Method, device and system for determining number of common data for protecting private data
A privacy data and privacy protection technology, applied in the computer field, can solve problems such as leakage, achieve the effect of improving security and avoiding the leakage of additional information
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0062] The solutions provided in this specification will be described below in conjunction with the accompanying drawings.
[0063] figure 1 It is a schematic diagram of an implementation scenario of an embodiment disclosed in this specification. This implementation scenario involves the determination of the number of shared data that protects privacy data, and is used to determine the number of shared data between the first private data set owned by the first party and the second private data set owned by the second party. like figure 1 As shown, the scenario where both parties determine the amount of shared data involves participant A and participant B, or referred to as the first party and the second party, or referred to as party A and party B. Each participant can be implemented as any device, platform, server or device cluster with computing and processing capabilities. The two parties shall jointly determine the amount of shared data under the condition of protecting...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


