CN110737913B - Safety desensitization method and device based on time and date data and computer equipment - Google Patents

Safety desensitization method and device based on time and date data and computer equipment Download PDF

Info

Publication number
CN110737913B
CN110737913B CN201910824292.3A CN201910824292A CN110737913B CN 110737913 B CN110737913 B CN 110737913B CN 201910824292 A CN201910824292 A CN 201910824292A CN 110737913 B CN110737913 B CN 110737913B
Authority
CN
China
Prior art keywords
time
date
vector
level
desensitization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910824292.3A
Other languages
Chinese (zh)
Other versions
CN110737913A (en
Inventor
许超俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Financial Technology Co Ltd Shanghai
Original Assignee
OneConnect Financial Technology Co Ltd Shanghai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Financial Technology Co Ltd Shanghai filed Critical OneConnect Financial Technology Co Ltd Shanghai
Priority to CN201910824292.3A priority Critical patent/CN110737913B/en
Publication of CN110737913A publication Critical patent/CN110737913A/en
Priority to PCT/CN2020/105884 priority patent/WO2021042918A1/en
Application granted granted Critical
Publication of CN110737913B publication Critical patent/CN110737913B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a security desensitization method, a device, a computer device and a storage medium based on time-date data, wherein the method comprises the following steps: obtaining ready to take offSensitive first and second time dates; and (3) calling a reference time according to the formula: calculating a first time interval from a first time date to a reference time; acquiring a first parameter vector; mapping the first time-date to a first date vector; according to the formula:
Figure DDA0002188567120000011
calculating to obtain a level identifier m, and recording a time level corresponding to the level identifier m as an appointed time level; desensitizing the first time date to a first target time; mapping the first target time into a first target time vector, and calculating according to a formula to obtain a compensation vector; mapping the second time and date into a second date vector, and calculating to obtain a second target time vector; a second target time after desensitization of the second time date is composed. Thereby improving the utilization rate of data.

Description

Safety desensitization method and device based on time and date data and computer equipment
Technical Field
The present application relates to the field of computers, and in particular, to a security desensitization method and apparatus based on time-date data, a computer device, and a storage medium.
Background
Data desensitization, also known as data bleaching, data privacy removal or data deformation, refers to the deformation of data on some sensitive information through desensitization rules to realize reliable protection of sensitive private data. Date data desensitization is often used during data transmission and processing, and generally employed methods are: 1. the digital mask desensitization causes loss of information value, and data analysis cannot reflect the full value of data; 2. fixed replacement, namely replacing all dates with random dates or randomly replacing the dates on the same day, can not only generate unreasonable data, but also cause great misleading to statistics and analysis by damaged original information. Therefore, the traditional technology cannot ensure effective utilization of data when data desensitization is adopted to realize reliable protection of sensitive private data.
Disclosure of Invention
The present application is mainly aimed at providing a security desensitization method, device, computer equipment and storage medium based on time-date data, aiming at raising effective utilization rate of time data.
In order to achieve the above object, the present application provides a security desensitization method based on time-date data, comprising the steps of:
acquiring a first time date and a second time date to be desensitized, wherein the time dates at least comprise four time levels of a grade, a month level, a day level and a time level;
calling a preset reference time, and according to a formula: calculating a first time interval from a first time date to a reference time;
acquiring a first parameter vector corresponding to a first time interval according to the corresponding relation between the preset time interval and the parameter vector;
according to a preset date vector mapping method, mapping a first time and date into a first date vector, wherein the first date vector comprises four sub-vectors consisting of four time levels, namely a year level, a month level, a day level and a time level, and the dimensionality of the first parameter vector is the same as that of the first date vector;
according to the formula:
Figure BDA0002188567100000021
i is an independent variable, calculating to obtain a level identifier m, wherein y is a first date vector, yi is the ith component in the first date vector, si is the ith component in the first parameter vector, and recording the time level corresponding to the level identifier m as a specified time level;
desensitizing the first time date to a first target time according to a preset desensitization interval conversion scheme, wherein the value of the specified time level of the first target time is the same as the value of the specified time level of the first time date;
mapping the first target time into a first target time vector according to a preset date vector mapping method, and according to a formula: calculating to obtain a compensation vector, wherein the compensation vector is a first target time vector and a first date vector;
according to a preset date vector mapping method, mapping a second time and date into a second date vector, and according to a formula: calculating a second target time vector, namely a second date vector and a compensation vector;
and extracting numerical values of four time levels of grade, month level, day level and time level from the second target time vector so as to form a second target time after desensitization to the second time and date.
Further, the step of obtaining a first parameter vector corresponding to the first time interval according to the corresponding relationship between the preset time interval and the parameter vector includes:
acquiring a plurality of initial parameter vectors corresponding to a first time interval according to the corresponding relation between a preset time interval and the parameter vectors, wherein the initial parameter vectors mark designated component vectors;
and comparing the numerical values of the designated component vectors in the plurality of initial parameter vectors, so as to screen out the initial parameter vector with the maximum numerical value of the designated component vector, and recording the initial parameter vector as the first parameter vector.
Further, the step of mapping the first time and date into a first date vector according to a preset date vector mapping method, wherein the first date vector comprises four sub-vectors consisting of four time levels, namely a year level, a month level, a day level and a time level, includes:
generating a first date initial vector according to the first time date, wherein the first date initial vector only comprises four sub-vectors consisting of four time levels of a year level, a month level, a day level and a time level of the first time date;
embedding a plurality of component vectors in the first date initial vector according to a preset component embedding method so that the number of the component vectors of the first date initial vector reaches a specified number;
and recording the first date initial vector subjected to component embedding processing as a first date vector.
Further, the step of desensitizing the first time date to a first target time according to a preset desensitization interval shifting scheme, wherein the value of the specified temporal level of the first target time is the same as the value of the specified temporal level of the first time date, comprises:
acquiring a designated desensitization parameter corresponding to the first time interval according to the corresponding relation between the time interval and the desensitization parameter;
applying the specified desensitization parameters to a preset initial desensitization model to obtain a specified desensitization model;
and inputting the numerical values of other time levels except for the specified time level in the first time period into the specified desensitization model for calculation, and combining the output value of the specified desensitization model and the numerical value of the specified time level into a first target time.
Further, the step of obtaining the designated desensitization parameter corresponding to the first time interval according to the correspondence between the time interval and the desensitization parameter includes:
acquiring a ciphertext of the appointed desensitization parameter corresponding to the first time interval according to the corresponding relation between the time interval and the ciphertext of the desensitization parameter;
and decrypting the ciphertext of the specified desensitization parameter into a plaintext by adopting a preset AES128 algorithm according to a preset secret key.
Further, the step of desensitizing the first time date to a first target time according to a preset desensitization interval shifting scheme, wherein the value of the specified temporal level of the first target time is the same as the value of the specified temporal level of the first time date, comprises:
calling three preset desensitization functions, and taking numerical values of three time levels except the specified time level in the first time date as parameters of the three desensitization functions respectively;
respectively carrying out integral operation on the three desensitization functions within a specified interval so as to obtain three output integral values;
combining the three integrated values with the values of the specified time level to a first target time.
Further, the step of extracting numerical values of four time levels of year, month, day and time from the second target time vector to constitute a second target time desensitized to the second time and date includes:
receiving a data processing instruction, wherein the data processing instruction is used for indicating that a first time and date is processed;
judging whether the data processing instruction further indicates to process a second time and date;
and if the data processing instruction does not indicate that the second time and date are processed, refusing to process the data.
The application provides a safety desensitization device based on time date data, includes:
a date acquisition unit for acquiring a first time date and a second time date to be desensitized, wherein the time date is composed of at least four time levels of a grade, a month level, a day level and a time level;
the first time interval calculation unit is used for calling preset reference time and according to a formula: calculating a first time interval from a first time date to a reference time;
a first parameter vector obtaining unit, configured to obtain a first parameter vector corresponding to a first time interval according to a correspondence between a preset time interval and a parameter vector;
the date vector mapping unit is used for mapping a date to be displayed into a date vector according to a preset date vector mapping method, wherein the date vector comprises four sub-vectors consisting of four time levels, namely a year level, a month level, a day level and a time level, and the dimension of the parameter vector is the same as that of the date vector;
a designated time level obtaining unit configured to:
Figure BDA0002188567100000041
i is an independent variable, calculating to obtain a level identifier m, wherein y is a first date vector, yi is the ith component in the first date vector, si is the ith component in the first parameter vector, and recording the time level corresponding to the level identifier m as a specified time level;
