A Blockchain-Based System to Prevent Misuse of Managed Data Sources

A blockchain and data source technology, applied in the blockchain field, can solve problems such as difficulty in obtaining the trust of subject A, difficulty in allowing access to data, and reduced data sharing efficiency, so as to enhance liquidity and data value mining and avoid Data isolated islands, convenient self-proving effect of innocence

Active Publication Date: 2022-03-25
HANGZHOU VASTCHAIN TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are mainly the following problems in this implementation scenario: (1) It is difficult for subject B to prove the authenticity of its data access or operation records in data source X, because it may obtain data or perform operations beyond the scope of subject A’s permission, so it is difficult Obtain the trust of subject A; (2) When the data source involves information security, it is generally difficult for subject A to allow subject B to directly connect or use the data source to obtain part of the required data, but to submit all processes to subject A for review or agent, resulting in a reduction in the efficiency of data sharing
(3) The data obtained from data source X is easily copied by subject B to other places beyond the authorized use domain, resulting in data leakage
Regarding this possibility, subject A has no way to prevent it in advance except to pursue responsibility afterwards

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Blockchain-Based System to Prevent Misuse of Managed Data Sources

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0024] refer to figure 1 , which is a schematic structural diagram of a system for preventing abuse of managed data sources based on blockchain in an embodiment of the present invention, including a third-party data source, a dedicated virtual machine and a blockchain system. The third-party data source is hosted by the data owner Third-party data services; the blockchain system is jointly built by the data owner and the data authorized subject, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system based on block chain to prevent the misuse of managed data sources, including a third-party data source, a dedicated virtual machine and a block chain system. The third-party data source is a data service hosted by a data owner in a third party; The blockchain system is jointly built by the data owner and the data authorized subject, and the data owner and the data authorized subject respectively run blockchain nodes on the blockchain system; the dedicated virtual machine is managed by the data owner, and further includes Virtual network adapter and dedicated network communication software, the dedicated network communication software is the only path for the data authorized subject to access the data source, the virtual network adapter is used for external network communication of the virtual machine, protocol analysis and message verification pass or interception . The present invention is used to realize credible supervision and recording of data owner's use of data sources hosted in a third party through virtual machine technology and block chain technology.

Description

technical field [0001] The invention belongs to the technical field of block chains, and in particular relates to a system for preventing the abuse of custody data sources based on block chains. Background technique [0002] At present, many data owners (companies, individuals, and other institutions) host their data and services on the cloud or third parties, or use data services provided by third parties. At the same time, data owners hope to open part of their own data query or use permissions to other data operators under the premise of controllability. However, since the data of the data owner is hosted by a third party, the data owner cannot simply and directly monitor the usage of the data. If the third party does not provide the corresponding functions of authority management and sub-account, the data owner must directly grant the data operator the login credentials with full authority of the data source, which poses a high security risk. [0003] Specifically, ass...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F16/27G06F9/455
CPCG06F9/45558G06F16/27G06F21/6218G06F2009/45587
Inventor 程希冀陈贤雕高诸锋
Owner HANGZHOU VASTCHAIN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products