Data sharing control method based on block chain

A control method and data sharing technology, applied in the direction of electrical components, transmission systems, etc., can solve the problems of inconvenient management, increased data leakage, decentralization, etc., and achieve the effect of fast authentication

Inactive Publication Date: 2019-12-03
CHINA UNIV OF PETROLEUM (BEIJING)
View PDF16 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The APP terminal of the credit sharing management system based on blockchain technology is operated through the interface of the crowd-use module, and the management system responds and transmits data to solve the problem of working on the credits of blockchain technology, because the original company is responsible for its own , the information on the overall blockchain technology points has not been shared, which is not convenient for the overall management work
[0017] Based on the current blockchain-based data sharing method, there are at least the following deficiencies: 1. There is still a supervisory agent subsystem participating in data sharing. Compared with the centralized system, it is only weakly centralized and not truly decentralized. change
While uploading data ciphertext to the network, the symmetric key used to encrypt data may be maliciously stolen during transmission, which will undoubtedly increase the risk of data leakage
3. Lack of fine-grained access control, it is impossible to set different data access permissions for different data visitors according to the situation in different scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data sharing control method based on block chain
  • Data sharing control method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] This embodiment discloses a blockchain-based data sharing control method. In the case of no conflict or contradiction, the whole and / or part of the preferred implementations of other embodiments can be used as a supplement to this embodiment.

[0040] Common terms in this invention:

[0041] Data Owner 1 (Data Owner): The data sharing party can encrypt the data to be shared, create a private chain (control access to the data to be shared) and generate a private chain index file according to the attributes of the User. For example, data holder 1 can be a major securities firm, a hospital or a non-governmental organization.

[0042] Data visitor 2, (User): The party to whom the data is shared can download the shared data and need to obtain the ciphertext uploaded by the holder 1 to the private chain to use, view or change the shared data resource. For example, data visitor 2 could be a patient or a bank customer.

[0043] Private chain Pb: Refers to the blockchain whose...

Embodiment 2

[0064] This embodiment may be a further improvement and / or supplement to Embodiment 1, and repeated content will not be repeated here. In the case of no conflict or contradiction, the whole and / or part of the content of the preferred implementations of other embodiments may serve as supplements to this embodiment.

[0065] Such as figure 2 As shown, the data sharing control method specifically includes the following two steps: a data upload control step S1 and a data download control step S2.

[0066] The data upload control step S1 includes:

[0067] S11: Data holder 1 encrypts data resources that need to be shared.

[0068] S12: Data holder 1 creates a private chain Pb in the blockchain network.

[0069] S13: After the private chain Pb is created, the data holder 1 can generate an index file according to the attributes of the data visitor who needs to obtain the data resource.

[0070] S14: The data holder 1 packages the encrypted shared data resource together with the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a sharing control method based on a block chain. A data holder uploads a first file package comprising encrypted data resources and index files corresponding to the data resources to a data memory through a private chain created by the data holder; the data accessor downloads the first file package from the data memory; the data accessor can access the private chain corresponding to the data resource based on the obtained management file, wherein the private chain allows the data accessor to acquire a key corresponding to the data resource from the private chain underthe condition that the management file is approved; and the data decryption module is used for decrypting the encrypted data resources, requesting the sharing permission from the data holder based onthe data accessor, generating a management file matched with the index file by the data holder under the condition that the data accessor is matched with the index file, and transmitting the management file to the data accessor.

Description

technical field [0001] The invention relates to the technical field of network sharing, in particular to a block chain-based data sharing control method. Background technique [0002] Data sharing is to enable users who use different computers and different software in different places to read other people's data and perform various operations, calculations and analysis. The degree of data sharing reflects the level of information development in a region or a country. The higher the degree of data sharing, the higher the level of information development. [0003] In the existing technology, most data sharing platforms adopt a centralized system structure. This type of shared platform has the same shared exchange subject. Exchange subjects include data providers, data service parties and data demand parties. [0004] Among them, the data provider refers to the party that provides data resources shared and exchanged. [0005] Among them, the data service party is the party...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/0876H04L63/10H04L63/1466H04L63/20H04L67/104
Inventor 范永开王憬晗林晓东刘家旭雷晶赵冠群雷霞白建蓉马俊杰彭聪夏方略孙啸峰
Owner CHINA UNIV OF PETROLEUM (BEIJING)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products