CN111814196B - 一种数据处理方法、装置及设备 - Google Patents
一种数据处理方法、装置及设备 Download PDFInfo
- Publication number
- CN111814196B CN111814196B CN202010922306.8A CN202010922306A CN111814196B CN 111814196 B CN111814196 B CN 111814196B CN 202010922306 A CN202010922306 A CN 202010922306A CN 111814196 B CN111814196 B CN 111814196B
- Authority
- CN
- China
- Prior art keywords
- data
- target data
- security application
- target
- owner
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2228—Indexing structures
- G06F16/2255—Hash tables
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Business, Economics & Management (AREA)
- Data Mining & Analysis (AREA)
- Tourism & Hospitality (AREA)
- Marketing (AREA)
- Economics (AREA)
- Human Resources & Organizations (AREA)
- Educational Administration (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computational Linguistics (AREA)
- Development Economics (AREA)
- Power Engineering (AREA)
- Automation & Control Theory (AREA)
- Medical Informatics (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (22)
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010922306.8A CN111814196B (zh) | 2020-09-04 | 2020-09-04 | 一种数据处理方法、装置及设备 |
| US17/348,975 US11455417B2 (en) | 2020-09-04 | 2021-06-16 | Data processing methods, apparatuses, and devices |
| EP21182307.5A EP3964995B1 (en) | 2020-09-04 | 2021-06-29 | Data processing methods, apparatuses, and devices |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010922306.8A CN111814196B (zh) | 2020-09-04 | 2020-09-04 | 一种数据处理方法、装置及设备 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN111814196A CN111814196A (zh) | 2020-10-23 |
| CN111814196B true CN111814196B (zh) | 2021-01-05 |
Family
ID=72860666
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202010922306.8A Active CN111814196B (zh) | 2020-09-04 | 2020-09-04 | 一种数据处理方法、装置及设备 |
Country Status (3)
| Country | Link |
|---|---|
| US (1) | US11455417B2 (zh) |
| EP (1) | EP3964995B1 (zh) |
| CN (1) | CN111814196B (zh) |
Families Citing this family (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20210314293A1 (en) * | 2020-04-02 | 2021-10-07 | Hewlett Packard Enterprise Development Lp | Method and system for using tunnel extensible authentication protocol (teap) for self-sovereign identity based authentication |
| CN111930846B (zh) * | 2020-09-15 | 2021-02-23 | 支付宝(杭州)信息技术有限公司 | 一种数据处理方法、装置及设备 |
| CN113012008B (zh) | 2020-09-15 | 2022-06-03 | 支付宝(杭州)信息技术有限公司 | 一种基于可信硬件的身份管理方法、装置及设备 |
| CN113778326B (zh) * | 2021-02-23 | 2025-07-15 | 北京沃东天骏信息技术有限公司 | 数据处理方法、装置、设备、介质及程序产品 |
| WO2022220062A1 (ja) * | 2021-04-06 | 2022-10-20 | 株式会社ワコム | アートワーク管理方法、コンピュータ、及びプログラム |
| CN113849840B (zh) * | 2021-10-13 | 2023-06-09 | 福建师范大学 | 基于可认证加密计数器的加密数据统计分析方法 |
| CN114253680A (zh) * | 2021-11-10 | 2022-03-29 | 武汉路特斯汽车有限公司 | 一种数据处理方法、装置、设备及存储介质 |
