CN115640604A - Private information retrieval method and system applied to financial scene - Google Patents

Private information retrieval method and system applied to financial scene Download PDF

Info

Publication number
CN115640604A
CN115640604A CN202211264969.0A CN202211264969A CN115640604A CN 115640604 A CN115640604 A CN 115640604A CN 202211264969 A CN202211264969 A CN 202211264969A CN 115640604 A CN115640604 A CN 115640604A
Authority
CN
China
Prior art keywords
data
node
task
private information
sender
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202211264969.0A
Other languages
Chinese (zh)
Inventor
徐德安
李升林
刘宇飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Qianfang Technology Co ltd
Original Assignee
Shanghai Qianfang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Qianfang Technology Co ltd filed Critical Shanghai Qianfang Technology Co ltd
Priority to CN202211264969.0A priority Critical patent/CN115640604A/en
Publication of CN115640604A publication Critical patent/CN115640604A/en
Withdrawn legal-status Critical Current

Links

Images

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention is suitable for the technical field of information security, and provides a private information retrieval method and a private information retrieval system applied to a financial scene, wherein the private information retrieval method comprises the following steps of; initiating a task, namely initiating a task of retrieving private information in a dispatching center by a participant; the method comprises the following steps that a task distribution step that a scheduling center distributes a privacy label query task to two participating parties respectively through scheduling service, namely a data query node and a data providing node; and the like; according to the private information retrieval method and system, the data demand party can retrieve the user data of the data provider side according to the user ID or other keywords, the data provider cannot obtain the key information such as the ID of the data demand party, the privacy and the safety of the data are guaranteed, the method and system are widely applied to financial scenes such as telecommunication anti-fraud, account risk, black product transaction, wool party, embezzlement and cash register, credit fraud and the like, and the safety and the compliance of the data are guaranteed.

