CN108989285A - Personal privacy protection method, electronic equipment, storage medium - Google Patents

Personal privacy protection method, electronic equipment, storage medium Download PDF

Info

Publication number
CN108989285A
CN108989285A CN201810589580.0A CN201810589580A CN108989285A CN 108989285 A CN108989285 A CN 108989285A CN 201810589580 A CN201810589580 A CN 201810589580A CN 108989285 A CN108989285 A CN 108989285A
Authority
CN
China
Prior art keywords
passenger
block chain
mobile terminal
platform
chain address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810589580.0A
Other languages
Chinese (zh)
Inventor
尚凌辉
陈鑫
叶淑阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Zechk Artificial Intelligence Research And Development Co Ltd
Original Assignee
Zhejiang Zechk Artificial Intelligence Research And Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Zechk Artificial Intelligence Research And Development Co Ltd filed Critical Zhejiang Zechk Artificial Intelligence Research And Development Co Ltd
Priority to CN201810589580.0A priority Critical patent/CN108989285A/en
Publication of CN108989285A publication Critical patent/CN108989285A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Software Systems (AREA)
  • Traffic Control Systems (AREA)
  • Medical Informatics (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)

Abstract

The present invention provides personal privacy protection method, comprising steps of initial key exchange, passenger's mobile terminal, data interaction, which are audited, carries out key exchange between platform, third party database;Permission, passenger's mobile terminal transmission request for utilization order to data interaction audit platform are authorized, and authorizes data interaction audit platform and carries out the permission that block chain examines Clocked operation passenger data;Privacy information is uploaded, passenger's individual privacy information is uploaded to third party database and audited in block chain by passenger's mobile terminal, is sent request of calling a taxi to internet and is hired a car software platform.The invention further relates to electronic equipments, storage medium.Internet of the invention software platform of hiring a car can not obtain the stroke route privacy of passenger, to protect the stroke route privacy information of passenger;Passenger enhances the control to individual privacy data it can be seen that all visitors record;By revocation data interaction platform of auditing the access right of data is realized internet software platform of hiring a car is stopped using.

