User data anonymous sharing method based on league chain encryption

A technology of user data and encrypted data, which is applied in the field of data exchange, can solve the problems of lack of corresponding control of blockchain data read and write permissions, unfavorable data provider privacy, and inability to guarantee the authenticity of uploaded data, etc.

Inactive Publication Date: 2018-11-16
深圳崀途科技有限公司
View PDF0 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, blockchain technology is gradually being applied in many fields such as banking, finance, insurance, etc., and public chain technology is mostly used to build the underlying blockchain. Since public chain technology lacks corresponding control over the read and write permissions of blockchain data, therefore The authenticity of the data uploaded by each institution cannot be guaranteed; in addition, each institution usually needs to verify each other's real identity when exchanging data, which is not conducive to protecting the privacy of the data provider, thus limiting the scale of shared data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User data anonymous sharing method based on league chain encryption
  • User data anonymous sharing method based on league chain encryption
  • User data anonymous sharing method based on league chain encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] In order to make the above objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0080] figure 1 It is a schematic flowchart of the anonymous sharing method of user data based on consortium chain encryption in Embodiment 1 of the present invention. see figure 1 , this embodiment provides an anonymous user data sharing method based on alliance chain encryption, including:

[0081] Each founding member institution builds it...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user data anonymous sharing method based on league chain encryption. The method comprises the steps as follows: each founding member mechanism builds a respectively corresponding network data collection node and accesses a league chain network, to form an initial chain; a common member mechanism builds the network data collection node after passing through verification, and sequentially accesses the initial chain to build a league chain; the network data collection node acquires a pseudonym identity and symmetric keys corresponding to the pseudonym identity; after acquiring data, the network data collection node sends an uploading request to a network data storage node; the final encrypted data is decrypted via the private key pair of the network data storage nodeto acquire pseudonym encryption data; the network data storage node stores a corresponding relationship between the pseudonym encryption data and the pseudonym identity into a local database; and thenetwork data storage node compresses the data stored within set time into a block, and adds the block into the league chain. Through building the league chain, the permissions of the common member mechanisms are effectively controlled, and the privacy of each member mechanism is ensured.

Description

technical field [0001] The invention relates to the technical field of data exchange, in particular to a method for anonymously sharing user data based on alliance chain encryption. Background technique [0002] Blockchain is a new technology that applies distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and other modes. It can use block chain data structure to verify and store data, and use distributed node consensus algorithm to generate and Update data, use cryptography to ensure the security of data transmission and access, use smart contracts composed of automated script codes to program and manipulate data, blockchain and related encryption technologies are closely related to applications such as data sharing and data use security . [0003] At present, blockchain technology is gradually being applied in many fields such as banking, finance, insurance, etc., and public chain technology is mostly used to build the underlyi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0414H04L63/0421H04L63/0435H04L63/0442H04L63/0478H04L63/0823H04L67/1044H04L67/1097
Inventor 张燕
Owner 深圳崀途科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products