Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Block chain model with the privacy protection function

A privacy protection and blockchain technology, applied in the field of computer information security, can solve problems such as embezzlement of currency, scrambled and rearranged transaction records, confusion of transaction history, etc., to achieve the effect of privacy protection

Active Publication Date: 2018-06-15
广州京盛数码科技有限公司
View PDF8 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this obfuscation mechanism is aimed at disrupting and rearranging the transaction records in a block. Some studies have proved that the attacker can restore the original order of transaction records through the analysis of the transaction graph to track the real identity of the user, and This obfuscation mechanism also has many defects: (1) the time interval from the time the currency is deposited into the account to the confirmation that the currency will not be traced by others must be long enough to ensure that the transaction history is fully confused; (2) "confusion (3) The "obfuscator" may embezzle the currency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the examples. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0011] The present invention provides a block chain model based on the existing encrypted currency (base currency) to ensure user privacy through a distributed anonymous mechanism and to use zero-knowledge proof for data verification. This model is divided into three parts: There are three parts - the minimum trust administrator, the private part, and the public part, and its core is a distributed anonymous mechanism.

[0012] The minimum trust administrator is used to assist in the transaction. In each transaction, all users participating in the transaction freeze the currency th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a block chain model with the privacy protection function. The block chain model is formed by a minimum trustrank administrator, a private part, and a public part. The minimum trustrank administrator is used for assisting in transaction; the private part is used for defining input information of all sides participating in transaction and sending and receiving of the information and defining relevant calculations during the transaction process and verification of relevant data during the transaction process; and the public part is used for ensuring fairness of the transaction. On the basis of currency encryption, a block chain is constructed by using a distributed anonymous mechanism, zero-knowledge verification, overtime penalties, and packaging methods. Realizationof currency generation and usage, and conversion into basic currency having the privacy protection function relays on zk-SNARK and related data in a ciphertext mode are verified, so that the user is able to realize data verification while the user information is not leaked.

Description

technical field [0001] The invention belongs to the technical field of computer information security, relates to a block chain model with a privacy protection function, and specifically relates to the realization of the privacy protection function and the problem of block verification. Background technique [0002] With the development of Internet technology, the decentralization of information has been popularized, so people have turned their attention to the decentralization of value. The so-called decentralization of value refers to the process of value circulation (mainly financial transactions). , the two parties to the transaction directly exchange value without the intervention of a third party, so that expensive legal fees and transaction costs caused by the introduction of a third party can be avoided. The emergence of blockchain technology provides the possibility to realize the decentralization of value. [0003] The blockchain is a decentralized distributed data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38H04L9/08H04L9/32
CPCG06Q20/3825G06Q20/3829H04L9/0869H04L9/3221
Inventor 陈晶杜瑞颖何琨
Owner 广州京盛数码科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products