Data management method, device and system

A technology for data management and privacy data, applied in the field of information processing, it can solve the problem that privacy users cannot effectively manage privacy data, and achieve the effect of recording true and reliable

Active Publication Date: 2020-10-09
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a data management method, device and system to solve the technical problem in the prior art that private users cannot effectively manage their own private data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data management method, device and system
  • Data management method, device and system
  • Data management method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] This embodiment provides a data management method for managing private data of private users. The execution subject of the data management method is a data management device, which can be set on a service terminal device, which can be any terminal device that can be implemented, such as a notebook computer, a mobile phone, a tablet, a server, and so on. Adopt blockchain technology on this terminal device. Blockchain is a decentralized distributed database system that is jointly maintained by all nodes in the blockchain network. The nodes in the blockchain network can be called blockchain nodes. The blockchain network is based on P2P (Peer to Peer). Network, the service terminal device can be used as a blockchain node in the blockchain network. The specific blockchain data writing is based on the prior art and is not limited here.

[0069] Such as figure 1 As shown, the flow diagram of the data management method provided by this embodiment includes:

[0070] Step 101: Rece...

Embodiment 2

[0081] This embodiment further supplements the data management method provided by the foregoing embodiment.

[0082] On the basis of the foregoing embodiment, after step 103, the method further includes:

[0083] Step 201: Receive a data access request of the accessing user sent by the accessing client. The data access request includes the data identifier corresponding to the private data to be accessed and the user public key of the accessing user.

[0084] Specifically, the data management device in the service terminal device may receive the data access request of the accessing user sent by the accessing user terminal, the data access request including the data identification corresponding to the private data to be accessed and the user public key of the accessing user. The accessing user terminal can be the user terminal device of the accessing user, or it can be an application in the user terminal device used by the accessing user. The user terminal device of the visiting user ...

Embodiment 3

[0092] This embodiment further supplements the data management method provided in the foregoing embodiment.

[0093] On the basis of the foregoing embodiment, before step 201, the method further includes:

[0094] Step 301: Receive an authorization message of a private user sent by a private client. The authorization message includes the message type with the authorization identifier, the user public key of the private user, the data identifier corresponding to the private data of the private user, and the user public key of the accessing user .

[0095] In step 302, the authorization message is verified according to the user public key of the private user, the user public key of the accessing user, and the registered public key list recorded in the end block in the blockchain.

[0096] Step 303: Record the authenticated authorization message in the access permission list to perform privacy data access permission registration.

[0097] Specifically, when the accessing user needs to acc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data management method, a data management device and a data management system. The data management method comprises the steps of: receiving a data message corresponding to privacy data of a private user sent by a private user side; verifying the data message according to a registered public key list recorded in a terminal block in a blockchain and a user public key of theprivate user in the data message; and recording the data message passing verification to a newly generated block, so that the private user stores the privacy data corresponding to the data message anda corresponding relation of the data message and the privacy data, and a storage address of the privacy data and a data identifier in the data message recorded in the block are in association mappingin a data storage region. The data management method, the data management device and the data management system realize the features of decentralization as well as true and credible recording by utilizing the blockchain technology, and the private user can send the data message of the privacy data to a data management device at any time so as to manage the privacy data, thereby guaranteeing thatthe user has absolute control over the privacy data of one's own.

Description

Technical field [0001] The present invention relates to the field of information processing technology, and in particular to a data management method, device and system. Background technique [0002] With the continuous development of information and network technology, the security protection of users' personal privacy data has become an extremely important issue. In the prior art, it is usually for the user to reach an agreement with a third-party network platform or application software APP and agree to the third-party network platform or APP to collect and use their personal privacy data. The user accesses the third-party network platform or APP by logging in and uses the corresponding function. When logging in, the user is required to grant a series of private data usage permissions to the third-party network platform or APP. These private data permissions always exist during the user's login time period, until the user logs out of the account, the user has no effective wa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 李董刘露
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products