CN108989285A - Personal privacy protection method, electronic equipment, storage medium - Google Patents
Personal privacy protection method, electronic equipment, storage medium Download PDFInfo
- Publication number
- CN108989285A CN108989285A CN201810589580.0A CN201810589580A CN108989285A CN 108989285 A CN108989285 A CN 108989285A CN 201810589580 A CN201810589580 A CN 201810589580A CN 108989285 A CN108989285 A CN 108989285A
- Authority
- CN
- China
- Prior art keywords
- passenger
- block chain
- mobile terminal
- platform
- chain address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0645—Rental transactions; Leasing transactions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Software Systems (AREA)
- Traffic Control Systems (AREA)
- Medical Informatics (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Databases & Information Systems (AREA)
Abstract
The present invention provides personal privacy protection method, comprising steps of initial key exchange, passenger's mobile terminal, data interaction, which are audited, carries out key exchange between platform, third party database;Permission, passenger's mobile terminal transmission request for utilization order to data interaction audit platform are authorized, and authorizes data interaction audit platform and carries out the permission that block chain examines Clocked operation passenger data;Privacy information is uploaded, passenger's individual privacy information is uploaded to third party database and audited in block chain by passenger's mobile terminal, is sent request of calling a taxi to internet and is hired a car software platform.The invention further relates to electronic equipments, storage medium.Internet of the invention software platform of hiring a car can not obtain the stroke route privacy of passenger, to protect the stroke route privacy information of passenger;Passenger enhances the control to individual privacy data it can be seen that all visitors record;By revocation data interaction platform of auditing the access right of data is realized internet software platform of hiring a car is stopped using.
Description
Technical field
The present invention relates to field of communication technology more particularly to personal privacy protection method, electronic equipment, storage mediums.
Background technique
Internet is hired a car, and to be basic model by " hire a car+generation drive " provide in a manner of the novel Urban Traffic of one kind for passenger.But
As internet is hired a car prevailing, passenger's privacy problem is also outstanding day by day, causes the extensive concern of society.Passenger is daily
It is hired a car software using internet, traffic path is relatively more fixed.It hires a car and has the following problems in mode in existing internet: Cheng Kewu
Method guarantees that internet platform of hiring a car maintains secrecy to the personal information of oneself, and the travel route information of upload may be interconnected net and rent
Vehicle platform is usurped in promotional advertising and obtains other commercial values;Platform is hired a car in internet and driver can arbitrarily check passenger
Travel routes information, so that passenger is difficult to effectively control the individual privacy information of oneself;When passenger wants to stop using the interconnection
Net hire a car software when, the information being stored on the software before can not empty;When successfully to have required internet to hire a car soft by passenger
Part deletes the personal information of oneself, when the hacked personal information for leading to oneself of the software leaks, can not provide evidence
It engages in a lawsuit to the software.
Summary of the invention
For overcome the deficiencies in the prior art, one of the objects of the present invention is to provide personal privacy protection methods, solve
The problem of traditional internet mode of hiring a car can not protect passenger's individual privacy.
The present invention provides personal privacy protection method, comprising the following steps:
Initial key exchange, passenger's mobile terminal, data interaction, which are audited, carries out key friendship between platform, third party database
It changes;
Permission, passenger's mobile terminal transmission request for utilization order to data interaction audit platform are authorized, and is awarded
It gives the data interaction audit platform and carries out the permission that block chain examines Clocked operation passenger data;
Privacy information is uploaded, passenger's individual privacy information is uploaded to the third party database by passenger's mobile terminal
And audit in block chain, it sends request of calling a taxi to internet and hires a car software platform.
Further, the step initial key exchange is specially that passenger's mobile terminal generates the first block chain address
With the first private key, first private key is corresponding with the first block chain address, and the third party database generates the second block
Chain address and the second private key, second private key is corresponding with the second block chain address, and passenger's mobile terminal will be described
Symmetric key between first block chain address, passenger's mobile terminal and the third party database is sent to the third
The second block chain address is sent to passenger's movement by the non-block chain address of party database, the third party database
The non-block chain address of terminal, passenger's mobile terminal by passenger's mobile terminal and the data interaction audit platform it
Between symmetric key, passenger's mobile terminal non-block chain address, the non-block chain address of the third party database, institute
State the non-block chain address that the second block chain address is sent to the data interaction audit platform, the data interaction audit platform
Third block chain address is generated, and with being sent to the non-block chain of passenger's mobile terminal by the third block chain address
Location.
Further, it is specially that passenger's mobile terminal accesses cryptographic Hash, passenger's message that the step, which authorizes permission,
Record, signature record are sent to the block chain address of the third party database, and the data interaction audit platform returns to transaction
Number to passenger's mobile terminal, authorization message, the Transaction Identification Number are sent to the third number formulary by passenger's mobile terminal
According to the non-block chain address in library, the third party database verifies the authorization message, and passenger's mobile terminal believes authorization
Breath, the first block chain address, the third block chain address are broadcasted on block chain.
Further, it is specially passenger's mobile terminal by the cryptographic Hash, described that the step, which uploads privacy information,
Passenger's message access record, signature record are sent to the second block chain address, and the data interaction audit platform returns
The Transaction Identification Number is returned to passenger's mobile terminal, the request of calling a taxi is sent to the internet by passenger's mobile terminal
It hires a car the non-block chain address of software platform, passenger's mobile terminal examines passenger's mobile terminal and the data interaction
Encrypted symmetric key and the Transaction Identification Number between meter platform are sent to the non-block chain address of the third party database, described
Third party database verifies the authorization message.
It further, further include that step reads passenger position and recommends driver, internet software platform of hiring a car passes through
The data interaction audits platform to third party database transmission reading passenger position request, receives third party's data
The passenger position that library is sent matches optimum position driver according to the passenger position.
It further, further include that step reads passenger's stroke route, driver's transfer terminal reception internet is hired a car soft
The passenger position that part platform is sent, transmission check that stroke route requests to the internet software platform of hiring a car, and receive described mutual
Networking hire a car software platform transmission stroke route, send competition for orders request.
It further, further include step read access person record, passenger's mobile terminal reads passenger's message and visits
Ask that record obtains visitor's record.
It further, further include step revocation permission, passenger's mobile terminal is by cancelling the data interaction audit
The permission of platform terminates the internet and hires a car the data read operation of software platform.
A kind of electronic equipment, comprising: processor;
Memory;And program, wherein described program is stored in the memory, and is configured to by processor
It executes, described program includes for executing above-mentioned personal privacy protection method.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
The above-mentioned personal privacy protection method of row.
Compared with prior art, the beneficial effects of the present invention are:
The present invention provides personal privacy protection method, comprising the following steps: initial key exchange, passenger's mobile terminal, number
Key exchange is carried out according between interaction audit platform, third party database;Permission is authorized, passenger's mobile terminal sends request for utilization
It orders to data interaction audit platform, and authorizes data interaction audit platform and carry out the power that block chain examines Clocked operation passenger data
Limit;Privacy information is uploaded, passenger's individual privacy information is uploaded to third party database and audited in block by passenger's mobile terminal
In chain, sends request of calling a taxi to internet and hire a car software platform.The invention further relates to a kind of electronic equipment, storage medium.This hair
The bright internet software platform of hiring a car that realizes can not obtain the stroke route privacy of passenger, to can not sell passenger's stroke route
It is sold to other groups;Passenger enhances the control to individual privacy data it can be seen that all visitors record;When passenger determines
Surely stop using internet hire a car software platform when, data interaction audit platform can be cancelled to the access right of data;If
Internet software platform of hiring a car by hacker attacks makes passenger's leakage of personal information after revocation permission, and passenger can be by visitor
It records and internet software platform of hiring a car is emptied by the unlawful practice of Customer information is not in time engaged in a lawsuit as evidence.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention,
And can be implemented in accordance with the contents of the specification, the following is a detailed description of the preferred embodiments of the present invention and the accompanying drawings.
A specific embodiment of the invention is shown in detail by following embodiment and its attached drawing.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes part of this application, this hair
Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is personal privacy protection method flow diagram of the invention.
Specific embodiment
In the following, being described further in conjunction with attached drawing and specific embodiment to the present invention, it should be noted that not
Under the premise of conflicting, new implementation can be formed between various embodiments described below or between each technical characteristic in any combination
Example.
Personal privacy protection method, as shown in Figure 1, comprising the following steps:
Initial key exchange, passenger's mobile terminal, data interaction, which are audited, carries out key friendship between platform, third party database
It changes;In the present embodiment, third party database is the trustship that passenger selects the database realizing individual privacy data trusted, and data are handed over
Mutually audit platform is the system for being built on block chain and auditing to all data manipulation behaviors, it is preferred that at the beginning of step
The exchange of beginning key is specially that passenger's mobile terminal generates the first block chain address and the first private key, the first private key and the first block chain
Address is corresponding, and third party database generates the second block chain address and the second private key, the second private key and the second block chain address pair
It answers, passenger's mobile terminal sends the symmetric key between the first block chain address, passenger's mobile terminal and third party database
To the non-block chain address of third party database, the second block chain address is sent to passenger's mobile terminal by third party database
Non- block chain address, passenger's mobile terminal by passenger's mobile terminal and data interaction audit platform between symmetric key, passenger
Non- block chain address, the non-block chain address of third party database, the second block chain address of mobile terminal are sent to data friendship
The mutually non-block chain address of audit platform, data interaction audit platform generate third block chain address, and by third block chain
Location is sent to the non-block chain address of passenger's mobile terminal.
Permission, passenger's mobile terminal transmission request for utilization order to data interaction audit platform are authorized, and authorizes data friendship
Mutually audit platform carries out the permission that block chain examines Clocked operation passenger data;Preferably, it is specially passenger's shifting that step, which authorizes permission,
Cryptographic Hash, passenger's message access record, signature record are sent to the block chain address of third party database by dynamic terminal, and data are handed over
Mutually audit platform returns to Transaction Identification Number to passenger's mobile terminal, and authorization message, Transaction Identification Number are sent to third party by passenger's mobile terminal
The non-block chain address of database, third party database verify authorization message, and passenger's mobile terminal is by authorization message, the first block
Chain address, third block chain address are broadcasted on block chain.
Privacy information is uploaded, passenger's individual privacy information is uploaded to third party database and audited by passenger's mobile terminal
In block chain, sends request of calling a taxi to internet and hire a car software platform.Preferably, it is specially passenger's shifting that step, which uploads privacy information,
It moves terminal and cryptographic Hash, passenger's message access record, signature record is sent to the second block chain address, data interaction audit platform
Transaction Identification Number is returned to passenger's mobile terminal, request of calling a taxi is sent to internet and hired a car the non-area of software platform by passenger's mobile terminal
Block chain address, passenger's mobile terminal by passenger's mobile terminal and data interaction audit platform between encrypted symmetric key and transaction
It number is sent to the non-block chain address of third party database, third party database verifies authorization message.Internet software of hiring a car is flat
Platform, which can not obtain the stroke route privacy of passenger and sell, gives other groups, and individual privacy information is uploaded to third party database
And it audits in block chain.
In one embodiment, it is preferred that further include that step reads passenger position and recommends driver, internet software of hiring a car is flat
Platform audits platform to third party database transmission reading passenger position request by data interaction, receives third party database and sends
Passenger position, according to passenger position match optimum position driver.
In one embodiment, it is preferred that further include that step reads passenger's stroke route, driver transfers terminal and receives internet
The passenger position that software platform of hiring a car is sent, transmission check that stroke route requests to internet software platform of hiring a car, receive interconnection
Net hire a car software platform transmission stroke route, send competition for orders request.It avoids internet and hires a car software platform to passenger's stroke
The acquisition of route privacy, hire a car all operations of software platform and driver of internet can be all recorded on block chain, enable passenger
Enough control the individual privacy information of oneself.
In one embodiment, it is preferred that further include step read access person record, passenger's mobile terminal reads passenger's message
Access record obtains visitor's record.Passenger can not only see all visitor's records, enhance the control to oneself data,
The violation operation that evidence indicts privacy leakage platform can also be obtained, such as empties Customer information not in time.
In one embodiment, it is preferred that further include step revocation permission, passenger's mobile terminal is examined by revocation data interaction
The permission of meter platform terminates internet and hires a car the data read operation of software platform.When passenger determines that internet is stopped using to hire a car
When software platform, data interaction audit platform can be cancelled to the access right of oneself data, ensure itself privacy from infringement.
A kind of electronic equipment, comprising: processor;
Memory;And program, wherein program is stored in memory, and is configured to be executed by processor, journey
Sequence includes for executing above-mentioned personal privacy protection method.
A kind of computer readable storage medium, is stored thereon with computer program, and computer program is executed by processor
State personal privacy protection method.
The present invention provides personal privacy protection method, comprising the following steps: initial key exchange, passenger's mobile terminal, number
Key exchange is carried out according between interaction audit platform, third party database;Permission is authorized, passenger's mobile terminal sends request for utilization
It orders to data interaction audit platform, and authorizes data interaction audit platform and carry out the power that block chain examines Clocked operation passenger data
Limit;Privacy information is uploaded, passenger's individual privacy information is uploaded to third party database and audited in block by passenger's mobile terminal
In chain, sends request of calling a taxi to internet and hire a car software platform.The invention further relates to a kind of electronic equipment, storage medium.This hair
The bright internet software platform of hiring a car that realizes can not obtain the stroke route privacy of passenger, to can not sell passenger's stroke route
It is sold to other groups;Passenger enhances the control to individual privacy data it can be seen that all visitors record;When passenger determines
Surely stop using internet hire a car software platform when, data interaction audit platform can be cancelled to the access right of data;If
Internet software platform of hiring a car by hacker attacks makes passenger's leakage of personal information after revocation permission, and passenger can be by visitor
It records and internet software platform of hiring a car is emptied by the unlawful practice of Customer information is not in time engaged in a lawsuit as evidence.
More than, only presently preferred embodiments of the present invention is not intended to limit the present invention in any form;All current rows
The those of ordinary skill of industry can be shown in by specification attached drawing and above and swimmingly implement the present invention;But all to be familiar with sheet special
The technical staff of industry without departing from the scope of the present invention, is made a little using disclosed above technology contents
The equivalent variations of variation, modification and evolution is equivalent embodiment of the invention;Meanwhile all substantial technologicals according to the present invention
The variation, modification and evolution etc. of any equivalent variations to the above embodiments, still fall within technical solution of the present invention
Within protection scope.
Claims (10)
1. personal privacy protection method, it is characterised in that the following steps are included:
Initial key exchange, passenger's mobile terminal, data interaction, which are audited, carries out key exchange between platform, third party database;
Permission, passenger's mobile terminal transmission request for utilization order to data interaction audit platform are authorized, and authorizes institute
It states data interaction audit platform and carries out the permission that block chain examines Clocked operation passenger data;
Privacy information is uploaded, passenger's individual privacy information is uploaded to the third party database and examined by passenger's mobile terminal
Meter sends request of calling a taxi to internet and hires a car software platform in block chain.
2. personal privacy protection method as described in claim 1, it is characterised in that: the step initial key exchange is specially
Passenger's mobile terminal generates the first block chain address and the first private key, first private key and the first block chain address
Corresponding, the third party database generates the second block chain address and the second private key, second private key and second block
Chain address is corresponding, and passenger's mobile terminal is by the first block chain address, passenger's mobile terminal and the third party
Symmetric key between database is sent to the non-block chain address of the third party database, and the third party database is by institute
The non-block chain address that the second block chain address is sent to passenger's mobile terminal is stated, passenger's mobile terminal multiplies described
The non-block chain of symmetric key, passenger's mobile terminal between objective mobile terminal and data interaction audit platform
Location, the non-block chain address of the third party database, the second block chain address are sent to the data interaction audit and put down
The non-block chain address of platform, the data interaction audit platform generate third block chain address, and by the third block chain
Location is sent to the non-block chain address of passenger's mobile terminal.
3. personal privacy protection method as claimed in claim 2, it is characterised in that: it is specially described that the step, which authorizes permission,
Cryptographic Hash, passenger's message access record, signature record are sent to the block chain of the third party database by passenger's mobile terminal
Address, the data interaction audit platform return to Transaction Identification Number to passenger's mobile terminal, and passenger's mobile terminal will authorize
Information, the Transaction Identification Number are sent to the non-block chain address of the third party database, described in the third party database verifying
Authorization message, passenger's mobile terminal is by authorization message, the first block chain address, the third block chain address in area
It is broadcasted on block chain.
4. personal privacy protection method as claimed in claim 3, it is characterised in that: the step uploads privacy information and is specially
The cryptographic Hash, passenger's message access record, signature record are sent to described second by passenger's mobile terminal
Block chain address, the data interaction audit platform return to the Transaction Identification Number to passenger's mobile terminal, and the passenger is mobile
The request of calling a taxi is sent to the internet and hired a car the non-block chain address of software platform by terminal, passenger's mobile terminal
By passenger's mobile terminal and the data interaction audit platform between encrypted symmetric key and the Transaction Identification Number be sent to
The non-block chain address of the third party database, the third party database verify the authorization message.
5. personal privacy protection method as claimed in claim 4, it is characterised in that: further include that step reads passenger position and pushes away
Recommend driver, internet software platform of hiring a car is sent to the third party database and read by data interaction platform of auditing
It takes passenger position to request, receives the passenger position that the third party database is sent, optimum bit is matched according to the passenger position
Set driver.
6. personal privacy protection method as claimed in claim 5, it is characterised in that: further include that step reads passenger's stroke road
Line, driver transfer terminal receive the internet hire a car software platform transmission passenger position, transmission check stroke route request
It hires a car software platform to the internet, receives the internet and hire a car the stroke route of software platform transmission, send competition for orders and ask
It asks.
7. personal privacy protection method as claimed in claim 4, it is characterised in that: it further include step read access person record,
Passenger's mobile terminal reads passenger's message access record and obtains visitor's record.
8. personal privacy protection method as described in claim 1, it is characterised in that: it further include step revocation permission, it is described to multiply
Objective mobile terminal terminates the internet and hires a car the data of software platform by cancelling the audit permission of platform of the data interaction
Read operation.
9. a kind of electronic equipment, characterized by comprising: processor;
Memory;And program, wherein described program is stored in the memory, and is configured to be held by processor
Row, described program include requiring method described in 1-8 any one for perform claim.
10. a kind of computer readable storage medium, is stored thereon with computer program, it is characterised in that: the computer program
It is executed by processor the method as described in claim 1-8 any one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810589580.0A CN108989285A (en) | 2018-06-08 | 2018-06-08 | Personal privacy protection method, electronic equipment, storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810589580.0A CN108989285A (en) | 2018-06-08 | 2018-06-08 | Personal privacy protection method, electronic equipment, storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108989285A true CN108989285A (en) | 2018-12-11 |
Family
ID=64540108
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810589580.0A Pending CN108989285A (en) | 2018-06-08 | 2018-06-08 | Personal privacy protection method, electronic equipment, storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108989285A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110022217A (en) * | 2019-04-04 | 2019-07-16 | 深圳大通实业股份有限公司 | A kind of credible deposit system of advertisement media business datum based on block chain |
CN112752232A (en) * | 2021-01-07 | 2021-05-04 | 重庆大学 | Privacy-oriented driver-passenger matching mechanism |
WO2021121350A1 (en) * | 2019-12-19 | 2021-06-24 | Beijing Didi Infinity Technology And Development Co., Ltd. | System, method, and storage medium for distributed data management |
CN113472594A (en) * | 2021-08-06 | 2021-10-01 | 上海海事大学 | Revocation-supported shared data auditing system and method in vehicle self-organizing network |
CN113836576A (en) * | 2021-08-25 | 2021-12-24 | 安徽高山科技有限公司 | User privacy data protection method for taxi taking software |
-
2018
- 2018-06-08 CN CN201810589580.0A patent/CN108989285A/en active Pending
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110022217A (en) * | 2019-04-04 | 2019-07-16 | 深圳大通实业股份有限公司 | A kind of credible deposit system of advertisement media business datum based on block chain |
CN110022217B (en) * | 2019-04-04 | 2021-11-05 | 深圳大通实业股份有限公司 | Advertisement media service data credible storage system based on block chain |
WO2021121350A1 (en) * | 2019-12-19 | 2021-06-24 | Beijing Didi Infinity Technology And Development Co., Ltd. | System, method, and storage medium for distributed data management |
US11275851B2 (en) | 2019-12-19 | 2022-03-15 | Beijing Didi Infinity Technology And Development Co., Ltd. | System, method, and storage medium for distributed data management |
CN112752232A (en) * | 2021-01-07 | 2021-05-04 | 重庆大学 | Privacy-oriented driver-passenger matching mechanism |
CN112752232B (en) * | 2021-01-07 | 2022-07-12 | 重庆大学 | Privacy protection-oriented driver-passenger matching method |
CN113472594A (en) * | 2021-08-06 | 2021-10-01 | 上海海事大学 | Revocation-supported shared data auditing system and method in vehicle self-organizing network |
CN113836576A (en) * | 2021-08-25 | 2021-12-24 | 安徽高山科技有限公司 | User privacy data protection method for taxi taking software |
CN113836576B (en) * | 2021-08-25 | 2023-07-07 | 安徽高山科技有限公司 | User privacy data protection method for taxi taking software |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108989285A (en) | Personal privacy protection method, electronic equipment, storage medium | |
Zhang et al. | Design of | |
CN110120953B (en) | Railway passenger identity authentication system facing smart phone client | |
CN110490610B (en) | Community management system based on block chain | |
CN110414270B (en) | Personal data protection system and method based on block chain | |
CN107563846A (en) | Shared vehicles management method, server, system and computer-readable recording medium | |
CN110046945A (en) | Invoice creation method and device, electronic equipment based on block chain | |
CN109710687A (en) | Processing method of insuring, device and electronic equipment based on block chain | |
CN106785146A (en) | The charging method and system of the electric automobile charging pile with bluetooth | |
CN107507451A (en) | Parking stall shared system and method | |
CN101677272B (en) | Center apparatus, terminal apparatus, and authentication system | |
CN107256478A (en) | A kind of shared resource system and method based on mobile Internet big data | |
CN111061982B (en) | News information publishing and managing system based on block chain | |
CN111242248A (en) | Personnel information monitoring method and device and computer storage medium | |
CN110009439A (en) | A kind of taxi operational know-how and device based on block chain | |
Puri et al. | A vital role of blockchain technology toward internet of vehicles | |
Sharifinejad et al. | BIS-A blockchain-based solution for the insurance industry in smart cities | |
CN111639836A (en) | Vehicle scheduling processing method and device based on block chain and computer equipment | |
CN106696749A (en) | Charging method and system for electric automobile charging pile with Zigbee | |
CN109064215A (en) | The male to male settlement system of tourism commission and method based on region chain | |
CN112053081A (en) | Credit integral adjusting method and device based on block chain and storage medium thereof | |
Wang et al. | Enabling Fairness‐Aware and Privacy‐Preserving for Quality Evaluation in Vehicular Crowdsensing: A Decentralized Approach | |
CN111460492B (en) | Data privacy management system based on block chain and implementation method thereof | |
CN109543868A (en) | A kind of about vehicle approaches to IM and relevant apparatus | |
CN109410056A (en) | A kind of method that charging system for electric automobile realizes decentralization Secure Transaction |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20181211 |
|
WD01 | Invention patent application deemed withdrawn after publication |