Description

Personal privacy protection method, electronic equipment, storage medium
Technical field
The present invention relates to field of communication technology more particularly to personal privacy protection method, electronic equipment, storage mediums.
Background technique
Internet is hired a car, and to be basic model by " hire a car+generation drive " provide in a manner of the novel Urban Traffic of one kind for passenger.But As internet is hired a car prevailing, passenger's privacy problem is also outstanding day by day, causes the extensive concern of society.Passenger is daily It is hired a car software using internet, traffic path is relatively more fixed.It hires a car and has the following problems in mode in existing internet: Cheng Kewu Method guarantees that internet platform of hiring a car maintains secrecy to the personal information of oneself, and the travel route information of upload may be interconnected net and rent Vehicle platform is usurped in promotional advertising and obtains other commercial values;Platform is hired a car in internet and driver can arbitrarily check passenger Travel routes information, so that passenger is difficult to effectively control the individual privacy information of oneself;When passenger wants to stop using the interconnection Net hire a car software when, the information being stored on the software before can not empty;When successfully to have required internet to hire a car soft by passenger Part deletes the personal information of oneself, when the hacked personal information for leading to oneself of the software leaks, can not provide evidence It engages in a lawsuit to the software.
Summary of the invention
For overcome the deficiencies in the prior art, one of the objects of the present invention is to provide personal privacy protection methods, solve The problem of traditional internet mode of hiring a car can not protect passenger's individual privacy.
The present invention provides personal privacy protection method, comprising the following steps:
Initial key exchange, passenger's mobile terminal, data interaction, which are audited, carries out key friendship between platform, third party database It changes;
Permission, passenger's mobile terminal transmission request for utilization order to data interaction audit platform are authorized, and is awarded It gives the data interaction audit platform and carries out the permission that block chain examines Clocked operation passenger data;
Privacy information is uploaded, passenger's individual privacy information is uploaded to the third party database by passenger's mobile terminal And audit in block chain, it sends request of calling a taxi to internet and hires a car software platform.
Further, the step initial key exchange is specially that passenger's mobile terminal generates the first block chain address With the first private key, first private key is corresponding with the first block chain address, and the third party database generates the second block Chain address and the second private key, second private key is corresponding with the second block chain address, and passenger's mobile terminal will be described Symmetric key between first block chain address, passenger's mobile terminal and the third party database is sent to the third The second block chain address is sent to passenger's movement by the non-block chain address of party database, the third party database The non-block chain address of terminal, passenger's mobile terminal by passenger's mobile terminal and the data interaction audit platform it Between symmetric key, passenger's mobile terminal non-block chain address, the non-block chain address of the third party database, institute State the non-block chain address that the second block chain address is sent to the data interaction audit platform, the data interaction audit platform Third block chain address is generated, and with being sent to the non-block chain of passenger's mobile terminal by the third block chain address Location.
Further, it is specially that passenger's mobile terminal accesses cryptographic Hash, passenger's message that the step, which authorizes permission, Record, signature record are sent to the block chain address of the third party database, and the data interaction audit platform returns to transaction Number to passenger's mobile terminal, authorization message, the Transaction Identification Number are sent to the third number formulary by passenger's mobile terminal According to the non-block chain address in library, the third party database verifies the authorization message, and passenger's mobile terminal believes authorization Breath, the first block chain address, the third block chain address are broadcasted on block chain.
Further, it is specially passenger's mobile terminal by the cryptographic Hash, described that the step, which uploads privacy information, Passenger's message access record, signature record are sent to the second block chain address, and the data interaction audit platform returns The Transaction Identification Number is returned to passenger's mobile terminal, the request of calling a taxi is sent to the internet by passenger's mobile terminal It hires a car the non-block chain address of software platform, passenger's mobile terminal examines passenger's mobile terminal and the data interaction Encrypted symmetric key and the Transaction Identification Number between meter platform are sent to the non-block chain address of the third party database, described Third party database verifies the authorization message.
It further, further include that step reads passenger position and recommends driver, internet software platform of hiring a car passes through The data interaction audits platform to third party database transmission reading passenger position request, receives third party's data The passenger position that library is sent matches optimum position driver according to the passenger position.
It further, further include that step reads passenger's stroke route, driver's transfer terminal reception internet is hired a car soft The passenger position that part platform is sent, transmission check that stroke route requests to the internet software platform of hiring a car, and receive described mutual Networking hire a car software platform transmission stroke route, send competition for orders request.
It further, further include step read access person record, passenger's mobile terminal reads passenger's message and visits Ask that record obtains visitor's record.
It further, further include step revocation permission, passenger's mobile terminal is by cancelling the data interaction audit The permission of platform terminates the internet and hires a car the data read operation of software platform.
A kind of electronic equipment, comprising: processor;
Memory;And program, wherein described program is stored in the memory, and is configured to by processor It executes, described program includes for executing above-mentioned personal privacy protection method.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor The above-mentioned personal privacy protection method of row.
Compared with prior art, the beneficial effects of the present invention are:
The present invention provides personal privacy protection method, comprising the following steps: initial key exchange, passenger's mobile terminal, number Key exchange is carried out according between interaction audit platform, third party database;Permission is authorized, passenger's mobile terminal sends request for utilization It orders to data interaction audit platform, and authorizes data interaction audit platform and carry out the power that block chain examines Clocked operation passenger data Limit;Privacy information is uploaded, passenger's individual privacy information is uploaded to third party database and audited in block by passenger's mobile terminal In chain, sends request of calling a taxi to internet and hire a car software platform.The invention further relates to a kind of electronic equipment, storage medium.This hair The bright internet software platform of hiring a car that realizes can not obtain the stroke route privacy of passenger, to can not sell passenger's stroke route It is sold to other groups;Passenger enhances the control to individual privacy data it can be seen that all visitors record;When passenger determines Surely stop using internet hire a car software platform when, data interaction audit platform can be cancelled to the access right of data;If Internet software platform of hiring a car by hacker attacks makes passenger's leakage of personal information after revocation permission, and passenger can be by visitor It records and internet software platform of hiring a car is emptied by the unlawful practice of Customer information is not in time engaged in a lawsuit as evidence.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention, And can be implemented in accordance with the contents of the specification, the following is a detailed description of the preferred embodiments of the present invention and the accompanying drawings. A specific embodiment of the invention is shown in detail by following embodiment and its attached drawing.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes part of this application, this hair Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is personal privacy protection method flow diagram of the invention.
Specific embodiment
In the following, being described further in conjunction with attached drawing and specific embodiment to the present invention, it should be noted that not Under the premise of conflicting, new implementation can be formed between various embodiments described below or between each technical characteristic in any combination Example.
Personal privacy protection method, as shown in Figure 1, comprising the following steps:
Initial key exchange, passenger's mobile terminal, data interaction, which are audited, carries out key friendship between platform, third party database It changes;In the present embodiment, third party database is the trustship that passenger selects the database realizing individual privacy data trusted, and data are handed over Mutually audit platform is the system for being built on block chain and auditing to all data manipulation behaviors, it is preferred that at the beginning of step The exchange of beginning key is specially that passenger's mobile terminal generates the first block chain address and the first private key, the first private key and the first block chain Address is corresponding, and third party database generates the second block chain address and the second private key, the second private key and the second block chain address pair It answers, passenger's mobile terminal sends the symmetric key between the first block chain address, passenger's mobile terminal and third party database To the non-block chain address of third party database, the second block chain address is sent to passenger's mobile terminal by third party database Non- block chain address, passenger's mobile terminal by passenger's mobile terminal and data interaction audit platform between symmetric key, passenger Non- block chain address, the non-block chain address of third party database, the second block chain address of mobile terminal are sent to data friendship The mutually non-block chain address of audit platform, data interaction audit platform generate third block chain address, and by third block chain Location is sent to the non-block chain address of passenger's mobile terminal.
Permission, passenger's mobile terminal transmission request for utilization order to data interaction audit platform are authorized, and authorizes data friendship Mutually audit platform carries out the permission that block chain examines Clocked operation passenger data;Preferably, it is specially passenger's shifting that step, which authorizes permission, Cryptographic Hash, passenger's message access record, signature record are sent to the block chain address of third party database by dynamic terminal, and data are handed over Mutually audit platform returns to Transaction Identification Number to passenger's mobile terminal, and authorization message, Transaction Identification Number are sent to third party by passenger's mobile terminal The non-block chain address of database, third party database verify authorization message, and passenger's mobile terminal is by authorization message, the first block Chain address, third block chain address are broadcasted on block chain.
Privacy information is uploaded, passenger's individual privacy information is uploaded to third party database and audited by passenger's mobile terminal In block chain, sends request of calling a taxi to internet and hire a car software platform.Preferably, it is specially passenger's shifting that step, which uploads privacy information, It moves terminal and cryptographic Hash, passenger's message access record, signature record is sent to the second block chain address, data interaction audit platform Transaction Identification Number is returned to passenger's mobile terminal, request of calling a taxi is sent to internet and hired a car the non-area of software platform by passenger's mobile terminal Block chain address, passenger's mobile terminal by passenger's mobile terminal and data interaction audit platform between encrypted symmetric key and transaction It number is sent to the non-block chain address of third party database, third party database verifies authorization message.Internet software of hiring a car is flat Platform, which can not obtain the stroke route privacy of passenger and sell, gives other groups, and individual privacy information is uploaded to third party database And it audits in block chain.
In one embodiment, it is preferred that further include that step reads passenger position and recommends driver, internet software of hiring a car is flat Platform audits platform to third party database transmission reading passenger position request by data interaction, receives third party database and sends Passenger position, according to passenger position match optimum position driver.
In one embodiment, it is preferred that further include that step reads passenger's stroke route, driver transfers terminal and receives internet The passenger position that software platform of hiring a car is sent, transmission check that stroke route requests to internet software platform of hiring a car, receive interconnection Net hire a car software platform transmission stroke route, send competition for orders request.It avoids internet and hires a car software platform to passenger's stroke The acquisition of route privacy, hire a car all operations of software platform and driver of internet can be all recorded on block chain, enable passenger Enough control the individual privacy information of oneself.
In one embodiment, it is preferred that further include step read access person record, passenger's mobile terminal reads passenger's message Access record obtains visitor's record.Passenger can not only see all visitor's records, enhance the control to oneself data, The violation operation that evidence indicts privacy leakage platform can also be obtained, such as empties Customer information not in time.
In one embodiment, it is preferred that further include step revocation permission, passenger's mobile terminal is examined by revocation data interaction The permission of meter platform terminates internet and hires a car the data read operation of software platform.When passenger determines that internet is stopped using to hire a car When software platform, data interaction audit platform can be cancelled to the access right of oneself data, ensure itself privacy from infringement.
A kind of electronic equipment, comprising: processor;
Memory;And program, wherein program is stored in memory, and is configured to be executed by processor, journey Sequence includes for executing above-mentioned personal privacy protection method.
A kind of computer readable storage medium, is stored thereon with computer program, and computer program is executed by processor State personal privacy protection method.
The present invention provides personal privacy protection method, comprising the following steps: initial key exchange, passenger's mobile terminal, number Key exchange is carried out according between interaction audit platform, third party database;Permission is authorized, passenger's mobile terminal sends request for utilization It orders to data interaction audit platform, and authorizes data interaction audit platform and carry out the power that block chain examines Clocked operation passenger data Limit;Privacy information is uploaded, passenger's individual privacy information is uploaded to third party database and audited in block by passenger's mobile terminal In chain, sends request of calling a taxi to internet and hire a car software platform.The invention further relates to a kind of electronic equipment, storage medium.This hair The bright internet software platform of hiring a car that realizes can not obtain the stroke route privacy of passenger, to can not sell passenger's stroke route It is sold to other groups;Passenger enhances the control to individual privacy data it can be seen that all visitors record;When passenger determines Surely stop using internet hire a car software platform when, data interaction audit platform can be cancelled to the access right of data;If Internet software platform of hiring a car by hacker attacks makes passenger's leakage of personal information after revocation permission, and passenger can be by visitor It records and internet software platform of hiring a car is emptied by the unlawful practice of Customer information is not in time engaged in a lawsuit as evidence.
More than, only presently preferred embodiments of the present invention is not intended to limit the present invention in any form;All current rows The those of ordinary skill of industry can be shown in by specification attached drawing and above and swimmingly implement the present invention;But all to be familiar with sheet special The technical staff of industry without departing from the scope of the present invention, is made a little using disclosed above technology contents The equivalent variations of variation, modification and evolution is equivalent embodiment of the invention;Meanwhile all substantial technologicals according to the present invention The variation, modification and evolution etc. of any equivalent variations to the above embodiments, still fall within technical solution of the present invention Within protection scope.

Claims (10)

1. personal privacy protection method, it is characterised in that the following steps are included:
Initial key exchange, passenger's mobile terminal, data interaction, which are audited, carries out key exchange between platform, third party database;
Permission, passenger's mobile terminal transmission request for utilization order to data interaction audit platform are authorized, and authorizes institute It states data interaction audit platform and carries out the permission that block chain examines Clocked operation passenger data;
Privacy information is uploaded, passenger's individual privacy information is uploaded to the third party database and examined by passenger's mobile terminal Meter sends request of calling a taxi to internet and hires a car software platform in block chain.
2. personal privacy protection method as described in claim 1, it is characterised in that: the step initial key exchange is specially Passenger's mobile terminal generates the first block chain address and the first private key, first private key and the first block chain address Corresponding, the third party database generates the second block chain address and the second private key, second private key and second block Chain address is corresponding, and passenger's mobile terminal is by the first block chain address, passenger's mobile terminal and the third party Symmetric key between database is sent to the non-block chain address of the third party database, and the third party database is by institute The non-block chain address that the second block chain address is sent to passenger's mobile terminal is stated, passenger's mobile terminal multiplies described The non-block chain of symmetric key, passenger's mobile terminal between objective mobile terminal and data interaction audit platform Location, the non-block chain address of the third party database, the second block chain address are sent to the data interaction audit and put down The non-block chain address of platform, the data interaction audit platform generate third block chain address, and by the third block chain Location is sent to the non-block chain address of passenger's mobile terminal.
3. personal privacy protection method as claimed in claim 2, it is characterised in that: it is specially described that the step, which authorizes permission, Cryptographic Hash, passenger's message access record, signature record are sent to the block chain of the third party database by passenger's mobile terminal Address, the data interaction audit platform return to Transaction Identification Number to passenger's mobile terminal, and passenger's mobile terminal will authorize Information, the Transaction Identification Number are sent to the non-block chain address of the third party database, described in the third party database verifying Authorization message, passenger's mobile terminal is by authorization message, the first block chain address, the third block chain address in area It is broadcasted on block chain.
4. personal privacy protection method as claimed in claim 3, it is characterised in that: the step uploads privacy information and is specially The cryptographic Hash, passenger's message access record, signature record are sent to described second by passenger's mobile terminal Block chain address, the data interaction audit platform return to the Transaction Identification Number to passenger's mobile terminal, and the passenger is mobile The request of calling a taxi is sent to the internet and hired a car the non-block chain address of software platform by terminal, passenger's mobile terminal By passenger's mobile terminal and the data interaction audit platform between encrypted symmetric key and the Transaction Identification Number be sent to The non-block chain address of the third party database, the third party database verify the authorization message.
5. personal privacy protection method as claimed in claim 4, it is characterised in that: further include that step reads passenger position and pushes away Recommend driver, internet software platform of hiring a car is sent to the third party database and read by data interaction platform of auditing It takes passenger position to request, receives the passenger position that the third party database is sent, optimum bit is matched according to the passenger position Set driver.
6. personal privacy protection method as claimed in claim 5, it is characterised in that: further include that step reads passenger's stroke road Line, driver transfer terminal receive the internet hire a car software platform transmission passenger position, transmission check stroke route request It hires a car software platform to the internet, receives the internet and hire a car the stroke route of software platform transmission, send competition for orders and ask It asks.
7. personal privacy protection method as claimed in claim 4, it is characterised in that: it further include step read access person record, Passenger's mobile terminal reads passenger's message access record and obtains visitor's record.
8. personal privacy protection method as described in claim 1, it is characterised in that: it further include step revocation permission, it is described to multiply Objective mobile terminal terminates the internet and hires a car the data of software platform by cancelling the audit permission of platform of the data interaction Read operation.
9. a kind of electronic equipment, characterized by comprising: processor;
Memory;And program, wherein described program is stored in the memory, and is configured to be held by processor Row, described program include requiring method described in 1-8 any one for perform claim.
10. a kind of computer readable storage medium, is stored thereon with computer program, it is characterised in that: the computer program It is executed by processor the method as described in claim 1-8 any one.
CN201810589580.0A 2018-06-08 2018-06-08 Personal privacy protection method, electronic equipment, storage medium Pending CN108989285A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810589580.0A CN108989285A (en) 2018-06-08 2018-06-08 Personal privacy protection method, electronic equipment, storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810589580.0A CN108989285A (en) 2018-06-08 2018-06-08 Personal privacy protection method, electronic equipment, storage medium

Publications (1)

Publication Number Publication Date
CN108989285A true CN108989285A (en) 2018-12-11

Family

ID=64540108

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810589580.0A Pending CN108989285A (en) 2018-06-08 2018-06-08 Personal privacy protection method, electronic equipment, storage medium

Country Status (1)

