Hua et al., 2024 - Google Patents
International trade privacy data management system combining Internet of Things blockchainHua et al., 2024
View HTML- Document ID
- 12977403543242493230
- Author
- Hua X
- Zhang H
- Publication year
- Publication venue
- Intelligent Decision Technologies
External Links
Snippet
Currently, international trade (Int'l Trade) often faces risks such as privacy data leakage and transaction security during transactions, which seriously affect the protection of privacy data in trade. Therefore, this article used the Internet of Things and blockchain to attempt to …
- 238000013523 data management 0 title description 13
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
- G06Q40/025—Credit processing or loan processing, e.g. risk analysis for mortgages
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220050921A1 (en) | Systems and methods for functionally separating heterogeneous data for analytics, artificial intelligence, and machine learning in global data ecosystems | |
US20220012364A1 (en) | Systems and methods for enforcing privacy-respectful, trusted communications | |
US20230054446A1 (en) | Systems and methods for functionally separating geospatial information for lawful and trustworthy analytics, artificial intelligence and machine learning | |
AU2018258656B2 (en) | Systems and methods for enforcing centralized privacy controls in de-centralized systems | |
Fang et al. | A survey of big data security and privacy preserving | |
Sun et al. | Data security and privacy in cloud computing | |
US10043035B2 (en) | Systems and methods for enhancing data protection by anonosizing structured and unstructured data and incorporating machine learning and artificial intelligence in classical and quantum computing environments | |
US20180307859A1 (en) | Systems and methods for enforcing centralized privacy controls in de-centralized systems | |
Dasaklis et al. | Sok: Blockchain solutions for forensics | |
Zhao et al. | Research on electronic medical record access control based on blockchain | |
US20170277773A1 (en) | Systems and methods for secure storage of user information in a user profile | |
Lu et al. | Privacy information security classification for internet of things based on internet data | |
US20170277775A1 (en) | Systems and methods for secure storage of user information in a user profile | |
WO2019246568A1 (en) | Systems and methods for enforcing privacy-respectful, trusted communications | |
KR20190029509A (en) | System and method for securely storing user information in a user profile | |
Datta et al. | Ransomware and Costa Rica’s national emergency: A defense framework and teaching case | |
Easttom | Digital forensics, investigation, and response | |
Ignatovski | For-profit versus non-profit cybersecurity posture: breach types and locations in healthcare organisations | |
Khurshid et al. | Big data-9vs, challenges and solutions | |
Hua et al. | International trade privacy data management system combining Internet of Things blockchain | |
Jain et al. | Big Data Analytics and Security Over the Cloud: Characteristics, Analytics, Integration and Security | |
Zhao | Construction information security management system based on data sharing algorithm | |
Wang | Data Security and Privacy Protection: A Comprehensive Guide | |
Naranjo Rico | Holistic business approach for the protection of sensitive data: study of legal requirements and regulatory compliance at international level to define and implement data protection measures using encryption techniques | |
Divadari et al. | Managing data protection and privacy on cloud |