当前位置:网站首页>Zero technology is deeply involved in the development of privacy computing financial scenario standards of the ICT Institute
Zero technology is deeply involved in the development of privacy computing financial scenario standards of the ICT Institute
2022-07-29 07:35:00 【Zero Technology】
In recent days, ,2022 The privacy Computing Conference was held in Beijing , A number of privacy computing related standards were released at the meeting , among , Zero technology as one of the leading units , Deep involvement 《 Privacy computing Application specifications for financial scenarios 》 Standard setting , stay 38 In common scenarios , It provides the most scenario solutions for a single family , It highlights the comprehensive strength of zero in product scenario solutions .
according to the understanding of , The standard mainly includes four capability areas : The first is algorithm implementation and security , This capability domain lays the foundation of security technology for scenario applications ; The second is the ability to support financial scenarios , This capability domain is to improve the basic capability of the product and support the application of financial scenarios ; The third is ease of use , This capability domain is extended beyond the existing basic capability evaluation items , Enhance the ease of use of privacy computing products in practical financial applications ; The fourth capability area is the application capability of financial scenarios , This capability domain is a solution to safely and effectively complete common financial scenarios through algorithm combination .
Today, , With the rapid development of digital economy , A new round of technological and industrial changes is reshaping the global economic structure , The problem coexisting with the value of massive data is data security and how to protect data privacy . Privacy computing technology provides a new model for the circulation of data elements and the release of value , Complete virtual joint computation without exposing the original data , Implementation data 「 ownership 」 and 「 Right to use 」 The separation of , Resolve the contradiction between data circulation and privacy protection , Get academic 、 Widely recognized by the industry market and supervision , It is regarded as a reliable solution for the safe interworking of data elements , Privacy computing is gradually becoming one of the new infrastructures in the data age .
Many privacy computing technical specifications and standards released by this Conference , Zero technology as one of the leading units , Heavily involved 《 Application specification of privacy computing for financial scenarios 》 Preparation of Standards , It is among the manufacturers participating in the preparation of Standards , It provides the largest number of scene solution manufacturers . The vice president and Secretary General of China Communications Standardization Association mentioned , Promote data security and compliance circulation , Promote the normative development of privacy computing and other related technologies , Standardization plays a crucial role . A perfect standard system is conducive to the specification of technical products , Mature detection and verification methods are conducive to the further application of products , Regulatory system 、 The integration of technology system and standard system will also accelerate the healthy and orderly development of the industry .
The privacy computing series of zero technology covers federal learning 、 Safety calculation 、 Hidden query 、 Safe intersection, etc , Its application mode breaks the data island , Realize the efficient circulation of data value .2021 By the end of year , Zero technology releases the basic version of zero privacy computing platform , Provide secure computing from multiple parties 、 model training 、 The whole process from model evaluation to application deployment , It can effectively protect data security and user privacy ; The following year 5 month , Zero releases the commercial version of the privacy computing platform , Support federated modeling 、 Hidden query 、 Safety is the key 、 Safety Statistics ; The zero federal learning platform successfully passed the “ Trusted privacy computing evaluation ”, This is the earliest in the field of privacy computing in China 、 The most complete 、 Widely recognized by the industry evaluation system , It is known as the wind vane of supply side product research and development and demand side procurement selection .
It is expected that by the end of this year , Zero technology will release a financial level version of the privacy computing platform , Meet financial level safety and performance requirements . future , Zero will continue to deepen the exploration of the application scenarios of privacy computing technology , Integrate existing blockchain and privacy computing technologies , Publish a data circulation service platform that covers the whole life cycle of data privacy protection , Build a new generation of data sharing and asset circulation infrastructure , Empowering the digital future , Make data value orderly 、 trusted 、 Circulate safely , Help the digital transformation and development of all walks of life in China .
边栏推荐
- MySQL 45讲 | 08 事务到底是隔离的还是不隔离的?
- MapReduce各阶段步骤
- 能在SQL 语句中 指定 内存参数吗?
- [FPGA tutorial case 42] image case 2 - realize image binarization processing through Verilog, and conduct auxiliary verification through MATLAB
- 受欢迎的牛 G
- 3-global exception handling
- String类
- 我,28岁,测试员,10月无情被辞:想给还在学测试 的人提个醒......
- 我想问一下,我flink作业是以upsert-kafka的方式写入数据的,但是我在mysql里面去更
- Write some DP
猜你喜欢
Some learning and understanding of vintage analysis
Can the subset of the array accumulate K
Leetcode buckle classic problem -- 4. Find the median of two positively ordered arrays
一篇长文---深入理解synchronized
halcon的安装以及在vs2017中测试,vs2017中dll的配置
[summer daily question] Luogu p6461 [coci2006-2007 5] trik
09 bloom filter
分析25个主要DeFi协议的路线图 预见DeFi未来的七大趋势
3-全局异常处理
【MYSQL】-【子查询】
随机推荐
PAT甲级 1146 拓扑顺序
零数科技深度参与信通院隐私计算金融场景标准制定
7-2 计算正五边形的面积和周长 (25分)
监听页面滚动位置定位底部按钮(包含页面初始化定位不对鼠标滑动生效的解决方案)
Reflect reflect
MySQL 45讲 | 08 事务到底是隔离的还是不隔离的?
08 dynamic programming
QT basic day 2 (2) QT basic components: button class, layout class, output class, input class, container and other individual examples
Using C language to skillfully realize the chess game -- Sanzi chess
Some learning and understanding of vintage analysis
【无标题】格式保存
Pat class a 1150 traveling salesman problem
OA项目之会议通知(查询&是否参会&反馈详情)
JS day 4 process control (if statement and switch statement)
【暑期每日一题】洛谷 P4413 [COCI2006-2007#2] R2
How can electronic component trading enterprises solve warehouse management problems with ERP system?
Thinkphp6 realizes database backup
Introduction and introduction of logback
Vue router route cache
1-后台项目搭建