Unlock instant, AI-driven research and patent intelligence for your innovation.

A blockchain privacy protection method based on asymmetric encryption

An asymmetric encryption and privacy protection technology, applied in digital transmission systems, user identity/authority verification, secure communication devices, etc., can solve the problems of few third-party institutions and untrustworthiness, and achieve flexible user authorization data access mode Effect

Active Publication Date: 2020-04-14
HANGZHOU YUNXIANG NETWORK TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the current application and research, the data operation request sent by the user through the server is generally regarded as the same operation, and its security completely depends on the security service of network communication, and there is little untrustworthiness of the third-party organization that provides data operation service Therefore, in the scenario where a third-party untrusted organization provides data operation services, there is an urgent need for a privacy protection measure for the blockchain

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A blockchain privacy protection method based on asymmetric encryption
  • A blockchain privacy protection method based on asymmetric encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to describe the present invention more specifically, the technical solutions of the present invention will be described in detail below with reference to the accompanying drawings and specific embodiments.

[0028] In this embodiment, an encryption module is established for each encryption process. The encryption module involves the user object user, the untrusted object server providing data operation services, and the data storage object blockchain, so as to realize the authorization management mechanism when the server accesses user data.

[0029] In this embodiment, when the data operation service is provided by an untrusted third-party organization, a highly flexible user-authorized data access mode is established, and the specific execution steps are as follows:

[0030] (1) Authorization operation creation and cancellation.

[0031] 1-1. Generate the corresponding public key and private key (PK_u, SK_u, PK_s, SK_s, PK_bc, SK_bc) for user, server and bloc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a blockchain privacy protection method based on asymmetric encryption. The blockchain privacy protection method based on asymmetric encryption comprises the steps of: (1), creating and cancelling authorized operation; and (2), verifying and accepting a data operation service, wherein the data operation service can be initiated by a user and automatically initiated by a server. By means of the technical scheme disclosed by the invention, in a scene that a third-party untrusted mechanism provides the data operation service, sending and response of the data operation request are realized; and a highly flexible user authorized data access mode is provided.

Description

technical field [0001] The invention belongs to the technical field of Internet privacy protection, and in particular relates to a blockchain privacy protection method based on asymmetric encryption. Background technique [0002] With the rise of Bitcoin technology and the deepening of its application, as the core technology of underlying support, blockchain technology has attracted widespread attention in the industry. Blockchain is a shared distributed database that records transactions between parties, enhancing transparency, security and efficiency. With its advantages of decentralization, trustworthiness, transparency, security and efficiency, more and more departments in the industry have begun to explore the application of blockchain in their fields and seek effective solutions. As blockchain technology gradually becomes an important strategy for distributed storage, its application model will expand rapidly, and the provision of storage services and access services ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L63/0442H04L63/0892H04L63/10
Inventor 陈建海王津航黄步添王备刘振广俞之贝杨文龙
Owner HANGZHOU YUNXIANG NETWORK TECH