| US12430463B1 (en) * | 2022-01-24 | 2025-09-30 | Nant Holdings Ip, Llc | Token-based digital private data exchange systems, methods, and apparatus |
| US12463822B2 (en) * | 2022-11-22 | 2025-11-04 | Microsoft Technology Licensing, Llc | Sharing security settings between entities using verifiable credentials |
| CN119691816A (zh) * | 2023-09-25 | 2025-03-25 | Oppo广东移动通信有限公司 | 可信任数据获取方法、装置、系统及可读存储介质 |
Family Cites Families (62)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN100542140C (zh) | 2006-12-15 | 2009-09-16 | 华为技术有限公司 | 一种访问用户数据的方法及用户档案管理服务器 |
| US20140304836A1 (en) * | 2012-04-27 | 2014-10-09 | Intralinks, Inc. | Digital rights management through virtual container partitioning |
| US8752203B2 (en) * | 2012-06-18 | 2014-06-10 | Lars Reinertsen | System for managing computer data security through portable data access security tokens |
| US8838681B2 (en) * | 2012-12-21 | 2014-09-16 | Dropbox, Inc. | Systems and methods for adding digital content to content management service accounts |
| CN103677935A (zh) | 2013-12-23 | 2014-03-26 | 北京奇虎科技有限公司 | 一种应用程序的安装控制方法、系统及装置 |
| CN104010044B (zh) | 2014-06-12 | 2018-02-23 | 北京握奇数据系统有限公司 | 基于可信执行环境技术的应用受限安装方法、管理器和终端 |
| CN105631322A (zh) * | 2015-12-25 | 2016-06-01 | 北京奇虎科技有限公司 | 免root对通知栏进行管理的方法及装置 |
| US10505741B1 (en) | 2016-09-29 | 2019-12-10 | Amazon Technologies, Inc. | Cryptographically provable data certification and provenance |
| CN106408486A (zh) | 2016-09-30 | 2017-02-15 | 深圳市华傲数据技术有限公司 | 用于网格化管理的数据采集方法及系统 |
| CN108076011A (zh) | 2016-11-10 | 2018-05-25 | 中国移动通信有限公司研究院 | 一种可信执行环境数据迁移方法及装置 |
| US10387383B2 (en) * | 2017-02-15 | 2019-08-20 | Google Llc | Systems and methods for providing access to a data file stored at a data storage system |
| WO2018164955A1 (en) * | 2017-03-06 | 2018-09-13 | Rivetz Corp. | Device enrollment protocol |
| CN109245893A (zh) | 2017-07-10 | 2019-01-18 | 浙江华信区块链科技服务有限公司 | 一种用于替代u盾的身份构建及签名方法 |
| CN107622385A (zh) | 2017-08-28 | 2018-01-23 | 南京邮电大学 | 一种基于区块链智能合约的数字作品发行方法 |
| CN107507091A (zh) | 2017-09-07 | 2017-12-22 | 复旦大学 | 基于区块链和智能合约的增强型数据权益保护方法 |
| CN107579979A (zh) | 2017-09-07 | 2018-01-12 | 成都理工大学 | 基于区块链技术的电子病历的共享查询方法 |
| CN107729745A (zh) * | 2017-10-24 | 2018-02-23 | 珠海市魅族科技有限公司 | 数据处理方法、终端、计算机装置及计算机可读存储介质 |
| CN107742189A (zh) | 2017-11-13 | 2018-02-27 | 广东航程科技有限公司 | 一种简单为非特定b2b平台建立企业间合作关系的方法 |
| CN110365489B (zh) * | 2017-11-15 | 2021-02-05 | 财付通支付科技有限公司 | 业务审计方法、装置及存储介质 |
| CN109840436A (zh) | 2017-11-29 | 2019-06-04 | 阿里巴巴集团控股有限公司 | 数据处理方法、可信用户界面资源数据的应用方法及装置 |
| CN109993490A (zh) | 2017-12-29 | 2019-07-09 | 中思博安科技(北京)有限公司 | 一种报关系统和报关方法 |
| CN108471350A (zh) | 2018-03-28 | 2018-08-31 | 电子科技大学成都研究院 | 基于区块链的可信数据计算方法 |
| CN108616539B (zh) | 2018-05-03 | 2019-08-20 | 东莞市翔实信息科技有限公司 | 一种区块链交易记录访问的方法及系统 |