Description

Private information retrieval method and system applied to financial scene
Technical Field
The invention belongs to the technical field of information security, and particularly relates to a private information retrieval method and system applied to a financial scene.
Background
The private information retrieval is also called as a hidden query, which means that a query party hides a keyword or client id information of a queried object, and a data provider provides a matched query result but cannot know which query object is specifically corresponding. Data can not go out and can be calculated, and the possibility of data caching is avoided.
The private information retrieval technology is suitable for various scenes in the financial field and plays an important role in the aspect of protecting the privacy and information safety of users. The privacy information retrieval technology is very important in financial systems, including telecom fraud, account risk, black product transaction, wool party, embezzlement and cash register, credit fraud, stock inquiry and the like, and especially in recent years, the telecom fraud is increasingly rampant, so that the method is seriously pernicious to the property safety of common people, and is also highly valued by the industry.
In the prior art, certain potential safety hazards and compliance problems can be found.
1. A data provider provides information retrieval service in an API interface mode, and data transmission in a network has safety problems, so that information leakage is caused.
2. And the data inquirer transmits the ID to the data provider for data retrieval. The data provider can obtain the data which the inquirer wants to inquire, if a large number of keywords such as inquiry ID are mastered, the heat of some data can be roughly estimated, so that the price of some data is improved, and the stability of the financial market is influenced. For example, if a user applies for a credit card at a bank, and the bank determines whether the user is in a blacklist of another bank, the user may be exposed to the other bank if the user is queried by the current technical solution, which may cause customer churn.
Therefore, the invention provides a private information retrieval method and a private information retrieval system applied to financial scenes.
Disclosure of Invention
The embodiment of the invention provides a private information retrieval method and a private information retrieval system applied to financial scenes, wherein a data demand party can retrieve user data at a data provider side according to a user ID or other keywords, the data provider cannot obtain key information such as the ID of the data demand party, the privacy and the safety of the data are guaranteed, the private information retrieval method and the private information retrieval system are widely applied to financial scenes such as telecommunication anti-fraud, account risk, black product transaction, wool party, embezzlement and cash register, credit fraud and the like, and the safety and the compliance of the data are guaranteed.
The embodiment of the invention is realized in such a way that the private information retrieval method applied to the financial scene comprises the following steps;
initiating a task, namely initiating a task of retrieving private information in a dispatching center by a participant;
the method comprises the following steps that a task distribution step that a scheduling center distributes a privacy label inquiry task to two participating parties through scheduling service, namely a data inquiry node and a data providing node;
the task query, the data providing node carries out local retrieval query, after the retrieval is finished, the result is encrypted, and the information is sent to the data query node;
and acquiring task data, and carrying out decryption results by the data query node through a decryption program and storing a result body.
As a preferred embodiment of the present invention, in the task distribution described in the method, the data query node sends the keywords such as the user ID that needs to be retrieved to the data providing node, and the data providing node cannot sense the specific ID and other information of the user of the data query node.
As a preferred embodiment of the present invention, initiating, by the task center, a participant in a PSI task for the participant comprises: a supplier Sender and a demander;
supplier Sender: there are n pieces of data that are,
Figure BDA0003892736940000021
receiver of the demander: there are m pieces of data
Figure BDA0003892736940000022
The supplier Sender and the demander represent a data query node and a data providing node respectively in the method.
As a preferred embodiment of the present invention, the parameter disclosure between the two participants includes:
data volume held by both sides: m is s ,m r
Cryptographic hash function: h;
homomorphic parameters: n, q, t.
As a preferred embodiment of the present invention, in the task query, the data providing node performs local retrieval query, and after the retrieval is completed, the result is encrypted, and the algorithm process of sending the information to the data querying node is as follows;
1) A Sender and a Receiver jointly agree on a homomorphic encryption scheme; sender generates non-zero plaintext random number r i ,i=1,...,m r
2) Receiver generates a key pair (pk, sk), hashes all IDs and encrypts c with the public key i =Enc(pk,H(rID i ) I =1,.. M, and sends c i Giving a Sender;
3) Sender performs Hash operation on all IDs to obtain x j =H(sID j ),j=1,...,m s
4) Sender calculates d under homomorphic scene i =r i Π x∈X (c i -x),i=1,...,m r And transmit
Figure BDA0003892736940000031
To Receiver.
As a preferred embodiment of the present invention, the step of acquiring task data decryption comprises the following steps: receiver decryption
Figure BDA0003892736940000032
If d is i =0, which is added to the output list.
As a preferred embodiment of the present invention, any party participating in the method cannot obtain other information than intersection information from another party.
A private information retrieval system for application in financial scenarios comprising:
the scheduling platform is used for being responsible for task scheduling service;
the first node module comprises a computing node and a data node, wherein the computing node is used for participating in computing, and the data node is connected with the computing node and used for storing computing data;
and the second node module comprises a computing node and a data node, wherein the computing node is used for participating in computation, the data node is connected with the computing node, and the data node is used for storing computation data.
As a preferred embodiment of the present invention, the scheduling platform is deployed at any position after negotiation by both parties, and may be disposed inside a certain participant or on another server.
As a preferred embodiment of the present invention, the computing nodes in the first node module and the second node module are both provided with a homomorphic encryption algorithm.
