A data privacy protection method, device, equipment and storage medium
A technology of data privacy and proxy data, which is applied in the field of Internet and blockchain to achieve the effect of protecting data privacy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0058] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the specific technical solutions of the invention will be further described in detail below in conjunction with the drawings in the embodiments of the present invention. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.
[0059] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.
[0060] figure 1 It is a schematic flowchart of a data privacy protection method provided by an embodiment of the present invention. Such as figure 1 As shown, the method is applied to a trusted artificial intelligence (Artificial Intelligence, AI) system; the trusted AI system includes at least a buyer AI agent and a seller AI agent; the method includes:
[0061] S101: Obtain the authorization data of the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


