CN110535913A - A kind of user's authorization based on block chain and really weigh method - Google Patents

A kind of user's authorization based on block chain and really weigh method Download PDF

Info

Publication number
CN110535913A
CN110535913A CN201910699412.1A CN201910699412A CN110535913A CN 110535913 A CN110535913 A CN 110535913A CN 201910699412 A CN201910699412 A CN 201910699412A CN 110535913 A CN110535913 A CN 110535913A
Authority
CN
China
Prior art keywords
user
information
data
authorization
app
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910699412.1A
Other languages
Chinese (zh)
Inventor
白卫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Baiyang Software Co Ltd
Original Assignee
Suzhou Baiyang Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Baiyang Software Co Ltd filed Critical Suzhou Baiyang Software Co Ltd
Priority to CN201910699412.1A priority Critical patent/CN110535913A/en
Publication of CN110535913A publication Critical patent/CN110535913A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of, and the user based on block chain authorizes and really weighs method, and personal user logs in APP, and user information is filled in APP, to generate personal information and associated user's authorization message in APP;User's authorization;It is encrypted by encipheror, forms encryption data;Authorized user message obtains information data by digital digest algorithm;After authorized user message goes markization, using general ledger technology, write data into total account book that one can not distort;Using the netted alliance's chain technology of multicenter, each account book ensures that total account book will not be tampered stored at least on three or more data center's nodes.The present invention is that a technology of the specification is realized with reference to personal information security specification.By by personal authorization message data encryption, go the technologies such as markization, the storage of weak center's block chain, realize and meet the processing method of personal information authorization specified in personal information security specification, protect the safety of personal information, it is therefore prevented that personal information is abused.

Description

A kind of user's authorization based on block chain and really weigh method
Technical field
It is specifically a kind of dominant by user based on block chain technology the present invention relates to personal information security protection technology field The personal information of oneself is licensed to third party and used by authorization message gatherer, and the safety for digital assets such as personal information is anti- Shield.
Background technique
With popularizing for smart phone, people are increasingly longer using the time of mobile phone, and personal information uses APP's in people It is recorded simultaneously by APP, the developer of APP can buy and sell personal information without the agreement of user.Constantly there is personal letter in recent years Heart leakage, is taken away by illegal company and implements the malfeasances such as swindle, cause severe social influence.Therefore, art technology Personnel provide a kind of personal information security guard method based on block chain, to solve mentioned above in the background art ask Topic.
Summary of the invention
The purpose of the present invention is to provide a kind of, and the user based on block chain authorizes and really weighs method, to solve above-mentioned background The problem of being proposed in technology.
To achieve the above object, the invention provides the following technical scheme:
It is a kind of based on block chain user authorization and really weigh method, the method for security protection is specific as follows:
(1) when starting, personal user logs in APP, and user information is filled in APP, and selection allows APP developer by its people Information is paid or is gratuitously shared with third party, and limits the scope of business that third party uses its personal information, thus raw in APP At personal information and associated user's authorization message;
(2) whether user authorizes:
A. no, authorized user message is not generated, i.e. user disagrees APP developer and userspersonal information is shared with third party;
It b. is to generate authorized user message, i.e., user agrees to or part agrees to that userspersonal information is shared with the by APP developer Tripartite, APP encrypts personal user information and associated user's authorization message at this time;
(3) data encryption: personal information and user are encrypted to the information of the authorization of APP developer by encipheror, are formed and are added Ciphertext data;
(4) go markization: authorized user message obtains information data by digital digest algorithm, i.e. authorized user message is made a summary, It can be retrieved by third party after authorized user message abstract authorization, matching;
(5) region chain stores: after authorized user message goes markization by step (4), using general ledger technology, writing data into one In a total account book that can not be distorted, i.e., stored by region chain technology;
(6) it protects alliance's chain: using the netted alliance's chain technology of multicenter, each account book is stored at least in three or more data On heart node, when a point is tampered with attack, ensures that total account book will not be tampered, increase the fault-tolerance of system.
As a further solution of the present invention: the personal user or third party are when using data: passing through personal information Digital digest retrieves data, to use data, needs personal user and authorization message to match, and personal user and third party Corresponding data block can be recalled from general ledger, matched or analyzed.
As further scheme of the invention: irreversible to data encryption process in the step (3).
As further scheme of the invention: the encryption in digital digest algorithm and step (3) in the step (4) A variety of digital hash algorithms can be used in program.
As further scheme of the invention: authorized user message abstract includes but is not limited to have in the step (4) The digital information of body, the information content, information source, information storage means, information storage.
As further scheme of the invention: the digital information includes but is not limited to name, identification card number, DNA, electricity Words, fingerprint, geographical location, behavior portrait etc..
As further scheme of the invention: the third party includes but is not limited to: government and government offices, business roll into a ball Body, overseas institution, other people etc..
Compared with prior art, the beneficial effects of the present invention are:
It is authorized the present invention is based on the user of block chain and really weighs method, can effectively guided the third-party institution legitimate and use user Individual privacy data allow the user You Liao third-party institution to use the right to know of my private data purposes, promote to a certain extent Problem is weighed really into individual digital assets, prevents APP developer from abusing userspersonal information.The present invention is with reference to personal information Safety standard is that a technology of the specification is realized.By by personal authorization message data encryption, go markization, area, weak center The technologies such as block chain storage, realize the processing method for meeting personal information authorization specified in personal information security specification, protect The safety of personal information, it is therefore prevented that personal information is abused.
Detailed description of the invention
Fig. 1 is the flow diagram of a kind of user's authorization based on block chain and true power method.
Fig. 2 be a kind of user's authorization based on block chain and really in power method data encryption flow diagram.
Fig. 3 removes the flow diagram of markization for a kind of user's authorization based on block chain and really in power method.
Fig. 4 be a kind of user's authorization based on block chain and really in power method block chain functional block diagram.
Fig. 5 be a kind of user's authorization based on block chain and really in power method alliance's chain functional block diagram.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
In the embodiment of the present invention, it is a kind of based on block chain user authorization and really weigh method, as shown in Figure 1, the safety Guard method is specific as follows:
(1) when starting, personal user logs in APP, and user information is filled in APP, and selection allows APP developer by its people Information is paid or is gratuitously shared with third party, and limits the scope of business that third party uses its personal information, thus raw in APP At personal information and associated user's authorization message;
(2) whether user authorizes:
A. no, authorized user message is not generated, i.e. user disagrees APP developer and userspersonal information is shared with third party;
It b. is to generate authorized user message, i.e., user agrees to or part agrees to that userspersonal information is shared with the by APP developer Tripartite, APP encrypts personal user information and associated user's authorization message at this time;
(3) data encryption: personal information and user are encrypted to the information of the authorization of APP developer by encipheror, are formed and are added Ciphertext data, as shown in Figure 2;
(4) go markization: authorized user message obtains information data by digital digest algorithm, i.e. authorized user message is made a summary, It can be retrieved by third party after authorized user message abstract authorization, matching, as shown in Figure 3;
(5) region chain stores: after authorized user message goes markization by step (4), using general ledger technology, writing data into one In a total account book that can not be distorted, i.e., stored by region chain technology, as shown in Figure 4;
(6) protect alliance's chain: total account book causes loss of data or service disruption, in mostly by malicious attack in order to prevent The netted alliance's chain technology of the heart, each account book is stored at least on three or more data center's nodes, when a point is tampered with When attack, ensures that total account book will not be tampered, increase the fault-tolerance of system, as shown in Figure 5.
The personal user or third party are when using data: by personal information digital digest, data are retrieved, to make With data, personal user and authorization message is needed to match, and personal user and third party can recall corresponding number from general ledger According to block, is matched or analyzed.
It is irreversible to data encryption process in the step (3).
A variety of digital hash can be used in the encipheror in digital digest algorithm and step (3) in the step (4) Algorithm, such as hash algorithm.
Authorized user message abstract includes but is not limited to specific digital information, the information content, information in the step (4) Source, information storage means, information storage.
The digital information includes but is not limited to name, identification card number, DNA, phone, fingerprint, geographical location, behavior portrait Deng.
The third party includes but is not limited to: government and government offices, commercial organization, overseas institution, other people etc..
It is authorized the present invention is based on the user of block chain and really weighs method, can effectively guide third-party institution's use legitimate Individual subscriber private data allows the user You Liao third-party institution to use the right to know of my private data purposes, to a certain degree On promote individual digital assets and weigh problem really, prevent APP developer from abusing userspersonal information.The present invention is with reference to individual Information security specification is that a technology of the specification is realized.By by personal authorization message data encryption, go markization, it is weak in The technologies such as heart district block chain storage, realize the processing method for meeting personal information authorization specified in personal information security specification, protect The safety of personal information is protected, it is therefore prevented that personal information is abused.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.

Claims (7)

1. a kind of user based on block chain authorizes and really weighs method, which is characterized in that the method for security protection is specific as follows:
When beginning, personal user logs in APP, and user information is filled in APP, and selection allows APP developer to believe its people Breath is paid or is gratuitously shared with third party, and limits the scope of business that third party uses its personal information, to generate in APP Personal information and associated user's authorization message;
Whether user authorizes:
A. no, authorized user message is not generated, i.e. user disagrees APP developer and userspersonal information is shared with third party;
It b. is to generate authorized user message, i.e., user agrees to or part agrees to that userspersonal information is shared with the by APP developer Tripartite, APP encrypts personal user information and associated user's authorization message at this time;
(3) data encryption: personal information and user are encrypted to the information of the authorization of APP developer by encipheror, are formed and are added Ciphertext data;
(4) go markization: authorized user message obtains information data by digital digest algorithm, i.e. authorized user message is made a summary, It can be retrieved by third party after authorized user message abstract authorization, matching;
(5) region chain stores: after authorized user message goes markization by step (4), using general ledger technology, writing data into one In a total account book that can not be distorted, i.e., stored by region chain technology;
(6) it protects alliance's chain: using the netted alliance's chain technology of multicenter, each account book is stored at least in three or more data On heart node, when a point is tampered with attack, ensures that total account book will not be tampered, increase the fault-tolerance of system.
2. a kind of user based on block chain according to claim 1 authorizes and really weighs method, which is characterized in that described People user or third party are when using data: by personal information digital digest, retrieving data, to use data, need a People user and authorization message matching, and personal user and third party can recall corresponding data block from general ledger, be matched Or analysis.
3. a kind of user based on block chain according to claim 1 authorizes and really weighs method, which is characterized in that the step Suddenly irreversible to data encryption process in (3).
4. a kind of user based on block chain according to claim 1 authorizes and really weighs method, which is characterized in that the step Suddenly the encipheror in the digital digest algorithm in (4) and step (3), which can be used, can be used a variety of digital hash algorithms.
5. a kind of user based on block chain according to claim 1 authorizes and really weighs method, which is characterized in that the step Suddenly authorized user message abstract includes but is not limited to specific digital information, the information content, information source, information storage in (4) Mode, information storage.
6. a kind of user based on block chain according to claim 1 authorizes and really weighs method, which is characterized in that the number Word information includes but is not limited to name, identification card number, DNA, phone, fingerprint, geographical location, behavior portrait.
7. a kind of user's authorization based on block chain according to claim 1 and really weighing method, which is characterized in that described the Tripartite includes but is not limited to: government and government offices, commercial organization, overseas institution, other people.
CN201910699412.1A 2019-07-31 2019-07-31 A kind of user's authorization based on block chain and really weigh method Pending CN110535913A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910699412.1A CN110535913A (en) 2019-07-31 2019-07-31 A kind of user's authorization based on block chain and really weigh method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910699412.1A CN110535913A (en) 2019-07-31 2019-07-31 A kind of user's authorization based on block chain and really weigh method

Publications (1)

Publication Number Publication Date
CN110535913A true CN110535913A (en) 2019-12-03

Family

ID=68660751

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910699412.1A Pending CN110535913A (en) 2019-07-31 2019-07-31 A kind of user's authorization based on block chain and really weigh method

Country Status (1)

Country Link
CN (1) CN110535913A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111815395A (en) * 2020-06-02 2020-10-23 郑州博雅讯科技有限公司 Management method and management device of digital resources and computer equipment
CN111831984A (en) * 2019-04-23 2020-10-27 苏州白杨软件有限公司 Method for determining and verifying digital information property in digital economy
CN112052458A (en) * 2020-07-28 2020-12-08 华控清交信息科技(北京)有限公司 Information processing method, device, equipment and medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107181765A (en) * 2017-07-25 2017-09-19 光载无限(北京)科技有限公司 Network digital identity identifying method based on block chain technology
US20180144153A1 (en) * 2016-11-21 2018-05-24 Adobe Systems Incorporated Providing user control of shared personal information
CN108632284A (en) * 2018-05-10 2018-10-09 网易(杭州)网络有限公司 User data authorization method, medium, device and computing device based on block chain
CN108923908A (en) * 2018-06-25 2018-11-30 百度在线网络技术(北京)有限公司 authorization processing method, device, equipment and storage medium
CN109063426A (en) * 2018-09-20 2018-12-21 新华智云科技有限公司 A kind of copyright based on alliance's block chain deposits card sharing method and system
CN109391611A (en) * 2018-08-17 2019-02-26 深圳壹账通智能科技有限公司 Userspersonal information's encryption and authorization method, device, equipment and readable storage medium storing program for executing
CN109741800A (en) * 2018-12-20 2019-05-10 李秦豫 The method for security protection of medical data intranet and extranet interaction based on block chain technology
CN109961290A (en) * 2017-12-26 2019-07-02 重庆云创科技有限公司 A kind of user information safety management method based on block chain technology
CN109981598A (en) * 2019-03-04 2019-07-05 成都小步创想慧联科技有限公司 Convenient processing method, device and the electronic equipment of personal information

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180144153A1 (en) * 2016-11-21 2018-05-24 Adobe Systems Incorporated Providing user control of shared personal information
CN107181765A (en) * 2017-07-25 2017-09-19 光载无限(北京)科技有限公司 Network digital identity identifying method based on block chain technology
CN109961290A (en) * 2017-12-26 2019-07-02 重庆云创科技有限公司 A kind of user information safety management method based on block chain technology
CN108632284A (en) * 2018-05-10 2018-10-09 网易(杭州)网络有限公司 User data authorization method, medium, device and computing device based on block chain
CN108923908A (en) * 2018-06-25 2018-11-30 百度在线网络技术(北京)有限公司 authorization processing method, device, equipment and storage medium
CN109391611A (en) * 2018-08-17 2019-02-26 深圳壹账通智能科技有限公司 Userspersonal information's encryption and authorization method, device, equipment and readable storage medium storing program for executing
CN109063426A (en) * 2018-09-20 2018-12-21 新华智云科技有限公司 A kind of copyright based on alliance's block chain deposits card sharing method and system
CN109741800A (en) * 2018-12-20 2019-05-10 李秦豫 The method for security protection of medical data intranet and extranet interaction based on block chain technology
CN109981598A (en) * 2019-03-04 2019-07-05 成都小步创想慧联科技有限公司 Convenient processing method, device and the electronic equipment of personal information

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111831984A (en) * 2019-04-23 2020-10-27 苏州白杨软件有限公司 Method for determining and verifying digital information property in digital economy
CN111815395A (en) * 2020-06-02 2020-10-23 郑州博雅讯科技有限公司 Management method and management device of digital resources and computer equipment
CN112052458A (en) * 2020-07-28 2020-12-08 华控清交信息科技(北京)有限公司 Information processing method, device, equipment and medium
CN112052458B (en) * 2020-07-28 2024-02-23 华控清交信息科技(北京)有限公司 Information processing method, device, equipment and medium

Similar Documents

Publication Publication Date Title
Froomkin Metaphor is the key: cryptography, the clipper chip, and the constitution
CN108200079A (en) Block chain method for secret protection and device based on symmetrical and asymmetric Hybrid Encryption
CN110326251A (en) The system and method that the general dispersion solution of user is verified using cross validation feature are provided
CN110535913A (en) A kind of user's authorization based on block chain and really weigh method
KR101923943B1 (en) System and method for remitting crypto currency with enhanced security
Køien et al. Aspects of Personal Privacy in Communications-Problems, Technology and Solutions
Lee et al. A study of the security of Internet banking and financial private information in South Korea
Rotenberg Communications privacy: Implications for network design
Kumar An overview of cyber security in digital banking Sector
CN109087102A (en) Transaction protection robot system based on block chain
Nowroozi et al. Cryptocurrency wallets: assessment and security
WO2020233038A1 (en) Blacklist cloud sharing verification method based on homomorphic encryption, and related apparatus
CN104518870A (en) Encryption type communication safe earphones
Segal China, Encryption Policy, and International Influence
CN106357413A (en) Method for encrypting numbers with fingerprint and mobile terminal
Crowley et al. Protecting corporate intellectual property: Legal and technical approaches
Orr et al. Cryptocurrency and the blockchain: A discussion of forensic needs
Kim US-UK Executive agreement: Case study of incidental collection of data under the CLOUD Act
Ishengoma NFC-Blockchain Based COVID-19 Immunity Certificate: Proposed System and Emerging Issues.
CN105468939B (en) Mobile terminal safety guard system
Islam Protection of privacy in Bangladesh: issues, challenges and way forward
Ndung'u Blockchain as a Solution of Information Security and Data Privacy Issues
Afriyie Exploring Methods Cybersecurity Managers Need to Implement to Minimize Cyber-Frauds in Mobile Money Services in Ghana
Burum et al. Apple v. FBI: Privacy vs. security?
Olanrewaju et al. The impact of mobile information and communication technology on cybercrime in Nigeria

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191203

RJ01 Rejection of invention patent application after publication