CN114944924A - Private information management method and system - Google Patents

Private information management method and system Download PDF

Info

Publication number
CN114944924A
CN114944924A CN202110177599.6A CN202110177599A CN114944924A CN 114944924 A CN114944924 A CN 114944924A CN 202110177599 A CN202110177599 A CN 202110177599A CN 114944924 A CN114944924 A CN 114944924A
Authority
CN
China
Prior art keywords
account
contract
management
management program
end management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110177599.6A
Other languages
Chinese (zh)
Inventor
赵晓波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202110177599.6A priority Critical patent/CN114944924A/en
Publication of CN114944924A publication Critical patent/CN114944924A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Abstract

The invention discloses a private information management method and system, which realizes whole course authentication and encryption from front end management, background communication to block chain-based on-chain and off-chain storage by means of decentralized characteristic of block chain, when a front end management program registers an account in the block chain, source code and corresponding executable files, etc. are registered, the front-end hypervisor is subjected to strict security checks by the trusted opportunity, including whether the program is complete, confirmation that it has not been maliciously modified or infected by a virus, meanwhile, whether the current login account is authorized to access the block chain network through the front-end management program and the trusted machine is checked, and the connection with the block chain network can be established only after the check is passed, therefore, the front-end management program which is operated by a user can be ensured to be safe and reliable, the background communication and storage adopt the whole-process encryption processing, and the safety management of private information is ensured.

Description

Private information management method and system
Technical Field
The invention relates to a private information management method and system based on a block chain.
Background
As various secret key information, such as personal bank account numbers, mailbox passwords, personal daily life electronic information and the like, are hopefully stored in an absolute private mode, various cloud disks and various third party management systems are stored in places which can be stored at present, the method cannot guarantee absolute privacy security, security vulnerabilities exist in front-end entry, back-end communication and background storage, the biggest vulnerabilities exist in system developers and operation and maintenance organizations, used software has no back door, how storage is encrypted, whether encryption methods have vulnerabilities or not, and the existing system architectures are mostly based on centralized management, privacy security cannot be achieved for core developers, and private information management methods based on block chains are started to be adopted, but the security and the reliability of the front-end entry system cannot be guaranteed.
Disclosure of Invention
The invention aims to solve the technical problems that by means of the decentralized characteristic of a blockchain, whole-process authentication and encryption are realized from front-end management and back-end communication to block-chain-based on-chain and off-chain storage, when a front-end management program registers an account in the blockchain, a source code, a corresponding executable file and the like are registered for a user to download, when the user uses the system, the front-end management program is downloaded to a current node, and a trusted machine program is downloaded at the same time, and when the front-end management program is started, the trusted machine follows the blockchain network communication when the front-end management program is started, the trusted machine carries out strict security check on the current front-end management program by means of the support of a trusted machine (a decentralized trusted machine realization method and system, patent application number: 2020111511913), including whether the program is complete or not, whether the program is modified maliciously or infected by viruses is confirmed, and whether the current login account is authorized to access the blockchain network through the front-end management program and the trusted machine, after the check is passed, the connection with the block chain network can be established, so that the front-end management program which is operated by a user can be ensured to be safe and trusted, the whole-process encryption processing is adopted for the rear-end communication and storage, and the safe management of private information is ensured.
In order to solve the technical problems, the technical scheme of the invention is as follows:
a private information management method includes the following steps:
the block chain network account number comprises a common account number and a contract account number, when the common account number is created each time, the account number address and a transaction serial number are combined together and then subjected to Hash to generate an initial contract address, the address stores all contract account number address information subsequently created by the common account number, and a trust engine and a front-end management program both create a corresponding contract account number by the common account number and store the address information into the initial contract account number;
creating a common account, and generating a corresponding initial contract account when generating the common account;
establishing a front-end management program contract account by using a common account, registering a source code, a corresponding executable file and the like for downloading and using by a user, and storing a contract account address to an initial contract account;
downloading a trust machine from a block chain network by using a common account, creating a contract account for the trust machine, distributing authority roles to the contract account, providing an account adding interface, an account deleting interface and an account inquiring interface for the contract account;
adding an account interface: the parameters are two items of contract account numbers and common account numbers of the front-end management program, one or a batch of common account numbers can be added for accessing the front-end management program on the current trust machine, if the parameters are null, the current trust machine allows all the common account numbers to access all the front-end management programs;
and (4) deleting an account interface: the parameters are two items of a front-end management program contract account and a common account, and one common account or a batch of accounts corresponding to the front-end management program contract can be deleted;
and (3) inquiring an account interface: the parameters are contract account numbers, and all common account numbers which can access the contract account numbers on the current trust machine are inquired;
downloading a front-end management program to a management node, configuring a local trust machine as a proxy, and connecting a block chain network;
and starting a front-end management program, configuring a current node trust machine as a proxy server, and connecting the block chain network with the front-end management program by the front-end management program through the trust machine network for access.
The implementation process of the invention patent is described in three aspects of front-end security, communication security and storage security:
the front end is safe:
the front-end management program is opened, a contract account is established in a block chain, a source code and an executable file are registered, the executable file is ensured to be consistent with the opened source code, when the block chain network is accessed, a trust opportunity matches a currently operated version with the registration information of the contract account, and the block chain network can be established with connection only if the matching is successful;
the front-end management program login adopts the combination of face recognition and passwords, after login is successful, content is managed in a grading mode according to the privacy degree and can be divided into 1 to multiple stages, the highest-level content mainly stores information such as bank passwords, different-level information is managed in different windows, and when the highest-level information is operated, the function of a system clipboard is forbidden, so that the content is prevented from being stolen by a hacker program;
and (3) communication security:
the front-end management program and the block chain network communication are connected through a trusted machine encryption channel, and when the front-end management program is connected with the trusted machine, the front-end management program needs to pass security check of the trusted machine, and the check is divided into two steps: the first step is that the integrity of a front-end management program is checked, and a trust opportunity matches a currently running version with contract account registration information; secondly, checking access authority, inquiring whether a current front-end management account contract in a trust machine contract has authority control or not through an account interface inquired by a trust machine, and if the current front-end management account contract contains a current login common account, establishing an encrypted connection channel of a block chain network only after the current front-end management account contract passes the inquiry, so that the front-end management program is not infected or disguised by viruses, login limitation of a region range is performed on login accounts, and safer protection is realized;
and (4) storage safety:
the background storage process is completed in a block chain network, the login password and the highest level information are directly stored in a chain in an encrypted mode, other level contents can be stored in a chain in an encrypted mode, for example, the contents are stored in a cloud end and decentralized storage devices in an encrypted mode, addresses and content encryption keys are required to be encrypted and stored in the chain when the contents are stored in the chain, and distributed synchronization to each node is facilitated.
Through safety protection in the three aspects of front-end safety, communication safety and storage safety, the decentralized private information management method is realized, information is ensured to be recorded, communicated to background storage, no leakage risk is caused, and the privacy of the information is ensured.
A private information management system comprising: the method comprises the steps of establishing a common account and an initial contract account in a block chain network, deploying a private system front-end management program, establishing a front-end management program contract account in the block chain network, registering a front-end management program source code and an executable file, downloading the front-end management program to a local node, downloading a trusted machine to the local node, establishing a contract account for a current trusted machine, adding an account interface to the contract account of the common account and the front-end management program into the account of the trusted machine through a contract, enabling the common account to communicate with the block chain network when logging in the front-end management program, performing window management on a front-end management program window according to content privacy level, disabling a system clipboard function when operating a window with the highest level, and enabling the front-end management program to pass security check of the trusted machine when being connected with the trusted machine, and checking the front-end management program in two steps: the first step is that the integrity of a front-end management program is checked, and a trust opportunity matches a currently running version with contract account registration information; and secondly, checking access authority, inquiring an account interface through a contract, inquiring whether a front-end management account contract in a trust machine contract has authority control, if the front-end management account contract contains a current login common account, establishing an encryption connection channel with a block chain network after the front-end management account contract passes the access control, finishing a background storage process in the block chain network, directly encrypting and storing a login password and highest-level information on a chain, and for other-level contents, performing encryption and storage under the chain, if the login password and the highest-level information are encrypted and stored in a cloud end and decentralized storage equipment, encrypting and storing a storage mode, an address and a content encryption key when the contents are stored under the chain, and storing the encrypted and stored contents on the chain, so that distributed synchronization to each node is facilitated.
Therefore, a decentralized private information management method and system are realized through three aspects of safety protection, namely front end safety, communication safety and storage safety.
Drawings
FIG. 1 is a flow chart of a login process of a privacy information management system of the present invention.
Detailed Description
The following description of the preferred embodiments of the present invention, with reference to the accompanying drawings, will provide a better understanding of the function and features of the invention.
And registering a contract account number for the front-end management program in the block chain network, simultaneously registering an executable file and source code information, and confirming whether the executable file is matched or not by third-party authentication after compiling according to the provided source code.
And downloading the front-end management program to the management node.
Downloading a trusted machine program to a management node, registering a contract account on a blockchain network, wherein the contract account provides three interfaces, namely an account interface is added, an account interface is deleted and an account interface is inquired, and the method mainly functions in specifying which common accounts can be connected with which front-end management programs in the current trusted machine.
The common account login front-end management program flow comprises the following steps:
a common account logs in a front-end management program;
the front-end management program packs the login request and sends the login request to the current trusted machine program;
the trusted machine program acquires corresponding process information through a communication port of the opposite side, acquires a contract account number of the process from a blockchain network through a process content Hash characteristic value, downloads the characteristic information of an executable file registered by the account number, matches the characteristic information with the front-end management program, and if the matching fails, returns a login failure, and if the matching fails, continues the permission check;
the trusted machine program checks whether the contract account number of the front-end management program has authority configuration, if so, whether the current common account number exists in the configuration list, if not, the login failure is returned, and if so, the login is successful.
The method realizes a complete trusted management flow from the front-end management program and the back-end communication to the background storage, and realizes the complete trusted management of the private information.
Obviously, many modifications and variations of the present invention are possible in light of the above teachings, and it is to be understood that within the scope of the appended claims, the invention may be practiced otherwise than as specifically described.

