Login Register Home Chinese
Achivement Detail
Networkbigdatacomputinganalysisandsecuritytrustworthykeytechnologyandapplication

0

Registration number:G20250476

Industry:

Subject classification:

Key words: big data network Secure and trustworthy index network

Green classification:

Publisher:管理人员

Release time:2025-08-09 08:53:55.0

  • Essential information
Name of achievement: Networkbigdatacomputinganalysisandsecuritytrustworthykeytechnologyandapplication
Result registration number: G20250476 Subject classification:
Green classification: Item keywords: big data network  Secure and trustworthy   index network    
Recommenders:

Tongji University

The stage of achievement:
Mode of cooperation: JointVentureandCooperation Outcome Information:
Countries/regions: China Intellectual property rights: Invention patent, others
Introduction: Click to view
The rapid development of the internet has driven an explosive growth in data volume, highlighting its importance. Unlike traditional forms of data, big data on the network is characterized by large scale, mixed structure, strong temporal variability, and low density. Existing technologies implement massive collection and full-volume computation, organize data in forms such as inverted indexes, and manage and secure it through identity authentication and closed-loop defense. This leads to a large amount of inefficient or even ineffective data collection and processing, not only wasting a significant amount of storage and transmission resources but also resulting in issues such as low efficiency, insufficient adaptability, and difficult control of credibility. In response to the above problems, under the support of various research programs at the national level, with big data exploration as the core and the goals of sensing, knowing, connecting, and controlling big data, inventions and implementations have been made for autonomous innovation in data explorers, mining analyzers, content indexers, and security and credibility managers. A network big data computing analysis and security trustworthy key technology system has been constructed, which has achieved successful applications in multiple fields. The main inventions are as follows: (1) Inspired by geological mineral exploration, a big data resource prospector was invented, transforming massive collection into quantitative exploration to grasp the status and value of resources, achieving optimized collection, overcoming the blindness in the development and utilization of big data, and effectively reducing waste; (2) A big data mining analyzer that combines feature selection, efficient classification, and adaptive clustering was invented, changing full-volume calculation to incremental calculation, solving the strong time-varying and incremental processing needs and challenges of big data; (3) An index network model for big data resources was established, exploratory search technology was proposed, and a content indexer was invented, changing inverted indexing to an index network and matching search to exploratory search, solving problems such as semantic loss and heterogeneous redundancy in the organization and management of big data. Achieved effective recommendation of semantic association information. (4) Established a big data protection and open security system for comprehensive behavior analysis and credible assessment, invented a Security and Trust Manager, transformed static identity authentication into dynamic behavior analysis, changed closed passive defense into open active security, overcame the inherent defects of traditional rule-based security protection, and ensured the safety and credibility of network big data and system platforms. The achievements have been authorized with 80 invention/innovation patents (1 in the United States, 15 in Australia, 64 in China), 14 international PCTs; 5 industry standards; 59 software copyrights; published 88 papers, including 29 in ACM/IEEE journals, 1 monograph, 59 SCI-indexed, 80 EI-indexed, and more than 1500 Google Scholar citations; won 1 National Excellent Invention Patent in 2017. The results have received recognition from the Chinese Academy of Sciences/Engineering Academy. The research has been cited and positively evaluated more than 30 times by academicians from the European Academy of Sciences and other countries, as well as ACM/IEEE Fellows. Among them, Professor Victor Leung from the Royal Canadian Academy of Sciences commented that this achievement is "the first efficient data transmission strategy that considers different levels of activity among nodes within a community." The Shanghai Science and Technology Information Research Institute's level retrieval report concluded that the achievement "has generally reached an international advanced level in network big data optimization management and computing service platforms, with credible management and authentication technology reaching an international leading level." As designated technical strength, the achievement has served national major events such as the security assurance for the 19th National Congress of the Communist Party of China, the Qingdao Summit of the Shanghai Cooperation Organization, and the first China International Import Expo, successfully completing all tasks. Received gratitude and commendation from the event organizers, and won the 'First China International Import Expo Network Security Outstanding Contribution Award' issued by the Shanghai Public Security Bureau Network Security Protection Corps. At the same time, the achievements have been successfully applied in more than 500 units across more than ten industries including finance, insurance, trade, e-commerce, etc., achieving significant economic and social benefits. In the past three years, the added value has exceeded 31.9 billion yuan, the added profit has exceeded 1.1 billion yuan, the added tax revenue has exceeded
Name: Gender:
Date of birth: Position:
Nationality: Address:
Mobile: Email:

All comments(0)

Position:1/0 First Previous Next Last Jump to
Similar results
Matching needs

No record

Relevant experts