A method and system for confirming data rights based on encryption

一种加密数据、数据的技术,应用在信息处理领域,能够解决不能较好的支撑数据开放、共享、应用等问题,达到保证专有性的效果

Active Publication Date: 2021-01-26
苗放
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The copyable, modifiable, and reusable properties of data make the traditional commodity sales methods unable to meet the needs of data transactions. New data models and methods are urgently needed to ensure the normal progress of data transactions, which cannot better support data openness, sharing, and application.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for confirming data rights based on encryption
  • A method and system for confirming data rights based on encryption
  • A method and system for confirming data rights based on encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] A method for confirming data rights based on encryption, comprising the following steps:

[0051] A. Determine whether the data is open. If the data is open, the data owner uses his private key to encrypt the data to complete the ownership declaration and end the process; if the data is not open, proceed to step B;

[0052] B. Determine whether the data is shared. If the data cannot be shared, the data owner uses his own public key to encrypt the data to complete the data protection and end the process; if the data can be shared, enter the ownership declaration and protection steps.

[0053] Such as figure 1 As shown, the ownership declaration and protection step includes the self ownership declaration and protection step and the agency ownership declaration and protection step, that is, includes an active right confirmation method and a passive right confirmation method.

[0054]That is to say, for different data and different usage situations, the above-mentioned met...

Embodiment 2

[0056] This embodiment is an active right confirmation method using self-declaration and protection steps. The method is specifically:

[0057] A. Determine whether the data is open. If the data is open, the data owner uses his private key to encrypt the data to complete the ownership declaration and end the process; if the data is not open, proceed to step B;

[0058] B. Determine whether the data is shared. If the data cannot be shared, the data owner uses his own public key to encrypt the data to complete the data protection and end the process; if the data can be shared, the data owner uses his own public key to encrypt the data to complete the data protection;

[0059] Determine whether the data ownership needs to be declared, and if not, end the process; if necessary, the data owner uses his private key to encrypt the data to complete the ownership declaration.

Embodiment 3

[0061] This embodiment is a passive right confirmation method that adopts proxy ownership declaration and protection steps. The method is specifically:

[0062] A. Determine whether the data is open. If the data is open, the data owner uses his private key to encrypt the data to complete the ownership declaration and end the process; if the data is not open, proceed to step B;

[0063] B. Determine whether the data is shared. If the data cannot be shared, the data owner uses his own public key to encrypt the data to complete the data protection and end the process; if the data can be shared, enter the step of judging whether it is an agent;

[0064] Judging whether the data needs a proxy, if no proxy is required, the data owner uses his own public key to encrypt the data to complete data protection; judging whether the data ownership needs to be declared, if not, the process ends; if necessary, the data owner uses Encrypt the data with your own private key to complete the owne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for confirming data rights based on encryption. The method includes the following steps: A. Judging whether the data is open, if the data is open, the data owner uses his private key to encrypt the data to complete the ownership statement and End the process; if the data cannot be opened, enter step B; B, determine whether the data is shared, if the data cannot be shared, the data owner uses his own public key to encrypt the data to complete the data protection and end the process; if the data can be shared, enter Claiming and protection steps. The method of the present invention realizes data right confirmation, technically guarantees the exclusiveness of data ownership, realizes data owner's unique ownership of data, lays the foundation for the distribution of data responsibilities and rights, ensures that data has an owner and can be found, and facilitates data transactions. Provide the basis.

Description

technical field [0001] The invention relates to the technical field of information processing, in particular to an encryption-based data right confirmation method and system. Background technique [0002] With the continuous development of data technology, data transactions and data applications based on ownership have become important behaviors of data applications. The current data transaction follows the traditional method of commodity sales. The data seller and the exchange negotiate to determine the price of the data to be traded and sell it on the market. The copyable, modifiable, and reusable properties of data make the traditional commodity sales methods unable to meet the needs of data transactions. New data models and methods are urgently needed to ensure the normal progress of data transactions, which cannot better support data openness, sharing, and application. . [0003] The data application based on data ownership can be understood as a new data transaction ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q30/06G06Q20/38
CPCG06Q30/06H04L9/006H04L9/30H04L9/32
Inventor 苗放王进解岩杨文晖
Owner 苗放
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products