Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data security management method and system based on block chain

A technology of data security and management methods, applied in the field of blockchain-based data security management methods and systems, to achieve the effect of improving reliability and security, and improving security

Inactive Publication Date: 2022-08-09
深圳嘉业产业发展有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But on the blockchain, once a transaction occurs, there is no way to undo it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security management method and system based on block chain
  • Data security management method and system based on block chain
  • Data security management method and system based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] like figure 1 As shown, the present application provides a blockchain-based data security management method, which includes the following steps:

[0036] Step S1: Perform authority verification and network security detection on the requesting terminal requesting to join the blockchain. If both the authority verification and the network security detection pass, the requesting terminal is allowed to join the blockchain, and the requesting terminal and each of the blockchains are established. Data encrypted transmission channel between blockchain nodes, otherwise, the requesting terminal is prohibited from joining the blockchain.

[0037] Specifically, in response to a request for joining the blockchain sent by the requesting terminal, the requesting terminal is subjected to authority verification and network security detection. If both the authority verification and the network security detection pass, the requesting terminal is allowed to join the blockchain, and the req...

Embodiment 2

[0082] like Figure 5 As shown, the present application provides a blockchain-based data security management system 100, the system 100 includes:

[0083] The data security verification module 10 is used to perform security verification on the data upload request and the content of the data to be uploaded in response to the data upload request sent by the blockchain node. Trust evaluation data of blockchain nodes, otherwise, uploading the data to the blockchain is prohibited;

[0084] The data processor 30 is configured to calculate the reliability value of the blockchain node requesting to upload the data according to the trust evaluation data;

[0085] The data comparison module 40 is used to compare the reliability value of the blockchain node requesting to upload data and the size of the preset second threshold. If the reliability value of the blockchain node requesting to upload data is less than the preset second threshold, the request is prohibited. The blockchain nod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data security management method and system based on a block chain, and the method comprises the following steps: responding to a data uploading request sent by a block chain node, carrying out the security verification of the data uploading request and to-be-uploaded data content, and if the security verification is passed, carrying out the security verification of the to-be-uploaded data content; if yes, collecting trust evaluation data of the block chain node requesting to upload the data, and otherwise, prohibiting uploading the data to the block chain; according to the trust evaluation data, calculating a reliable value of a block chain node requesting to upload the data; comparing the reliable value of the block chain node requesting to upload the data with a preset second threshold value, if the reliable value of the block chain node requesting to upload the data is smaller than the preset second threshold value, forbidding the block chain node requesting to upload the data to perform data interaction with other nodes in the block chain, and otherwise, forbidding the block chain node requesting to upload the data to perform data interaction with other nodes in the block chain. And allowing the block chain node requesting to upload the data to perform data interaction with other nodes in the block chain. According to the invention, security management is carried out on the data on the block chain, and the data security of the block chain is improved.

Description

technical field [0001] The present application relates to the field of data processing, and in particular, to a method and system for data security management based on blockchain. Background technique [0002] Blockchain is a new application mode of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. With the gradual promotion of blockchain technology, more and more people understand the blockchain. The blockchain has the characteristics of decentralization, anti-tampering, security and trustworthiness. Since the data on the blockchain is difficult to tamper with, once a transaction occurs on the blockchain, it is almost impossible to roll back. In the traditional centralized system, due to the existence of the central node, we can manually interfere with the data of the system, correct the data through high-level authority, and offset the occurrence of errors. But on the blockchain, once a trans...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/40
CPCH04L9/3263H04L9/3297H04L63/0428
Inventor 贺评李虹陈慧强李治良孙秋玉
Owner 深圳嘉业产业发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products