A privacy information tamper-proofing method and system based on a block chain technology
A technology of privacy information and block chain, which is applied in the field of anti-tampering of private information based on block chain technology, can solve problems such as unproposed solutions, and achieve the effect of solving easy tampering, improving security, and preventing tampering
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] According to an embodiment of the present invention, an embodiment of an anti-tampering method for private information based on blockchain technology is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be implemented in a computer system such as a set of computer-executable instructions and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0029] figure 1 It is a flow chart of a method for preventing tampering of private information based on blockchain technology according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:
[0030] Step S102, obtaining the privacy data to be processed;
[0031] Step S104, performing image processing on the privacy data to be processed to obtain a mirror image file, and performing segmentation processin...
Embodiment 2
[0071] The present invention also provides an anti-tampering system for private information based on blockchain technology, which is used to implement the anti-tampering method for private information based on blockchain technology provided by the above-mentioned content of the embodiment of the present invention. The following is provided by the embodiment of the present invention The specific introduction of the anti-tampering system for private information based on blockchain technology.
[0072] like image 3 As shown, the system includes: an acquisition unit 10, a processing unit 20, a storage unit 30, an authentication unit 40 and a first execution unit 50, wherein,
[0073] The obtaining unit 10 is used to obtain privacy data to be processed;
[0074] The processing unit 20 is configured to perform image processing on the privacy data to be processed to obtain a mirror image file; and perform segmentation processing on the privacy data to be processed to obtain multipl...
PUM
![No PUM](https://static-eureka.patsnap.com/ssr/23.2.0/_nuxt/noPUMSmall.5c5f49c7.png)
Abstract
Description
Claims
Application Information
![application no application](https://static-eureka.patsnap.com/ssr/23.2.0/_nuxt/application.06fe782c.png)
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com