Blockchain user identity supervision method and system considering privacy protection

A technology of privacy protection and user identity, which is applied in the blockchain user identity supervision method and system field that takes into account privacy protection, and can solve the problem that it does not have substantial functions, does not realize the authentication of user identity, and the supervision of big data analysis technology is not simple and effective, etc. question

Pending Publication Date: 2020-10-20
INST OF INFORMATION ENG CAS
View PDF1 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, it is not easy and effective to implement supervision based on big data analysis technology
Chinese patent application CN109672529A discloses a deanonymization method and system combining blockchain and secret

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain user identity supervision method and system considering privacy protection
  • Blockchain user identity supervision method and system considering privacy protection
  • Blockchain user identity supervision method and system considering privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail through the following examples.

[0053] The privacy protection blockchain user identity supervision system of the present invention includes the following four types of entities: CA authentication node, (block chain) node server, supervision department and (block chain) user;

[0054] 1. The CA authentication node has a signature private key share of the (t,n) threshold signature algorithm: authenticate the user and obtain its real identity information; call the public key encryption algorithm with the public key of the supervision department for the real identity information Encrypt and generate the corresponding ciphertext; run the corresponding protocol with other t-1 CA authentication nodes to generate the (t,n) threshold signature of the ciphertext of the real identity information and send it to the user as an ac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a blockchain user identity supervision method and system considering privacy protection. The method comprises the steps that a user makes a request to call a service; a CA authentication node verifies an admission voucher of the user; a node server verifies the legality of the user obtaining the admission voucher, splices the key information containing the real identity information of the legal user with the corresponding operation data, and stores the spliced key information and operation data in the blockchain; and a supervision node monitors operation data in the blockchain, searches for key information of illegal/violating operation data, and acquires real identity information of illegal/violating users. According to the method, anonymous admission to the user issupported, a real identity encryption mode is adopted for the user, a supervision department can achieve the purpose of supervising the identity of the user without modifying a blockchain basic protocol, the identity of a malicious user can be revealed without adopting technologies such as big data analysis, and the method is simple and convenient.

Description

technical field [0001] The invention belongs to the technical field of computer applications, and in particular relates to a blockchain user identity supervision method and system that takes into account privacy protection. Background technique [0002] Blockchain technology originated from Bitcoin, which is essentially a distributed data storage and processing technology, mainly using cryptography (including hash, digital signature and encryption, etc.) to protect anonymity, data integrity, Unforgeability etc. But it is these security features that make it difficult to be regulated, thus causing many security problems. For example, malicious users may use the privacy protection features of the blockchain to conduct illegal transactions (money laundering). In order to prevent such crimes, a regulatory approach to blockchain user identities is needed. [0003] In the existing technology, regulatory authorities usually need to obtain the knowledge behind hidden block data, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F21/60G06F21/46
CPCG06F21/46G06F21/602G06F21/6218
Inventor 张锐肖禹亭
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products