[go: up one dir, main page]

Hua et al., 2024 - Google Patents

International trade privacy data management system combining Internet of Things blockchain

Hua et al., 2024

View HTML @Full View
Document ID
12977403543242493230
Author
Hua X
Zhang H
Publication year
Publication venue
Intelligent Decision Technologies

External Links

Snippet

Currently, international trade (Int'l Trade) often faces risks such as privacy data leakage and transaction security during transactions, which seriously affect the protection of privacy data in trade. Therefore, this article used the Internet of Things and blockchain to attempt to …
Continue reading at journals.sagepub.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
    • G06Q40/025Credit processing or loan processing, e.g. risk analysis for mortgages
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Similar Documents

Publication Publication Date Title
US20220050921A1 (en) Systems and methods for functionally separating heterogeneous data for analytics, artificial intelligence, and machine learning in global data ecosystems
US20220012364A1 (en) Systems and methods for enforcing privacy-respectful, trusted communications
US20230054446A1 (en) Systems and methods for functionally separating geospatial information for lawful and trustworthy analytics, artificial intelligence and machine learning
AU2018258656B2 (en) Systems and methods for enforcing centralized privacy controls in de-centralized systems
Fang et al. A survey of big data security and privacy preserving
Sun et al. Data security and privacy in cloud computing
US10043035B2 (en) Systems and methods for enhancing data protection by anonosizing structured and unstructured data and incorporating machine learning and artificial intelligence in classical and quantum computing environments
US20180307859A1 (en) Systems and methods for enforcing centralized privacy controls in de-centralized systems
Dasaklis et al. Sok: Blockchain solutions for forensics
Zhao et al. Research on electronic medical record access control based on blockchain
US20170277773A1 (en) Systems and methods for secure storage of user information in a user profile
Lu et al. Privacy information security classification for internet of things based on internet data
US20170277775A1 (en) Systems and methods for secure storage of user information in a user profile
WO2019246568A1 (en) Systems and methods for enforcing privacy-respectful, trusted communications
KR20190029509A (en) System and method for securely storing user information in a user profile
Datta et al. Ransomware and Costa Rica’s national emergency: A defense framework and teaching case
Easttom Digital forensics, investigation, and response
Ignatovski For-profit versus non-profit cybersecurity posture: breach types and locations in healthcare organisations
Khurshid et al. Big data-9vs, challenges and solutions
Hua et al. International trade privacy data management system combining Internet of Things blockchain
Jain et al. Big Data Analytics and Security Over the Cloud: Characteristics, Analytics, Integration and Security
Zhao Construction information security management system based on data sharing algorithm
Wang Data Security and Privacy Protection: A Comprehensive Guide
Naranjo Rico Holistic business approach for the protection of sensitive data: study of legal requirements and regulatory compliance at international level to define and implement data protection measures using encryption techniques
Divadari et al. Managing data protection and privacy on cloud