Data encryption, data analysis method and apparatus
A technology of data encryption and data analysis, applied in the Internet field, to achieve the effect of balancing security and accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0045] The embodiments of this specification will be described below with reference to the drawings.
[0046] figure 1 A schematic diagram of a data processing system 100 according to an embodiment of the present specification is shown. Such as figure 1 As shown, the system 100 includes multiple user devices 11 and servers 12. Multiple user equipments 11 are data providers respectively, which include respective original data corresponding to the first variable (that is, the value of the first variable) x 1 ,x 2 ,...,X n . The data provider wants the original data to be protected. The server 12 is the data demander, and it hopes to analyze and integrate the relevant information (macro index) of the above-mentioned first variable based on the original data. In the data processing process according to the embodiment of this specification, at the end of the user equipment 11, the original data x 1 ,x 2 ,...,X n Convert to upload data Q 1 ,Q 2 ,...,Q n , And upload the uploaded da...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap