CN109697368A - Method, equipment and system that user information data safety uses, storage medium - Google Patents
Method, equipment and system that user information data safety uses, storage medium Download PDFInfo
- Publication number
- CN109697368A CN109697368A CN201710983616.9A CN201710983616A CN109697368A CN 109697368 A CN109697368 A CN 109697368A CN 201710983616 A CN201710983616 A CN 201710983616A CN 109697368 A CN109697368 A CN 109697368A
- Authority
- CN
- China
- Prior art keywords
- data
- service platform
- user
- information
- desensitization
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Abstract
The present invention provides a kind of method that user information data safety uses, equipment and system, storage medium, wherein method includes: to send data to data service platform to use solicited message;The desensitization user data for using solicited message to generate according to the data is received from the data service platform, wherein the data service platform generates the desensitization user data according to users personal data.The present invention makes full use of users personal data while protecting individual subscriber privacy, allows the maximizing the benefits of users personal data.
Description
Technical field
The present invention relates to the guard methods of technical field of the computer network more particularly to user privacy information, specifically
Exactly a kind of method that user information data safety uses, equipment and system, storage medium.
Background technique
With the fast development of the network information technology, the combination in daily life and the virtual network world is more and more tighter
Close, many contents in people's daily life, work are by carriers such as computer, server, network service platforms with data information
Mode write come, these data informations are dispersed in electric business platform, financial institution, search engine, geo-location service quotient's hand
In.Some Internet service companies utilize illegal technological means, collect the personal data information of user without restraint, and according to collection
Personal data information analyzes the privacy information that user takes pains protection;With the expansion of internet financing service, Ge Biegong
Department signs User Agreement with user, and using the carelessness of user and ignorant, any privacy information collected and share user will be used
The affairs such as the privacy information at family is used for credit evaluation, promise breaking is called to account, are abused so as to cause user information;What is more, some
Internet company even sells user information in the unwitting situation of user and obtains economic interests, these user informations become mutual
The information source of networking swindle case.
The personal data information of user should belong to user, and user possesses ownership to the personal data information of oneself and makes
With power.Then, different user is different to the attention rate of personal data privacy, and personal privacy protection structure of the law is not good for also at home
In the case where complete, many people form risk prevention consciousness to the personal data information of oneself not yet, how to protect this kind of crowd
Legitimate rights and interests do not encroached on, prevent personal data information from illegally being abused, be the task of top priority of those skilled in the art.
Personal data information itself has preferable society and economic benefit, such as: a large amount of trip data of user helps
In helping government department to formulate more accurately traffic administration scheme;A large amount of medical data is for disease treatment and drug invention
With practice significance.Therefore, either social level or enterprise level, user data all have good society and economy
Benefit.In addition, enterprise analyzes hobby, consumption habit of user etc., or even pass through user's according to the historical behavior data of user
Historical behavior data are the credit rating of user, allow the user having a good credit to obtain under the scenes such as loan more preferential, reduce enterprise
While the operation management cost of industry, more cheap, efficient, quality services can be provided for family of keeping promise, people will
The credit record of oneself is treasured, so that the Credit Environment of entire society is improved.
Therefore, how while protecting users personal data information not abused illegally, guarantee users personal data letter
Breath can fairly be utilized, and given full play to the social benefit and economic benefit of users personal data information, be this field
The technical issues of technical staff's urgent need to resolve.
Summary of the invention
In view of this, the technical problem to be solved in the present invention is that providing a kind of side that user information data safety uses
Method, equipment and system, storage medium, solving the prior art cannot be considered in terms of personal data information protection and personal data information benefit
The problem of using.
In order to solve the above-mentioned technical problem, a specific embodiment of the invention provides a kind of user information data safety use
Method, comprising: to data service platform send data use solicited message;It is received according to from the data service platform
The desensitization user data that data use solicited message to generate, wherein the data service platform is generated according to users personal data
The desensitization user data.
A specific embodiment of the invention also provides a kind of data that user information data safety uses and uses method, apparatus, wraps
Include: transmission unit uses solicited message for sending data to data service platform;Receiving unit, for being taken from the data
Business platform receives the desensitization user data for using solicited message to generate according to the data, wherein the data service platform root
The desensitization user data is generated according to users personal data.
A specific embodiment of the invention also provides a kind of method that user information data safety uses, comprising: from data
Data, which are received, using method, apparatus uses solicited message;Using solicited message users personal data is processed into according to the data de-
Quick user data.
A specific embodiment of the invention also provides a kind of data service platform that user information data safety uses, packet
Include: receiving unit uses solicited message for receiving data using method, apparatus from data;Processing unit, for according to the number
According to using solicited message that users personal data is processed into desensitization user data.
A specific embodiment of the invention also provides a kind of method that user information data safety uses, comprising: to data
Service platform sends data and illustrates information;Data are received using method, apparatus according to the data explanation from the data service platform
The business algorithm of message composition;The business algorithm is authenticated, is utilized to authenticate by the rear data service platform
The users personal data is generated desensitization user data by the business algorithm.
A specific embodiment of the invention also provides a kind of data providing equipment that user information data safety uses, packet
Include: transmission unit illustrates information for sending data to data service platform;Receiving unit, for flat from the data service
Platform receives the business algorithm that data illustrate message composition using method, apparatus according to the data;Authentication unit, for the industry
Business algorithm is authenticated, and utilizes the business algorithm by the individual subscriber number by the rear data service platform to authenticate
According to generation desensitization user data.
A specific embodiment of the invention also provides a kind of method that user information data safety uses, comprising: from data
Service platform receives data and uses authorization requests information;It is flat to the data service using authorization requests information according to the data
Platform feeds back license confirmation information, so that the data service platform is passed to data using method, apparatus according to the license confirmation information
Send desensitization user data.
A specific embodiment of the invention also provides a kind of subscriber terminal equipment that user information data safety uses, packet
Include: receiving unit uses authorization requests information for receiving data from data service platform;Transmission unit, for according to
Data feed back license confirmation information to the data service platform using authorization requests information, so as to the data service platform root
Method, apparatus transmission desensitization user data is used to data according to the license confirmation information.
A specific embodiment of the invention also provides a kind of system that user information data safety uses, comprising: multiple numbers
According to using method, apparatus, data service platform, multiple data providing equipment and multiple subscriber terminal equipments.Wherein, Duo Gesuo
State data using method, apparatus, multiple data providing equipment and multiple subscriber terminal equipments with the data service
Platform connection;The data are used to illustrate message composition industry according to the data that the data providing equipment provides using method, apparatus
Business algorithm, and use the desensitization user data on the data service platform;The data service platform is used to utilize the industry
Users personal data is generated the desensitization user data by business algorithm, and will be described de- after the subscriber terminal equipment authorization
Quick user data sends the data to and uses method, apparatus;The data providing equipment to the data service platform for mentioning
For the users personal data, and authenticate the business algorithm that the data are write using method, apparatus;The user terminal is set
It is ready for use on the authorization data and uses legal use of the method, apparatus to the users personal data.
A specific embodiment of the invention also provides a kind of computer storage medium comprising computer executed instructions, described
When computer executed instructions are handled by data processing equipment, the data processing equipment executes user information data safety and uses
Method.
Above-mentioned specific embodiment according to the present invention it is found that user information data safety use method, equipment and be
System, storage medium at least have the advantages that data user oneself defines the business processing algorithm of users personal data,
Data providing authenticates the business processing algorithm;If data user needs obtaining the user using users personal data
In the case where authorization, (individual subscriber number is not being influenced using the users personal data by the business processing algorithm process of certification
Under the premise of according to normal use, desensitization process is carried out to users personal data), by treated, users personal data is sent to number
According to user, (privacy of user or initial data are not exposed) while protecting individual subscriber privacy, does not influence individual subscriber
The normal use of data makes the maximizing the benefits of users personal data.
It is to be understood that above-mentioned general description and following specific embodiments are merely illustrative and illustrative, not
The range of the invention to be advocated can be limited.
Detailed description of the invention
Following appended attached drawing is part of specification of the invention, depicts example embodiments of the present invention, institute
Attached drawing is used to illustrate the principle of the present invention together with the description of specification.
Fig. 1 is a kind of embodiment one for method that user information data safety uses that the specific embodiment of the invention provides
Flow chart.
Fig. 2 is a kind of embodiment two for method that user information data safety uses that the specific embodiment of the invention provides
Flow chart.
Fig. 3 is that a kind of data that user information data safety uses that the specific embodiment of the invention provides use method, apparatus
Embodiment one structural schematic diagram.
Fig. 4 is that a kind of data that user information data safety uses that the specific embodiment of the invention provides use method, apparatus
Embodiment two structural schematic diagram.
Fig. 5 is a kind of embodiment three for method that user information data safety uses that the specific embodiment of the invention provides
Flow chart.
Fig. 6 is a kind of example IV for method that user information data safety uses that the specific embodiment of the invention provides
Flow chart.
Fig. 7 is a kind of embodiment five for method that user information data safety uses that the specific embodiment of the invention provides
Flow chart.
Fig. 8 is a kind of data service platform that user information data safety uses that the specific embodiment of the invention provides
The structural schematic diagram of embodiment one.
Fig. 9 is a kind of data service platform that user information data safety uses that the specific embodiment of the invention provides
The structural schematic diagram of embodiment two.
Figure 10 is a kind of embodiment for method that user information data safety uses that the specific embodiment of the invention provides
Six flow chart.
Figure 11 is a kind of embodiment for method that user information data safety uses that the specific embodiment of the invention provides
Seven flow chart.
Figure 12 is that a kind of data providing that user information data safety uses that the specific embodiment of the invention provides is set
Standby structural schematic diagram.
Figure 13 is a kind of embodiment for method that user information data safety uses that the specific embodiment of the invention provides
Eight flow chart.
Figure 14 is a kind of subscriber terminal equipment that user information data safety uses that the specific embodiment of the invention provides
Structural schematic diagram.
Figure 15 is that a kind of composition for system that user information data safety uses that the specific embodiment of the invention provides shows
It is intended to.
When Figure 16 is a kind of work for system that user information data safety uses that the specific embodiment of the invention provides
Sequence figure.
Specific embodiment
Understand in order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below will with attached drawing and in detail
Narration clearly illustrates the spirit of disclosed content, and any skilled artisan is understanding the content of present invention
After embodiment, when the technology that can be taught by the content of present invention, it is changed and modifies, without departing from the essence of the content of present invention
Mind and range.
The illustrative embodiments of the present invention and their descriptions are used to explain the present invention, but not as a limitation of the invention.
In addition, in the drawings and embodiments the use of element/component of same or like label is for representing same or like portion
Point.
About " first " used herein, " second " ... etc., not especially censure the meaning of order or cis-position,
It is non-to limit the present invention, only for distinguish with same technique term description element or operation.
About direction term used herein, such as: upper and lower, left and right, front or rear etc. are only the sides with reference to attached drawing
To.Therefore, the direction term used is intended to be illustrative and not intended to limit this creation.
It is open term, i.e., about "comprising" used herein, " comprising ", " having ", " containing " etc.
Mean including but not limited to.
About it is used herein " and/or ", including any of the things or all combination.
It include " two " and " two or more " about " multiple " herein;It include " two groups " about " multiple groups " herein
And " more than two ".
About term used herein " substantially ", " about " etc., to modify it is any can be with the quantity or mistake of microvariations
Difference, but this slight variations or error can't change its essence.In general, microvariations that such term is modified or error
Range in some embodiments can be 20%, in some embodiments can be 10%, can be in some embodiments 5% or its
His numerical value.It will be understood by those skilled in the art that the aforementioned numerical value referred to can be adjusted according to actual demand, it is not limited thereto.
It is certain to describe the word of the application by lower or discuss in the other places of this specification, to provide art technology
Personnel's guidance additional in relation to the description of the present application.
Fig. 1 is a kind of embodiment one for method that user information data safety uses that the specific embodiment of the invention provides
Flow chart, as shown in Figure 1, data using method, apparatus to data service platform send data use solicited message, data service
The data that platform is sent according to data using method, apparatus generate desensitization user data using solicited message.
In the specific embodiment shown in the drawings, the method that user information data safety uses includes:
Step 101: sending data to data service platform and use solicited message.In specific embodiments of the present invention, data
Service platform can be network server, cloud server, server cluster etc..
Step 102: the desensitization user for using solicited message to generate according to the data is received from the data service platform
Data, wherein the data service platform generates the desensitization user data according to users personal data.Specific reality of the invention
It applies in example, is not in that subscriber phone number, ID card No., account, password etc. are sensitive or privacy is believed in the user data that desensitizes
Breath.
Referring to Fig. 1, data are desensitized by sending data to data service platform using solicited message using method, apparatus
User data while making full use of users personal data, is effectively protected the individual privacy of user.
Fig. 2 is a kind of embodiment two for method that user information data safety uses that the specific embodiment of the invention provides
Flow chart, as shown in Fig. 2, data using method, apparatus by data service platform obtain data providing equipment offer data say
Bright information, and illustrate message composition business algorithm according to data, then data to are sent business algorithm by data service platform
Method, apparatus is provided to be authenticated.
In the specific embodiment shown in the drawings, step 101 this method further include:
Step 098: receiving data from the data service platform and illustrate information.In specific embodiments of the present invention, data
Method, apparatus is provided and illustrates that information, data illustrate that information includes data content, data type, number to data service platform offer data
According to provider's device id, use the information such as field, acquisition modes.
Step 099: illustrating message composition business algorithm according to the data.In specific embodiments of the present invention, data make
The business algorithm for meeting specific transactions is write according to the demand of itself with method, apparatus, for example, bank calculates user credit collection point
Algorithm, insurance company calculate the algorithm of user's motor vehicle Green Travel.In addition, data can also be in data service using method, apparatus
The algorithmic system that an isolation is established on platform, writes business algorithm in the algorithmic system of foundation.
Step 100: the data service platform sends the business algorithm to data providing equipment and authenticates, with
Just the users personal data is generated the desensitization using the business algorithm by the rear data service platform and used by certification
User data.In specific embodiments of the present invention, the business algorithm that data are write using method, apparatus needs to set by data providing
After standby certification, users personal data could be generated desensitization user data using the business algorithm by data service platform.
Referring to fig. 2, data providing equipment offer data illustrate that information, data illustrate information according to data using method, apparatus
Write business algorithm, the business algorithm that data are write using method, apparatus reauthentication data using method, apparatus can be with after certification passes through
Users personal data is generated into desensitization user data using the business algorithm, data user can be according to itself practical need
It asks, the data that combined data provider provides rationally write business algorithm, under the premise of not encroaching on individual subscriber privacy, realize
The maximization that users personal data utilizes.
Fig. 3 is that a kind of data that user information data safety uses that the specific embodiment of the invention provides use method, apparatus
Embodiment one structural schematic diagram, equipment as shown in Figure 3 can be applied to Fig. 1, in method shown in Fig. 2, and data use
Method, apparatus sends data to data service platform and uses solicited message, and data service platform is sent according to data using method, apparatus
Data generate desensitization user data using solicited message.
In the specific embodiment shown in the drawings, it includes hair that the data that user information data safety uses, which use method, apparatus,
Send unit 11 and receiving unit 12.Wherein, transmission unit 11, which is used to send data to data service platform, uses solicited message;It connects
Unit 12 is received to be used to receive the desensitization user data for using solicited message to generate according to the data from the data service platform,
Wherein, the data service platform generates the desensitization user data according to users personal data.
Referring to Fig. 3, data are desensitized by sending data to data service platform using solicited message using method, apparatus
User data while making full use of users personal data, is effectively protected the individual privacy of user.
Fig. 4 is that a kind of data that user information data safety uses that the specific embodiment of the invention provides use method, apparatus
Embodiment two structural schematic diagram, as shown in figure 4, data obtain data providing by data service platform using method, apparatus
Equipment provides data and illustrates information, and illustrates message composition business algorithm according to data, then pass through data service platform for business
Algorithm sends data providing equipment to and is authenticated.
In the specific embodiment shown in the drawings, the receiving unit 12 is also used to receive from the data service platform
Data illustrate information.The data further include arranging unit 13 using method, apparatus.Wherein, arranging unit 13 is used for according to the data
Illustrate message composition business algorithm;The transmission unit 11 is also used to pass the business algorithm by the data service platform
It gives data providing equipment to be authenticated, utilizes the business algorithm by institute by the rear data service platform to authenticate
It states users personal data and generates the desensitization user data.
Referring to fig. 4, data providing equipment offer data illustrate that information, data illustrate information according to data using method, apparatus
Write business algorithm, the business algorithm that data are write using method, apparatus reauthentication data using method, apparatus can be with after certification passes through
Users personal data is generated into desensitization user data using the business algorithm, data user can be according to itself practical need
It asks, the data that combined data provider provides rationally write business algorithm, under the premise of not encroaching on individual subscriber privacy, realize
The maximization that users personal data utilizes.
Fig. 5 is a kind of embodiment three for method that user information data safety uses that the specific embodiment of the invention provides
Flow chart, as shown in figure 5, the data that are provided according to data using method, apparatus of data service platform are using solicited message by user
Personal data are processed into desensitization user data.
In the specific embodiment shown in the drawings, the method that user information data safety uses includes:
Step 211: receiving data using method, apparatus from data and use solicited message.In specific embodiments of the present invention, number
Data, which are received, using method, apparatus from data according to service platform uses solicited message.Data specifically included using solicited message be intended to using
The information such as data object, data user device id, business algorithm title, submission time, abstract.Data service platform is by data
Use solicited message write-in block chain (the standard block chain service that third party provides).
Step 212: users personal data being processed into desensitization user data using solicited message according to the data.This hair
In bright specific embodiment, users personal data is processed into desensitization user using solicited message according to data by data service platform
Data are used for data using method, apparatus.
Referring to Fig. 5, users personal data is processed into desensitization user data, while using users personal data, no
The individual privacy that user can be exposed protects the legitimate rights and interests of user not encroached on, and has good social and economic benefit.
Fig. 6 is a kind of example IV for method that user information data safety uses that the specific embodiment of the invention provides
Flow chart, as shown in fig. 6, data service platform receives data using before solicited message using method, apparatus from data, data
Service platform sends data using method, apparatus to data and illustrates that information, data illustrate message composition industry according to data using method, apparatus
Business algorithm.
In the specific embodiment shown in the drawings, before step 211, this method further include:
Step 209: Xiang Suoshu data send data using method, apparatus and illustrate information.In specific embodiments of the present invention, number
Data, which are sent, using method, apparatus to data according to service platform illustrates information,.
Step 210: the business algorithm that the data illustrate message composition using method, apparatus according to the data is received, so as to
The users personal data is generated into the desensitization user data using the business algorithm.In specific embodiments of the present invention,
If data use data using the request of method, apparatus later period, users personal data is generated desensitization number of users by data service platform
According to.
As shown in fig. 6, data providing equipment sends data explanation using method, apparatus to data by data service platform
Information, data illustrate message composition business algorithm according to data using method, apparatus, and the business algorithm write both had met data use
The requirement of side, but it is highly relevant with the data of data providing equipment offer, thus making full use of the same of users personal data
When, protect the individual privacy of user to be inviolable.
Fig. 7 is a kind of embodiment five for method that user information data safety uses that the specific embodiment of the invention provides
Flow chart, as shown in fig. 7, data service platform, which sends data to subscriber terminal equipment, uses authorization requests information, user is whole
End equipment receives data using after authorization requests information, deciding whether that data is allowed to use users personal data using method, apparatus.
In the specific embodiment shown in the drawings, after step 212, this method further include:
Step 213: sending data to subscriber terminal equipment and use authorization requests information.In specific embodiments of the present invention,
Data service platform sends data to subscriber terminal equipment and uses authorization requests information.Data include industry using authorization requests information
The information such as business algorithm title, data user device id, data providing device id, abstract.
Step 214: receiving the subscriber terminal equipment from the subscriber terminal equipment and asked according to the data using authorization
The license confirmation information for asking information to feed back.In specific embodiments of the present invention, subscriber terminal equipment is asked according to data using authorization
Information is asked to feed back license confirmation information, for example, user's input handset identifying code and additional identity on corresponding authorization interface is broken
Piece information (latter 4 of such as ID card No.) clicks authorization, i.e., feeds back license confirmation information to data service platform.
Step 215: the desensitization user data is transmitted using method, apparatus to the data according to the license confirmation information.
In specific embodiments of the present invention, data service platform uses method, apparatus transmission desensitization user to data according to license confirmation information
Data.
Referring to Fig. 7, data service platform sends data to subscriber terminal equipment and uses authorization requests information, and user terminal is set
Standby to feed back license confirmation information to data service platform using authorization requests information according to data, data service platform is according to authorization
Confirmation message uses method, apparatus transmission desensitization user data to data.
In specific embodiments of the present invention, users personal data can be processed into desensitization number of users by data service platform
According to later, data are sent to subscriber terminal equipment and use authorization requests information (as shown in Figure 7), it can also be by individual subscriber number
According to before being processed into desensitization user data, data are sent to subscriber terminal equipment and use authorization requests information.Before step 212,
This method further include: send data to subscriber terminal equipment and use authorization requests information;Institute is received from the subscriber terminal equipment
State the license confirmation information that subscriber terminal equipment is fed back according to the data using authorization requests information.
Fig. 8 is a kind of data service platform that user information data safety uses that the specific embodiment of the invention provides
The structural schematic diagram of embodiment one, data service platform as shown in Figure 8 can be applied in Fig. 5~method shown in Fig. 7, number
Users personal data is processed into desensitization using solicited message and used by the data provided according to data using method, apparatus according to service platform
User data.
In the specific embodiment shown in the drawings, the data service platform that user information data safety uses includes receiving
Unit 21 and processing unit 22.Wherein, receiving unit 21, which is used to receive data using method, apparatus from data, uses solicited message;Place
Reason unit 22 is used to that users personal data to be processed into desensitization user data using solicited message according to the data.
Referring to Fig. 8, users personal data is processed into desensitization user data, while using users personal data, no
The individual privacy that user can be exposed protects the legitimate rights and interests of user not encroached on, and has good social and economic benefit.
Fig. 9 is a kind of data service platform that user information data safety uses that the specific embodiment of the invention provides
The structural schematic diagram of embodiment two, as shown in figure 9, data service platform, which receives data using method, apparatus from data, uses request letter
Before breath, data service platform sends data using method, apparatus to data and illustrates that information, data are said using method, apparatus according to data
Bright message composition business algorithm.
In the specific embodiment shown in the drawings, the data service platform that user information data safety uses further includes hair
Send unit 23.Wherein, transmission unit 23, which is used to send data using method, apparatus to the data, illustrates information;The receiving unit
21 are also used to receive the business algorithm that the data illustrate message composition using method, apparatus according to the data, described in utilizing
The users personal data is generated the desensitization user data by business algorithm.
As shown in figure 9, data providing equipment sends data explanation using method, apparatus to data by data service platform
Information, data illustrate message composition business algorithm according to data using method, apparatus, and the business algorithm write both had met data use
The requirement of side, but it is highly relevant with the data of data providing equipment offer, thus making full use of the same of users personal data
When, protect the individual privacy of user to be inviolable.
