Method and system for protecting user privacy data in application program
A technology for application programs and user privacy, applied in digital data protection, digital transmission systems, transmission systems, etc., can solve problems such as difficult to meet the security sharing and privacy protection requirements of massive data, affect data sharing efficiency, and low performance, and achieve security Security of ownership and privacy, realization of secure sharing, reduction of computing and storage burdens
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0037] This embodiment provides a method for protecting user privacy data in an application;
[0038] like figure 1 As shown, the protection methods for user privacy data in the application include:
[0039] S100: The data provider encrypts the shareable content of the user's private data in its own application, and uploads it to the blockchain after encryption;
[0040] S200: The data demand side uploads the selected machine learning model and data demand list to the blockchain;
[0041] S300: The blockchain selects matching data from the data provided by the data provider according to the data requirement list, and sends the machine learning model and the matching data to the trusted execution environment;
[0042] S400: The trusted execution environment uses user data to train the machine learning model, and obtains the model training result; the model training result is fed back to the blockchain; the blockchain feeds back the model training result to the data demand sid...
Embodiment 2
[0078] This embodiment provides a protection system for user privacy data in an application;
[0079] like figure 2 As shown in the figure, the protection system for user privacy data in the application program includes: data provider, data demander, blockchain and trusted execution environment;
[0080] The data provider encrypts the shareable content of the user's private data in its own application, and uploads it to the blockchain after encryption;
[0081] The data demand side uploads the selected machine learning model and data demand list to the blockchain;
[0082] According to the list of data requirements, the blockchain selects matching data from the data provided by the data provider, and sends the machine learning model and matching data to the trusted execution environment;
[0083] The trusted execution environment uses user data to train the machine learning model and obtains the model training result; the model training result is fed back to the blockchain;...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

