A desensitization data comparison method and device based on an asymmetric algorithm
An asymmetric algorithm and data comparison technology, applied in the field of data security, can solve the problems of comparison benchmark data security and data comparison efficiency, and achieve the effect of ensuring confidentiality
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to explain the present invention, and are not intended to limit the present invention.
[0024] Such as figure 1 As shown, the embodiment of the present invention provides a desensitized data comparison method based on an asymmetric algorithm, including the following steps:
[0025] S1. Use an asymmetric encryption algorithm to encrypt the batch source data one by one to obtain the desensitized benchmark data. The encryption operation is completed through the encryption card, and the encryption key uses the built-in key of the encryption card, and the two sets of encryption keys of the asymmetric encryption algorithm key pair One of the groups in the key has been destroyed beforehand...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
