Supercharge Your Innovation With Domain-Expert AI Agents!

Monitoring method and device for data access based on white list and related product

A data access and whitelist technology, applied in the blockchain field to reduce the risk of data leakage

Pending Publication Date: 2021-04-09
北京八分量信息科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, data leakage will still occur on the blockchain system, making data access monitoring still one of the important issues to be solved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Monitoring method and device for data access based on white list and related product
  • Monitoring method and device for data access based on white list and related product
  • Monitoring method and device for data access based on white list and related product

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] see figure 1 , the embodiment of the present application provides a monitoring method for data access based on a whitelist, including:

[0054] S101: Determine the target data to be left at the boundary of the blockchain system;

[0055] In this embodiment, the blockchain system boundary can be the alliance chain boundary, the public chain boundary, and the private chain boundary.

[0056] Optionally, in a specific implementation manner, the target data to be left at the boundary of the blockchain system includes sensitive data and / or non-sensitive data;

[0057] After determining the target data to leave the boundary of the blockchain system, it includes: parsing sensitive data and / or non-sensitive data from the target data to leave the boundary of the blockchain system.

[0058] For example, financial-related data, ID number, etc., are sensitive data, and user consumption data habits, etc., are non-sensitive data. Through this effective classification of sensitive an...

Embodiment 2

[0095] see figure 2 , the embodiment of the present application provides a monitoring device 20 for data access based on a whitelist, including:

[0096] A data determination unit 201, configured to determine target data to be left at the boundary of the blockchain system;

[0097] An array calling unit 202, configured to call a hash array corresponding to the set accessible data whitelist;

[0098] The hash matching unit 203 is configured to calculate the hash value of the target data according to the set multi-hash function mapping model, and match the hash array corresponding to the accessible data whitelist according to bits;

[0099] If there is an exact match, access to the target data is allowed, and if there is at least one bit mismatch, access to the target data is not allowed.

[0100] The specific instructions are as follows:

[0101] A data determination unit 201, configured to determine target data to be left at the boundary of the blockchain system;

[0102]...

Embodiment 3

[0142] see image 3 , the embodiment of the present application provides a blockchain system 30, including: a plurality of blockchain nodes 301, and each blockchain node 301 is provided with a monitoring device 20 for data access based on a whitelist, which includes:

[0143] A data determination unit 201, configured to determine target data to be left at the boundary of the blockchain system;

[0144] An array calling unit 202, configured to call a hash array corresponding to the set accessible data whitelist;

[0145] The hash matching unit 203 is configured to calculate the hash value of the target data according to the set multi-hash function mapping model, and match the hash array corresponding to the accessible data whitelist according to bits;

[0146] If there is an exact match, access to the target data is allowed, and if there is at least one bit mismatch, access to the target data is not allowed.

[0147] The specific instructions are as follows:

[0148] A data ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a monitoring method and device for data access based on a white list and a related product. The method comprises the steps of determining target data to leave a blockchain system boundary; calling a hash array corresponding to the set accessible data white list; calculating a hash value of the target data according to a set multi-hash function mapping model, and matching the hash value with a hash array corresponding to the accessible data white list according to bits; and if the at least one bit is completely matched, permitting to access the target data, and if at least one bit is not matched, not permitting to access the target data. Therefore, data access can be effectively monitored, and the risk of data leakage on the blockchain system is reduced.

Description

technical field [0001] This application relates to the technical field of blockchain, in particular to a monitoring method, device and related products for data access based on a whitelist. Background technique [0002] The blockchain system is an integrated application model of distributed data storage system, point-to-point transmission, consensus mechanism, encryption algorithm and other technologies, which can realize trust and value transfer that cannot be realized on the traditional Internet on the Internet. However, data leakage will still occur on the blockchain system, making data access monitoring still one of the important issues to be solved. Contents of the invention [0003] Based on the above problems, the embodiments of the present application provide a monitoring method, device and related products for data access based on a whitelist. [0004] The embodiment of the application discloses the following technical solutions: [0005] In the first aspect, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6218
Inventor 阮安邦王佳帅魏明陈旭明
Owner 北京八分量信息科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More