Cross-service-provider epidemic situation data authorization method
A data authorization and cross-service technology, which is applied in the field of cross-service provider epidemic data authorization, can solve the problems of lower data usage efficiency, difficulty in decrypting authorization authorization, lack of encryption methods, etc., to achieve flexible data authorization and traceable data access rights Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0039] Such as figure 1 As shown, this embodiment provides a cross-service provider epidemic data authorization method, which includes the following steps:
[0040] 1. The client collects terminal information through information collection modules such as Bluetooth and GPS modules;
[0041] 2. After the client completes the information collection, the client encrypts the data information through the proxy re-encryption algorithm; the key used for encryption is the public key of the asymmetric key generated by the ECDSA algorithm;
[0042] Encrypt the message through the encryption algorithm of proxy re-encryption, cipher, capsule=Enc(pubkey, plaintext), where capsule is the vertex information on the curve used in the encryption process;
[0043] 3. After the service provider receives the encrypted information, the service provider stores the encrypted information locally and uploads the data index to the blockchain;
[0044] 4. When the user wants to authorize his own data t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
