Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy data transaction method and device

A technology of private data and transaction methods, applied in the field of data circulation, can solve problems such as the inability to prevent both parties from doing evil intentionally, data leakage, and difficulty in data circulation, so as to eliminate hidden dangers of data leakage, prevent both parties from doing evil intentionally, and solve data leakage.

Active Publication Date: 2021-04-27
上海一橙网络科技股份有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The main purpose of this application is to provide a private data transaction method and device to solve the situation that data leakage still exists during the data transaction process, and it is impossible to prevent the situation where both parties to the transaction intentionally do evil, resulting in difficult data circulation under protected conditions question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy data transaction method and device
  • Privacy data transaction method and device
  • Privacy data transaction method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0030] It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It should be understood that the data so used may be interchanged under appropriate circumstances for...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a private data transaction method and device. The method includes confirming the transaction relationship between the two parties; transferring the funds provided by the first transaction party to the target address of the smart contract; encrypting the private data provided by the second transaction party through the RSA public key of the first transaction party; The encrypted data is checked by the first transaction party; if the verification is successful, funds are transferred from the target address to the second transaction party. The device includes: a confirmation unit, a first transfer unit, an encryption unit, a verification unit and a second transfer unit. This application solves the technical problem that data circulation under protected conditions is not easy due to the fact that there is still data leakage during the data transaction process, and it is impossible to prevent the two parties in the transaction from doing evil intentionally.

Description

technical field [0001] The present application relates to the field of data circulation, in particular, to a private data transaction method and device. Background technique [0002] According to the National Development and Reform Commission's prediction, the proportion of new cars in China's intelligent networked vehicles will reach 50% in 2020, and cars will become the next important mobile terminal. [0003] In order to perceive the surrounding environmental information in real time and make appropriate responses in advance, different levels of self-driving cars are equipped with various high-precision cameras, radars and other sensors. These sensors also record a wealth of personal information while optimizing vehicle performance and service. [0004] The vehicle and owner information, as well as the trajectory generated during driving, vehicle status, maintenance and entertainment preferences, and other information are mostly owned and managed by car companies and ser...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06Q20/38G06Q40/04
Inventor 张翔吴峰
Owner 上海一橙网络科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products