the ability to generate profits from shared data can only drive the aggressiveness of large operators to share data, with the security of the shared data being determined. Meanwhile, the data list can be used as evidence of profit distribution of the shared data (data sharing party and data processing party are ensured to be well documented when the profit is actually distributed); of course, the data sharing party can also be used as evidence for determining the profit under the condition of independent profit sharing, for example, the larger the data volume used for processing, the higher the profit can be obtained, and the smaller the data volume used for processing, the lower the profit can be obtained; for example, the more important the data used for processing, the higher the gain that can be obtained, the less important the data used for processing, the lower the gain that can be obtained, etc., all require the data sharing party to know which data the processing data specifically uses and shares, and more likely, not to mention, but also in the following preferred embodiments.
In a further preferred embodiment, the step of processing at least a part of the shared data to generate processing data usable for sharing specifically includes: performing fusion processing on at least two shares of shared data respectively acquired by the data neutral countries, and generating fusion processing data which can be used for sharing; the data manifest further includes: and the attribution identification of the data sharing party corresponding to the basic identification information.
The effect of above-mentioned scheme lies in: the data sharing method provided by the invention not only can share the processing data of the shared data provided by a single operator, but also can fuse and process the data provided by different operators (or other data sharing parties) according to the requirements, and for the user who simply obtains the processing data of other people and can not meet the use requirements, on one hand, the data of the user and the data of other people can be fused and processed, and the problem that the processing data can not meet the requirements due to simple integration is solved; on the other hand, the problem that the data sharing party cannot trust the data using party and thus the data is not provided with confidence can be solved (the data processing party is neutral for the data sharing party and the data using party, and the definition of the data neutral country is the origin, so the data sharing party does not need to worry about the problem that the data using party copies and retains the data after the data is provided); on the other hand, most data holders do not take processed data and shared data as major businesses, but the processing requirements of the data are different according to different application fields and application modes of the data, and the data holders only need to provide the data and do not need to worry about influencing major businesses for various processing requirements; that is, the data processing side can provide a uniform data sharing channel and perform fusion processing (or separate processing) on data from each side according to various requirements.
In a further preferred embodiment, after the step of performing fusion processing on at least two shares of shared data respectively obtained by the data countries in the middle and generating fusion processed data available for sharing, the method further includes: a charging permission data user uses the processing data or the analysis result of the processing data; the data list is used for determining data sharing profits respectively obtained by at least two data sharing parties and data processing parties, or determining data sharing profits respectively obtained by at least two data sharing parties.
The effect of above-mentioned scheme lies in: for example, an enterprise a (data sharing party 1) and an enterprise B (data sharing party 2) provide data willing to be shared to a data processing party for processing, the data processing party contacts with an enterprise C (data using party), obtains required data from the data provided by the enterprise a and the enterprise B for processing (or performs data processing aiming at each field and various application modes in advance) according to the requirement of the enterprise C, provides data services (such as data retrieval, query, task assignment and the like) for the enterprise C and charges the data services, traces back the data source according to a data list, and performs internal settlement on profits generated by the data (profits distributed by the enterprise a and the enterprise B); alternatively, enterprise A and enterprise B internally settle the revenue generated by the data based on the data manifest.
In a further preferred scheme, the at least two data sharing parties are a first data sharing party and a second data sharing party; the step of performing fusion processing on at least two shares of shared data respectively acquired by the data countries in the middle and generating fusion processed data which can be used for sharing further comprises: permitting a second data sharing party to use the processing data or the analysis result of the processing data for a fee; the data list is used for determining data sharing profits respectively obtained by the first data sharing party and the data processing party or determining the data sharing profits obtained by the first data sharing party.
The effect of above-mentioned scheme lies in: for example, enterprise a (a first data sharer) and enterprise B (a second data sharer) provide data that is willing to be shared to a data processor for processing, and when enterprise B needs to use the processed data or the results of the re-analysis of the processed data, paying the data processing party, and the data processing party and the first data sharing party trace back the data source according to the data list to perform internal settlement on the income generated by the data (or in the case that the first data sharing party shares the data sharing income alone, the data list can also be used as evidence for determining the income, for example, the larger the data amount used by the processing party is, the higher the income can be obtained, the smaller the data amount used by the processing party is, the lower the income can be obtained, for example, the more important the data used by the processing party is, the higher the income can be obtained, the less important the data used by the processing party is, the lower the income can be obtained, and the like). Enterprise B does not need to worry about infringement risks, and enterprise a does not need to worry about security problems of shared data, so that the method not only conforms to the spirit of internet data sharing, but also avoids the problem that a wrong and wrong competition law is easy to violate when data is shared.
In a further preferred scheme, the data list is specifically a data asset register table, and the data asset register table is formed by performing data asset formation and registration storage on node information of data source, authorization, processing and application through asset registration and a block chain technology.
The effect of above-mentioned scheme lies in: in the invention, the blockchain technology has simple function and can be understood as a notebook, when data are transmitted to a system, the blockchain technology records which party transmits the data, when the data are processed, records which party processes the data, when the data are used, records which party applies the data, and then determines benefit distribution according to a historical data chain; the most central application of blockchain technology is to resemble a non-repudiation notepad.
In a further preferred embodiment, the step of acquiring, by the data-oriented country, the shared data provided by the data sharing party specifically includes: according to a payment agent processing request jointly proposed by a first data sharing party and a second data sharing party, a data neutral country respectively obtains shared data provided by the first data sharing party and the second data sharing party;
the step of processing at least a part of the shared data to generate the processing data for sharing specifically includes: and performing fusion processing on at least two shares of shared data respectively acquired by the data neutral countries to generate fusion processing data which can be used for sharing.
The effect of above-mentioned scheme lies in: for example, enterprise a and enterprise B both want to use the data of the other party and request the data processing party to perform data fusion processing, so that the data security of both parties in the data sharing process is ensured, and the data processing process is omitted; after the data processing is finished, the data processing party can make the enterprise a and the enterprise B obtain required data or services by directly providing the data of the fused processing to the enterprise a and the enterprise B or providing data retrieval and the like.
A system for realizing the data security sharing method based on the data neutral country comprises a memory and a processor, wherein the memory is used for storing a data security sharing program based on the data neutral country, and the processor is used for running the data security sharing program based on the data neutral country so as to realize the data security sharing method based on the data neutral country. The system comprises all technical characteristics of the data security sharing method based on the data neutral, and also comprises all technical effects of the data security sharing method based on the data neutral, which are not described in detail.
A storage medium having stored thereon a computer program, wherein the computer program, when executed by a processor, implements the steps of the data-neutral-based data security sharing method as described above. The storage medium includes all technical features of the data security sharing method based on the data neutral, and also includes all technical effects of the data security sharing method based on the data neutral, which are not described in detail.
Compared with the prior art, the data security sharing method, the data security sharing system and the data security sharing storage medium based on the data neutral country provided by the invention comprise the following steps: the method comprises the steps that a data neutral country obtains shared data provided by a data sharing party, and the shared data are stored in a data storage space special for the data sharing party; and processing at least a part of the shared data to generate processing data which can be used for sharing. The data security sharing method based on the data neutral country provided by the invention has the following effects: the data of the first and the data sharing parties are stored in respective dedicated data storage spaces, so that the risk of leakage of source data is not worried about; secondly, the processed data processed by the source data is finally shared, but not the source data, so that the problem that the source data is not controlled after being shared is solved, and the sharing efficiency of the shared processed data is higher than that of the preset interface. Based on the method, the data sharing party can share the data without worry behind, and a foundation is laid for data sharing in the real sense.
Drawings
Fig. 1 is a flowchart of a data security sharing method based on a data country in the present invention.
Detailed Description
The invention provides a data security sharing method, a system and a storage medium based on a data neutral country, and in order to make the purpose, technical scheme and effect of the invention clearer and clearer, the invention is further described in detail below by referring to the attached drawings and taking examples. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As shown in fig. 1, the present invention provides a data security sharing method based on a data neutral country, which includes:
s100, the data neutral country obtains shared data provided by a data sharing party, and the shared data is stored in a data storage space special for the data sharing party.
It should be understood that, as long as it can be ensured that the shared data is data that the data sharing party is willing to share, no matter where the data is stored or how the data is obtained (the obtaining method should be legal), therefore, the following various embodiments are all provided for explaining the technical solution of the present invention, and are not intended to limit the scope of the present invention.
It should also be noted that the data sharing party may refer not only to the data holder of the third party, but also to the data processing party (the data processing party may own the data available for sharing).
In practical implementation, the manner of obtaining the shared data in the data-neutral country includes, but is not limited to, the following (the following is only illustrative and is not intended to limit the scope of the present invention):
1. the data sharing party uploads the data willing to be shared to the data neutral country;
2. the data neutral country calls data from a data storage space (which can be rented, purchased or created by oneself) owned by the data sharing party;
3. and the data sharing party sends the data willing to be shared to the transit data storage space, and the data neutral country calls the transit data storage space.
Based on this, the data storage space dedicated for the data sharing party may be a data storage space separately set by the data neutral country for the data sharing party, may also be a data storage space owned by the data sharing party, and may also be a data storage space rented or purchased by the data sharing party at a third party, which is not limited in the present invention.
Preferably, in the data acquisition step, the present invention introduces the data of the data sharing party (further, the data includes resources (such as an advertisement slot and/or a content slot, etc.) corresponding to the data) into the data processing party (such as the braise data) by defining the data authority attribution and the authorization boundary, and uses the data in the secure environment of the data neutral country. And preferably, the data safety is guaranteed by adopting technologies such as data black boxes, edge calculation, federal learning and block chains in the data neutral country. After the data use is completed, the data sharing party has the right to delete and revoke the data.
The specific privilege setting scheme is preferably (or other self-negotiated):
the data sharing party has ownership, use right and deletion right for respective data (and resources), and has no authority for the data (and resources) of other data sharing parties (even cannot see which enterprises' data are stored in the data neutral country);
the data producer has usage rights to the data (and resources) but does not have ownership, modification rights, and deletion rights (except, of course, where the data sharer is also the data producer).
That is, in the preferred embodiment of the present invention, even if the data sharing party stores the data in the data neutral country, the data is still owned by the data sharing party, and the enterprise data cannot be seen and accessed by each other, and the data processing party only has the right of use of the data and has no authority to modify, delete, etc.
And S200, processing at least a part of the shared data to generate processing data which can be used for sharing. That is, in the preferred embodiment of the present invention, the data processing party is not required to process all the obtained shared data, for example, enterprise a is willing to share its data X (which is divided into sub-data X1, X2, X3 and X4), and during processing the shared data, only sub-data X1 and X2 are processed, so as to generate processed data; of course, the entire data X may be processed, and the present invention is not particularly limited thereto.
In particular, the data is desensitized and processed, preferably by way of machine code. Preferably, before data processing, the data sharing party confirms the processing logic of the data, and after confirming that the processing logic of the data is not in question, the data sharing party processes the data.
The data processing target is based on a specific application field and a specific application mode, for example, AI technology and data tag technology may be combined to process data, determine a homologous user, and even construct a homologous network, and then apply the data to each field (specifically disclosed in another patent document, which is not described here again).
In a further preferred embodiment of the present invention, the step S200 further includes the following steps: and generating a data list according to the processing process, wherein the data list comprises basic identification information of shared data used for generating the processing data.
Further, the data list is specifically a data asset registration table, and the data asset registration table is formed by performing data asset formation and registration storage on node information of data sources, authorizations, processing and applications through asset registration and a block chain technology.
