Decentralized privacy protection method

A privacy-protecting and decentralized technology, applied in the field of social networks, can solve problems such as the inability to guarantee the user's personal privacy and security, and achieve the effect of ensuring effectiveness and protecting privacy

Active Publication Date: 2019-07-23
CHENGDU PVIRTECH TECH
View PDF9 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are even third-party platforms that use massive amounts of user information to

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decentralized privacy protection method
  • Decentralized privacy protection method
  • Decentralized privacy protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The following and accompanying appendices illustrating the principles of the invention Figure 1 A detailed description of one or more embodiments of the invention is provided together. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details.

[0016] One aspect of the present invention provides a decentralized privacy protection method. figure 1 is a flowchart of a decentralized privacy protection method according to an embodiment of the present invention.

[0017] The inve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a decentralized privacy protection method. The method comprises: using a P2P network structure, constructing block chains by social platform regional server cluster nodes, storing user privacy data of a social platform in blocks in an encryption signature verification mode, and establishing an authorized access and safety protection mechanism of a distributed cluster database system. The invention provides a decentralized privacy protection method. The decentralized storage and authentication of user privacy data in a social network are realized. The authentication process is completed in the block chain, the validity of the user identity is ensured by utilizing the tamper resistance of the block chain, the data abstract is used for replacing a user personal information plaintext, information is matched for the user according to the data abstract, the user privacy information plaintext cannot be checked even if a malicious attacker intercepts the user information, and the privacy of the user is protected.

Description

technical field [0001] The invention relates to a social network, in particular to a decentralized privacy protection method. Background technique [0002] In recent years, social networks such as WeChat, forums, and Weibo have developed rapidly, and people usually join multiple social platforms at the same time to enjoy the convenience and complete services provided by the Internet. Taking two social platforms as an example, if a user who has already registered on one of the platforms wants to join another platform, he will send a request to the original platform to ask for the basic information of the user in order to provide personalized services. However, traditional identity authentication methods have issues such as user privacy disclosure, forged authentication information, and platform denial of authenticated behaviors. What's more serious is that the social network platform investigates a large amount of user-related information, and the user provides the system wi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F21/60G06Q50/00H04L29/08
CPCG06F21/6245G06F21/602H04L67/1097G06Q50/01
Inventor 黄希聂贻俊刘翼梁松宋晓梅
Owner CHENGDU PVIRTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products