a first desensitization unit for desensitizing the first time date to a first target time according to a preset desensitization interval conversion scheme, wherein a value of a specified time level of the first target time is the same as a value of a specified time level of the first time date;
the offset vector acquisition unit is used for mapping the first target time into a first target time vector according to a preset date vector mapping method, and according to a formula: calculating to obtain a compensation vector, wherein the compensation vector is a first target time vector and a first date vector;
a second date vector mapping unit, configured to map a second time and date into a second date vector according to a preset date vector mapping method, and according to a formula: calculating a second target time vector, namely a second date vector and a compensation vector;
and the second target time acquisition unit is used for extracting numerical values of four time levels of grade, month level, day level and time level from the second target time vector so as to form a second target time after desensitization to the second time and date.
The present application provides a computer device comprising a memory storing a computer program and a processor implementing the steps of any of the above methods when the processor executes the computer program.
The present application provides a computer-readable storage medium having stored thereon a computer program which, when being executed by a processor, carries out the steps of the method of any of the above.
According to the safety desensitization method and device based on time and date data, the computer equipment and the storage medium, a first time date and a second time date to be desensitized are obtained; according to the formula: calculating a first time interval from a first time date to a reference time; acquiring a first parameter vector corresponding to a first time interval; mapping the first time-date to a first date vector; according to the formula:
Figure BDA0002188567100000051
i is an independent variable, a level identifier m is obtained through calculation, and a time level corresponding to the level identifier m is recorded as an appointed time level; desensitizing the first time date to a first target time; according to the formula: filling boxCalculating a compensation vector which is a first target time vector and a first date vector; according to the formula: calculating a second target time vector, namely a second date vector and a compensation vector; and extracting numerical values of four time levels of grade, month level, day level and time level from the second target time vector so as to form a second target time after desensitization to the second time and date, thereby improving the utilization rate of time data.
Drawings
FIG. 1 is a schematic flow chart of a method for security desensitization based on time-date data according to an embodiment of the present application;
FIG. 2 is a block diagram illustrating the structure of a security desensitization device based on time-date data according to an embodiment of the present application;
fig. 3 is a block diagram illustrating a structure of a computer device according to an embodiment of the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
Referring to fig. 1, an embodiment of the present application provides a security desensitization method based on time-date data, including the following steps:
s1, acquiring a first time date and a second time date to be desensitized, wherein the time dates at least comprise four time levels of grade, month grade, day grade and time grade;
s2, calling a preset reference time, and according to a formula: calculating a first time interval from a first time date to a reference time;
s3, acquiring a first parameter vector corresponding to the first time interval according to the corresponding relation between the preset time interval and the parameter vector;
s4, mapping the first time and date into a first date vector according to a preset date vector mapping method, wherein the first date vector comprises four component vectors consisting of four time levels, namely a year level, a month level, a day level and a time level, and the dimension of the first parameter vector is the same as that of the first date vector;
s5, according to the formula:
Figure BDA0002188567100000061
i is an independent variable, calculating to obtain a level identifier m, wherein y is a first date vector, yi is the ith component in the first date vector, si is the ith component in the first parameter vector, and recording the time level corresponding to the level identifier m as a specified time level;
s6, desensitizing the first time date to a first target time according to a preset desensitization interval conversion scheme, wherein the value of the designated time level of the first target time is the same as the value of the designated time level of the first time date;
s7, mapping the first target time into a first target time vector according to a preset date vector mapping method, and according to a formula: calculating to obtain a compensation vector, wherein the compensation vector is a first target time vector and a first date vector;
s8, according to a preset date vector mapping method, mapping the second time and date into a second date vector, and according to a formula: calculating a second target time vector, namely a second date vector and a compensation vector;
and S9, extracting numerical values of four time levels of grade, month level, day level and time level from the second target time vector, thereby forming a second target time after desensitization to the second time and date.
As described in the above step S1, the first time date and the second time date to be desensitized are acquired, wherein the time dates are constituted by at least four time levels of the grade, the month level, the day level and the time level. In order to improve the effective utilization rate of data and reduce the calculation loss, the method adopts a mode of desensitizing a first time date and a second time date which are simultaneously treated for desensitization, wherein the scheme of desensitizing the first time date is just opposite to the scheme of desensitizing the second time date, so that the data are distorted for single data, but the data are ensured to be available when macroscopic data processing (such as average value processing) is carried out, thereby improving the effective utilization rate of the data. Here, the time and date is, for example, 2010.01.01.01, which indicates 1 month, 1 day, and 1 hour in 2010.
As mentioned in step S2, the preset reference time is called, according to the formula: the first time interval | the first time date — the reference time | is calculated. The reference time may be set to be earlier than the first time date or later than the first time date.
As described in step S3, the first parameter vector corresponding to the first time interval is obtained according to the corresponding relationship between the preset time interval and the parameter vector. The preset time interval may be in one-to-one correspondence with the parameter vector, or in one-to-many correspondence. If the corresponding relation is one-to-many, screening out an accurate first parameter vector from the multiple parameter vectors, wherein the specific process comprises the following steps: acquiring a plurality of initial parameter vectors corresponding to a first time interval according to the corresponding relation between a preset time interval and the parameter vectors, wherein the initial parameter vectors mark designated component vectors; and comparing the numerical values of the designated component vectors in the plurality of initial parameter vectors, so as to screen out the initial parameter vector with the maximum numerical value of the designated component vector, and recording the initial parameter vector as the first parameter vector.
As described in the above step S4, according to the preset date vector mapping method, the first time and date is mapped into the first date vector, wherein the first date vector includes four component vectors composed of four time levels of a year level, a month level, a day level and a time level, and the dimension of the first parameter vector is the same as that of the first date vector. The first date vector may include only four component vectors composed of four time levels, i.e., a year level, a month level, a day level, and a time level, and may also include other component vectors. According to a preset date vector mapping method, mapping the first time and date into a first date vector is, for example: generating a first date initial vector according to the first time date, wherein the first date initial vector only comprises four sub-vectors consisting of four time levels of a year level, a month level, a day level and a time level of the first time date; embedding a plurality of component vectors in the first date initial vector according to a preset component embedding method so that the number of the component vectors of the first date initial vector reaches a specified number; and recording the first date initial vector subjected to component embedding processing as a first date vector.
As stated in step S5 above, according to the formula:
Figure BDA0002188567100000071
and i is an independent variable, calculating to obtain a level identifier m, wherein y is a first date vector, yi is the ith component in the first date vector, and si is the ith component in the first parameter vector, and recording the time level corresponding to the level identifier m as the designated time level. Wherein argmax represents the value of the corresponding argument when the objective function takes the maximum value. From this, m represents the largest value of i among yi · si. The most valuable designated time level in the first scheduled time to be desensitized is thus determined, and the value of the designated time level is retained in order to ensure availability of data.
As set forth above in step S6, desensitizing the first time date to a first target time according to a preset desensitization interval shifting scheme, wherein the value of the specified time level of the first target time is the same as the value of the specified time level of the first time date. The preset desensitization interval change scheme may be any scheme that requires changing the values of the time levels other than the designated time level in the first time period to values different from the original values. The specific process is as follows:
acquiring a designated desensitization parameter corresponding to the first time interval according to the corresponding relation between the time interval and the desensitization parameter; applying the specified desensitization parameters to a preset initial desensitization model to obtain a specified desensitization model; and inputting the numerical values of other time levels except for the specified time level in the first time period into the specified desensitization model for calculation, and combining the output value of the specified desensitization model and the numerical value of the specified time level into a first target time. Wherein the value specifying the time level is therefore reserved in order to guarantee the availability of the data.
As described in step S7, the first target time is mapped to the first target time vector according to the preset date vector mapping method, and according to the formula: and calculating to obtain a compensation vector, wherein the compensation vector is a first target time vector and a first date vector. Wherein the offset vector reflects the degree of deviation between the first target time and the first time of day and is subsequently used as a basis for desensitization of the second time of day.
As described in step S8, the second time and date is mapped into the second date vector according to the preset date vector mapping method, and according to the formula: and calculating to obtain a second target time vector, wherein the second target time vector is a second date vector and a compensation vector. In order to improve the effective utilization rate of data and reduce the calculation loss, the method adopts the following formula: the second target time vector is the second date vector-offset vector, and the way of calculating the second target time vector ensures that data is available when macroscopic data processing is performed (for example, average processing), so that the effective utilization rate of the data is improved.
As described in the above step S9, the numerical values of the four time levels of the year level, the month level, the day level, and the time level are extracted from the second target time vector, thereby composing the second target time desensitized to the second time date. Wherein the value of the specified time level of the second target time is also constant, so that a certain degree of data availability can also be guaranteed. And because the first date time is associated with the second date time, the data can be ensured to be available in a common processing mode during the macroscopic data processing, thereby improving the data utilization rate.
In an embodiment, the step S3 of obtaining a first parameter vector corresponding to the first time interval according to the preset correspondence between the time interval and the parameter vector includes:
s301, acquiring a plurality of initial parameter vectors corresponding to a first time interval according to a corresponding relation between a preset time interval and the parameter vectors, wherein the initial parameter vectors are marked with designated component vectors;
s302, comparing the numerical values of the designated component vectors in the plurality of initial parameter vectors, so as to screen out the initial parameter vector with the maximum numerical value of the designated component vector, and recording the initial parameter vector as a first parameter vector.
As described above, the first parameter vector corresponding to the first time interval is obtained according to the corresponding relationship between the preset time interval and the parameter vector. The method comprises the steps of adopting a mode that a preset time interval and a corresponding relation of parameter vectors are in a one-to-many corresponding relation, and further comparing numerical values of designated component vectors in a plurality of initial parameter vectors, so that the initial parameter vector with the maximum numerical value of the designated component vectors is screened out and recorded as a first parameter vector. Therefore, the parameter vector of the time level with the most value is screened out from the initial parameter vectors, so that the subsequent judgment of the appointed time level is more accurate and more appropriate.
In one embodiment, the step S4 of mapping the first time and date into a first date vector according to a preset date vector mapping method, wherein the first date vector includes four sub-vectors including four time levels of a year, a month, a day, and a time, includes:
s401, generating a first date initial vector according to the first time date, wherein the first date initial vector only comprises four sub-vectors consisting of four time levels of a grade, a month level, a day level and a time level of the first time date;
s402, embedding a plurality of sub-vectors into the first date initial vector according to a preset vector embedding method so that the number of the sub-vectors of the first date initial vector reaches a specified number;
and S403, recording the first date initial vector subjected to the vector embedding processing as a first date vector.
As described above, it is realized that the first time-date is mapped to the first date vector according to the preset date vector mapping method. In order to further keep secret in the operation process and the operation result, a first date initial vector is generated according to the first time date; embedding a plurality of component vectors in the first date initial vector according to a preset component embedding method; the first date start vector after the vector embedding process is written as a first date vector, and a dummy component vector is present in the first date vector to secure information even when information leaks. The preset component embedding method can be any component embedding method, and only four components formed by four time levels of the grade, the month level, the day level and the time level of the first time date need to be reserved, for example, the components can be embedded before, between and after the four components.
In one embodiment, the step S6 of desensitizing the first time date to a first target time according to a preset desensitization interval shifting scheme, wherein the value of the specified time level for the first target time is the same as the value of the specified time level for the first time date, includes:
s601, acquiring a designated desensitization parameter corresponding to the first time interval according to the corresponding relation between the time interval and the desensitization parameter;
s602, applying the specified desensitization parameters to a preset initial desensitization model to obtain a specified desensitization model;
s603, inputting numerical values of other time levels except for the specified time level in the first time date into the specified desensitization model for calculation, and combining the output value of the specified desensitization model and the numerical value of the specified time level into a first target time.
As described above, desensitization of the first time date to a first target time according to a preset desensitization interval shifting scheme is achieved. Wherein the desensitization parameter is used in a desensitization model such that the desensitization model can output exact values based on input values. The desensitization model is an arbitrary model, for example, three exact desensitization functions respectively corresponding to three different time levels, and the specified desensitization parameters are applied to a preset initial desensitization model, so that the specified desensitization model is obtained, that is, the specified desensitization model is a process in which the desensitization parameters are applied to the desensitization functions to obtain the exact desensitization functions. Accordingly, the numerical values of the time levels except the designated time level in the first time date are input into the designated desensitization model for calculation, so that the numerical values of three different time levels after desensitization can be obtained, and the original numerical values of the designated time level are combined to obtain the first target time.
In one embodiment, the step S601 of obtaining the specified desensitization parameter corresponding to the first time interval according to the correspondence between the time interval and the desensitization parameter includes:
s6011, obtaining a cryptograph of the designated desensitization parameter corresponding to the first time interval according to the corresponding relation between the time interval and the cryptograph of the desensitization parameter;
s6012, according to a preset secret key, decrypting the ciphertext of the specified desensitization parameter into a plaintext by adopting a preset AES128 algorithm.