| CN108881160A (zh) | 2018-05-07 | 2018-11-23 | 北京信任度科技有限公司 | 基于区块链智能合约的医疗健康数据管理方法及系统 |
| CN108632284B (zh) | 2018-05-10 | 2021-02-23 | 网易(杭州)网络有限公司 | 基于区块链的用户数据授权方法、介质、装置和计算设备 |
| CN110555292B (zh) | 2018-05-31 | 2021-07-06 | 本无链科技(深圳)有限公司 | 一种防窃取与可信授权的版权作品发行方法及其系统 |
| CN108932297B (zh) | 2018-06-01 | 2022-03-22 | 创新先进技术有限公司 | 一种数据查询、数据共享的方法、装置及设备 |
| CN108985089B (zh) | 2018-08-01 | 2020-08-07 | 清华大学 | 互联网数据共享系统 |
| CN109150607A (zh) | 2018-08-22 | 2019-01-04 | 中链科技有限公司 | 用于区块链网络的分级管控方法及装置 |
| CN109376504B (zh) | 2018-09-26 | 2022-04-12 | 福州大学 | 一种基于区块链技术的图片隐私保护方法 |
| CN109522722A (zh) | 2018-10-17 | 2019-03-26 | 联想(北京)有限公司 | 系统安全处理方法和装置 |
| CN109525400A (zh) | 2018-11-01 | 2019-03-26 | 联想(北京)有限公司 | 安全处理方法、系统和电子设备 |
| CN110034924B (zh) | 2018-12-12 | 2022-05-13 | 创新先进技术有限公司 | 一种数据处理方法和装置 |
| CN109710270A (zh) * | 2018-12-29 | 2019-05-03 | 北京神州绿盟信息安全科技股份有限公司 | 一种安全应用交付方法、装置以及存储介质 |
| CN109741039B (zh) | 2019-01-07 | 2021-01-19 | 深圳市红砖坊技术有限公司 | 记账方法、矿池服务器、终端设备、挖矿节点及矿池 |
| CN109660358B (zh) | 2019-01-08 | 2022-04-08 | 余炀 | 一种基于区块链及安全执行环境的数据流通方法 |
| CN109768865A (zh) | 2019-01-18 | 2019-05-17 | 深圳市威赫科技有限公司 | 可信执行环境下的区块链上身份数字化实现方法及系统 |
| CN109547500A (zh) | 2019-01-21 | 2019-03-29 | 信雅达系统工程股份有限公司 | 一种保护用户数据所有权的数据共享方法及系统 |
| CN110009232A (zh) | 2019-04-04 | 2019-07-12 | 重庆龙易购电子商务有限公司 | 在线企业服务管理平台 |
| CN110046165A (zh) | 2019-04-17 | 2019-07-23 | 江苏全链通信息科技有限公司 | 分布式应用程序的发布方法、设备及计算机可读存储介质 |
| CN110086804B (zh) | 2019-04-25 | 2021-08-31 | 广州大学 | 一种基于区块链及可信硬件的物联网数据隐私保护方法 |
| CN110083610B (zh) | 2019-04-29 | 2022-11-04 | 百度在线网络技术(北京)有限公司 | 数据处理方法、装置、系统、可信计算装置、设备和介质 |
| CN110224837B (zh) | 2019-06-06 | 2021-11-19 | 西安纸贵互联网科技有限公司 | 基于分布式身份标识的零知识证明方法及终端 |
| CN110222533B (zh) * | 2019-06-17 | 2021-08-13 | 英联(厦门)金融技术服务股份有限公司 | 分布式数据安全应用方法、系统及电子设备 |
| CN110335149B (zh) | 2019-06-19 | 2021-08-20 | 华中科技大学 | 一种基于区块链的资产确权交易实现方法及系统 |
| SG11202003792QA (en) | 2019-07-02 | 2020-05-28 | Advanced New Technologies Co Ltd | System and method for verifying verifiable claims |
| CN110516178A (zh) * | 2019-07-23 | 2019-11-29 | 平安科技(深圳)有限公司 | 基于大数据的多级品目展示方法、服务器及存储介质 |
| CN110457875B (zh) | 2019-07-31 | 2021-04-27 | 创新先进技术有限公司 | 基于区块链的数据授权方法及装置 |
| CN110636062B (zh) | 2019-09-20 | 2022-02-08 | 百度在线网络技术(北京)有限公司 | 设备的安全交互控制方法、装置、电子设备及存储介质 |
| CN111222157B (zh) | 2019-10-30 | 2021-03-23 | 支付宝(杭州)信息技术有限公司 | 区块链隐私数据的查询方法及装置 |
| CN110837658A (zh) | 2019-11-18 | 2020-02-25 | 浙江蓝景科技有限公司 | 联单信息的处理方法及系统、电子设备、存储介质 |
| CN110968743B (zh) | 2019-12-13 | 2021-07-06 | 支付宝(杭州)信息技术有限公司 | 针对隐私数据的数据存储、数据读取方法及装置 |
| CN111179067B (zh) | 2019-12-31 | 2023-06-27 | 杭州趣链科技有限公司 | 一种基于区块链的银行间客户信息交换系统 |
| CN111414599A (zh) | 2020-02-26 | 2020-07-14 | 北京奇艺世纪科技有限公司 | 身份验证方法、装置、终端、服务端以及可读存储介质 |
| CN110990804B (zh) | 2020-03-03 | 2020-08-14 | 支付宝(杭州)信息技术有限公司 | 资源访问方法、装置及设备 |
