A privacy information tamper-proofing method and system based on a block chain technology

A technology of privacy information and block chain, which is applied in the field of anti-tampering of private information based on block chain technology, can solve problems such as unproposed solutions, and achieve the effect of solving easy tampering, improving security, and preventing tampering

Active Publication Date: 2019-04-26
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF10 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] For the above problems, no e

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A privacy information tamper-proofing method and system based on a block chain technology
  • A privacy information tamper-proofing method and system based on a block chain technology
  • A privacy information tamper-proofing method and system based on a block chain technology

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0027] Embodiment one:

[0028] According to an embodiment of the present invention, an embodiment of an anti-tampering method for private information based on blockchain technology is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be implemented in a computer system such as a set of computer-executable instructions and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0029] figure 1 It is a flow chart of a method for preventing tampering of private information based on blockchain technology according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:

[0030] Step S102, obtaining the privacy data to be processed;

[0031] Step S104, performing image processing on the privacy data to be processed to obtain a mirror image file, and perform...

Example Embodiment

[0070] Embodiment two:

[0071] The present invention also provides an anti-tampering system for private information based on blockchain technology, which is used to implement the anti-tampering method for private information based on blockchain technology provided by the above-mentioned content of the embodiment of the present invention. The following is provided by the embodiment of the present invention The specific introduction of the anti-tampering system for private information based on blockchain technology.

[0072] like image 3 As shown, the system includes: an acquisition unit 10, a processing unit 20, a storage unit 30, an authentication unit 40 and a first execution unit 50, wherein,

[0073] The obtaining unit 10 is used to obtain privacy data to be processed;

[0074] The processing unit 20 is configured to perform image processing on the privacy data to be processed to obtain a mirror image file; and perform segmentation processing on the privacy data to be p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a privacy information tamper-proofing method and system based on a blockchain technology, and relates to the technical field of data security, and the method comprises the steps: obtaining to-be-processed privacy data; Performing mirror image processing on the to-be-processed privacy data to obtain a mirror image file; Carrying out segmentation processing on the to-be-processed private data to obtain a plurality of data blocks; Storing the mirror image file and the plurality of data blocks in a network node of a block chain, each network node being provided with a key pair; If the first request information is obtained, the first request information is forwarded to a block chain, so that the block chain carries out key authentication on a public key carried in the first request information, and the first request information is request information for modifying a first privacy field in the to-be-processed privacy data; And if the authentication is passed, modifyingthe first privacy field stored in the block chain network, thereby solving the technical problem that the privacy data is easily tampered in the prior art.

Description

technical field [0001] The present invention relates to the technical field of data security, in particular to a method and system for preventing tampering of private information based on block chain technology. Background technique [0002] The need to protect an enterprise's sensitive employee, customer and business data is on the rise, wherever it resides. So far, most data theft cases have originated from the malicious intrusion of production databases by individual hackers. Given the significant legal liability and negative publicity that a series of well-known and costly thefts have created for victimized companies, defenses and methods against such attacks are rapidly becoming more sophisticated, but attackers are also pressing ahead. [0003] While the industry has responded to the worst forms of data theft, many computer systems remain vulnerable at some level. Today's new data security procedures have yet to actually touch and protect an important layer of data: ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/64G06F21/62
CPCG06F21/6245G06F21/64G06F2221/2107
Inventor 龙文洁范渊周俊莫金友
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products