As described above, obtaining the specified desensitization parameter corresponding to the first time interval according to the corresponding relationship between the time interval and the desensitization parameter is realized. In order to further meet the requirement of data confidentiality and prevent desensitized data from being reversely restored, the method adopts a mode that the desensitization parameters are encrypted into ciphertexts, and obtains the ciphertexts of the appointed desensitization parameters corresponding to the first time interval according to the corresponding relation between the time interval and the ciphertexts of the desensitization parameters; and according to a preset secret key, a preset AES128 algorithm is adopted, and the cryptograph of the specified desensitization parameter is decrypted into a plaintext, so that the desensitization parameter is safer. The AES128 algorithm is an advanced encryption standard algorithm with a key length of 128 bits, is a symmetric encryption algorithm, and can effectively improve the security of data.
In one embodiment, the step S6 of desensitizing the first time date to a first target time according to a preset desensitization interval shifting scheme, wherein the value of the specified time level for the first target time is the same as the value of the specified time level for the first time date, includes:
s611, calling three preset desensitization functions, and taking numerical values of three time levels except the specified time level in the first time date as parameters of the three desensitization functions respectively;
s612, respectively carrying out integral operation on the three desensitization functions within a specified interval so as to obtain three output integral values;
s613, combining the three integrated values and the numerical value of the specified time level into a first target time.
As described above, desensitization of the first time date to a first target time according to a preset desensitization interval shifting scheme is achieved. Calling three preset desensitization functions, and respectively taking numerical values of three time levels except the specified time level in the first time date as parameters of the three desensitization functions; respectively carrying out integral operation on the three desensitization functions within a specified interval so as to obtain three output integral values; the first time date is desensitized to the first target time by combining the three integrated values with the numerical values of the specified time level to the first target time. The numerical values of the three time levels in the first time period except for the specified time level are not used as input values of the function (namely, are independent of independent variables), but are used as parameters of the function to determine a specific function, and then integration is carried out, so that unique three integral values are obtained, the purpose of data desensitization is finally achieved, and the data security is further ensured due to the fact that the desensitization mode is different from that of the traditional technology.
In one embodiment, after the step S9 of extracting numerical values of four time levels of year, month, day and time from the second target time vector to compose the second target time desensitized to the second time and date, the method includes:
s91, receiving a data processing instruction, wherein the data processing instruction is used for indicating the processing of the first time date;
s92, judging whether the data processing instruction further indicates to process the second time and date;
and S93, if the data processing instruction does not instruct to process the second time and date, refusing to process the data.
As described above, rejection of data processing is achieved. The method and the device adopt a mode that the first time date and the second time date form associated data so as to improve the utilization rate of the data. When the data processing instruction only relates to the first time date, the result of the data processing is distorted, the final credibility of the data processing result cannot be ensured, and accordingly, the data processing is refused. Further, while rejecting the data processing, generating recommendation information that recommends data processing for both the first time date and the second time date.
According to the safety desensitization method based on time date data, a first time date and a second time date to be desensitized are obtained; according to the formula: calculating a first time interval from a first time date to a reference time; acquiring a first parameter vector corresponding to a first time interval; mapping the first time-date to a first date vector; according to the formula:
Figure BDA0002188567100000121
i is an independent variable, a level identifier m is obtained through calculation, and a time level corresponding to the level identifier m is recorded as an appointed time level; desensitizing the first time date to a first target time; according to the formula: calculating to obtain a compensation vector, wherein the compensation vector is a first target time vector and a first date vector; according to the formula: calculating a second target time vector, namely a second date vector and a compensation vector; and extracting numerical values of four time levels of grade, month level, day level and time level from the second target time vector so as to form a second target time after desensitization to the second time and date, thereby improving the utilization rate of time data.
Referring to fig. 2, an embodiment of the present application provides a security desensitization apparatus based on time-date data, including:
a date acquisition unit 10 for acquiring a first time date and a second time date to be desensitized, wherein the time dates are composed of at least four time levels of a grade, a month level, a day level and a time level;
a first time interval calculating unit 20, configured to retrieve a preset reference time according to a formula: calculating a first time interval from a first time date to a reference time;
a first parameter vector obtaining unit 30, configured to obtain a first parameter vector corresponding to a first time interval according to a corresponding relationship between a preset time interval and a parameter vector;
a first date vector mapping unit 40, configured to map a first time and date into a first date vector according to a preset date vector mapping method, where the first date vector includes four component vectors composed of four time levels, a year level, a month level, a day level, and a time level, and a dimension of the first parameter vector is the same as a dimension of the first date vector;
a specified time level obtaining unit 50 for obtaining, according to the formula:
Figure BDA0002188567100000131
i is an independent variable, calculating to obtain a level identifier m, wherein y is a first date vector, yi is the ith component in the first date vector, si is the ith component in the first parameter vector, and recording the time level corresponding to the level identifier m as a specified time level;
a first desensitization unit 60 for desensitizing the first time date to a first target time according to a preset desensitization interval changing scheme, wherein a value of a specified time level of the first target time is the same as a value of a specified time level of the first time date;
the offset vector obtaining unit 70 is configured to map the first target time into a first target time vector according to a preset date vector mapping method, and according to a formula: calculating to obtain a compensation vector, wherein the compensation vector is a first target time vector and a first date vector;
a second date vector mapping unit 80, configured to map a second time and date into a second date vector according to a preset date vector mapping method, and according to a formula: calculating a second target time vector, namely a second date vector and a compensation vector;
a second target time obtaining unit 90, configured to extract, from the second target time vector, numerical values of four time levels, a year level, a month level, a day level, and a time level, thereby composing a second target time desensitized to a second time date.
The operations respectively executed by the above units correspond to the steps of the security desensitization method based on time and date data of the foregoing embodiment one by one, and are not described herein again.
In one embodiment, the first parameter vector obtaining unit 30 includes:
the initial parameter vector acquisition subunits are used for acquiring a plurality of initial parameter vectors corresponding to a first time interval according to the corresponding relation between a preset time interval and the parameter vectors, wherein the initial parameter vectors are marked with designated component vectors;
and the screening subunit is used for comparing the numerical values of the designated component vectors in the plurality of initial parameter vectors, screening the initial parameter vector with the maximum numerical value of the designated component vector, and recording the initial parameter vector as the first parameter vector.
The operations respectively executed by the subunits correspond to the steps of the security desensitization method based on time-date data in the foregoing embodiment one to one, and are not described herein again.
In one embodiment, the first date vector mapping unit 40 includes:
a first date start vector generation subunit configured to generate a first date start vector from the first time date, the first date start vector including only four partial vectors composed of four time levels of a year level, a month level, a day level, and a time level of the first time date;
a component embedding subunit, configured to embed, in the first date start vector, a plurality of components according to a preset component embedding method, so that the number of components of the first date start vector reaches a specified number;
