Unlock instant, AI-driven research and patent intelligence for your innovation.

Cross-service-provider epidemic situation data authorization method

A data authorization and cross-service technology, which is applied in the field of cross-service provider epidemic data authorization, can solve the problems of lower data usage efficiency, difficulty in decrypting authorization authorization, lack of encryption methods, etc., to achieve flexible data authorization and traceable data access rights Effect

Pending Publication Date: 2021-10-22
DONGGUAN UNIV OF TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Most current epidemic tracking apps cannot effectively protect user data, they will automatically collect user data and upload it to the server for subsequent data analysis
That is: once the user agrees to use the app, the user will lose control of their data
[0006] 2. Information between service providers cannot communicate with each other, becoming an information island
[0007] Due to geographical, legal and other objective conditions, service providers cannot effectively and safely exchange information
It makes it difficult for users to perform cross-platform detection and reduces the efficiency of data usage
Users are likely to need to use multiple epidemic tracking apps at the same time to cope with the testing requirements in different regions, causing great inconvenience to users
[0008] 3. When data interacts across platforms, data permission issues
[0010] 4. Lack of efficient encryption methods
However, after the data is encrypted, it is difficult for the service provider to effectively authorize the decryption authority to the service provider receiving the data (as mentioned in question 3, the data should be authorized by the user), so there is still an urgent need for a method to set the decryption authority The encryption method specified in the encryption algorithm encrypts the data
[0012] In general, the current epidemic tracking apps are difficult to meet the current needs of people, especially since such apps collect important private information, people will pay more attention to the security of their privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-service-provider epidemic situation data authorization method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] Such as figure 1 As shown, this embodiment provides a cross-service provider epidemic data authorization method, which includes the following steps:

[0040] 1. The client collects terminal information through information collection modules such as Bluetooth and GPS modules;

[0041] 2. After the client completes the information collection, the client encrypts the data information through the proxy re-encryption algorithm; the key used for encryption is the public key of the asymmetric key generated by the ECDSA algorithm;

[0042] Encrypt the message through the encryption algorithm of proxy re-encryption, cipher, capsule=Enc(pubkey, plaintext), where capsule is the vertex information on the curve used in the encryption process;

[0043] 3. After the service provider receives the encrypted information, the service provider stores the encrypted information locally and uploads the data index to the blockchain;

[0044] 4. When the user wants to authorize his own data t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of epidemic situation data processing, and relates to a cross-service-provider epidemic situation data authorization method, which comprises the following steps that: 1, a client collects terminal information; 2, the client encrypts the data information through a proxy re-encryption algorithm; 3, a service provider locally stores the encrypted information and uploads a data index to a blockchain; 4, a user obtains the proxy re-encryption public key of an authorization target, and the user uploads the rekey generated by re-encryption and the pubparam to a starting service provider locally through a ReKey algorithm of proxy re-encryption; 5, the service provider locally converts the encrypted information through ReEnc re-encryption operation; 6, the service providers communicate with each other and upload the information to the blockchain, and notify an authorization decryption party; and 7, the decryption party locally obtains the original data through a ReDec method. The method has relatively good safety.

Description

technical field [0001] The invention relates to the technical field of epidemic data processing, in particular to a cross-service provider epidemic data authorization method. Background technique [0002] With the gradual popularization of mobile devices and the gradual improvement of mobile phone performance, mobile phones have played an important role during the epidemic. Mobile phones have become an important device for collecting users' geographic information and accessing information. This kind of user-level data collection is extremely efficient in helping epidemic tracking service providers to target infected users and contact users. However, with the continuous development of the epidemic situation, the epidemic tracking of a single service provider has gradually exposed problems. Although a single service provider has performed well in its service domain, with the flow of people, especially when people reach the service domain of other service providers After that,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/08
CPCH04L63/0442H04L9/0861H04L9/0819H04L63/10H04L67/56H04L9/50
Inventor 吴宇张琰李睿姚景升刘振张海涛张婷张嘉翔
Owner DONGGUAN UNIV OF TECH