Country Link
CN (1) CN108989285A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110022217A (en) * 2019-04-04 2019-07-16 深圳大通实业股份有限公司 A kind of credible deposit system of advertisement media business datum based on block chain
CN112752232A (en) * 2021-01-07 2021-05-04 重庆大学 Privacy-oriented driver-passenger matching mechanism
WO2021121350A1 (en) * 2019-12-19 2021-06-24 Beijing Didi Infinity Technology And Development Co., Ltd. System, method, and storage medium for distributed data management
CN113472594A (en) * 2021-08-06 2021-10-01 上海海事大学 Revocation-supported shared data auditing system and method in vehicle self-organizing network
CN113836576A (en) * 2021-08-25 2021-12-24 安徽高山科技有限公司 User privacy data protection method for taxi taking software

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110022217A (en) * 2019-04-04 2019-07-16 深圳大通实业股份有限公司 A kind of credible deposit system of advertisement media business datum based on block chain
CN110022217B (en) * 2019-04-04 2021-11-05 深圳大通实业股份有限公司 Advertisement media service data credible storage system based on block chain
WO2021121350A1 (en) * 2019-12-19 2021-06-24 Beijing Didi Infinity Technology And Development Co., Ltd. System, method, and storage medium for distributed data management
US11275851B2 (en) 2019-12-19 2022-03-15 Beijing Didi Infinity Technology And Development Co., Ltd. System, method, and storage medium for distributed data management
CN112752232A (en) * 2021-01-07 2021-05-04 重庆大学 Privacy-oriented driver-passenger matching mechanism
CN112752232B (en) * 2021-01-07 2022-07-12 重庆大学 Privacy protection-oriented driver-passenger matching method
CN113472594A (en) * 2021-08-06 2021-10-01 上海海事大学 Revocation-supported shared data auditing system and method in vehicle self-organizing network
CN113836576A (en) * 2021-08-25 2021-12-24 安徽高山科技有限公司 User privacy data protection method for taxi taking software
CN113836576B (en) * 2021-08-25 2023-07-07 安徽高山科技有限公司 User privacy data protection method for taxi taking software

Similar Documents

Publication Publication Date Title
CN108989285A (en) Personal privacy protection method, electronic equipment, storage medium
Zhang et al. Design of
CN110120953B (en) Railway passenger identity authentication system facing smart phone client
CN110490610B (en) Community management system based on block chain
CN110414270B (en) Personal data protection system and method based on block chain
CN107563846A (en) Shared vehicles management method, server, system and computer-readable recording medium
CN110046945A (en) Invoice creation method and device, electronic equipment based on block chain
CN109710687A (en) Processing method of insuring, device and electronic equipment based on block chain
CN106785146A (en) The charging method and system of the electric automobile charging pile with bluetooth
CN107507451A (en) Parking stall shared system and method
CN101677272B (en) Center apparatus, terminal apparatus, and authentication system
CN107256478A (en) A kind of shared resource system and method based on mobile Internet big data
CN111061982B (en) News information publishing and managing system based on block chain
CN111242248A (en) Personnel information monitoring method and device and computer storage medium
CN110009439A (en) A kind of taxi operational know-how and device based on block chain
Puri et al. A vital role of blockchain technology toward internet of vehicles
Sharifinejad et al. BIS-A blockchain-based solution for the insurance industry in smart cities
CN111639836A (en) Vehicle scheduling processing method and device based on block chain and computer equipment
CN106696749A (en) Charging method and system for electric automobile charging pile with Zigbee
CN109064215A (en) The male to male settlement system of tourism commission and method based on region chain
CN112053081A (en) Credit integral adjusting method and device based on block chain and storage medium thereof
Wang et al. Enabling Fairness‐Aware and Privacy‐Preserving for Quality Evaluation in Vehicular Crowdsensing: A Decentralized Approach
CN111460492B (en) Data privacy management system based on block chain and implementation method thereof
CN109543868A (en) A kind of about vehicle approaches to IM and relevant apparatus
CN109410056A (en) A kind of method that charging system for electric automobile realizes decentralization Secure Transaction

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181211

WD01 Invention patent application deemed withdrawn after publication