Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data security system based on block chain and data security processing method

A data security and data processing technology, applied in the blockchain field, can solve problems such as open sharing, illegal data theft, and loss of data control by data owners

Active Publication Date: 2019-09-27
西安纸贵互联网科技有限公司
View PDF11 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Data control right issue: After data sharing, the data owner loses the control right of the data, cannot intervene and monitor the use of the shared data, and it is difficult to audit the behavior of data use, for example, the data is easily copied, resulting in sharing Expansion of scope, out of control
The problem of data control rights leads to the unwillingness of the data source owner to open and share the data, and the data cannot be shared and circulated
[0004] Data security computing issues: data sharing is to obtain valuable results in subsequent processing, but in the process of data sharing, there is a lack of a secure computing environment, and data may be illegally stolen during processing, or after calculation, The calculation results will still cause the leakage of sensitive information of the source data
[0005] Data privacy protection issues: The owner of the source data is unwilling to share the data due to privacy considerations. Even if the shared data is desensitized data, in many cases the value of the desensitized data is also discounted, limiting data sharing application scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security system based on block chain and data security processing method
  • Data security system based on block chain and data security processing method
  • Data security system based on block chain and data security processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0037] figure 1 It shows a blockchain-based data security system provided by an embodiment of the present invention, which is used for security controllable and comprehensive supervision of blockchain-based shared data. Under the current circumstances, after the data is shared, the data requester can directly obtain the shared data, causing the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a data security system based on a block chain and a data security processing method. The system comprises a checking unit, a security calculation unit and a data processing unit, the checking unit is used for receiving a data processing request sent by a data demand terminal, checking a preset information type according to the data processing request, and sending the data processing request to the data processing unit and the security calculation unit after the checking is passed; the data processing unit is used for obtaining corresponding demand data from the distributed storage management system according to the data processing request and sending the demand data to the security calculation unit; the security calculation unit is used for processing the demand data according to the data processing request, obtaining processing information, sending the processing information to the checking unit for checking, and sending the processing information to the data demand terminal after the checking is passed, thereby realizing the safe use of the shared data in a safe computing environment, and ensuring the safety and controllability of the data provider on the source data.

Description

technical field [0001] The present invention relates to the technical field of block chains, in particular to a data security system and data security processing method based on block chains. Background technique [0002] The blockchain access control process based on token authorization realizes the security, controllability and comprehensive supervision of data sharing rights, which is mainly the control of sharing rights, but once the data is shared, it loses its unique value, and the current data privacy protection and The data security mechanism is not perfect, which leads to the limitation of data sharing and circulation process. Mainly faced with the following problems: [0003] Data control right issue: After data sharing, the data owner loses the control right of the data, cannot intervene and monitor the use of the shared data, and it is difficult to audit the behavior of data use, for example, the data is easily copied, resulting in sharing The expansion of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0209H04L63/0227H04L67/1097H04L9/50
Inventor 杨文韬陈昌王昊易晓春
Owner 西安纸贵互联网科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products