CN109727033B - Block chain-based data security access control method - Google Patents
Block chain-based data security access control method Download PDFInfo
- Publication number
- CN109727033B CN109727033B CN201811640085.4A CN201811640085A CN109727033B CN 109727033 B CN109727033 B CN 109727033B CN 201811640085 A CN201811640085 A CN 201811640085A CN 109727033 B CN109727033 B CN 109727033B
- Authority
- CN
- China
- Prior art keywords
- data
- information
- transaction
- block chain
- blockchain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Abstract
The invention discloses a data security access control method based on a block chain. In the method, the data provider can add the item of data transaction into the blockchain through an intelligent contract, when a data buyer wants to purchase, the data buyer can obtain the access right of the data through the intelligent contract of the data provider only by paying corresponding fee on the blockchain, and the data buyer can obtain the data wanted through the access right of the data. The invention links the data transaction process and automatically executes the issuance of the access control authority by using the intelligent contract of the block chain, thereby centralizing the data transaction process, greatly improving the efficiency of the data transaction and ensuring the transaction access of the data to be more credible.
Description
Technical Field
The invention relates to the field of blockchain technology and data security access, in particular to a data security access control method based on a blockchain.
Background
The blockchain technology is a novel decentralized protocol, digital currency transactions or other data can be safely stored, information cannot be forged and falsified, transaction confirmation on the blockchain is completed by all nodes on the blockchain together, consistency of the transaction confirmation is guaranteed by a consensus algorithm, a public account book is maintained on the blockchain, and any node of the public account book on a storage block is visible, so that the digital currency transactions or other data cannot be forged and falsified.
The intelligent contract is an assembly language programmed on the blockchain, is a section of automatically executable program deployed on the blockchain, and comprises a programming language, a compiler, a virtual machine, an event, a state machine, a fault-tolerant mechanism and the like in a broad sense. In other words, an intelligent contract is a contract that can be automatically executed on a computer system when certain conditions are met. Typically one will not write the bytecode itself, but will compile it from a higher level language, e.g. using a special purpose language like Solidity.
Data access security refers to the method by which an information system controls the ability of a user to view and modify data. These methods include browsing of logical views of data and authorization of individual users or groups of users to obtain data.
The existing data transaction can not be decentralized, the confirmation process of the data transaction and the authorization process of the security access control are extremely complicated, a lot of manpower and material resources are consumed, and a decentralized and data security access control method is needed to improve the data transaction efficiency and enable the transaction access of the data to be more credible.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a data security access control method based on a block chain, thereby solving the problem that decentralized data transaction cannot provide data security access pain points.
The purpose of the invention is realized by the following technical scheme: a block chain-based data security access control method is characterized by comprising the following steps:
the method comprises the following steps: contract deployment: after the data provider classifies and arranges the data required to be provided, the data and pricing are written into the intelligent contract according to the own needs, and after the security of the intelligent contract is checked, if the check is passed, the contract can be deployed on a block chain.
Step two: the data purchaser initiates a transaction on the blockchain: the data purchaser initiates a purchase transaction of the data, and writes transaction information into the block chain, at which time funds of the data purchaser are frozen.
Step three: the intelligent contract detects the transaction information: when the transaction information is written into the block chain, the intelligent contract is automatically executed, and the access right information of the data which the data buyer wants to purchase is provided for the data buyer according to the transaction information.
Step four: the data buyer acquires the data through the access right information: the data buyer obtains the data with data gap from the data provider through the specific interface by the authority information of data access returned by the intelligent contract.
Step five: the data provider provides data gap information to the upper blockchain: and the data provider provides the information of the data gap to the blockchain, and once the intelligent contract of the blockchain detects the chaining of the data gap information and checks the information as correct information, the frozen fund is transferred to the account of the data provider.
Further, the data of the data provider is stored locally at the data provider, rather than on a unified server.
Furthermore, the access right information provided by the data provider is provided by the intelligent contract in the block chain, and is automatically issued without the help of a central mechanism.
Further, the purchase amount paid by the data purchaser will be frozen on the blockchain for a period of time.
Further, the data provider provides the data with data gap to the purchaser after the money transaction is linked up, and then the gap information is linked up to complete the automated transaction.
Drawings
Fig. 1 is a flowchart of a block chain-based data security access control method according to the present invention.
Detailed Description
The present invention will be described in detail below with reference to the drawings and specific embodiments, and the objects and effects of the present invention will become more apparent.
As shown in fig. 1, the method for controlling data security access based on a block chain provided by the present invention includes the following steps:
the method comprises the following steps: contract deployment: after the data provider classifies and arranges the data required to be provided, the data and pricing are written into the intelligent contract according to the own needs, and after the security of the intelligent contract is checked, if the check is passed, the contract can be deployed on a block chain.
Step two: the data purchaser initiates a transaction on the blockchain: the data purchaser initiates a purchase transaction of the data, and writes transaction information into the block chain, at which time funds of the data purchaser are frozen.
Step three: the intelligent contract detects the transaction information: when the transaction information is written into the block chain, the intelligent contract is automatically executed, and the access right information of the data which the data buyer wants to purchase is provided for the data buyer according to the transaction information.
Step four: the data buyer acquires the data through the access right information: the data buyer obtains the data with data gap from the data provider through the specific interface by the authority information of data access returned by the intelligent contract.
Step five: the data provider provides data gap information to the upper blockchain: and the data provider provides the information of the data gap to the blockchain, and once the intelligent contract of the blockchain detects the chaining of the data gap information and checks the information as correct information, the frozen fund is transferred to the account of the data provider.
Preferably, the data of the data provider is stored locally at the data provider, rather than on a unified server.
Preferably, the access right information provided by the data provider is provided by an intelligent contract in the block chain, and is automatically issued without the help of a central authority.
Preferably, the purchase amount paid by the data purchaser will be frozen on the blockchain for a period of time.
Preferably, the data provider provides the data with the data gap to the purchaser after the funds transaction is linked up, and then links up the gap information to complete the automated transaction.
Claims (5)
1. A block chain-based data security access control method is characterized by comprising the following steps:
the method comprises the following steps: contract deployment: after the data provider classifies and arranges the data to be provided, the data and pricing are written into an intelligent contract according to the needs of the data provider, and after the security of the intelligent contract is checked, if the check is passed, the contract is deployed on a block chain;
step two: the data purchaser initiates a transaction on the blockchain: the data purchaser initiates a purchase transaction of the data, and writes transaction information into the block chain, at which time funds of the data purchaser are frozen;
step three: the intelligent contract detects the transaction information: after the transaction information is written into the block chain, the intelligent contract is automatically executed, and the access right information of the data which the data buyer wants to purchase is provided for the data buyer according to the transaction information;
step four: the data buyer acquires the data through the access right information: the data buyer obtains the data with data gap from the data provider through the specific interface according to the authority information of data access returned by the intelligent contract;
step five: the data provider provides data gap information to the upper blockchain: and the data provider provides the information of the data gap to the blockchain, and once the intelligent contract of the blockchain detects the chaining of the data gap information and checks the information as correct information, the frozen fund is transferred to the account of the data provider.
2. The blockchain-based data security access control method of claim 1, wherein data of a data provider is stored locally to the data provider instead of on a unified server.
3. The block chain-based data security access control method according to claim 1, wherein the access right information provided by the data provider is provided by a smart contract in the block chain, and is automatically issued without the aid of a central authority.
4. The blockchain-based data security access control method of claim 1, wherein a purchase amount paid by a data purchaser is frozen on the blockchain for a period of time.
5. The block chain based data security access control method of claim 1, wherein the data provider provides data with data gaps to the buyer after the funds transaction is established, and then the gap information is established to complete the automated transaction.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811640085.4A CN109727033B (en) | 2018-12-29 | 2018-12-29 | Block chain-based data security access control method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811640085.4A CN109727033B (en) | 2018-12-29 | 2018-12-29 | Block chain-based data security access control method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109727033A CN109727033A (en) | 2019-05-07 |
CN109727033B true CN109727033B (en) | 2020-12-11 |
Family
ID=66298518
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811640085.4A Active CN109727033B (en) | 2018-12-29 | 2018-12-29 | Block chain-based data security access control method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109727033B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110808974A (en) * | 2019-10-31 | 2020-02-18 | 深圳市网心科技有限公司 | Data acquisition method and device, computer device and storage medium |
CN110888935A (en) * | 2019-11-12 | 2020-03-17 | 北京芯际科技有限公司 | Data transaction method based on block chain |
CN111324881B (en) * | 2020-02-20 | 2020-10-30 | 铭数科技(青岛)有限公司 | Data security sharing system and method fusing Kerberos authentication server and block chain |
CN111597585B (en) * | 2020-05-26 | 2023-08-11 | 牛津(海南)区块链研究院有限公司 | Privacy protection method, system and related components of blockchain data |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107273759A (en) * | 2017-05-08 | 2017-10-20 | 上海点融信息科技有限责任公司 | Method, equipment and computer-readable recording medium for protecting block chain data |
CN108399571A (en) * | 2018-01-30 | 2018-08-14 | 厦门快商通信息技术有限公司 | Unsecured method of commerce and system based on block chain intelligence contract |
CN108681898A (en) * | 2018-05-15 | 2018-10-19 | 广东工业大学 | A kind of data trade method and system based on block chain |
CN109063169A (en) * | 2018-08-17 | 2018-12-21 | 福建省农村信用社联合社 | A kind of customer data management system based on block chain |
-
2018
- 2018-12-29 CN CN201811640085.4A patent/CN109727033B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107273759A (en) * | 2017-05-08 | 2017-10-20 | 上海点融信息科技有限责任公司 | Method, equipment and computer-readable recording medium for protecting block chain data |
CN108399571A (en) * | 2018-01-30 | 2018-08-14 | 厦门快商通信息技术有限公司 | Unsecured method of commerce and system based on block chain intelligence contract |
CN108681898A (en) * | 2018-05-15 | 2018-10-19 | 广东工业大学 | A kind of data trade method and system based on block chain |
CN109063169A (en) * | 2018-08-17 | 2018-12-21 | 福建省农村信用社联合社 | A kind of customer data management system based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN109727033A (en) | 2019-05-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109727033B (en) | Block chain-based data security access control method | |
JP7036844B2 (en) | Systems and methods for implementing deterministic finite automata (DFA) over the blockchain | |
US11509464B2 (en) | System and method using a fitness-gradient blockchain consensus and providing advanced distributed ledger capabilities via specialized data records | |
JP7431934B2 (en) | Method and system for blockchain implementation script-based byte interpretation | |
Chod et al. | Platform tokenization: Financing, governance, and moral hazard | |
JP6966474B2 (en) | Modeling of digital assets | |
JP6946435B2 (en) | Methods and systems that provide confirmed, auditable, and immutable inputs to smart contracts | |
CN107679857B (en) | Block chain cross-chain transaction method and storage medium | |
Kranz et al. | Blockchain token sale: economic and technological foundations | |
CN108805707A (en) | Works copyright revenue distribution method and device based on block chain | |
JP5778865B2 (en) | Services for adding functionality to applications | |
CN111476667B (en) | Block chain-based original work transaction method and device and electronic equipment | |
CN101390050B (en) | Reach the apparatus and method of selectivity distribution software resource by subtractive installation | |
US11501368B2 (en) | Computing systems for managing and administering dynamic letters of credit | |
CN107316245A (en) | Expense adjusts method and system | |
CN113723960A (en) | Information processing method, device, equipment and medium for payment of pad | |
AU2021299440A1 (en) | A machine learning framework and method for using the same | |
Fries et al. | Implementing a financial derivative as smart contract | |
De Gasperis et al. | Demonstrator of Decentralized Autonomous Organizations for Tax Credit’s Tracking | |
WO2023068951A1 (en) | Method and system for concluding sale/purchase transactions of digital assets | |
CN101841612A (en) | Rent deduction method and accounting system | |
KR20050011022A (en) | Program sales and system of user count style | |
KR20240044000A (en) | Apparatus of processing non-fungible token | |
EA043503B1 (en) | METHOD AND SYSTEM FOR CONCLUSION OF PURCHASE AND SALE TRANSACTIONS OF DIGITAL ASSETS | |
KR20240005643A (en) | System for providing financial services and simple payment server therefor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |