Data management method, device and system

A technology of data management and privacy data, applied in the field of information processing, can solve the problem that privacy users cannot effectively manage privacy data, and achieve the effect of authentic and reliable records

Active Publication Date: 2018-01-12
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF5 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a data management method, device and system to solve the technical problem in the prior art that private users cannot effectively manage their own private data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data management method, device and system
  • Data management method, device and system
  • Data management method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] This embodiment provides a data management method for managing private data of private users. The execution subject of the data management method is a data management device, which can be set on a service terminal device, and the service terminal device can be any implementable terminal device such as a notebook computer, a mobile phone, a tablet, a server, and the like. Blockchain technology is used on this terminal device. The blockchain is a decentralized distributed database system that is jointly maintained by all nodes in the blockchain network. The nodes in the blockchain network can be called blockchain nodes. The blockchain network is based on P2P (Peer to Peer, peer to peer network) network, the service terminal device can be used as a blockchain node in the blockchain network. The specific blockchain data writing is an existing technology and is not limited here.

[0069] Such as figure 1 As shown, it is a schematic flow chart of the data management method...

Embodiment 2

[0081] This embodiment provides a further supplementary description of the data management method provided in the above embodiments.

[0082] On the basis of the foregoing embodiments, after step 103, the method further includes:

[0083] Step 201, receiving a data access request of the accessing user sent by the accessing client, the data access request includes the data identifier corresponding to the private data to be accessed and the user public key of the accessing user.

[0084] Specifically, the data management device in the service terminal device may receive the access user's data access request sent by the access client, and the data access request includes the data identifier corresponding to the private data to be accessed and the user public key of the access user. The visiting user terminal may be the user terminal equipment of the visiting user, or an application program in the user terminal equipment used by the visiting user. The user terminal device of the ...

Embodiment 3

[0092] This embodiment provides a further supplementary description of the data management method provided in the above embodiments.

[0093] On the basis of the foregoing embodiments, before step 201, the method further includes:

[0094] Step 301, receiving the authorization message of the privacy user sent by the privacy client, the authorization message includes the message type with the authorization identifier, the user public key of the privacy user, the data identifier corresponding to the private data of the privacy user, and the user public key of the access user .

[0095] Step 302: Verify the authorization message according to the user public key of the privacy user, the user public key of the visiting user, and the registered public key list recorded in the end block of the blockchain.

[0096] Step 303, recording the verified authorization message in the access right list, so as to register the private data access right.

[0097] Specifically, when the access u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data management method, a data management device and a data management system. The data management method comprises the steps of: receiving a data message corresponding to privacy data of a private user sent by a private user side; verifying the data message according to a registered public key list recorded in a terminal block in a blockchain and a user public key of theprivate user in the data message; and recording the data message passing verification to a newly generated block, so that the private user stores the privacy data corresponding to the data message anda corresponding relation of the data message and the privacy data, and a storage address of the privacy data and a data identifier in the data message recorded in the block are in association mappingin a data storage region. The data management method, the data management device and the data management system realize the features of decentralization as well as true and credible recording by utilizing the blockchain technology, and the private user can send the data message of the privacy data to a data management device at any time so as to manage the privacy data, thereby guaranteeing thatthe user has absolute control over the privacy data of one's own.

Description

technical field [0001] The present invention relates to the technical field of information processing, in particular to a data management method, device and system. Background technique [0002] With the continuous development of information and network technology, the security protection of users' personal privacy data has become an extremely important issue. In the prior art, it is usually for the individual user to reach an agreement with a third-party network platform or application software APP, agreeing that the third-party network platform or APP collects and uses its personal privacy data. The user accesses the third-party network platform or APP by logging in, and uses the corresponding functions. When logging in, the user is required to grant a series of permission to use private data to the third-party network platform or APP. These privacy data permissions exist during the user's login time interval until the user logs out of the account, and the user has no ef...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 李董刘露
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products