Unlock instant, AI-driven research and patent intelligence for your innovation.

Blockchain-based data security sharing method and device

A data security and blockchain technology, applied in the field of information security, can solve the problems of data eavesdropping, data content tampering, and easy impersonation of the identity of the data sender, and achieve the effect of improving security.

Active Publication Date: 2022-04-15
苏州汐桥智能科技有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method has hidden dangers in security. For example, during the entire data transmission process, the data may be eavesdropped, the data content may be tampered with, and the identity of the data sender may be impersonated, etc.
In addition, in resolving disputes in the data sharing process, this method is difficult to quickly provide trustworthy evidence, which will bring loss of interests to both parties of the data. For example, the data provider shares the data, but the data user cannot obtain the data. At this time, the interests of the data user suffer losses; or, the data user does not recognize the behavior of obtaining data on the premise of obtaining the data, and the interests of the data provider suffer losses at this time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain-based data security sharing method and device
  • Blockchain-based data security sharing method and device
  • Blockchain-based data security sharing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044]In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0045] It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a blockchain-based data security sharing method and device. Among them, the method applied to the data provider terminal includes: uploading the URI of the shared data received from the proxy server to the decentralized application of the blockchain; processing the application access request sent by the data user terminal and returning the processing result; When the data user terminal obtains the URI and sends the data access request to the proxy server, it receives the data access request and forwards it to the decentralized application for verification; receives the verification result and sends it to the proxy server, and if the verification is passed , the proxy server sends the access result of the shared data to the data user terminal. This method uses the blockchain to record various information in the process of data sharing, so that various records are true and cannot be tampered with, and identities cannot be impersonated, which greatly improves the security of data sharing and can provide credible evidence for disputes in the data sharing process Record.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a blockchain-based data security sharing method and device. Background technique [0002] The security of data sharing is a very important issue to be faced when data is shared by data providers to data users in the Internet environment. In the prior art, servers that provide external data sharing services usually use the secure communication protocol HTTPS to implement data sharing. This method has hidden dangers in security, for example, during the entire data transmission process, the data may be eavesdropped, the data content may be tampered with, and the identity of the data sender may be impersonated and so on. In addition, in resolving disputes in the data sharing process, this method is difficult to quickly provide trustworthy evidence, which will bring loss of interests to both parties of the data. For example, the data provider shares the data, b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L67/06H04L67/60H04L9/40H04L67/56
Inventor 牟卫洋孙金虎杨杰孙玉辰杨志伟
Owner 苏州汐桥智能科技有限公司