The invention has the beneficial effects that: according to the private information retrieval method and system provided by the invention, the data demand party can retrieve the user data of the data provider side according to the user ID or other keywords, and the data provider cannot obtain the key information such as the ID of the data demand party, so that the privacy and the safety of the data are guaranteed, the private information retrieval method and system are widely applied to financial scenes such as telecommunication anti-fraud, account risk, black product transaction, wool party, embezzlement, credit fraud and the like, and the safety and the right of the data are guaranteed.
Drawings
FIG. 1 is a block diagram of a private information retrieval method applied to a financial scenario in accordance with the present invention;
FIG. 2 is a diagram of a private computing platform system deployment of the present invention;
fig. 3 is a block diagram of the private information retrieval computation flow of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and do not limit the invention.
According to the private information retrieval method and system provided by the invention, the data demander can retrieve the user data at the data provider side according to the user ID or other keywords, and the data provider cannot acquire the ID and other key information of the data demander.
The embodiment of the invention is realized in the way, and the privacy information retrieval method applied to the financial scene comprises the following steps;
s100, initiating a task, namely initiating a task of retrieving private information in a dispatching center by a participant;
s200, distributing tasks, namely distributing the privacy label inquiry tasks to the two participating parties respectively through a scheduling service by a scheduling center, namely a data inquiry node and a data providing node;
s300, task query is carried out, the data providing node carries out local retrieval query, the result is encrypted after the retrieval is finished, and information is sent to the data query node;
s400, acquiring task data, and the data query node decrypts the result through a decryption program and stores the result body.
Furthermore, in the task distribution described in the method, the data query node sends keywords such as a user ID to be retrieved to the data providing node, and the data providing node cannot sense a specific ID and other information of a user of the data query node.
Further, initiating, by the task center, the participant in the PSI task for the participant includes: a supplier Sender and a demander;
supplier Sender: there are n pieces of data that are,
Figure BDA0003892736940000051
receiver of the demander: there are m pieces of data
Figure BDA0003892736940000052
The supplier Sender and the demander represent a data query node and a data providing node respectively in the method.
Further, the parameter disclosure between the two participants includes:
data volume held by both sides: m is a unit of s ,m r
Cryptographic hash function: h;
homomorphic parameters: n, q, t.
Further, in the task query, the data providing node performs local retrieval query, and after the retrieval is completed, the result is encrypted, and the algorithm process of sending the information to the data query node is as follows;
1) A Sender and a Receiver jointly agree on a homomorphic encryption scheme; sender generates non-zero plaintext random number r i ,i=1,...,m r
2) Receiver generates a key pair (pk, sk), hashes all IDs and encrypts c with the public key i =Enc(pk,H(rID i ) I = 1.. M, and sends c i Giving a Sender;
3) Sender performs Hash operation on all IDs to obtain x j =H(sID j ),j=1,...,m s
4) Sender calculates d under homomorphic scene i =r i Π x∈X (c i -x),i=1,...,m r And transmit it
Figure BDA0003892736940000061
To Receiver.
Further, the step of decrypting the acquired task data comprises the following steps: receiver decryption
Figure BDA0003892736940000062
If d is i =0, which is added to the output list.
Furthermore, any party participating in the method cannot obtain other information of the other party except the intersection information.
A private information retrieval system for application in financial scenarios comprising:
the scheduling platform is used for being responsible for task scheduling service;
the first node module comprises a computing node and a data node, wherein the computing node is used for participating in computing, and the data node is connected with the computing node and used for storing computing data;
and the second node module comprises a computing node and a data node, wherein the computing node is used for participating in computation, the data node is connected with the computing node, and the data node is used for storing computation data.
Furthermore, the scheduling platform is deployed at any position after negotiation by both parties, and can be arranged in a certain participant or on other servers.
Further, the computing nodes in the first node module and the second node module are both provided with homomorphic encryption algorithms.
Example one
Referring to fig. 1-3, a method for retrieving private information applied to a financial scenario includes the following steps;
s100, initiating a task, namely initiating a task of retrieving privacy information in a dispatching center by a participant;
s200, distributing tasks, wherein a scheduling center distributes a privacy label inquiry task to two participating parties respectively through scheduling service, namely a data inquiry node and a data providing node;
s300, task query is carried out, the data providing node carries out local retrieval query, the result is encrypted after the retrieval is finished, and information is sent to the data query node;
s400, acquiring task data, carrying out decryption results by the data query node through a decryption program, and storing a result body.
In this embodiment, in the task distribution described in the method, the data query node sends the keywords such as the user ID that needs to be retrieved to the data providing node, and the data providing node cannot sense the specific ID and other information of the user of the data query node.
In this embodiment, initiating, by the task center, a participant in the PSI task for the participant includes: a supplier Sender and a demander;
supplier Sender: there are n pieces of data, { (sID _ 1),. -, (sID _ (m _ s)) };
receiver of the demander: there are m pieces of data { (rID _ 1),. ·, (rID _ (m _ r)) };
the supplier Sender and the demander represent a data query node and a data providing node respectively in the method, wherein the participating parties in the method are respectively referred to by a node A and a node B in the figure.
In summary, if node a wants to retrieve data from node B, it only needs to initiate a task of retrieving private information at the dispatch center. The dispatching center sends respective task information to a designated node, the node A (data inquirer) sends keywords such as a user ID (identity) to be searched to the node B (data provider), and the node B cannot sense the specific ID and other information of the user. After the node B completes the search in the local library, the result is sent to the node A in a ciphertext mode, and the node A completes decryption locally so as to acquire the data needing to be searched.
Example two
Referring to fig. 1-3, in the present embodiment, the parameters disclosed between the two participants include:
amount of data held by both sides: m is a unit of s ,m r
Cryptographic hash function: h;
homomorphic parameters: n, q, t.
In the embodiment, in the task query, the data providing node performs local retrieval query, and after the retrieval is completed, the result is encrypted, and the algorithm process of sending the information to the data query node is as follows;
1) A Sender and a Receiver jointly agree on a homomorphic encryption scheme; sender generates non-zero plaintext random number r i ,i=1,...,m r
2) Receiver generationKey pair (pk, sk), hashing all IDs and encrypting c with public key i =Enc(pk,H(rID i ) I = 1.. M, and sends c i Giving a Sender;
3) Sender performs hash operation on all IDs to obtain x j =H(sID j ),j=1,...,m s
4) Sender calculates d under homomorphic scene i =r i Π x∈X (c i -x),i=1,...,m r And transmit
Figure BDA0003892736940000081
To Receiver.
In this embodiment, the step of decrypting the acquired task data includes the following steps: receiver decryption
Figure BDA0003892736940000082
If d is i =0, which is added to the output list.
In this embodiment, any party participating in the method cannot obtain other information of the other party except the intersection information.
In summary, the algorithm designed by the present invention is as follows:
first determining the participants, and the participant data
1. Supplier Sender: there are n pieces of data that are,
Figure BDA0003892736940000083
2. receiver of the requirer: there are m pieces of data
Figure BDA0003892736940000091
Next, determining system disclosure parameters:
1. data volume held by both sides: m is s ,m r
2. Cryptographic hash function: h
3. Homomorphic parameters: n, q, t
And (3) calculating:
firstly, inputting:
Figure BDA0003892736940000092
the detailed calculation flow is further as follows:
1) A Sender and a Receiver jointly agree on a homomorphic encryption scheme; sender generates non-zero plaintext random number r i ,i=1,...,m r
2) Receiver generates a key pair (pk, sk), hashes all IDs and encrypts c with the public key i =Enc(pk,H(rID i ) I = 1.. M, and sends c i Giving a Sender;
3) Sender hashes all IDs to get x j =H(sID j ),j=1,...,m s
4) Sender calculates d under homomorphic scene i =r i Π x∈X (c i -x),i=1,...,m r And transmit it
Figure BDA0003892736940000093
Giving a Receiver;
5) Receiver decryption
Figure BDA0003892736940000094
If d is i =0, which is added to the output list.
And (3) outputting: receiver output d i A list of =0, including IDs common to the supplier and the demander.
EXAMPLE III
Referring to fig. 1-3, a private information retrieval system applied to a financial scenario includes:
the scheduling platform is used for being responsible for task scheduling service;
the first node module comprises a computing node and a data node, wherein the computing node is used for participating in computing, the data node is connected with the computing node, and the data node is used for storing computing data;
and the second node module comprises a computing node and a data node, wherein the computing node is used for participating in computation, the data node is connected with the computing node, and the data node is used for storing computation data.
In this embodiment, the scheduling platform is deployed at any position after negotiation by both parties, and may be disposed inside a certain participant or on another server.
In this embodiment, the computing nodes in the first node module and the second node module are both provided with a homomorphic encryption algorithm.
In conclusion: the privacy computation comprises a scheduling platform, computing nodes and data nodes, wherein the computing nodes and the data nodes are arranged in the financial enterprise, and the scheduling platform is deployed at any position (such as the inside of a certain participant or other servers) after negotiation between the two parties. The data nodes store respective calculation data, the calculation nodes participate in calculation, and the scheduling platform is responsible for task scheduling.
The working principle is as follows: the algorithm (two-party secure matching) is used for calculating a common data intersection between two parties, an initiator (one party) can obtain an intersection result, a collaborator (the other party) cannot obtain any information, and the algorithm can be flexibly adapted to the fact that both parties can obtain intersection information. In addition, any one party cannot obtain other information except intersection information of the other party; according to the private information retrieval method and the private information retrieval system, the data demander can retrieve the user data at the data provider side according to the user ID or other keywords, the data provider cannot obtain the ID and other key information of the data demander, the privacy and the safety of the data are guaranteed, the private information retrieval method and the private information retrieval system are widely applied to financial scenes such as telecommunication anti-fraud, account risk, black product transaction, wool party, embezzlement and cash register, credit fraud and the like, and the safety and the compliance of the data are guaranteed.
The invention can therefore be practically applied to items such as financial anti-fraud and stock queries, examples of which are as follows:
1. financial anti-fraud
By the private information retrieval method and the private information retrieval system applied to financial scenes, blacklist retrieval can be performed among different banks, black households of other banks can be inquired, fraudulent behaviors of credit cards, loans and the like can be prevented, and joint defense joint control in the field of blacklists is realized.
2. Stock inquiry
The invention can also be applied to stock information inquiry. The user can inquire the stock information through the invention, and the security dealer can not know the specific stock information inquired by the user, thereby preventing the loss of stockholders caused by malicious operation of stock prices by the security dealer and other large users.
It should be understood that, although the steps in the flowcharts of the embodiments of the present invention are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in various embodiments may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present invention. It should be noted that various changes and modifications can be made by those skilled in the art without departing from the spirit of the invention, and these changes and modifications are all within the scope of the invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.
The above description is intended to be illustrative of the preferred embodiment of the present invention and should not be taken as limiting the invention, but rather, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention.

Claims (10)

1. A private information retrieval method applied to financial scenes is characterized by comprising the following steps of;
initiating a task, namely initiating a task of retrieving private information in a dispatching center by a participant;
the method comprises the following steps that a task distribution step that a scheduling center distributes a privacy label inquiry task to two participating parties through scheduling service, namely a data inquiry node and a data providing node;
the task query, the data providing node carries out local retrieval query, after the retrieval is finished, the result is encrypted, and the information is sent to the data query node;
and acquiring task data, and carrying out decryption results by the data query node through a decryption program and storing a result body.
2. The method as claimed in claim 1, wherein the data query node in task distribution sends a keyword such as a user ID to be retrieved to the data providing node, and the data providing node cannot sense the specific ID and other information of the user of the data query node.
3. The method of claim 1, wherein initiating, by the task center, the participant in the PSI task for the participant comprises: a supplier Sender and a demander;
supplier Sender: there are n pieces of data that are,
Figure FDA0003892736930000011
receiver of the demander: there are m pieces of data
Figure FDA0003892736930000012
The supplier Sender and the demander Receiver represent a data query node and a data providing node respectively in the method.
4. The private information retrieval method applied to financial scenario as claimed in claim 3, wherein the parameter disclosed between both participants comprises:
amount of data held by both sides: m is a unit of s ,m r
Cryptographic hash function: h;
homomorphic parameters: n, q, t.
5. The private information retrieval method applied to financial scenarios as claimed in claim 4, wherein the task query, the data providing node to search locally, the result is encrypted after the retrieval is completed, and the algorithm process of sending the information to the data querying node is as follows;
1) A Sender and a Receiver jointly agree on a homomorphic encryption scheme; sender generates non-zero plaintext random number r i ,i=1,...,m r
2) Receiver generates a key pair (pk, sk), hashes all IDs and encrypts c with the public key i =Enc(pk,H(rID i ) I = 1.. M, and sends c i Giving a Sender;
3) Sender performs Hash operation on all IDs to obtain x j =H(sID j ),j=1,...,m s
4) Sender calculates d under homomorphic scene i =r ix∈X (c i -x0,i=1,...,m r And transmit it
Figure FDA0003892736930000021
To Receiver.
6. The method as claimed in claim 5, wherein the step of obtaining the task data comprises obtaining the task dataThe decryption steps are as follows: receiver decryption
Figure FDA0003892736930000022
If d is i =0, which is added to the output list.
7. The method as claimed in claim 6, wherein any party involved in the method cannot obtain other information except intersection information from another party.
8. A private information retrieval system applied to financial scenarios based on claims 1-7, comprising:
the scheduling platform is used for being responsible for task scheduling service;
the first node module comprises a computing node and a data node, wherein the computing node is used for participating in computing, and the data node is connected with the computing node and used for storing computing data;
and the second node module comprises a computing node and a data node, wherein the computing node is used for participating in computation, the data node is connected with the computing node, and the data node is used for storing computation data.
9. The system as claimed in claim 8, wherein the deployment platform is deployed at any position after negotiation between two parties, and can be deployed inside a participant or on other servers.
10. The system as claimed in claim 8, wherein the computing nodes of the first node module and the second node module are each provided with a homomorphic encryption algorithm.
CN202211264969.0A 2022-10-17 2022-10-17 Private information retrieval method and system applied to financial scene Withdrawn CN115640604A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211264969.0A CN115640604A (en) 2022-10-17 2022-10-17 Private information retrieval method and system applied to financial scene

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211264969.0A CN115640604A (en) 2022-10-17 2022-10-17 Private information retrieval method and system applied to financial scene

Publications (1)

Publication Number Publication Date
CN115640604A true CN115640604A (en) 2023-01-24

Family

ID=84944323

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211264969.0A Withdrawn CN115640604A (en) 2022-10-17 2022-10-17 Private information retrieval method and system applied to financial scene

Country Status (1)

Country Link
CN (1) CN115640604A (en)

Similar Documents

Publication Publication Date Title
Zhao et al. Machine learning based privacy-preserving fair data trading in big data market
Li et al. Privacy-preserving-outsourced association rule mining on vertically partitioned databases
Badsha et al. Privacy preserving user-based recommender system
Kelsey et al. Conditional purchase orders
Zhan Privacy-preserving collaborative data mining
WO2020051710A1 (en) System and process for managing digitized security tokens
CA2808369A1 (en) System for protecting an encrypted information unit
CN110719176A (en) Logistics privacy protection method and system based on block chain and readable storage medium
Yi et al. Privacy-preserving user profile matching in social networks
CN110210249A (en) The system and method for track query function of hideing are realized based on data obfuscation
US20220417018A1 (en) Cryptographic Pseudonym Mapping Method, Computer System, Computer Program And Computer-Readable Medium
Bao et al. Privacy protection for transactions of digital goods
Zhang et al. Blockchain-based secure and fair crowdsourcing scheme
CN108737435A (en) A kind of account initial method and device
Guo et al. Subset membership encryption and its applications to oblivious transfer
CN114144783B (en) Cryptographic pseudonym mapping method, computer system, computer program and computer-readable medium
US20230367902A1 (en) Common data determining methods, apparatuses, and systems for protecting privacy
CN117371010A (en) Data trace query method, electronic device and readable storage medium
CN115640604A (en) Private information retrieval method and system applied to financial scene
AU2021101937A4 (en) Systems and methods for the delivery of digital receipts to shoppers by post-purchase transaction matching via an aggregator without the need to acquire shoppers’ consent at the counter while remaining compliant to privacy legislations
Chang et al. Secure electronic coupons
US7979712B2 (en) Network system, server and information terminal for list matching
CN111369251B (en) Block chain transaction supervision method based on user secondary identity structure
Liu et al. pRate: anonymous star rating with rating secrecy
CN114726549A (en) Data security query method and system based on bidirectional RSA three-time transmission protocol

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20230124