Unlock instant, AI-driven research and patent intelligence for your innovation.

Privacy protection method and device during data sharing, computer equipment and medium

A technology for data sharing and privacy protection, applied in digital data protection, computer security devices, computing, etc., can solve problems such as privacy leakage, and achieve the effect of solving privacy leakage

Pending Publication Date: 2022-02-22
华润数字科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, aiming at the above technical problems, this application provides a privacy protection method, device, computer equipment and storage medium when sharing data, so as to solve the technical problem of privacy leakage caused by data sharing in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method and device during data sharing, computer equipment and medium
  • Privacy protection method and device during data sharing, computer equipment and medium
  • Privacy protection method and device during data sharing, computer equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by those skilled in the technical field of the application; the terms used herein in the description of the application are only to describe specific embodiments The purpose is not to limit the present application; the terms "comprising" and "having" and any variations thereof in the specification and claims of the present application and the description of the above drawings are intended to cover non-exclusive inclusion. The terms "first", "second" and the like in the description and claims of the present application or the above drawings are used to distinguish different objects, rather than to describe a specific order.

[0026] Reference herein to an "embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the present application. The occurrenc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention belongs to the technical field of data sharing, and relates to a privacy protection method during data sharing. The method comprises the following steps of: when a data sharing request sent by a first service node is monitored, determining a second service node responding to the data sharing request; determining a data sharing authority endowed to the second service node by the first service node based on the data sharing request to instruct the first service node and the second service node to encrypt a to-be-encrypted field to obtain first encrypted data and second encrypted data; and based on the first encrypted data and the second encrypted data, indicating the first service node and the second service node to perform data sharing operation to obtain a sharing result. By adopting the method, the problem of privacy information leakage during data sharing is avoided.

Description

technical field [0001] The present application relates to the technical field of data sharing, in particular to a privacy protection method, device, computer equipment and storage medium when sharing data. Background technique [0002] In financial risk control, setting a blacklist is a very important strategy. Assuming a scenario, financial institution A needs to identify whether there are high-risk customers in its customer list, and may need to rely on another company that has been operating for a long time to accumulate more customers The blacklist data of the established institution B of the data is checked. More specifically, institution A needs to identify which clients in its client list are on B's blacklist. [0003] With the rapid development of various industries, more and more user data has been accumulated. In particular, each company and institution will establish a black and white list database under its own business system, and each subdivided product type h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F21/60G06F16/176
CPCG06F21/6245G06F21/602G06F16/176
Inventor 钟焰涛袁丽
Owner 华润数字科技有限公司