In another embodiment of the present invention, the data service platform that user information data safety uses further includes hair
Send unit 23.Wherein, transmission unit 23, which is used to send data to subscriber terminal equipment, uses authorization requests information.The reception is single
Member 21, which is also used to receive the subscriber terminal equipment from the subscriber terminal equipment, uses authorization requests information according to the data
The license confirmation information of feedback;The transmission unit 23 is also used to be set according to the license confirmation information to the data user
It is standby to transmit the desensitization user data.Data service platform sends data to subscriber terminal equipment and uses authorization requests information, uses
Family terminal device feeds back license confirmation information, data service platform to data service platform using authorization requests information according to data
Method, apparatus transmission desensitization user data is used to data according to license confirmation information.
Figure 10 is a kind of embodiment for method that user information data safety uses that the specific embodiment of the invention provides
Six flow chart, as shown in Figure 10, data providing equipment send data to data service platform and illustrate information, data user
Equipment illustrates message composition business algorithm according to data, and business algorithm is sent to data providing by data service platform
Equipment certification.
In the specific embodiment shown in the drawings, the method that user information data safety uses includes:
Step 311: sending data to data service platform and illustrate information.In specific embodiments of the present invention, data are provided
Method, apparatus sends data to data service platform and illustrates information, i.e. data providing illustrates that information describes oneself and possesses by data
The attribute of data, for example, data type, data fields, data generation time, data acquiring mode etc..
Step 312: receiving data from the data service platform and illustrate message composition according to the data using method, apparatus
Business algorithm.In specific embodiments of the present invention, data illustrate message composition business algorithm according to data using method, apparatus, and
The business algorithm write is sent to data service platform.
Step 313: the business algorithm being authenticated, to authenticate by described in the rear data service platform utilization
The users personal data is generated desensitization user data by business algorithm.In specific embodiments of the present invention, data service platform
Business algorithm is sent to data providing equipment to authenticate, after certification passes through, data service platform will using business algorithm
Users personal data generates desensitization user data.
Referring to Figure 10, data illustrate that information and the demand of itself write business algorithm according to data using method, apparatus, make
Before users personal data, using the business algorithm process users personal data write, desensitization user data is being allowed to meet spy
Determine business demand, and individual subscriber privacy will not be revealed.For example, business algorithm is user if data user is bank
Credit score algorithm;If data user is insurance company, business algorithm is motor vehicle Green Travel algorithm.
Figure 11 is a kind of embodiment for method that user information data safety uses that the specific embodiment of the invention provides
Seven flow chart, as shown in figure 11, after subscriber terminal equipment authorization, desensitization user data is just sent to by data service platform
Data use method, apparatus.
In the specific embodiment shown in the drawings, after step 313, the method that user information data safety uses also is wrapped
It includes:
Step 314: receiving the desensitization user data from the data service platform after subscriber terminal equipment authorization.This
In the specific embodiment of invention, after subscriber terminal equipment authorization, data could be received using method, apparatus from data service platform
Desensitize user data.
Referring to Figure 11, after user authorizes, desensitization user data could be used by data user, be further improved
The safety of individual subscriber privacy ensures that the individual privacy of user is not leaked.
Figure 12 is that a kind of data providing that user information data safety uses that the specific embodiment of the invention provides is set
Standby structural schematic diagram, equipment as shown in figure 12 can be applied in method shown in Figure 10, Figure 11, data providing equipment
Data, which are sent, to data service platform illustrates that information, data illustrate message composition business algorithm according to data using method, apparatus, and
Business algorithm is sent to the certification of data providing equipment by data service platform;And after subscriber terminal equipment authorization,
Desensitization user data is just sent to data and uses method, apparatus by data service platform.
In the specific embodiment shown in the drawings, the data providing equipment that user information data safety uses includes hair
Send unit 31, receiving unit 32 and authentication unit 33.Wherein, transmission unit 31 is used to send data explanation to data service platform
Information;Receiving unit 32 is used to receive data from the data service platform and illustrates that information is compiled according to the data using method, apparatus
The business algorithm write;Authentication unit 33 is for authenticating the business algorithm, to authenticate through the rear data service
The users personal data is generated desensitization user data using the business algorithm by platform.The receiving unit 32 is also used to
The desensitization user data is received from the data service platform after subscriber terminal equipment authorization.
Referring to Figure 12, data illustrate that information and the demand of itself write business algorithm according to data using method, apparatus, make
Before users personal data, using the business algorithm process users personal data write, desensitization user data is being allowed to meet spy
Determine business demand, and individual subscriber privacy will not be revealed;After user authorizes, desensitization user data could be used by data
Side uses, and further improves the safety of individual subscriber privacy, ensures that the individual privacy of user is not leaked.
Figure 13 is a kind of embodiment for method that user information data safety uses that the specific embodiment of the invention provides
Eight flow chart, as shown in figure 13, subscriber terminal equipment receive data from data service platform and use authorization requests information, and root
Decide whether that authorization data uses using authorization requests information according to data.
In the specific embodiment shown in the drawings, the method that user information data safety uses includes:
Step 411: receiving data from data service platform and use authorization requests information.In specific embodiments of the present invention,
Subscriber terminal equipment receives data from data service platform and uses authorization requests information.
Step 412: being believed using authorization requests information to data service platform feedback license confirmation according to the data
Breath, so that the data service platform uses method, apparatus transmission desensitization user data to data according to the license confirmation information.
In specific embodiments of the present invention, user decides whether to authorize by the authorization interface of subscriber terminal equipment, for example, user is awarding
Interface input identifying code and ID card No. are weighed, use of the authorization data user to users personal data is used after user's authorization
Family terminal device feeds back license confirmation information from trend data service platform.
Referring to Figure 13, subscriber terminal equipment receives data from data service platform and uses authorization requests information, and according to number
According to using authorization requests information to decide whether to allow data that method, apparatus is used whether to be able to use desensitization user data, user can be with
The users personal data for effectively supervising oneself prevents individual subscriber privacy leakage, the legitimate rights and interests of effective protection user.
Figure 14 is a kind of subscriber terminal equipment that user information data safety uses that the specific embodiment of the invention provides
Structural schematic diagram, equipment as shown in figure 14 can be applied in method shown in Figure 13, and subscriber terminal equipment takes from data
Platform reception data of being engaged in use authorization requests information, and decide whether that authorization data makes using authorization requests information according to data
With.
In the specific embodiment shown in the drawings, the subscriber terminal equipment that user information data safety uses includes receiving
Unit 41 and transmission unit 42.Wherein, receiving unit 41, which is used to receive data from data service platform, uses authorization requests information;
Transmission unit 42 is used to feed back license confirmation information to the data service platform using authorization requests information according to the data,
So that the data service platform uses method, apparatus transmission desensitization user data to data according to the license confirmation information.
Referring to Figure 14, subscriber terminal equipment receives data from data service platform and uses authorization requests information, and according to number
According to using authorization requests information to decide whether to allow data that method, apparatus is used whether to be able to use desensitization user data, user can be with
The users personal data for effectively supervising oneself prevents individual subscriber privacy leakage, the legitimate rights and interests of effective protection user.
Figure 15 is that a kind of composition for system that user information data safety uses that the specific embodiment of the invention provides shows
It is intended to, as shown in figure 15, the system that user information data safety uses includes: that multiple data use method, apparatus 100, data service
Platform 200, multiple data providing equipment 300 and multiple subscriber terminal equipments 400.Wherein, the data use method, apparatus
100, the data providing equipment 300 and the subscriber terminal equipment 400 are connect with the data service platform 200.Institute
Data are stated to be used to illustrate that message composition business is calculated according to the data that the data providing equipment 300 provides using method, apparatus 100
Method, and use the desensitization user data on the data service platform 200;The data service platform 200 is for described in utilization
Users personal data is generated the desensitization user data by business algorithm, and will after the subscriber terminal equipment 400 authorization
The desensitization user data sends the data to and uses method, apparatus 100;The data providing equipment 300 is used for the number
The users personal data is provided according to service platform 200, and authenticates the data and is calculated using the business that method, apparatus 100 is write
Method;The subscriber terminal equipment 400 is for authorizing the data to make using method, apparatus 100 to the legal of the users personal data
With.
The specific embodiment of the invention also provides a kind of computer storage medium comprising computer executed instructions, the meter
Calculation machine executes instruction when handling by data processing equipment, the data processing equipment execute Fig. 1, Fig. 2, Fig. 5~Fig. 7, Figure 10,
The method that user information data safety in Figure 11 or Figure 13 uses.
When Figure 16 is a kind of work for system that user information data safety uses that the specific embodiment of the invention provides
Sequence figure, as shown in figure 16, data providing equipment 300 illustrate that information is sent to for data are sent by data service platform 200
Data use method, apparatus 100;Data illustrate message composition business algorithm according to data using method, apparatus 100, and are taken by data
Business platform 200 transmits business algorithm to data providing equipment 300 and subscriber terminal equipment 400;Data providing equipment 300 is recognized
Card business algorithm, and authenticate-acknowledge message is fed back to data service platform 200, data service platform 200 is set to data user
Authenticate-acknowledge message is transmitted for 100 and subscriber terminal equipment 400;Data are sent using method, apparatus 100 to data service platform 200
Data use solicited message;Data service platform 200 sends data to subscriber terminal equipment 400 and uses authorization requests information, and
Receive the license confirmation message that subscriber terminal equipment 400 is fed back;Users personal data is generated desensitization and used by data service platform 200
It is sent to data after user data and uses method, apparatus 100.
The specific embodiment of the invention provides a kind of method that user information data safety uses, equipment and system, storage is situated between
Matter, data user oneself define the business processing algorithm of users personal data, and data providing authenticates the business processing algorithm;
If data user needs, in the case where obtaining user authorization, to use the industry by certification using users personal data
Business Processing Algorithm handles the users personal data (under the premise of not influencing users personal data normal use, to individual subscriber
Data carry out desensitization process), by treated, users personal data is sent to data user, in protection individual subscriber privacy
It (does not expose privacy of user or initial data) simultaneously, does not influence the normal use of users personal data;Using block chain technology,
Guarantee that data exchange process and algorithm implementing result can be traced, can not be distorted, guarantees the authenticity and validity of process.
The above-mentioned embodiment of the present invention can be implemented in various hardware, Software Coding or both combination.For example, this hair
Bright embodiment can also be the execution above method in data signal processor (Digital Signal Processor, DSP)
Program code.The present invention can also refer to computer processor, digital signal processor, microprocessor or field-programmable gate array
Arrange the multiple functions that (Field Programmable GateArray, FPGA) is executed.Above-mentioned processing can be configured according to the present invention
Device executes particular task, and machine-readable software code or the firmware generation of the ad hoc approach that the present invention discloses are defined by executing
Code is completed.Software code or firmware code can be developed as different program languages and different formats or form.Can also be
Different target platform composing software codes.However, executing software code and the other types configuration generation of task according to the present invention
Different code pattern, type and the language of code do not depart from spirit and scope of the invention.
The foregoing is merely the schematical specific embodiments of the present invention, before not departing from conceptions and principles of the invention
It puts, the equivalent changes and modifications that any those skilled in the art is made should belong to the scope of protection of the invention.
Claims (19)
1. a kind of method that user information data safety uses, which is characterized in that this method comprises:
Data, which are sent, to data service platform uses solicited message;
The desensitization user data for using solicited message to generate according to the data is received from the data service platform, wherein institute
It states data service platform and the desensitization user data is generated according to users personal data.
2. the method that user information data safety as described in claim 1 uses, which is characterized in that sent out to data service platform
Before the step of sending data to use solicited message, this method further include:
Data, which are received, from the data service platform illustrates information;
Illustrate message composition business algorithm according to the data;And
The business algorithm is sent to data providing equipment by the data service platform to authenticate, it is logical to authenticate
Later the users personal data is generated the desensitization user data using the business algorithm by the data service platform.
3. a kind of data that user information data safety uses use method, apparatus, which is characterized in that the data use method, apparatus packet
It includes:
Transmission unit uses solicited message for sending data to data service platform;And
Receiving unit, for receiving the desensitization user for using solicited message to generate according to the data from the data service platform
Data, wherein the data service platform generates the desensitization user data according to users personal data.
4. the data that user information data safety as claimed in claim 3 uses use method, apparatus, which is characterized in that described to connect
It receives unit and is also used to receive data from the data service platform and illustrate information, which uses method, apparatus further include:
Arranging unit, for illustrating message composition business algorithm according to the data,
The transmission unit is also used to send the business algorithm to data providing equipment by the data service platform
It is authenticated, is generated the users personal data using the business algorithm by the rear data service platform to authenticate
The desensitization user data.
5. a kind of method that user information data safety uses, which is characterized in that this method comprises:
Data, which are received, using method, apparatus from data uses solicited message;And
Users personal data is processed into desensitization user data using solicited message according to the data.
6. the method that user information data safety as claimed in claim 5 uses, which is characterized in that use method, apparatus from data
Before receiving the step of data use solicited message, this method further include:
Data, which are sent, using method, apparatus to the data illustrates information;And
The business algorithm that the data illustrate message composition using method, apparatus according to the data is received, to utilize the business
The users personal data is generated the desensitization user data by algorithm.
7. the method that user information data safety as claimed in claim 5 uses, which is characterized in that used according to the data
After the step of users personal data is processed into desensitization user data by solicited message, this method further include:
Data, which are sent, to subscriber terminal equipment uses authorization requests information;
Receive what the subscriber terminal equipment was fed back according to the data using authorization requests information from the subscriber terminal equipment
License confirmation information;And
The desensitization user data is transmitted using method, apparatus to the data according to the license confirmation information.
8. the method that user information data safety as claimed in claim 5 uses, which is characterized in that used according to the data
Before the step of users personal data is processed into desensitization user data by solicited message, this method further include:
Data, which are sent, to subscriber terminal equipment uses authorization requests information;And
Receive what the subscriber terminal equipment was fed back according to the data using authorization requests information from the subscriber terminal equipment
License confirmation information.
9. a kind of data service platform that user information data safety uses, which is characterized in that the data service platform includes:
Receiving unit uses solicited message for receiving data using method, apparatus from data;And
Processing unit, for users personal data to be processed into desensitization user data using solicited message according to the data.
10. the data service platform that user information data safety as claimed in claim 9 uses, which is characterized in that the data
Service platform further include:
Transmission unit illustrates information for sending data using method, apparatus to the data,
The receiving unit is also used to receive the data and illustrates that the business of message composition is calculated according to the data using method, apparatus
Method, so that the users personal data is generated the desensitization user data using the business algorithm.
11. the data service platform that user information data safety as claimed in claim 9 uses, which is characterized in that the data
Service platform further include:
Transmission unit uses authorization requests information for sending data to subscriber terminal equipment,
The receiving unit is also used to receive the subscriber terminal equipment from the subscriber terminal equipment and be used according to the data
The license confirmation information of authorization requests information feedback;
The transmission unit is also used to transmit the desensitization using method, apparatus to the data according to the license confirmation information and use
User data.
12. a kind of method that user information data safety uses, which is characterized in that this method comprises:
Data, which are sent, to data service platform illustrates information;
Illustrate the business algorithm of message composition according to the data using method, apparatus from data service platform reception data;With
And
The business algorithm is authenticated, utilizes the business algorithm by institute by the rear data service platform to authenticate
It states users personal data and generates desensitization user data.
13. the method that user information data safety as claimed in claim 12 uses, which is characterized in that this method further include:
The desensitization user data is received from the data service platform after subscriber terminal equipment authorization.
14. a kind of data providing equipment that user information data safety uses, which is characterized in that the data providing equipment packet
It includes:
Transmission unit illustrates information for sending data to data service platform;
Receiving unit illustrates message composition according to the data using method, apparatus for receiving data from the data service platform
Business algorithm;And
Authentication unit utilizes institute by the rear data service platform to authenticate for authenticating to the business algorithm
It states business algorithm and the users personal data is generated into desensitization user data.
15. the data providing equipment that user information data safety as claimed in claim 14 uses, which is characterized in that described
Receiving unit is also used to after subscriber terminal equipment authorization receive the desensitization user data from the data service platform.
16. a kind of method that user information data safety uses, which is characterized in that this method comprises:
Data, which are received, from data service platform uses authorization requests information;And
License confirmation information is fed back to the data service platform using authorization requests information according to the data, so as to the number
Method, apparatus transmission desensitization user data is used to data according to the license confirmation information according to service platform.
17. a kind of subscriber terminal equipment that user information data safety uses, which is characterized in that the subscriber terminal equipment includes:
Receiving unit uses authorization requests information for receiving data from data service platform;And
Transmission unit, for being believed using authorization requests information to data service platform feedback license confirmation according to the data
Breath, so that the data service platform uses method, apparatus transmission desensitization user data to data according to the license confirmation information.
18. a kind of system that user information data safety uses, which is characterized in that the system includes: multiple claims 3 or 4
The data use method, apparatus, any data service platform of claim 9~11, multiple claims 14 or 15 institute
Subscriber terminal equipment described in the data providing equipment and multiple claims 17 stated, wherein the data user sets
Standby, the described data providing equipment and the subscriber terminal equipment are connect with the data service platform,
The data are used to illustrate that message composition business is calculated according to the data that the data providing equipment provides using method, apparatus
Method, and use the desensitization user data on the data service platform;
The data service platform is used to that users personal data to be generated the desensitization user data using the business algorithm, and
The desensitization user data is sent to the data after the subscriber terminal equipment authorization uses method, apparatus;
The data providing equipment is used to provide the users personal data to the data service platform, and authenticates the number
According to the business algorithm for using method, apparatus to write;
The subscriber terminal equipment is for authorizing the data to use legal use of the method, apparatus to the users personal data.
19. a kind of computer storage medium comprising computer executed instructions, which is characterized in that the computer executed instructions warp
When crossing data processing equipment processing, the data processing equipment perform claim requirement 1~2,5~8,12~13,16 is any described
Method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710983616.9A CN109697368B (en) | 2017-10-20 | 2017-10-20 | Method, device and system for safe use of user information data and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710983616.9A CN109697368B (en) | 2017-10-20 | 2017-10-20 | Method, device and system for safe use of user information data and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109697368A true CN109697368A (en) | 2019-04-30 |
CN109697368B CN109697368B (en) | 2021-02-02 |
Family
ID=66225323
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710983616.9A Active CN109697368B (en) | 2017-10-20 | 2017-10-20 | Method, device and system for safe use of user information data and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109697368B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110290125A (en) * | 2019-06-17 | 2019-09-27 | 西安纸贵互联网科技有限公司 | Data security system and data safety processing method based on block chain |
CN113206758A (en) * | 2021-04-27 | 2021-08-03 | 北京极智数仓科技有限公司 | Cross-cloud-platform terminal data service method and system |
CN113472757A (en) * | 2021-06-18 | 2021-10-01 | 上汽通用五菱汽车股份有限公司 | Vehicle data processing method, processing platform and readable storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150039901A1 (en) * | 2013-07-30 | 2015-02-05 | International Business Machines Corporation | Field level database encryption using a transient key |
CN105515963A (en) * | 2015-12-03 | 2016-04-20 | 中国联合网络通信集团有限公司 | Data gateway device and big data system |
CN106530002A (en) * | 2016-10-28 | 2017-03-22 | 国信优易数据有限公司 | Personal information processing system and method thereof |
CN106599713A (en) * | 2016-11-11 | 2017-04-26 | 中国电子科技网络信息安全有限公司 | Database masking system and method based on big data |
-
2017
- 2017-10-20 CN CN201710983616.9A patent/CN109697368B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150039901A1 (en) * | 2013-07-30 | 2015-02-05 | International Business Machines Corporation | Field level database encryption using a transient key |
CN105515963A (en) * | 2015-12-03 | 2016-04-20 | 中国联合网络通信集团有限公司 | Data gateway device and big data system |
CN106530002A (en) * | 2016-10-28 | 2017-03-22 | 国信优易数据有限公司 | Personal information processing system and method thereof |
CN106599713A (en) * | 2016-11-11 | 2017-04-26 | 中国电子科技网络信息安全有限公司 | Database masking system and method based on big data |
Non-Patent Citations (1)
Title |
---|
明朝万达: "明朝万达:区块链技术助力大数据安全共享与交易", 《搜狐》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110290125A (en) * | 2019-06-17 | 2019-09-27 | 西安纸贵互联网科技有限公司 | Data security system and data safety processing method based on block chain |
CN110290125B (en) * | 2019-06-17 | 2021-12-28 | 西安纸贵互联网科技有限公司 | Data security system based on block chain and data security processing method |
CN113206758A (en) * | 2021-04-27 | 2021-08-03 | 北京极智数仓科技有限公司 | Cross-cloud-platform terminal data service method and system |
CN113472757A (en) * | 2021-06-18 | 2021-10-01 | 上汽通用五菱汽车股份有限公司 | Vehicle data processing method, processing platform and readable storage medium |
CN113472757B (en) * | 2021-06-18 | 2022-06-24 | 上汽通用五菱汽车股份有限公司 | Vehicle data processing method, processing platform and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109697368B (en) | 2021-02-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Winn | Open Systems, Free Markets, and Regulation of Internet Commerce | |
CN111316278A (en) | Secure identity and archive management system | |
US20020023054A1 (en) | Method and system for protecting credit card transactions | |
AU2023223007A1 (en) | Secure online access control to prevent identification information misuse | |
JP2002504731A (en) | Computer-based method and transaction support system | |
CN103353973B (en) | Banking transaction authentication method and system based on audio authentication | |
CN109858911A (en) | Qualification verification method, device, system, equipment and readable storage medium storing program for executing | |
CN111460525A (en) | Data processing method and device based on block chain and storage medium | |
CN109933987A (en) | For the key generation method of block chain network, endorsement method, storage medium, calculate equipment | |
CN109741800A (en) | The method for security protection of medical data intranet and extranet interaction based on block chain technology | |
CN109697368A (en) | Method, equipment and system that user information data safety uses, storage medium | |
Fasli | On agent technology for e-commerce: trust, security and legal issues | |
Azmi et al. | INTERNATIONAL NORMS IN REGULATING ECOMMERCE: THE ELECTRONIC COMMERCE CHAPTER OF THE COMPREHENSIVE TRANS-PACIFIC PARTNERSHIP AGREEMENT. | |
Allen et al. | Design choices for central bank digital currency | |
Weiss et al. | Auditing IT infrastructures for compliance | |
Zhou et al. | Leveraging zero knowledge proofs for blockchain-based identity sharing: A survey of advancements, challenges and opportunities | |
CN112433985A (en) | Controlling the composition of information submitted to a computing system | |
KR101360843B1 (en) | Next Generation Financial System | |
CN113783690A (en) | Tender inviting method and device based on authentication | |
Arnold et al. | Zero-knowledge proofs do not solve the privacy-trust problem of attribute-based credentials: What if alice is evil? | |
Lu et al. | DIFCS: a secure cloud data sharing approach based on decentralized information flow control | |
CN106534047A (en) | Information transmitting method and apparatus based on Trust application | |
Camp | Identity management's misaligned incentives | |
Kumbhare et al. | Blockchain's Data Integrity and Reliability | |
CN111062833A (en) | Signature authentication method of contract data and related device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210129 Address after: 102488 511, 4th floor, building 16, courtyard 1, Tianxing street, Fangshan District, Beijing Patentee after: Beijing Gongshi Technology Co.,Ltd. Address before: 100192 room 201c, A-1 / F, Dongsheng Science Park, 66 xixiaokou, Haidian District, Beijing Patentee before: BEIJING BELINK TECHNOLOGY Co.,Ltd. |
|
TR01 | Transfer of patent right |