Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy data credibility verification method based on block chain and privacy security calculation

A privacy data, privacy security technology, applied in the field of privacy data credible verification, can solve problems such as increasing supervision difficulty, falsifying real estate information, talent qualification information, disrupting the normal order of the market, etc.

Pending Publication Date: 2021-04-20
杭州亿房达科技有限公司
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Take the house purchase qualification inspection scenario of real estate transactions as an example. Although the real estate development company is responsible for the registration of house purchase qualification information, the citizen’s real estate information and talent qualification information involved in this scenario are all private data. , The Bureau of Human Resources and Social Security will not directly open the service of data credibility verification like real estate development companies, which leads to frequent occurrence of falsification of real estate information and talent qualification information submitted by home buyers in this scenario, which not only disrupts the normal order of the market, but also violates the normal submission The rights and interests of consumers who purchase housing materials; it also makes the Housing and Urban-Rural Development Bureau, as a real estate supervision department, have to rely on passive supervision methods such as random inspections or public reports, which greatly increases the difficulty of its supervision

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy data credibility verification method based on block chain and privacy security calculation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] A trusted verification method for private data based on blockchain and privacy security computing, the steps are as follows:

[0028] Step 1, build a system service platform, the user inputs the corresponding information to be verified on the system service platform, the system service platform locally constructs an encrypted user's corresponding information verification request according to the to-be-verified information, and the system service platform responds to the authoritative party of information verification at the same time. The client sends an authentication request.

[0029] In step 2, after receiving the verification request data in step 1, the corresponding terminal of the information verification authority first decrypts the ciphertext, obtains the content of the information verification request, and encrypts the real information corresponding to the requested information verification and sends it back to the system. Service Platform.

[0030] In step 3,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privacy data credibility verification method based on a block chain and privacy security calculation. Secure and credible privacy data credibility verification is achieved through innovative combined use of the block chain and privacy security calculation technology. According to the method, on one hand, the authoritative department is willing to provide a credible data source, and on the other hand, the data transmission link, the data calculation link and the calculation conclusion link cannot be tampered, so that the electronic data is truly ensured to have the anti-counterfeiting performance comparable with that of a paper document. According to the invention, a safer, more credible and more automatic information credibility verification mode is created, which is particularly important for transaction scenes of bulk commodities such as house products involving a large amount of citizen privacy data. The application of the invention enables privacy data credibility verification scenes in various commercial activities to make real, credible and efficient business judgments based on the invention, and eliminates the possibility of fraud of house purchase qualification through data counterfeiting.

Description

technical field [0001] The invention relates to a private data trusted verification method based on block chain and private security computing. Background technique [0002] In the Internet era, the verification of information credibility is gradually saying goodbye to the traditional verification method based on paper documents. However, in the digital world, how to define the credibility of a data is a very complicated matter, which needs to satisfy the requirements of credible data sources, credible data transmission environment, credible data computing and its environment, credible data at the same time. Computational conclusions and other links. Even if authoritative departments can rely on public credibility to ensure credible data sources, in the current Internet environment, once the data is transmitted on the public network, it may be stolen and assigned; the data calculation process may also suffer from insufficient security of the environment. Attacks; even the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/64G06F9/448
Inventor 徐若晨
Owner 杭州亿房达科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products