| CN111340627A (zh) | 2020-03-09 | 2020-06-26 | 广东珠影星光科技有限公司 | 基于区块链的影视资产版权交易系统 |
| CN111049660B (zh) | 2020-03-16 | 2020-06-09 | 杭州海康威视数字技术股份有限公司 | 证书分发方法、系统、装置及设备、存储介质 |
| CN111415157A (zh) | 2020-03-28 | 2020-07-14 | 贵阳大数据交易所有限责任公司 | 一种基于区块链的数据资产安全流通方法 |
| CN111191268B (zh) * | 2020-04-10 | 2020-08-07 | 支付宝(杭州)信息技术有限公司 | 一种可验证声明的存储方法、装置及设备 |
| CN111506662A (zh) | 2020-04-24 | 2020-08-07 | 江苏荣泽信息科技股份有限公司 | 一种基于区块链的企业固定资产整理用数据收集系统 |
| CN111597565A (zh) | 2020-05-12 | 2020-08-28 | 山大地纬软件股份有限公司 | 一种基于区块链的处方可信流转装置及方法 |
| CN111741036B (zh) | 2020-08-28 | 2020-12-18 | 支付宝(杭州)信息技术有限公司 | 一种可信数据传输方法、装置及设备 |
-
2020
- 2020-09-04 CN CN202010922306.8A patent/CN111814196B/zh active Active
-
2021
- 2021-06-16 US US17/348,975 patent/US11455417B2/en active Active
- 2021-06-29 EP EP21182307.5A patent/EP3964995B1/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| EP3964995B1 (en) | 2023-04-26 |
| US20210312073A1 (en) | 2021-10-07 |
| CN111814196A (zh) | 2020-10-23 |
| EP3964995A1 (en) | 2022-03-09 |
| US11455417B2 (en) | 2022-09-27 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN111814196B (zh) | 一种数据处理方法、装置及设备 | |
| CN113012008B (zh) | 一种基于可信硬件的身份管理方法、装置及设备 | |
| CN111931238B (zh) | 一种基于区块链的数据资产流转方法、装置及设备 | |
| CN111741036B (zh) | 一种可信数据传输方法、装置及设备 | |
| CN111814195B (zh) | 一种基于可信硬件的数据管理方法、装置及设备 | |
| CN107862215B (zh) | 一种数据存储方法、数据查询方法及装置 | |
| CN111814156B (zh) | 一种基于可信设备的数据获取方法、装置及设备 | |
| CN114884674B (zh) | 一种基于区块链的用户数据流转方法、装置及设备 | |
| CN111193597B (zh) | 一种可验证声明的传输方法、装置、设备及系统 | |
| CN111930846B (zh) | 一种数据处理方法、装置及设备 | |
| CN111460420A (zh) | 一种基于区块链使用电子印章的方法、设备及介质 | |
| CN112866235B (zh) | 一种数据处理方法、装置及设备 | |
| CN112100689A (zh) | 一种可信数据处理方法、装置及设备 | |
| CN116962061A (zh) | 一种基于区块链的用户身份核验方法、装置及设备 | |
| HK40059217B (zh) | 一种基於可信硬件的数据管理方法、装置及设备 | |
| HK40059217A (zh) | 一种基於可信硬件的数据管理方法、装置及设备 | |
| HK40039157B (zh) | 一种数据处理方法、装置及设备 | |
| HK40039157A (zh) | 一种数据处理方法、装置及设备 | |
| HK40039119A (zh) | 一种基於可信硬件的数据管理方法、装置及设备 | |
| HK40039119B (zh) | 一种基於可信硬件的数据管理方法、装置及设备 | |
| HK40041064A (zh) | 一种基於可信硬件的身份管理方法、装置及设备 | |
| HK40041064B (zh) | 一种基於可信硬件的身份管理方法、装置及设备 | |
| HK40039120A (zh) | 一种基於可信设备的数据获取方法、装置及设备 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant | ||
| REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 40039157 Country of ref document: HK |
|
| TR01 | Transfer of patent right |
Effective date of registration: 20241113 Address after: Room 803, floor 8, No. 618 Wai Road, Huangpu District, Shanghai 200010 Patentee after: Ant blockchain Technology (Shanghai) Co.,Ltd. Country or region after: China Address before: 310000 801-11 section B, 8th floor, 556 Xixi Road, Xihu District, Hangzhou City, Zhejiang Province Patentee before: Alipay (Hangzhou) Information Technology Co.,Ltd. Country or region before: China |
|
| TR01 | Transfer of patent right |