A method, system, device and storage medium for isolating user identity information

A technology for user identity information and users, which is applied in the field of isolating user identity information, and can solve problems such as inability to prevent privacy leaks

Active Publication Date: 2020-12-11
苏州交链科技有限公司 +1
View PDF15 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This patent is aimed at individual users, and is aimed at the anti-leakage sharing method of genetic testing, which is a private data. When the genetic data is disclosed to third-party organizations, it cannot prevent privacy leakage in an absolute sense.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, system, device and storage medium for isolating user identity information
  • A method, system, device and storage medium for isolating user identity information
  • A method, system, device and storage medium for isolating user identity information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] Such as figure 2 , 3 As shown, a method for isolating user identity information includes the following steps:

[0052] S1. The user generates a public key and a private key through the blockchain;

[0053] There are two ways to generate the public key and private key. One is to randomly generate the public key and private key through the blockchain. Once the private key is lost, it cannot be retrieved. (name, gender, ID number, mobile phone number, email address, voice, facial image, fingerprint, home address, place of household registration and other personal user identity information, or the name of the enterprise, organization, institution or unit, unified social credit code, address, Collective identity information such as tax number) is encrypted by Hash to generate a private key and a public key. If the private key is lost, it can be retrieved from the blockchain operator.

[0054] S2. The user's public key and user identity information are stored in the block...

Embodiment 2

[0063] A method for isolating user identity information is further improved on the basis of Embodiment 1, comprising the following steps:

[0064] S1. The user randomly generates the public key and private key through the blockchain, such as Figure 7 shown;

[0065] S2. The user's public key and user identity information are stored in the blockchain; in the blockchain, private chains and consortium chains are licensed chains, and each node participating in the blockchain system is licensed. Approved nodes cannot be connected to the system. However, if a limited number of multiple authentication nodes in the licensed chain are combined, it will also pose a certain threat to the leakage of user identity information. Therefore, if the blockchain is a licensed chain, after the user's public key and user identity information are Hash encrypted, Upload to the block chain; if the block chain is a public chain, user identity information can be selectively encrypted by Hash. Such a...

Embodiment 3

[0069] A method for isolating user identity information is further improved on the basis of embodiments 1 and 2, comprising the following steps:

[0070] S1. The user generates a private key and a public key through the blockchain operator based on the user's identity information, such as Figure 9 shown.

[0071] If the blockchain is a permissioned chain, the user's public key and user identity information are Hash-encrypted, and then the private key and public key are generated; if the blockchain is a public chain, user identity information can be selectively Hash-encrypted. Among them, the user identity information includes ID number, mobile phone number, mailbox, voice, facial image, fingerprint, home address, account location and other user identity information. If the private key is lost, it can be retrieved from the blockchain operator.

[0072] S2. The user's public key and user identity information are stored in the blockchain; in the blockchain, private chains and c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to the technical field of blockchains. Disclosed are a method and system for isolating user identity information, a device, and a storage medium. The method comprises: a user generates a public key and a private key by means of a blockchain; save the public key and user identity information of the user in the blockchain; generate, by means of the blockchain, multiple different account IDs for the same user; the user registers on an application by means of the account IDs. A corresponding system, a device, and a storage medium are also comprised. With regard to the user information leakage problem, the method can protect the privacy of the user, and prevent the privacy leak of the user.

Description

technical field [0001] The present invention relates to the technical field of block chains, in particular to a method, system, device and storage medium for isolating user identity information. Background technique [0002] In today's Internet era, various network applications emerge in endlessly. Some applications involving real transactions, such as Didi Taxi, Ele.me, Xianyu, 58.com, etc., require real-name authentication of users. For privacy reasons, users often do not want to disclose private information. For these applications, with the advent of the data age, user data will become more and more valuable to application software, and users will also pay more and more attention to their privacy, unwilling to disclose, but in order to use application software, they have to disclose , as the government pays more attention to the security of application apps, various application apps have to require users to provide more detailed authentication materials and require users ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0861H04L9/321H04L9/3247H04L63/02H04L63/0876
Inventor 马登极吴思进王志文
Owner 苏州交链科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products