Data trusted security sharing system and method based on block chain technology

A technology for sharing systems and data, applied in the field of information, can solve the problems of users losing personal data ownership, difficult to realize the unification of data and value, lack of security of information infrastructure, and trusted interconnection support, etc., to achieve data and value, avoid contact effect on data, protection of ownership

Active Publication Date: 2019-01-18
TSINGHUA UNIV
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The current data infrastructure is based on the Internet. Since the Internet has evolved into a winner-takes-all ecological structure, large companies have monopolized capital, traffic entrances, computing and storage resources, and service provision channels, resulting in users having to hand over their personal data. Large companies are exchanged for services, resulting in a situation where "data follows the application", which also makes users lose ownership of personal data, making it difficult to achieve the unification of data and value
On the other hand, there is a lack of built-in security and trusted interconnection support between information infrastructures during data circulation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data trusted security sharing system and method based on block chain technology
  • Data trusted security sharing system and method based on block chain technology
  • Data trusted security sharing system and method based on block chain technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0037] The current data infrastructure is based on the Internet. Since the Internet has evolved into a winner-takes-all ecological pattern, large companies have monopolized capital, traffic entrances, computing and storage resources, and service provision channels, resulting in users having to hand over their personal data. Giving large companies in exchange for se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses a data trusted security sharing system and method based on area chain technology. The system comprises a data registration platform, a data management platform, a security computing platform and a block chain. The data registration platform registers the data uploaded by the data publisher uniformly, which realizes the protection of data ownership in the process of data circulation. The data management platform manages the data which has the ownership relation with the data publisher, and effectively guarantees the data publisher's ownership to the data. In the data flow, the block chain records the network behavior information of the data users, monitors the network behavior, and ensures the data involved in the network behavior to be true and reliable. When the data user uses the target data, the target data is processed in the secure computing platform, and the processing result is returned to the data user, so as to realize the separation of the data ownership and the use right, avoid the data user to contact the data, and ensure the safety and controllability of the data circulation process.

Description

technical field [0001] The present application relates to the field of information technology, in particular to a trusted and secure data sharing system and method based on area chain technology. Background technique [0002] With the integration of information technology and human production and life, global data is characterized by explosive growth and massive accumulation. The global technological revolution is entering the era of data technology (DT) from the era of information technology (IT). Data technology has had a major impact on economic development, social governance, state management, and people's lives, and the establishment of data infrastructure is imminent. [0003] The current data infrastructure is based on the Internet. Since the Internet has evolved into a winner-takes-all ecological pattern, large companies have monopolized capital, traffic entrances, computing and storage resources, and service provision channels, resulting in users having to hand over...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08
CPCH04L67/10H04L2463/103
Inventor 尹浩殷波
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products