Data security sharing method, system and device
A data security and data sharing technology, applied in transmission systems, data processing applications, finance, etc., can solve data privacy leakage and other issues, achieve the effect of increasing protection and solving privacy protection problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0046] In order to make the objects, technical solutions, and advantages of the present invention more clearly, the technical solutions in the embodiments of the present invention will be described in contemplation in the embodiment of the present invention. It is an embodiment of the invention, not all of the embodiments. Based on the embodiments in the present invention, all other embodiments obtained without creative labor are not made in the premise of creative labor.
[0047]The block chain is a technique with characteristics such as detritionation, tamper-proof and traceability. The block chain can establish a detrimentary trading environment, get rid of third parties for the limitations of the data sharing process, so that the transaction is transparent to both parties At the same time, the transaction data is recorded by the block chain, which is convenient for subsequent retrieval and traceability of transaction information. There are often have a public chain, private ch...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap