Data authorization system and method based on block chain

A data authorization and blockchain technology, applied in the field of data authorization, can solve problems such as difficult to be identified, untraceable, user data abuse, etc., to achieve the effect of ensuring reliability and preventing abuse

Pending Publication Date: 2022-04-22
NEWLAND DIGITAL TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] On the one hand, when people need their own personal data, they need to prepare paper or electronic materials (such as the personal electronic ID card in the card bag) and give them to a third party. These personal data are often not issued by the individual themselves. The residence permit needs to be applied for at a government agency, and many times a business needs to use multiple materials, and the user needs to apply at multiple different agencies before collecting all the materials, which brings great inconvenience to the user
On the other hand, due to the increasingly prominent problems of user data leakage, user privacy violation, illegal collection, and use of user data in the Internet era, at present, the authorized use of user data to third-party organizations or platforms is generally based on paper-based carriers or electronic forms. Authorization, when user data is abused or stolen for business or verification, it is difficult to be identified and cannot be traced, resulting in damage to personal interests

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data authorization system and method based on block chain
  • Data authorization system and method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The following in conjunction with the accompanying drawings will further illustrate a particular embodiment of the present invention. It should be noted herein that the description of these embodiments is used to help understand the present invention, but does not constitute a qualification of the present invention. Further, the technical features involved in each embodiment of the present invention described below may be combined with each other as long as they do not constitute a conflict with each other.

[0030] A blockchain-based data authorization system, including,

[0031] Data request module 1, which is used to issue data authorization requests to the data management module;

[0032] Data management module 2, for pre-storage of user data; after receiving the authorization request of the data application module 1, the user identity is verified through the real person authentication module 3 to determine whether to give a response; after responding to the authorizati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data authorization system based on a block chain, and the system comprises a data application module which is used for transmitting a data authorization request to a data management module, and the authorization request comprises the personal information of a user; the data management module is used for pre-storing user data; after an authorization request of the data application module is received, the user identity is verified through a real person authentication module, and whether a response is given or not is judged; generating a first authorization code after responding to the authorization request, returning the first authorization code to the data application module, and extracting a fingerprint from authorization content to generate a first authorization content fingerprint; an authorization contract is deployed on the block chain module; when a data sending request of the data receiving module is received, a second authorization code in the data sending request is compared with a first authorization code stored on the block chain module through an authorization contract, and after verification is passed, the data management module is notified to push authorization content to the data receiving module; and the data receiving module is used for checking whether the authorization contents are consistent or not after receiving the authorization contents.

Description

Technical field [0001] The present invention relates to the field of data authorization, in particular to a blockchain-based data authorization system and method. Background [0002] As people fully enter the information age and the digital economy era, personal data has become a personal label that accompanies people at all times, and has become an important information for identifying individuals, proving personal credit and reflecting personal behavior habits. Individuals need to provide their personal data to third-party institutions or platforms to handle business everywhere in their lives, and they need to use personal data to prove their identity and other information. [0003] On the one hand, when people need their own personal data, they need to prepare paper or electronic materials (such as personal electronic ID cards in the card bag) to third parties, these personal data are not issued by the individuals themselves in many cases, they need to apply for a residence p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06F21/60G06F21/62G06F21/64
CPCG06F21/31G06F21/602G06F21/6245G06F21/64
Inventor 杨云凡翁美娜叶欣杰
Owner NEWLAND DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products