Claims (8)

1. A private information management method includes the following steps: (1-1) creating a common account and generating a corresponding initial contract account at the same time; (1-2) establishing a front-end management program contract account, registering source codes, corresponding executable files and the like for downloading and using by a user, and storing a contract account address to an initial contract account; (1-3) establishing a trust machine contract account, distributing authority roles to the contract account, providing an increased account by the contract account, deleting the account and inquiring an account interface, and storing the trust machine contract account address to an initial contract account; (1-4) downloading a front-end management program to a management node, configuring a local trust machine as a proxy, and connecting a block chain network; (1-5) adopting front-end safety management; (1-6) adopting communication security management; and (1-7) adopting background storage safety management.
2. The method as claimed in claim 1, wherein an initial contract account is generated, all trust machine nodes and network program contract accounts are created by a common account, the common account manages all other contract accounts created by the common account through the initial contract account, and the initial contract account has an adding, deleting and querying interface, so that the common account can conveniently manage the own contract account.
3. The method as claimed in claim 1, wherein the front-end management program registers the source code and the executable file, the executable file has corresponding source code, which is convenient for any user to verify the validity of the contract account and for the third authority to manage the contract.
4. The method according to claim 1, wherein the trusted machine contract account number has three functions, the first function is an executor of security verification of the front-end hypervisor, corresponding process information can be obtained through a communication port of the front-end hypervisor, a corresponding contract account number can be obtained from a blockchain network through a process content hash value, an executable file characteristic value registered by the contract account number is downloaded, and the security of the front-end hypervisor can be confirmed by matching with an executable file characteristic value corresponding to a currently running process; the second is used as an encryption channel for the front-end management program to communicate with the block chain network; and thirdly, the method can control which common users can access which front-end management programs at the current node, plays a role of safety access control based on regions, and provides three management interfaces for realizing the control and a trust engine contract: the method comprises the steps of adding an account interface, deleting the account interface and inquiring the account interface, wherein parameters of the added account interface and the deleted account interface are a front-end management program contract account and a common account, and the inquiring interface only has one front-end management contract account.
5. The method of claim 1, employing front-end security management, the front-end security management being managed from two perspectives, the security check of the first front-end being implemented by a trusted machine; and the second management interface carries out window management according to the information privacy level, and the highest level management window disables the system clipboard function.
6. The method as claimed in claim 1, wherein, with communication security management, the front-end hypervisor and the blockchain network communication are communicated through an encryption channel of a trusted machine, and the trusted machine checks security of the front-end hypervisor and current access authority of the logged-in common account when establishing the encryption communication channel.
7. The method as claimed in claim 1, wherein the background storage security management is performed, the private information management method is performed by using a blockchain network, the login password and the highest level information are directly stored in a chain in an encrypted manner, and other level contents can be stored in a chain in an encrypted manner, such as in a cloud and decentralized storage devices.
8. A private information management system comprising: the method comprises the steps of establishing a common account and an initial contract account in a block chain network, deploying a private system front-end management program, establishing a front-end management program contract account in the block chain network, registering a front-end management program source code and an executable file, downloading the front-end management program to a local node, downloading a trusted machine to the local node, establishing a contract account for a current trusted machine, increasing an account interface through a contract, adding the common account and the front-end management program contract account to the account of the trusted machine, enabling the common account to be communicated with the block chain network when logging in the front-end management program, performing window management on a front-end management program window according to a content privacy level, disabling a system clipboard function when a window with the highest operation level is used, and enabling the front-end management program to be checked in two steps through security check of the trusted machine when being connected with the trusted machine: the first step is that the integrity of a front-end management program is checked, and a trust opportunity matches a currently running version with contract account registration information; and secondly, checking access authority, inquiring an account interface through a contract, inquiring whether a front-end management account contract in a trust machine contract has authority control, if the front-end management account contract contains a current login common account, establishing an encryption connection channel with a block chain network after the front-end management account contract passes the access control, finishing a background storage process in the block chain network, directly encrypting and storing a login password and highest-level information on a chain, and for other-level contents, performing encryption and storage under the chain, if the login password and the highest-level information are encrypted and stored in a cloud end and decentralized storage equipment, encrypting and storing a storage mode, an address and a content encryption key when the contents are stored under the chain, and storing the encrypted and stored contents on the chain, so that distributed synchronization to each node is facilitated.
CN202110177599.6A 2021-02-09 2021-02-09 Private information management method and system Pending CN114944924A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110177599.6A CN114944924A (en) 2021-02-09 2021-02-09 Private information management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110177599.6A CN114944924A (en) 2021-02-09 2021-02-09 Private information management method and system

Publications (1)

Publication Number Publication Date
CN114944924A true CN114944924A (en) 2022-08-26

Family

ID=82906155

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110177599.6A Pending CN114944924A (en) 2021-02-09 2021-02-09 Private information management method and system

Country Status (1)

Country Link
CN (1) CN114944924A (en)

Similar Documents

Publication Publication Date Title
US9942274B2 (en) Securing communication over a network using client integrity verification
US20090240936A1 (en) System and method for storing client-side certificate credentials
US20090319793A1 (en) Portable device for use in establishing trust
US20190273739A1 (en) Systems and methods for controlling access to a blockchain
CN111431707B (en) Service data information processing method, device, equipment and readable storage medium
US8566952B1 (en) System and method for encrypting data and providing controlled access to encrypted data with limited additional access
CN105743638A (en) System client authorization authentication method based on B/S framework
CN112016073B (en) Construction method of server zero trust connection architecture
US11146961B2 (en) Third party certificate management for native mobile apps and internet of things apps
CN115333840A (en) Resource access method, system, device and storage medium
US10158623B2 (en) Data theft deterrence
CN114844644A (en) Resource request method, device, electronic equipment and storage medium
CN110851837B (en) Self-service equipment based on trusted computing, and security management system and method thereof
US10104060B2 (en) Authenticating applications to a network service
KR101133210B1 (en) Mobile Authentication System and Central Control System
CN115277237A (en) Control method and device for accessing mobile terminal to enterprise intranet
CN114944924A (en) Private information management method and system
CN115146284A (en) Data processing method and device, electronic equipment and storage medium
CN116781359B (en) Portal security design method using network isolation and cryptograph
CN117478326B (en) Key escrow method, device, terminal equipment and storage medium
CN117313144A (en) Sensitive data management method and device, storage medium and electronic equipment
CN114697111A (en) Method and system for accessing public cloud in cross-cloud mode and public cloud
BR102017006703A2 (en) identifier, guarantor and integrator method of different applications on the same device or on different processing devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20220826