Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Commercial data protection method and system based on supply chain management

A supply chain management and data protection technology, applied in digital data protection, electronic digital data processing, instruments, etc., can solve the problem of account information being threatened, and achieve the effect of safety and security

Active Publication Date: 2020-09-29
TIANJIN UNIVERSITY OF TECHNOLOGY +2
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a commercial data protection method and system based on supply chain management, which can solve the problem of safe storage of user private keys and addresses, and avoid the threat of account information being stored in a centralized system. The security of user account information is more secure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Commercial data protection method and system based on supply chain management
  • Commercial data protection method and system based on supply chain management
  • Commercial data protection method and system based on supply chain management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0074] The data structure stored in the file in the embodiment of the present invention includes file header information (head), address information (address), file version information (vertion), account information (id), file generation time information (time), and data encryption technology identification information (DID); detailed as follows:

[0075] (1) Generation of private key and address:

[0076] (2) Encrypt the private key with a password to generate a key

[0077] (3) Write the corresponding string to the file:

[0078]

[0079] (4) Store the file on the local server.

[0080] (5) When a transaction request from a supply chain merchant is received, the file is parsed, the private key ciphertext and address are read from the file, and the ciphertext password is entered to decrypt the private key ciphertext before the transaction is performed.

[0081] The supply chain-based commercial data protection method and system provided by the present invention uses the generated priva...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a commercial data protection method and system based on supply chain management. The method comprises the following steps: carrying out localized deployment on a responded service server; responding to the service data request to obtain request data; performing operation on data needing to be calculated of the service request to obtain operation data; encrypting the request data and the operation data to generate a private key ciphertext; and writing the private key ciphertext into a local server file or a database. According to the invention, the secure storage problem of the private key and the address of the user can be solved, the situation that the account information is stolen and threatened due to the fact that the private key and the address are stored in acentralized system is avoided, and the security of the user account information is better guaranteed.

Description

Technical field [0001] The present invention relates to the field of supply chain management, in particular to a method and system for protecting commercial data based on supply chain management. Background technique [0002] Supply chain management involves complicated permissions. The private key management and storage systems of each merchant in the supply chain are basically centralized. Private keys are easily stolen. Blockchain, as a kind of distributed ledger, is an Internet database. Technology is characterized by decentralization, openness and transparency. It was originally the underlying technology of Bitcoin and is currently widely used in finance and other fields. [0003] Inventory of the top ten data breaches in 2018: Facebook, A station, YTO, SF and other data were stolen. Facebook: 87 million user data leaks; ACFUN: 9 million user data leaks; Huazhu's multiple hotel chains: 240 million check-in records leaked; Marriott Starwood: 500 million customer user informat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6209G06F21/6218Y02P90/30
Inventor 李宝珠朱浩冰吕伟康周英
Owner TIANJIN UNIVERSITY OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products