and a first date vector marking subunit, configured to mark the first date initial vector subjected to component embedding processing as a first date vector.
The operations respectively executed by the subunits correspond to the steps of the security desensitization method based on time-date data in the foregoing embodiment one to one, and are not described herein again.
In one embodiment, the first desensitization unit 60 includes:
a specified desensitization parameter obtaining subunit, configured to obtain a specified desensitization parameter corresponding to the first time interval according to a correspondence between the time interval and the desensitization parameter;
the appointed desensitization model obtaining subunit is used for applying the appointed desensitization parameters to a preset initial desensitization model so as to obtain an appointed desensitization model;
and the first target time acquisition subunit is used for inputting the numerical values of other time levels except the specified time level in the first time date into the specified desensitization model for calculation, and combining the output value of the specified desensitization model and the numerical value of the specified time level into a first target time.
The operations respectively executed by the subunits correspond to the steps of the security desensitization method based on time-date data in the foregoing embodiment one to one, and are not described herein again.
In one embodiment, the desensitization parameter is encrypted as ciphertext, and the specifying a desensitization parameter acquisition subunit includes:
the ciphertext acquisition module is used for acquiring the ciphertext of the appointed desensitization parameter corresponding to the first time interval according to the corresponding relation between the time interval and the ciphertext of the desensitization parameter;
and the decryption module is used for decrypting the ciphertext of the specified desensitization parameter into a plaintext by adopting a preset AES128 algorithm according to a preset secret key.
The operations respectively executed by the modules correspond to the steps of the security desensitization method based on time and date data in the foregoing embodiment one to one, and are not described herein again.
In one embodiment, the first desensitization unit 60 includes:
a desensitization function calling subunit, configured to call three preset desensitization functions, and use numerical values of three time levels in the first time date except for the specified time level as parameters of the three desensitization functions, respectively;
the integral operation subunit is used for respectively carrying out integral operation on the three desensitization functions within a specified interval so as to obtain three output integral values;
a combination subunit configured to combine the three integrated values and the numerical value of the specified time level into a first target time.
The operations respectively executed by the subunits correspond to the steps of the security desensitization method based on time-date data in the foregoing embodiment one to one, and are not described herein again.
In one embodiment, the apparatus comprises:
the data processing instruction receiving unit is used for receiving a data processing instruction, wherein the data processing instruction is used for indicating that the first time and date are processed;
the processing judging unit is used for judging whether the data processing instruction further indicates to process a second time and date;
and the rejection unit is used for rejecting the data processing if the data processing instruction does not indicate that the second time and date is processed.
The operations respectively executed by the above units correspond to the steps of the security desensitization method based on time and date data of the foregoing embodiment one by one, and are not described herein again.
According to the safety desensitization device based on time date data, a first time date and a second time date to be desensitized are obtained; according to the formula: calculating a first time interval from a first time date to a reference time; acquiring a first parameter vector corresponding to a first time interval; mapping the first time-date to a first date vector; according to the formula:
Figure BDA0002188567100000161
i is an independent variable, and the calculation obtains the gradeIdentifying m, and recording the time level corresponding to the level identification m as an appointed time level; desensitizing the first time date to a first target time; according to the formula: calculating to obtain a compensation vector, wherein the compensation vector is a first target time vector and a first date vector; according to the formula: calculating a second target time vector, namely a second date vector and a compensation vector; and extracting numerical values of four time levels of grade, month level, day level and time level from the second target time vector so as to form a second target time after desensitization to the second time and date, thereby improving the utilization rate of time data.
Referring to fig. 3, an embodiment of the present invention further provides a computer device, where the computer device may be a server, and an internal structure of the computer device may be as shown in the figure. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the computer designed processor is used to provide computational and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The memory provides an environment for the operation of the operating system and the computer program in the non-volatile storage medium. The database of the computer device is used to store data for a security desensitization method based on time-date data. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a method of security desensitization based on time-date data.
The processor executes the above-mentioned security desensitization method based on time-date data, wherein the steps included in the method correspond to the steps of executing the security desensitization method based on time-date data of the foregoing embodiment one to one, and are not described herein again.
It will be understood by those skilled in the art that the structures shown in the drawings are only block diagrams of some of the structures associated with the embodiments of the present application and do not constitute a limitation on the computer apparatus to which the embodiments of the present application may be applied.
The computer equipment of the application acquires the waiting-to-take-offSensitive first and second time dates; according to the formula: calculating a first time interval from a first time date to a reference time; acquiring a first parameter vector corresponding to a first time interval; mapping the first time-date to a first date vector; according to the formula:
Figure BDA0002188567100000171
i is an independent variable, a level identifier m is obtained through calculation, and a time level corresponding to the level identifier m is recorded as an appointed time level; desensitizing the first time date to a first target time; according to the formula: calculating to obtain a compensation vector, wherein the compensation vector is a first target time vector and a first date vector; according to the formula: calculating a second target time vector, namely a second date vector and a compensation vector; and extracting numerical values of four time levels of grade, month level, day level and time level from the second target time vector so as to form a second target time after desensitization to the second time and date, thereby improving the utilization rate of time data.
An embodiment of the present application further provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the method for security desensitization based on time-date data is implemented, where the steps included in the method are in one-to-one correspondence with the steps of executing the method for security desensitization based on time-date data in the foregoing embodiment, and are not described herein again.
A computer-readable storage medium of the present application, obtaining a first time date and a second time date to be desensitized; according to the formula: calculating a first time interval from a first time date to a reference time; acquiring a first parameter vector corresponding to a first time interval; mapping the first time-date to a first date vector; according to the formula:
Figure BDA0002188567100000172
i is an independent variable, a level identifier m is obtained through calculation, and a time level corresponding to the level identifier m is recorded as an appointed time level; desensitizing the first time date to a first target time(ii) a According to the formula: calculating to obtain a compensation vector, wherein the compensation vector is a first target time vector and a first date vector; according to the formula: calculating a second target time vector, namely a second date vector and a compensation vector; and extracting numerical values of four time levels of grade, month level, day level and time level from the second target time vector so as to form a second target time after desensitization to the second time and date, thereby improving the utilization rate of time data.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium provided herein and used in the examples may include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), double-rate SDRAM (SSRSDRAM), Enhanced SDRAM (ESDRAM), synchronous link (Synchlink) DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and bus dynamic RAM (RDRAM).
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that includes the element.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are also included in the scope of the present application.

Claims (10)

1. A method of security desensitization based on time-of-day data, comprising:
acquiring a first time date and a second time date to be desensitized, wherein the time dates at least comprise four time levels of a grade, a month level, a day level and a time level;
calling a preset reference time, and according to a formula: calculating a first time interval from a first time date to a reference time;
acquiring a first parameter vector corresponding to a first time interval according to the corresponding relation between the preset time interval and the parameter vector;
according to a preset date vector mapping method, mapping a first time and date into a first date vector, wherein the first date vector comprises four sub-vectors consisting of four time levels, namely a year level, a month level, a day level and a time level, and the dimensionality of the first parameter vector is the same as that of the first date vector;
according to the formula:
Figure FDA0002188567090000011
i is an independent variable, calculating to obtain a level identifier m, wherein y is a first date vector, yi is the ith component in the first date vector, si is the ith component in the first parameter vector, and recording the time level corresponding to the level identifier m as a specified time level;
desensitizing the first time date to a first target time according to a preset desensitization interval conversion scheme, wherein the value of the specified time level of the first target time is the same as the value of the specified time level of the first time date;
mapping the first target time into a first target time vector according to a preset date vector mapping method, and according to a formula: calculating to obtain a compensation vector, wherein the compensation vector is a first target time vector and a first date vector;
according to a preset date vector mapping method, mapping a second time and date into a second date vector, and according to a formula: calculating a second target time vector, namely a second date vector and a compensation vector;
and extracting numerical values of four time levels of grade, month level, day level and time level from the second target time vector so as to form a second target time after desensitization to the second time and date.
2. The method for desensitizing security based on time-date data according to claim 1, wherein said step of obtaining a first parameter vector corresponding to a first time interval according to a preset correspondence between time intervals and parameter vectors comprises:
acquiring a plurality of initial parameter vectors corresponding to a first time interval according to the corresponding relation between a preset time interval and the parameter vectors, wherein the initial parameter vectors mark designated component vectors;
and comparing the numerical values of the designated component vectors in the plurality of initial parameter vectors, so as to screen out the initial parameter vector with the maximum numerical value of the designated component vector, and recording the initial parameter vector as the first parameter vector.
3. A method for security desensitization based on time-date data according to claim 1, characterized in that said mapping of the first time-date into a first date vector according to a preset date vector mapping method, wherein the first date vector comprises four component vectors constituted by four time levels of year, month, day and time, comprises:
generating a first date initial vector according to the first time date, wherein the first date initial vector only comprises four sub-vectors consisting of four time levels of a year level, a month level, a day level and a time level of the first time date;
embedding a plurality of component vectors in the first date initial vector according to a preset component embedding method so that the number of the component vectors of the first date initial vector reaches a specified number;
and recording the first date initial vector subjected to component embedding processing as a first date vector.
4. A method of temporal-date-data-based security desensitization according to claim 1, wherein said desensitizing said first temporal date to a first target time according to a preset desensitization interval transformation scheme, wherein the values of the specified temporal levels of said first target time are the same as the values of the specified temporal levels of said first temporal date, comprises:
acquiring a designated desensitization parameter corresponding to the first time interval according to the corresponding relation between the time interval and the desensitization parameter;
applying the specified desensitization parameters to a preset initial desensitization model to obtain a specified desensitization model;
and inputting the numerical values of other time levels except for the specified time level in the first time period into the specified desensitization model for calculation, and combining the output value of the specified desensitization model and the numerical value of the specified time level into a first target time.
5. The security desensitization method according to claim 4, wherein the desensitization parameters are encrypted into ciphertext, and the step of obtaining the specified desensitization parameters corresponding to the first time interval according to the correspondence between the time interval and the desensitization parameters comprises:
acquiring a ciphertext of the appointed desensitization parameter corresponding to the first time interval according to the corresponding relation between the time interval and the ciphertext of the desensitization parameter;
and decrypting the ciphertext of the specified desensitization parameter into a plaintext by adopting a preset AES128 algorithm according to a preset secret key.
6. A method of temporal-date-data-based security desensitization according to claim 1, wherein said desensitizing said first temporal date to a first target time according to a preset desensitization interval transformation scheme, wherein the values of the specified temporal levels of said first target time are the same as the values of the specified temporal levels of said first temporal date, comprises:
calling three preset desensitization functions, and taking numerical values of three time levels except the specified time level in the first time date as parameters of the three desensitization functions respectively;
respectively carrying out integral operation on the three desensitization functions within a specified interval so as to obtain three output integral values;
combining the three integrated values with the values of the specified time level to a first target time.
7. The method of claim 1, wherein the step of extracting numerical values of four time levels, year, month, day and hour, from the second target time vector to form a second target time after desensitization to the second time-date comprises:
receiving a data processing instruction, wherein the data processing instruction is used for indicating that a first time and date is processed;
judging whether the data processing instruction further indicates to process a second time and date;
and if the data processing instruction does not indicate that the second time and date are processed, refusing to process the data.
8. A security desensitization device based on time-of-day data, comprising:
a date acquisition unit for acquiring a first time date and a second time date to be desensitized, wherein the time date is composed of at least four time levels of a grade, a month level, a day level and a time level;
the first time interval calculation unit is used for calling preset reference time and according to a formula: calculating a first time interval from a first time date to a reference time;
a first parameter vector obtaining unit, configured to obtain a first parameter vector corresponding to a first time interval according to a correspondence between a preset time interval and a parameter vector;
the date vector mapping unit is used for mapping a date to be displayed into a date vector according to a preset date vector mapping method, wherein the date vector comprises four sub-vectors consisting of four time levels, namely a year level, a month level, a day level and a time level, and the dimension of the parameter vector is the same as that of the date vector;
a designated time level obtaining unit configured to:
Figure FDA0002188567090000041
i is an independent variable, calculating to obtain a level identifier m, wherein y is a first date vector, yi is the ith component in the first date vector, si is the ith component in the first parameter vector, and recording the time level corresponding to the level identifier m as a specified time level;
a first desensitization unit for desensitizing the first time date to a first target time according to a preset desensitization interval conversion scheme, wherein a value of a specified time level of the first target time is the same as a value of a specified time level of the first time date;
the offset vector acquisition unit is used for mapping the first target time into a first target time vector according to a preset date vector mapping method, and according to a formula: calculating to obtain a compensation vector, wherein the compensation vector is a first target time vector and a first date vector;
a second date vector mapping unit, configured to map a second time and date into a second date vector according to a preset date vector mapping method, and according to a formula: calculating a second target time vector, namely a second date vector and a compensation vector;
and the second target time acquisition unit is used for extracting numerical values of four time levels of grade, month level, day level and time level from the second target time vector so as to form a second target time after desensitization to the second time and date.
9. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN201910824292.3A 2019-09-02 2019-09-02 Safety desensitization method and device based on time and date data and computer equipment Active CN110737913B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910824292.3A CN110737913B (en) 2019-09-02 2019-09-02 Safety desensitization method and device based on time and date data and computer equipment
PCT/CN2020/105884 WO2021042918A1 (en) 2019-09-02 2020-07-30 Safe desensitization method and apparatus based on time and date data and computer device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910824292.3A CN110737913B (en) 2019-09-02 2019-09-02 Safety desensitization method and device based on time and date data and computer equipment

Publications (2)

Publication Number Publication Date
CN110737913A CN110737913A (en) 2020-01-31
CN110737913B true CN110737913B (en) 2022-03-18

Family

ID=69267777

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910824292.3A Active CN110737913B (en) 2019-09-02 2019-09-02 Safety desensitization method and device based on time and date data and computer equipment

Country Status (2)

Country Link
CN (1) CN110737913B (en)
WO (1) WO2021042918A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110737913B (en) * 2019-09-02 2022-03-18 深圳壹账通智能科技有限公司 Safety desensitization method and device based on time and date data and computer equipment
CN116545776B (en) * 2023-07-06 2023-10-03 中航金网(北京)电子商务有限公司 Data transmission method, device, computer equipment and storage medium

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102790774A (en) * 2012-07-31 2012-11-21 北京江南天安科技有限公司 Method and device capable of allowing internal network to obtain time information
US9492535B2 (en) * 2013-03-14 2016-11-15 Aimmune Therapeutics, Inc. Peanut formulations and uses thereof
US9341486B2 (en) * 2013-04-24 2016-05-17 University Of Washington Through Its Center For Commercialization Methods and systems for providing geotemporal graphs
US9747280B1 (en) * 2013-08-21 2017-08-29 Intelligent Language, LLC Date and time processing
JP2015184875A (en) * 2014-03-24 2015-10-22 株式会社東芝 Data processing device and data processing program
CN108154044A (en) * 2016-12-05 2018-06-12 广东精点数据科技股份有限公司 A kind of ID card No. desensitization method and device being combined based on random and displacement
CN106991337B (en) * 2017-04-06 2019-10-22 北京数聚世界信息技术有限公司 A kind of desensitization method and device of date of birth data
CN109726585B (en) * 2018-12-14 2020-08-04 银江股份有限公司 Integrated data desensitization system and method for identity card number
CN110188571A (en) * 2019-06-05 2019-08-30 深圳市优网科技有限公司 Desensitization method and system based on sensitive data
CN110737913B (en) * 2019-09-02 2022-03-18 深圳壹账通智能科技有限公司 Safety desensitization method and device based on time and date data and computer equipment

Also Published As

Publication number Publication date
WO2021042918A1 (en) 2021-03-11
CN110737913A (en) 2020-01-31

Similar Documents

Publication Publication Date Title
CN110737913B (en) Safety desensitization method and device based on time and date data and computer equipment
CN110727949B (en) Data storage method and device, computer equipment and storage medium
CN112632581A (en) User data processing method and device, computer equipment and storage medium
CN110555779A (en) data processing method, data processing device, computer equipment and storage medium
CN111917711B (en) Data access method and device, computer equipment and storage medium
CN109410073A (en) Image file desensitization method, device, computer equipment and storage medium
CN114428784A (en) Data access method and device, computer equipment and storage medium
CN112016122A (en) Webpage data processing method and device, computer equipment and storage medium
CN113392428B (en) Data protection method, device, equipment and medium
CN110311783B (en) User attribution verification method and device based on group signature and computer equipment
CN110011959B (en) Data storage method, data query method and system
CN111666558A (en) Key alternation method, key alternation device, computer equipment and storage medium
US11956353B2 (en) Machine learning device, machine learning system, and machine learning method
CN112329063A (en) Encryption method and device for sensitive information, computer equipment and storage medium
CN111310817B (en) Spectral clustering method, device, system, computer equipment and storage medium
CN109547463B (en) Method and device for obtaining secret key, computer equipment and storage medium
EP3834361B1 (en) Method of managing private cryptographic keys
CN110853042A (en) Automatic secret-involved vector graph segmentation system and method based on image recognition
CN116226886A (en) Information security management method and system for software information system
CN114500104A (en) Data desensitization method, system, computer device and storage medium
CN114238914A (en) Digital certificate application system, method, device, computer equipment and storage medium
CN111542050B (en) TEE-based method for guaranteeing remote initialization safety of virtual SIM card
CN114598466B (en) Production data processing method and device, computer equipment and storage medium
CN115168907B (en) Data matching method, system, equipment and storage medium for protecting data privacy
CN116633542B (en) Data encryption method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant