CN115378677A - Personal data collection method and system suitable for user side and use method and system thereof - Google Patents

Personal data collection method and system suitable for user side and use method and system thereof Download PDF

Info

Publication number
CN115378677A
CN115378677A CN202210982483.4A CN202210982483A CN115378677A CN 115378677 A CN115378677 A CN 115378677A CN 202210982483 A CN202210982483 A CN 202210982483A CN 115378677 A CN115378677 A CN 115378677A
Authority
CN
China
Prior art keywords
data
personal
party
box
personal data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210982483.4A
Other languages
Chinese (zh)
Inventor
李明煜
夏虞斌
陈海波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jiaotong University
Original Assignee
Shanghai Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Jiaotong University filed Critical Shanghai Jiaotong University
Priority to CN202210982483.4A priority Critical patent/CN115378677A/en
Publication of CN115378677A publication Critical patent/CN115378677A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a personal data collection method and system suitable for a user side, and a use method and system thereof, wherein the method comprises the following steps: step S1: adopting a trusted execution environment and a cryptography technology to construct a safe and reliable personal data box; step S2: synchronizing various personal information data of a user side into a personal data box; and step S3: the third party application uses the personal information data under access control constraints through the personal data box.

Description

Personal data collection method and system suitable for user side and use method and system thereof
Technical Field
The invention relates to the technical field of data collection, in particular to a personal data collection method and system suitable for a user side and a using method and system thereof, and more particularly relates to a method, system and device suitable for tamper-free automatic data importing of the user side and limited data using of a third party under an authorized condition.
Background
In the prior art, user data has the characteristics of multiple maintenance and decentralization. First, there is no subject who owns all the data of the user, and the different subjects do not provide cross-organizational sharing of data due to competitive relationships, and the "personal information protection act" data security act "does not allow subjects to freely share data without the user's consent. Secondly, in some scenes that data needs to be communicated, due to the difference of data interfaces and data formats of different service providers, a large time and labor cost are needed for constructing an interconnection system. Finally, because the range of motion of the user in the real space and the digital space is wide, it is also a great challenge to build a complete personal database covering all the ranges of motion of the user.
In the prior art, a user database is established and perfected by the government, and the core of the method lies in constructing a complete safety technical protection scheme and warns of the national safety problem caused by the loss of a large amount of user data after single-point attack. Meanwhile, some institutions with credibility establish companies to provide special personal data banking services for users, but the scheme has the difficulty that a proper compliance audit mode must be embedded in the services to ensure that individuals and governments can confirm the protection authenticity of data and prevent the companies from selling citizen data.
Patent document CN110888864a (application number: 201911183543.0) discloses an automatic collection method and device for user data, which output at least one collection problem corresponding to each target collection dimension, and set a corresponding confidence for feedback data of the collection problem corresponding to each target collection dimension; calculating the overall confidence degree corresponding to each target collection dimension according to the feedback data of the collection type problem corresponding to each target collection dimension and the confidence degree of the feedback data; outputting a verification problem corresponding to each target collection dimension; verifying the confidence degree of the feedback data of the collection problems corresponding to the target collection dimensionality by using the feedback data of the verification problems corresponding to each target collection dimensionality to obtain a verification result of the feedback data of the collection problems corresponding to the target collection dimensionality; correcting the overall confidence of the target collection dimension based on the verification result of the feedback data of the collection problem corresponding to the target collection dimension; and outputting the collected feedback data of the collection type problems and the corrected overall confidence.
Disclosure of Invention
In view of the defects in the prior art, the present invention provides a method and a system for collecting personal data suitable for a user terminal.
The invention provides a personal data collection method suitable for a user side, which comprises the following steps:
step S1: adopting a trusted execution environment and a cryptography technology to construct a safe and reliable personal data box;
step S2: and synchronizing various personal information data of the user side to the personal data box.
Preferably, the step S1 employs:
step S1.1: the data source server operates in a non-protected environment;
step S1.2: installing an information automatic synchronization tool in the personal data box, and operating the automatic synchronization tool in a protection environment provided by a trusted execution environment;
step S1.3: and carrying out channel encryption on the data source server and the personal data box.
Preferably, the step S2 employs: and synchronizing various personal information data of the user side to the personal data box through the automatic information synchronizing tool.
Preferably, before the various types of personal information data of the user end are synchronized to the personal data box and during data synchronization, the various types of personal information data of the user end are correspondingly processed through a data tamper-proof technology, and authenticity of a data source is guaranteed.
The invention provides a personal data collection system suitable for a user terminal, which comprises:
a module M1: adopting a trusted execution environment and a cryptography technology to construct a safe and reliable personal data box;
a module M2: and synchronizing various personal information data of the user side to the personal data box.
Preferably, the module M1 employs:
module M1.1: the data source server operates in a non-protected environment;
module M1.2: installing an information automatic synchronization tool in the personal data box, and operating the automatic synchronization tool in a protection environment provided by a trusted execution environment;
module M1.3: channel encryption is carried out on the data source server and the personal data box;
the module M2 employs: various personal information data of a user side are synchronized into a personal data box through an automatic information synchronization tool;
before various personal information data of the user side are synchronized to the personal data box and during data synchronization, various personal information data of the user side are correspondingly processed through a data tamper-proof technology, and authenticity of a data source is guaranteed.
The invention provides a data using method based on a personal data box, which comprises the following steps:
step S1: installing a third-party data using program on the personal data box;
step S2: the third party data consumer server operates in a protected environment;
and step S3: and the third-party data user server remotely verifies the authenticity of the personal data box, and ensures that the personal data box uses a trusted execution environment technology.
And step S4: the data of the personal data box is accessed based on the authority of the third party, the personal data box forms a data access report based on the data accessed by the third party, and when the third party has the download authority, the formed data access report is sent to the third party; and when the third party has no download right, automatically deleting the data access report in the personal data box.
Preferably, the data access report includes the access range, frequency and number of the third party to the user data.
According to the invention, the data use system based on the personal data box comprises:
a module M1: installing a third-party data using program on the personal data box;
a module M2: the third party data consumer server operates in a protected environment;
a module M3: and the third-party data user server remotely verifies the authenticity of the personal data box, and ensures that the personal data box uses a trusted execution environment technology.
A module M4: the data of the personal data box is accessed based on the authority of the third party, the personal data box forms a data access report based on the data accessed by the third party, and when the third party has the download authority, the formed data access report is sent to the third party; and when the third party has no download right, automatically deleting the data access report in the personal data box.
Preferably, the data access report includes the access range, frequency and number of the third party to the user data.
Compared with the prior art, the invention has the following beneficial effects:
1. the invention realizes the technical effect of the personal palm data bank of the user by automatically synchronizing various personal data of the user at the user end, and has more dimensionalities compared with the traditional enterprise end data collection scheme;
2. according to the invention, the trusted execution environment automatically adds the timestamp and the electronic signature during data synchronization, so that the effects of data authentication and source tracing are realized, and the method is more efficient compared with the existing technical scheme based on the block chain;
3. according to the invention, the data use of all third-party application programs is tracked through the personal data box operating system, so that the use report of all data access records of a user is realized, and compared with the problem that the existing third party is opaque and even has abuse when using data at an enterprise end, the access records are more transparent and complete;
4. according to the invention, the data access range of the third-party application program is limited by the security access control mechanism of the personal data box operating system, the limited privacy access technical effect is realized, and compared with the problem that the enterprise end has illegal data use after data collection, the privacy of the user is protected more powerfully.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments with reference to the following drawings:
FIG. 1 is a flow chart of the use of the personal data box of the present invention;
FIG. 2 is a diagram illustrating a hardware device structure according to the present invention.
Detailed Description
The present invention will be described in detail with reference to specific examples. The following examples will aid those skilled in the art in further understanding the present invention, but are not intended to limit the invention in any manner. It should be noted that it would be obvious to those skilled in the art that various changes and modifications can be made without departing from the spirit of the invention. All falling within the scope of the present invention.
Example 1
The invention provides a personal data collection method suitable for a user side, which comprises the following steps:
step S1: adopting a trusted execution environment and a cryptography technology to construct a safe and reliable personal data box;
specifically, the step S1 employs:
step S1.1: the data source server operates in a non-protected environment;
step S1.2: installing an information automatic synchronization tool in the personal data box, and operating the automatic synchronization tool in a protection environment provided by a trusted execution environment;
step S1.3: and carrying out channel encryption on the data source server and the personal data box.
The Trusted Execution Environment (TEE) technology has security capabilities such as security isolation and remote authentication. And automatically adding a time stamp to the data based on the trusted execution environment technology when the data is synchronized, and generating an electronic signature.
Step S2: and synchronizing various personal information data of the user side to the personal data box.
Specifically, the step S2 employs: various personal information data of the user side are synchronized to the personal data box through the automatic information synchronization tool, and the unavailability of the data after the third-party data source stops service is prevented.
Specifically, before various types of personal information data of the user side are synchronized to the personal data box and when the data are synchronized, the various types of personal information data of the user side are correspondingly processed through a data tamper-proof technology (such as an electronic signature or a certificate), and authenticity of a data source is guaranteed.
The invention provides a personal data collection system suitable for a user terminal, which comprises:
a module M1: adopting a trusted execution environment and a cryptography technology to construct a safe and reliable personal data box;
specifically, the module M1 employs:
module M1.1: the data source server operates in a non-protected environment;
module M1.2: installing an information automatic synchronization tool in the personal data box, and operating the automatic synchronization tool in a protection environment provided by a trusted execution environment;
module M1.3: and carrying out channel encryption on the data source server and the personal data box.
The Trusted Execution Environment (TEE) technology has security capabilities such as security isolation and remote authentication. And automatically adding a time stamp to the data based on the trusted execution environment technology when the data is synchronized, and generating an electronic signature.
A module M2: and synchronizing various personal information data of the user side to the personal data box.
Specifically, the module M2 employs: various personal information data of the user side are synchronized to the personal data box through the automatic information synchronization tool, and the unavailability of the data after the third-party data source stops service is prevented.
Specifically, before various types of personal information data of the user side are synchronized to the personal data box and when the data are synchronized, the various types of personal information data of the user side are correspondingly processed through a data tamper-proof technology (such as an electronic signature or a certificate), and authenticity of a data source is guaranteed.
The invention provides a data using method based on a personal data box, which comprises the following steps:
step S1: installing a third-party data using program on the personal data box;
step S2: the third party data consumer server operates in a protected environment;
and step S3: and the third-party data user server remotely verifies the authenticity of the personal data box, and ensures that the personal data box uses a trusted execution environment technology.
And step S4: the data of the personal data box is accessed based on the authority of the third party, the personal data box forms a data access report based on the data accessed by the third party, and when the third party has the download authority, the formed data access report is sent to the third party; and when the third party has no download right, the data access report is automatically deleted in the personal data box, so that the privacy safety of the user is guaranteed.
Specifically, the data access report includes the access range, frequency and number of the third party to the user data, and the user can set an upper limit on the length of the returned result.
According to the invention, the data use system based on the personal data box comprises:
a module M1: installing a third-party data using program on the personal data box;
a module M2: the third party data consumer server operates in a protected environment;
a module M3: and the third-party data user server remotely verifies the authenticity of the personal data box, and ensures that the personal data box uses a trusted execution environment technology.
A module M4: the data of the personal data box is accessed based on the authority of the third party, the personal data box forms a data access report based on the data accessed by the third party, and when the third party has the download authority, the formed data access report is sent to the third party; and when the third party has no download right, the data access report is automatically deleted in the personal data box, so that the privacy safety of the user is guaranteed.
Specifically, the data access report includes the access range, frequency and number of the third party to the user data, and the user can set an upper limit on the length of the returned result.
Example 2
Example 2 is a preferred example of example 1
Fig. 1 shows a specific process of personal data collection and usage at the user end of the present invention. The following describes the steps of collecting and using personal data in detail with reference to fig. 1, taking the use of the personal data box by a single user as an example:
in step 401, a user installs a plurality of data automatic synchronization tools, and then executes step 402;
in step 402, the personal data box automatically synchronizes the latest personal data of the user to the data source server, encrypts and stores the latest personal data in the local personal data box, and then executes step 403;
in step 403, the user downloads and installs the third-party data usage program, and then performs step 404;
in step 404, the third party data usage program determines whether the personal data box uses a Trusted Execution Environment (TEE), and if so, performs step 405; otherwise, go to step 408;
in step 405, the user authorizes the accessible data of the third-party data using program, and configures an upper limit of the length of the returned result, and then step 406 is executed;
in step 406, after the third-party data using program is executed, the personal data box gives a data access report and asks the user whether to send a result, and if so, step 407 is executed; otherwise, go to step 408;
in step 407, the personal data box determines whether the result of the third party data using program exceeds the upper limit of the length of the returned result, if not, the result is sent to the third party data using server, and then step 408 is executed; if yes, go to step 408;
in step 408, the third party data consuming program terminates execution.
As shown in fig. 2, the present invention uses a client/server (C/S) mode to build a wide area network with a personal data box device and a server, which can be connected through a wired network or a wireless network. The data source server synchronizes the personal information to the personal data box, and the third-party data using side server sends the third-party data using program to the personal data box.
Those skilled in the art will appreciate that, in addition to implementing the systems, apparatus, and various modules thereof provided by the present invention in purely computer readable program code, the same procedures can be implemented entirely by logically programming method steps such that the systems, apparatus, and various modules thereof are provided in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Therefore, the system, the device and the modules thereof provided by the present invention can be considered as a hardware component, and the modules included in the system, the device and the modules thereof for implementing various programs can also be considered as structures in the hardware component; modules for performing various functions may also be considered to be both software programs for performing the methods and structures within hardware components.
The foregoing description has described specific embodiments of the present invention. It is to be understood that the present invention is not limited to the specific embodiments described above, and that various changes or modifications may be made by one skilled in the art within the scope of the appended claims without departing from the spirit of the invention. The embodiments and features of the embodiments of the present application may be combined with each other arbitrarily without conflict.

Claims (10)

1. A method for collecting personal data at a user end, comprising:
step S1: adopting a trusted execution environment and a cryptography technology to construct a safe and reliable personal data box;
step S2: and synchronizing various personal information data of the user side to the personal data box.
2. The method for collecting personal data at user end according to claim 1, wherein the step S1 comprises:
step S1.1: the data source server operates in a non-protected environment;
step S1.2: installing an information automatic synchronization tool in the personal data box, and operating the automatic synchronization tool in a protection environment provided by a trusted execution environment;
step S1.3: and carrying out channel encryption on the data source server and the personal data box.
3. The method for collecting personal data at user end according to claim 1, wherein the step S2 comprises: and synchronizing various personal information data of the user side to the personal data box through the automatic information synchronizing tool.
4. The method for collecting personal data at a user end according to claim 1, wherein before synchronizing the various types of personal information data at the user end to the personal data box and during data synchronization, the various types of personal information data at the user end are processed correspondingly by a data tamper-proof technology to ensure the authenticity of the data source.
5. A personal data collection system adapted for use at a user site, comprising:
a module M1: adopting a trusted execution environment and a cryptography technology to construct a safe and reliable personal data box;
a module M2: and synchronizing various personal information data of the user side to the personal data box.
6. The personal data collection system for user end according to claim 5, wherein said module M1 employs:
module M1.1: the data source server operates in a non-protected environment;
module M1.2: installing an information automatic synchronization tool in the personal data box, and operating the automatic synchronization tool in a protection environment provided by a trusted execution environment;
module M1.3: channel encryption is carried out on the data source server and the personal data box;
the module M2 employs: synchronizing various personal information data of a user side into a personal data box through an automatic information synchronizing tool;
before various personal information data of the user side are synchronized to the personal data box and during data synchronization, various personal information data of the user side are correspondingly processed through a data tamper-proofing technology, and authenticity of a data source is guaranteed.
7. A method for using data based on a personal data box, comprising:
step S1: installing a third-party data using program on the personal data box;
step S2: the third party data consumer server operates in a protected environment;
and step S3: and the third-party data user server remotely verifies the authenticity of the personal data box, and ensures that the personal data box uses a trusted execution environment technology.
And step S4: the data of the personal data box is accessed based on the authority of the third party, the personal data box forms a data access report based on the data accessed by the third party, and when the third party has the download authority, the formed data access report is sent to the third party; and when the third party has no download right, automatically deleting the data access report in the personal data box.
8. The method of claim 7, wherein the data access report includes a third party's access range, frequency, and quantity to the user data.
9. A personal data box based data usage system, comprising:
a module M1: installing a third-party data using program on the personal data box;
a module M2: the third party data consumer server operates in a protected environment;
a module M3: and the third-party data user server remotely verifies the authenticity of the personal data box, and ensures that the personal data box uses a trusted execution environment technology.
A module M4: the data of the personal data box is accessed based on the authority of the third party, the personal data box forms a data access report based on the data accessed by the third party, and when the third party has the download authority, the formed data access report is sent to the third party; and when the third party has no download right, automatically deleting the data access report in the personal data box.
10. The personal data box-based data usage system of claim 9, wherein the data access report includes a third party's access range, frequency, and quantity of user data.
CN202210982483.4A 2022-08-16 2022-08-16 Personal data collection method and system suitable for user side and use method and system thereof Pending CN115378677A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210982483.4A CN115378677A (en) 2022-08-16 2022-08-16 Personal data collection method and system suitable for user side and use method and system thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210982483.4A CN115378677A (en) 2022-08-16 2022-08-16 Personal data collection method and system suitable for user side and use method and system thereof

Publications (1)

Publication Number Publication Date
CN115378677A true CN115378677A (en) 2022-11-22

Family

ID=84066286

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210982483.4A Pending CN115378677A (en) 2022-08-16 2022-08-16 Personal data collection method and system suitable for user side and use method and system thereof

Country Status (1)

Country Link
CN (1) CN115378677A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109800596A (en) * 2018-12-27 2019-05-24 余炀 A kind of personal data safety management system
CN111429254A (en) * 2020-03-19 2020-07-17 腾讯科技(深圳)有限公司 Business data processing method and device and readable storage medium
CN114500054A (en) * 2022-01-27 2022-05-13 百度在线网络技术(北京)有限公司 Service access method, service access device, electronic device, and storage medium
CN114520735A (en) * 2022-01-18 2022-05-20 福建亿榕信息技术有限公司 User identity authentication method, system and medium based on trusted execution environment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109800596A (en) * 2018-12-27 2019-05-24 余炀 A kind of personal data safety management system
CN111429254A (en) * 2020-03-19 2020-07-17 腾讯科技(深圳)有限公司 Business data processing method and device and readable storage medium
CN114520735A (en) * 2022-01-18 2022-05-20 福建亿榕信息技术有限公司 User identity authentication method, system and medium based on trusted execution environment
CN114500054A (en) * 2022-01-27 2022-05-13 百度在线网络技术(北京)有限公司 Service access method, service access device, electronic device, and storage medium

Similar Documents

Publication Publication Date Title
Lone et al. Forensic-chain: Blockchain based digital forensics chain of custody with PoC in Hyperledger Composer
US11784824B1 (en) Secure ledger assurance tokenization
CN103152173B (en) System and method for remote device registration
CN112765245A (en) Electronic government affair big data processing platform
Richter et al. Security digital evidence
CN110957025A (en) Medical health information safety management system
CN101571900B (en) Software copyright protection method, device and system
CN104268488A (en) System And Method For Product Registration
CN106533693B (en) Access method and device of railway vehicle monitoring and overhauling system
CN110061887B (en) Block chain-based traffic statistical method, device and equipment
CN113254947B (en) Vehicle data protection method, system, equipment and storage medium
CN110958319A (en) Method and device for managing infringement and evidence-based block chain
CN106548059A (en) The method of teacher, head of a family's mobile terminal and head of a family's authentication
Kuntze et al. Secure digital chains of evidence
CN109309645A (en) A kind of software distribution security guard method
CN113935065A (en) Ring signature-based federation chain identity privacy protection and supervision method
Pourmajidi et al. Immutable log storage as a service on private and public blockchains
CN112231755A (en) Data authorization method, device and system based on block chain
CN113037827B (en) Voting method based on block chain, self-organization management method and computer equipment
Kuntze et al. On the creation of reliable digital evidence
EP1921554A1 (en) Data delivery system, issuance apparatus, terminal apparatus and intermediate node
CN102821110A (en) Password finding method used for audio/video storage device
RU2712650C1 (en) Software and hardware system for authentication of electronic documents and electronic signatures
US11343107B2 (en) System for method for secured logging of events
CN115378677A (en) Personal data collection method and system suitable for user side and use method and system thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination