Unlock instant, AI-driven research and patent intelligence for your innovation.

User identity privacy encryption method based on block chain technology

A technology of user identity and encryption method, which is applied in the field of user identity privacy encryption based on blockchain technology, can solve the problems of user inconvenience, incomplete on-chain subject, and inability to effectively protect user privacy, so as to achieve the goal of protecting privacy Effect

Active Publication Date: 2020-11-03
黄灿楠
View PDF17 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the unreasonable on-chain process of the existing blockchain + two-dimensional code traceability system complicates the traceability operation after the user purchases the product, reduces the user's interest in traceability, and allows counterfeit and shoddy products to take advantage
The incomplete main body of the traceability system of blockchain + two-dimensional code leads to the inability to effectively protect user privacy, especially in the field of online shopping, which can easily cause inconvenience to users' lives

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] This embodiment provides a user identity privacy encryption method based on blockchain technology, including: Ⅰ. storing small graphics of different shapes and assigning each small graphics a string of independent short digital codes; Ⅱ. using the short digital codes to combine Form a number of long digital codes with multiple independent digital codes; III. Screen and delete long digital codes with repeated combinations; IV. Combine corresponding small graphics according to the rules of each long digital code to form an independent and unique large graphic; V. Combine Each of the above-mentioned large graphics is uploaded to the block chain, sent and displayed to the user's exclusive graphic password randomly or by designation according to the agreement, and bound to the user's identity for encryption processing, and the user's identity is indicated by the exclusive graphic password record on the block chain.

[0020] In the above step Ⅰ, the blockchain anti-counterfeit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a user identity privacy encryption method based on a block chain technology. The method comprises the following steps: storing small graphs with different shapes and endowingeach small graph with a string of independent short digital codes; combining the short digital codes into a plurality of long digital codes with multi-bit independent digital codes; screening and deleting repeatedly combined long digital codes; combining the corresponding small graphs into an independent and unique large graph according to the rule of each long digital code; and uploading each large graph to a block chain, randomly or appointed sending and displaying the large graph to a user exclusive graph password according to a protocol, binding the large graph with a user identity for encryption processing, and indicating the user identity on the block chain by using an exclusive graph password record. According to the invention, the real identity information of the user is separatedfrom the exclusive graph containing the digital code, and the blockchain only records the transaction information containing the digital code graph and does not record the real identity information ofthe user, so that the privacy of the user is effectively protected under the condition of ensuring the real transaction information.

Description

technical field [0001] The invention belongs to the technical field of traceability and anti-counterfeiting, and in particular relates to a user identity privacy encryption method based on block chain technology. Background technique [0002] Blockchain is a new application model of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. Blockchain is an important concept of Bitcoin. It is essentially a decentralized database. The underlying technology of the currency is a series of data blocks associated with cryptographic methods. Each data block contains a batch of bitcoin network transaction information, which is used to verify the validity of the information (anti-counterfeiting) and generate The next block, with the development of blockchain technology, practice has proved that blockchain technology can better reduce the trust risk in the process of multi-party collaboration. [0003] In the exi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06Q20/38
CPCG06F21/6245G06Q20/382
Inventor 黄灿楠
Owner 黄灿楠