Decentralized private data authorization method and system based on block chain

A private data, decentralized technology, applied in the field of private data authorization, can solve the problems of encrypted data leakage, heavy workload of authorization center, system paralysis, etc., to avoid evil or failure.

Pending Publication Date: 2020-06-19
北京众信易保科技有限公司
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, the above-mentioned existing technical solutions have the following defects: centralized authorization method, heavy workload of the authorization center, difficult management, centralized rights, and mischief will inevitably occur, and if the center fails to connect, it will cause the entire system to Paralyzed; and layered authorization, although it avoids the problem of centralized authorization, but due to the realization of its authorization method, the system lacks flexibility, and if the data requester of a certain layer does evil and discloses its access rights, then the layer All encrypted data of
Moreover, the above two methods do not conform to the decentralized nature of the blockchain.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decentralized private data authorization method and system based on block chain
  • Decentralized private data authorization method and system based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] Such as figure 1 As shown, this embodiment provides a decentralized private data authorization method based on blockchain, and the specific workflow is as follows:

[0043] (1) The data provider inputs the data information that needs to be submitted to the blockchain system according to the business needs, and the privacy data that needs to be encrypted is selected by the system or by the data provider itself;

[0044] (2) After the data provider confirms the private data that needs to be encrypted, the data provider uses the private key of the provider to encrypt the private data using asymmetric encryption, and collects open data to generate a data set I= {E,D}, where E={E1,E2,E3,…}, that is private data, D={D1,D2,D3,…}, that is open data; then, sign the transaction data set I, And submit it to a blockchain node;

[0045] (3) After the transaction is submitted to the blockchain node, establish a query system smart contract, preset index fields according to different...

Embodiment 2

[0054] Such as figure 2 As shown, in order to implement the method in Embodiment 1, this embodiment provides a blockchain-based decentralized privacy data authorization system, including a DAPP client, a smart contract, and the blockchain itself;

[0055] The DAPP client includes any form of APP, desktop application, and web page. It is used to provide a platform for user nodes including data providers and data demanders to operate, and to manage the keys of the user nodes, access blockchain interfaces and asymmetric encryption algorithms (including all Encryption algorithms that can be applied to the block chain, such as ECC elliptic curve encryption algorithm, RSA algorithm, Elgamal algorithm, etc.), realize the encryption and decryption functions of the asymmetric encryption algorithm; the encryption function can use the encryption framework of ECC (ECIES, Elliptic Curve Integrated Encryption Schema).

[0056] The smart contract is used to provide the user node for trans...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of privacy data authorization, and discloses a decentralized privacy data authorization method and system based on a blockchain, and the method specifically comprises the steps that a data provider selects privacy data needing to be encrypted in data information; encrypting the private data by using a provider private key, and submitting data information to the blockchain node; decrypting the private data by using the provider private key, and encrypting the private data through the demander public key; and the data demander decrypts the private data through the demander private key corresponding to the demander public key to obtain the content of the private data. The problems of large workload, difficult management and centralized rights of acentralized authorization mode and an authorization center are solved; the method solves the technical problems that in the prior art, hierarchical authorization is adopted, a system lacks flexibility, and if a data requester of a certain layer is disgusted, access permission of the data requester is disclosed, and all encrypted data of the layer can be leaked.

Description

technical field [0001] The present invention relates to the technical field of private data authorization, more specifically, it relates to a method and system for decentralized private data authorization based on blockchain. Background technique [0002] Blockchain is a comprehensive application mode that integrates distributed data storage, point-to-point transmission, encryption algorithm and consensus mechanism. Blockchain technology uses point-to-point transmission of data between multiple nodes, and uses a consensus mechanism to ensure data synchronization to achieve a distributed ledger with consistent data. The new block of the ledger saves the HASH information of the previous block through various modes, thus forming a chain structure with a very high modification cost. As for the various forms of "transaction data" stored in the ledger, all transaction data is signed by the initiator of the transaction using asymmetric encryption technology to ensure that the tran...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6218
Inventor 韩飞孙字弋张启科
Owner 北京众信易保科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products