Preferably, the processing data generated by the processing is stored in a separate security database for storage, and the data processing party has ownership and use rights of the processing data. For example, the data processing party determines the family homologous user by using the data of the enterprise A, and constructs the family homologous network according to the family homologous user; although the home homologous network is divorced from the data of the enterprise A, the home homologous network is actually new data generated by using the processing technology of the data processing party, and the sharing of the new data does not reveal the source data of the enterprise A, so that the security of the source data of the enterprise A is ensured during data sharing.
Further, after S200, the method further includes: a charging permission data user uses the processing data or the analysis result of the processing data; the data list is used for determining data sharing profits respectively obtained by the data sharing party and the data processing party or determining the data sharing profits obtained by the data sharing party.
As described above, the data processing party constructs a home homologous network using the data of the enterprise a; then, the data processing party charges to permit the enterprise B to use the family homologous network or provide services in the aspects of data retrieval and the like for the enterprise B by using the family homologous network, gains are obtained by using shared data, and the data is from the enterprise A and processed by the professional technology of the data processing party, so that the data processing party and the enterprise A share the gains obtained by data sharing without other appointments; in the case of an agreement (for example, the data processing party is agreed to pay the data usage fee fixed by the company a, or the company a pays the data processing fee fixed by the data processing party, etc.), the agreement may be made. Under the condition that the data security can be ensured, the data sharing party can obtain benefits through data sharing, and a market foundation is provided for data sharing (under the condition that the data security is ensured at S100 and S200 and a technical foundation is laid for data sharing, the data sharing is combined with the data sharing, the data sharing in the true sense can be realized, and the effects of other embodiments are also realized, and the repeated description is not repeated in the invention).
As another embodiment of the present invention, the S200 specifically includes: performing fusion processing on at least two shares of shared data respectively acquired by the data neutral countries, and generating fusion processing data which can be used for sharing; the data manifest further includes: and the attribution identification of the data sharing party corresponding to the basic identification information. That is, when a data processing party processes data provided by multiple parties, a data list not only represents which data are used in the processing process, but also represents a data sharing party to which each piece of data belongs; for example, when data processing uses the data X1, X2 and X3 of enterprise a and the data Y1 and Y2 of enterprise B, the data list can clearly show these information, so as to perform data tracing, and enable enterprise a and enterprise B to clearly know which data provided by both parties are used by the data processing party or which data provided by each party is used by the data processing party (specifically, whether the other party is made aware of which data provided by itself can be determined according to the wishes of enterprise a and enterprise B).
Further, the step of performing fusion processing on at least two pieces of shared data respectively acquired by the data neutral countries and generating fusion processed data that can be used for sharing further includes: a charging permission data user uses the processing data or the analysis result of the processing data; the data list is used for determining data sharing profits respectively obtained by at least two data sharing parties and data processing parties, or determining data sharing profits respectively obtained by at least two data sharing parties.
The allocation method of the data sharing profit is described above, and the method may be analogized or determined according to the market operation method, and the description of the present invention is omitted. It should be noted that, when the enterprise a or the enterprise B is not willing to know the data shared by the enterprise a or the data shared by the enterprise B, the data list or the data asset registry may respectively generate a data asset registry (capable of attaching total data and asset amount so that the enterprise a can know the total data and asset amount occupied by the data and asset) belonging to the enterprise a and a data asset registry (capable of attaching total data and asset amount so that the enterprise a can know the total data and asset amount occupied by the data and asset amount) belonging to the data enterprise B according to a preset rule, and then the enterprise a and the enterprise B respectively calculate the data sharing profit with the data processing party. However, the present invention is not limited thereto, and the example is not intended to limit the scope of the present invention.
According to yet another embodiment of the present invention, the step of obtaining the shared data provided by the data sharing party by the data neutral country specifically includes: according to a payment agent processing request jointly proposed by a first data sharing party and a second data sharing party, a data neutral country respectively obtains shared data provided by the first data sharing party and the second data sharing party; the step of processing at least a part of the shared data to generate the processing data for sharing specifically includes: and performing fusion processing on at least two shares of shared data respectively acquired by the data neutral countries to generate fusion processing data which can be used for sharing.
For example, enterprise a and enterprise B both want to use the data of the other party and request the data processing party to perform data fusion processing, so that the data security of both parties in the data sharing process is ensured, and the data processing process is omitted; after the data processing is finished, the data processing party can make the enterprise a and the enterprise B obtain required data or services by directly providing the data of the fused processing to the enterprise a and the enterprise B or providing data retrieval and the like. It should be understood that this example is only one specific operation manner of data sharing, and is only a specific illustration, and is not used to limit the scope of the present invention.
Take the three-party amalgamation of braise (data processing party), kukai (data sharing party 1) and each piece of push (data sharing party 2) as an example:
first, cool-open can provide data for a large screen of a television, including: the unique ID of the large television screen, the router ID associated with the large television screen, the mobile phone ID associated with the large television screen under a local area network and the user portrait of the television are disclosed, wherein the user portrait of the television comprises the following steps: age, gender, preferences, and device attribute information; ownership and use right of the data belong to all the cool kayaks, and the cool kayak braise has the use right of the data;
secondly, the push can provide data of the mobile terminal device, including: the unique ID of the mobile phone, the router ID associated with the mobile phone, the other equipment IDs associated with the mobile phone under a local area network and the mobile phone user portrait, wherein the mobile phone user portrait comprises: age, gender, preferences, and device attribute information; the ownership and the use right of the data belong to a push owner, and the push authorization braise has the use right of the data;
then, the braise processes both data by a free homologous relation technique based on the data usage right to generate a new family unique ID, and the family portrait includes: age, gender and preference (data quality is better than data source), the data braise has ownership and use right, but for large screen and mobile phone device ID and device attribute, only use right is possessed due to no processing;
rights and interests and classification of the data are registered in the braise data asset management system, and when a user uses a tag in a family portrait output by a braise, income of the tag can be shared according to a ratio preset by three parties.
The whole data processing process is based on the safe data neutral technology, and the problem of data leakage can not exist.
Therefore, the invention can utilize the processing data to construct data products, such as data models, data interface services and the like, and is used for helping users (data users) to solve the problems in data application and data insight. In specific implementation, a user can register the user through a service system of a data processing party, and the registered user submits the use requirements of data and resources and pays related fees; the data processing party can search, inquire and assign the data according to the requirements of the user and return the task result and the data portrait corresponding to the user. Meanwhile, the data use requirement of the user is based on the data source, the rights and interests attribution and the settlement price registered in the data asset registration table, and the data transaction settlement is carried out with the data sharing party.
In the whole process, related source data are still owned by a data sharing party, and processed data are subjected to source tracing, so that data can be managed, controlled and traced. In such a way, the invention can realize the safe sharing of data, and realize the data sharing in the real sense by internally settling the income generated by the data from the safe fusion of the data, the boundary division of the data rights and the registration management of the data assets.
A system for realizing the data security sharing method based on the data neutral country comprises a memory and a processor, wherein the memory is used for storing a data security sharing program based on the data neutral country, and the processor is used for running the data security sharing program based on the data neutral country so as to realize the data security sharing method based on the data neutral country. The system comprises all technical characteristics of the data security sharing method based on the data neutral, and also comprises all technical effects of the data security sharing method based on the data neutral, which are not described in detail.
A storage medium having stored thereon a computer program, wherein the computer program, when executed by a processor, implements the steps of the data-neutral-based data security sharing method as described above. The storage medium includes all technical features of the data security sharing method based on the data neutral, and also includes all technical effects of the data security sharing method based on the data neutral, which are not described in detail.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, databases, or other media used in embodiments provided herein may include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), synchronous Link (SyNchlinNk) DRAM (SLDRAM), Rambus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
It is to be understood that the invention is not limited to the examples described above, but that modifications and variations may be effected thereto by those of ordinary skill in the art in light of the foregoing description, and that all such modifications and variations are intended to be within the scope of the invention as defined by the appended claims.

Claims (10)

1. A data security sharing method based on a data neutral country is characterized by comprising the following steps:
the method comprises the steps that a data neutral country obtains shared data provided by a data sharing party, and the shared data are stored in a data storage space special for the data sharing party;
and processing at least a part of the shared data to generate processing data which can be used for sharing.
2. The data security sharing method based on the data neutral country according to claim 1, wherein the step of processing at least a part of the shared data to generate processed data available for sharing further comprises: and generating a data list according to the processing process, wherein the data list comprises basic identification information of shared data used for generating the processing data.
3. The data security sharing method based on the data neutral country according to claim 2, wherein the step of processing at least a part of the shared data to generate processed data available for sharing further comprises: a charging permission data user uses the processing data or the analysis result of the processing data; the data list is used for determining data sharing profits respectively obtained by the data sharing party and the data processing party or determining the data sharing profits obtained by the data sharing party.
4. The data security sharing method based on the data neutral country according to claim 2, wherein the step of processing at least a part of the shared data to generate the processed data available for sharing specifically comprises: performing fusion processing on at least two shares of shared data respectively acquired by the data neutral countries, and generating fusion processing data which can be used for sharing; the data manifest further includes: and the attribution identification of the data sharing party corresponding to the basic identification information.
5. The data security sharing method based on the data neutral country according to claim 4, wherein the step of performing fusion processing on at least two shares of shared data respectively acquired by the data neutral country and generating fusion processed data available for sharing further comprises: a charging permission data user uses the processing data or the analysis result of the processing data; the data list is used for determining data sharing profits respectively obtained by at least two data sharing parties and data processing parties, or determining data sharing profits respectively obtained by at least two data sharing parties.
6. The data-neutral-based data security sharing method of claim 4, wherein the at least two data sharing parties are a first data sharing party and a second data sharing party; the step of performing fusion processing on at least two shares of shared data respectively acquired by the data countries in the middle and generating fusion processed data which can be used for sharing further comprises: permitting a second data sharing party to use the processing data or the analysis result of the processing data for a fee; the data list is used for determining data sharing profits respectively obtained by the first data sharing party and the data processing party or determining the data sharing profits obtained by the first data sharing party.
7. The data security sharing method based on the data neutral country according to any one of claims 2 to 6, wherein the data list is a data asset registry, and the data asset registry is formed by performing data asset transformation, registration and storage on node information of data source, authorization, processing and application through asset registration and block chain technology.
8. The data security sharing method based on the data neutral country according to claim 1, wherein the step of acquiring the shared data provided by the data sharing party by the data neutral country is specifically: according to a payment agent processing request jointly proposed by a first data sharing party and a second data sharing party, a data neutral country respectively obtains shared data provided by the first data sharing party and the second data sharing party;
the step of processing at least a part of the shared data to generate the processing data for sharing specifically includes: and performing fusion processing on at least two shares of shared data respectively acquired by the data neutral countries to generate fusion processing data which can be used for sharing.
9. A system for implementing the data-neutral-based data security sharing method, comprising a memory and a processor, wherein the memory is used for storing a data-neutral-based data security sharing program, and the processor is used for operating the data-neutral-based data security sharing program to implement the data-neutral-based data security sharing method according to any one of claims 1 to 8.
10. A storage medium having stored thereon a computer program, wherein the computer program, when executed by a processor, performs the steps of the data-neutral-based data security sharing method according to any one of claims 1 to 8.
CN202110760174.8A 2021-07-06 2021-07-06 Data security sharing method, system and storage medium based on data neutral country Pending CN113326241A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110760174.8A CN113326241A (en) 2021-07-06 2021-07-06 Data security sharing method, system and storage medium based on data neutral country

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110760174.8A CN113326241A (en) 2021-07-06 2021-07-06 Data security sharing method, system and storage medium based on data neutral country

Publications (1)

Publication Number Publication Date
CN113326241A true CN113326241A (en) 2021-08-31

Family

ID=77425813

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110760174.8A Pending CN113326241A (en) 2021-07-06 2021-07-06 Data security sharing method, system and storage medium based on data neutral country

Country Status (1)

Country Link
CN (1) CN113326241A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105912950A (en) * 2016-04-13 2016-08-31 国信优易数据有限公司 System and method for data sharing and releasing
WO2017051420A1 (en) * 2015-09-21 2017-03-30 Yissum Research Development Company Of The Hebrew University Of Jerusalem Ltd. Advanced computer implementation for crawling and/or detecting related electronically catalogued data using improved metadata processing
US20180157433A1 (en) * 2016-12-07 2018-06-07 Vmware, Inc. Inter-application secure data sharing workflow
CN109525573A (en) * 2018-11-08 2019-03-26 安徽太阳石科技有限公司 Data safety sharing method and its system based on block chain
CN109542856A (en) * 2018-11-26 2019-03-29 上海基诺联生物科技有限公司 A kind of Distributed data share system and method based on block chain
US20200279139A1 (en) * 2019-03-01 2020-09-03 Jpmorgan Chase Bank, N.A. Systems and methods for data protection
CN112383616A (en) * 2020-11-12 2021-02-19 贝壳技术有限公司 Data sharing method and device, electronic equipment and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017051420A1 (en) * 2015-09-21 2017-03-30 Yissum Research Development Company Of The Hebrew University Of Jerusalem Ltd. Advanced computer implementation for crawling and/or detecting related electronically catalogued data using improved metadata processing
CN105912950A (en) * 2016-04-13 2016-08-31 国信优易数据有限公司 System and method for data sharing and releasing
US20180157433A1 (en) * 2016-12-07 2018-06-07 Vmware, Inc. Inter-application secure data sharing workflow
CN109525573A (en) * 2018-11-08 2019-03-26 安徽太阳石科技有限公司 Data safety sharing method and its system based on block chain
CN109542856A (en) * 2018-11-26 2019-03-29 上海基诺联生物科技有限公司 A kind of Distributed data share system and method based on block chain
US20200279139A1 (en) * 2019-03-01 2020-09-03 Jpmorgan Chase Bank, N.A. Systems and methods for data protection
CN112383616A (en) * 2020-11-12 2021-02-19 贝壳技术有限公司 Data sharing method and device, electronic equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘斌: "杭钢集团:数字牵引,引领转型", 《杭州科技》 *
数字营销杂志: "www.sohu.com/a/442919691_120051662",数字营销杂志,2021:媒体与广告主数据关系的新篇章", 《WWW.SOHU.COM/A/442919691_120051662》 *

Similar Documents

Publication Publication Date Title
US7299171B2 (en) Method and system for processing grammar-based legality expressions
CN108122109B (en) Electronic credential identity management method and device
CN102473229B (en) Modification of access control lists
CN111625809B (en) Data authorization method and device, electronic equipment and storage medium
US11361106B2 (en) Chaining, triggering, and enforcing entitlements
US20120215809A1 (en) Search mediation system
US11775681B2 (en) Enforcement flow for pipelines that include entitlements
de Carvalho et al. Protecting citizens’ personal data and privacy: Joint effort from GDPR EU cluster research projects
Khan et al. BlockU: Extended usage control in and for Blockchain
CN113326241A (en) Data security sharing method, system and storage medium based on data neutral country
Aseri The implication of the European union’s general data protection regulation (GDPR) on the global data privacy
Kiyomoto et al. Fair-trading protocol for anonymised datasets requirements and solution
Cirillo et al. Decentralized robinson list
Parrott Requirements for a rights data dictionary and rights expression language
Huertas Celdrán et al. A management platform for citizen’s data protection regulation
Richter „Blockchain Regulation”. U
Dam et al. Policy Patterns for Usage Control in Data Spaces
Alza Jr Blockchain & CCPA
KR102540415B1 (en) Blockchain-based secure and trusted data trading methods and platform system
Inshakova et al. Intellectual property exchange as a platform for exclusive copyright transfer by means of smart contracts
Naumov Patterns in the Formation of the Conceptual Apparatus in Regulating the Internet in Russia
Ali et al. BlockU: Extended usage control in and for Blockchain
Dixit Dynamic injunctions against Internet intermediaries: An overview of emerging trends in India and Singapore
Dwivedi et al. A novel approach for constructing privacy‐aware architecture utilizing Shannon's entropy
Gallofré Ocaña et al. Towards a Blockchain and Smart Contracts-Based Privacy Framework for Decentralized Data Processing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: B1004, Building 2, Skyworth Innovation Valley, No. 8, Tangtou No.1 Road, Tangtou Community, Shiyan Street, Bao'an District, Shenzhen City, Guangdong Province, 518108

Applicant after: Shenzhen Aiyixun Data Co.,Ltd.

Address before: B1004, Building 2, Skyworth Innovation Valley, No. 8, Tangtou No.1 Road, Tangtou Community, Shiyan Street, Bao'an District, Shenzhen City, Guangdong Province, 518108

Applicant before: Shenzhen Wenshi Data Co.,Ltd.

CB02 Change of applicant information