A method and system for protecting sensitive data
A sensitive data and data technology, applied in digital data protection, electronic digital data processing, instruments, etc., can solve desensitization and other problems, and achieve the effect of protecting computing assets
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.
[0028] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:
[0029] A sensitive data protection method and system disclosed in the present invention, the schematic diagram of its system architecture is as follows image 3 shown, including:
[0030] The data storage module is used to store data, and can authorize analysis result data to designated users.
[0031] In the data publishing module, the data owner publishes the data structure for the data user to develop analy...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


