CN110535913A - A kind of user's authorization based on block chain and really weigh method - Google Patents
A kind of user's authorization based on block chain and really weigh method Download PDFInfo
- Publication number
- CN110535913A CN110535913A CN201910699412.1A CN201910699412A CN110535913A CN 110535913 A CN110535913 A CN 110535913A CN 201910699412 A CN201910699412 A CN 201910699412A CN 110535913 A CN110535913 A CN 110535913A
- Authority
- CN
- China
- Prior art keywords
- user
- information
- data
- authorization
- app
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of, and the user based on block chain authorizes and really weighs method, and personal user logs in APP, and user information is filled in APP, to generate personal information and associated user's authorization message in APP;User's authorization;It is encrypted by encipheror, forms encryption data;Authorized user message obtains information data by digital digest algorithm;After authorized user message goes markization, using general ledger technology, write data into total account book that one can not distort;Using the netted alliance's chain technology of multicenter, each account book ensures that total account book will not be tampered stored at least on three or more data center's nodes.The present invention is that a technology of the specification is realized with reference to personal information security specification.By by personal authorization message data encryption, go the technologies such as markization, the storage of weak center's block chain, realize and meet the processing method of personal information authorization specified in personal information security specification, protect the safety of personal information, it is therefore prevented that personal information is abused.
Description
Technical field
It is specifically a kind of dominant by user based on block chain technology the present invention relates to personal information security protection technology field
The personal information of oneself is licensed to third party and used by authorization message gatherer, and the safety for digital assets such as personal information is anti-
Shield.
Background technique
With popularizing for smart phone, people are increasingly longer using the time of mobile phone, and personal information uses APP's in people
It is recorded simultaneously by APP, the developer of APP can buy and sell personal information without the agreement of user.Constantly there is personal letter in recent years
Heart leakage, is taken away by illegal company and implements the malfeasances such as swindle, cause severe social influence.Therefore, art technology
Personnel provide a kind of personal information security guard method based on block chain, to solve mentioned above in the background art ask
Topic.
Summary of the invention
The purpose of the present invention is to provide a kind of, and the user based on block chain authorizes and really weighs method, to solve above-mentioned background
The problem of being proposed in technology.
To achieve the above object, the invention provides the following technical scheme:
It is a kind of based on block chain user authorization and really weigh method, the method for security protection is specific as follows:
(1) when starting, personal user logs in APP, and user information is filled in APP, and selection allows APP developer by its people
Information is paid or is gratuitously shared with third party, and limits the scope of business that third party uses its personal information, thus raw in APP
At personal information and associated user's authorization message;
(2) whether user authorizes:
A. no, authorized user message is not generated, i.e. user disagrees APP developer and userspersonal information is shared with third party;
It b. is to generate authorized user message, i.e., user agrees to or part agrees to that userspersonal information is shared with the by APP developer
Tripartite, APP encrypts personal user information and associated user's authorization message at this time;
(3) data encryption: personal information and user are encrypted to the information of the authorization of APP developer by encipheror, are formed and are added
Ciphertext data;
(4) go markization: authorized user message obtains information data by digital digest algorithm, i.e. authorized user message is made a summary,
It can be retrieved by third party after authorized user message abstract authorization, matching;
(5) region chain stores: after authorized user message goes markization by step (4), using general ledger technology, writing data into one
In a total account book that can not be distorted, i.e., stored by region chain technology;
(6) it protects alliance's chain: using the netted alliance's chain technology of multicenter, each account book is stored at least in three or more data
On heart node, when a point is tampered with attack, ensures that total account book will not be tampered, increase the fault-tolerance of system.
As a further solution of the present invention: the personal user or third party are when using data: passing through personal information
Digital digest retrieves data, to use data, needs personal user and authorization message to match, and personal user and third party
Corresponding data block can be recalled from general ledger, matched or analyzed.
As further scheme of the invention: irreversible to data encryption process in the step (3).
As further scheme of the invention: the encryption in digital digest algorithm and step (3) in the step (4)
A variety of digital hash algorithms can be used in program.
As further scheme of the invention: authorized user message abstract includes but is not limited to have in the step (4)
The digital information of body, the information content, information source, information storage means, information storage.
As further scheme of the invention: the digital information includes but is not limited to name, identification card number, DNA, electricity
Words, fingerprint, geographical location, behavior portrait etc..
As further scheme of the invention: the third party includes but is not limited to: government and government offices, business roll into a ball
Body, overseas institution, other people etc..
Compared with prior art, the beneficial effects of the present invention are:
It is authorized the present invention is based on the user of block chain and really weighs method, can effectively guided the third-party institution legitimate and use user
Individual privacy data allow the user You Liao third-party institution to use the right to know of my private data purposes, promote to a certain extent
Problem is weighed really into individual digital assets, prevents APP developer from abusing userspersonal information.The present invention is with reference to personal information
Safety standard is that a technology of the specification is realized.By by personal authorization message data encryption, go markization, area, weak center
The technologies such as block chain storage, realize the processing method for meeting personal information authorization specified in personal information security specification, protect
The safety of personal information, it is therefore prevented that personal information is abused.
Detailed description of the invention
Fig. 1 is the flow diagram of a kind of user's authorization based on block chain and true power method.
Fig. 2 be a kind of user's authorization based on block chain and really in power method data encryption flow diagram.
Fig. 3 removes the flow diagram of markization for a kind of user's authorization based on block chain and really in power method.
Fig. 4 be a kind of user's authorization based on block chain and really in power method block chain functional block diagram.
Fig. 5 be a kind of user's authorization based on block chain and really in power method alliance's chain functional block diagram.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
In the embodiment of the present invention, it is a kind of based on block chain user authorization and really weigh method, as shown in Figure 1, the safety
Guard method is specific as follows:
(1) when starting, personal user logs in APP, and user information is filled in APP, and selection allows APP developer by its people
Information is paid or is gratuitously shared with third party, and limits the scope of business that third party uses its personal information, thus raw in APP
At personal information and associated user's authorization message;
(2) whether user authorizes:
A. no, authorized user message is not generated, i.e. user disagrees APP developer and userspersonal information is shared with third party;
It b. is to generate authorized user message, i.e., user agrees to or part agrees to that userspersonal information is shared with the by APP developer
Tripartite, APP encrypts personal user information and associated user's authorization message at this time;
(3) data encryption: personal information and user are encrypted to the information of the authorization of APP developer by encipheror, are formed and are added
Ciphertext data, as shown in Figure 2;
(4) go markization: authorized user message obtains information data by digital digest algorithm, i.e. authorized user message is made a summary,
It can be retrieved by third party after authorized user message abstract authorization, matching, as shown in Figure 3;
(5) region chain stores: after authorized user message goes markization by step (4), using general ledger technology, writing data into one
In a total account book that can not be distorted, i.e., stored by region chain technology, as shown in Figure 4;
(6) protect alliance's chain: total account book causes loss of data or service disruption, in mostly by malicious attack in order to prevent
The netted alliance's chain technology of the heart, each account book is stored at least on three or more data center's nodes, when a point is tampered with
When attack, ensures that total account book will not be tampered, increase the fault-tolerance of system, as shown in Figure 5.
The personal user or third party are when using data: by personal information digital digest, data are retrieved, to make
With data, personal user and authorization message is needed to match, and personal user and third party can recall corresponding number from general ledger
According to block, is matched or analyzed.
It is irreversible to data encryption process in the step (3).
A variety of digital hash can be used in the encipheror in digital digest algorithm and step (3) in the step (4)
Algorithm, such as hash algorithm.
Authorized user message abstract includes but is not limited to specific digital information, the information content, information in the step (4)
Source, information storage means, information storage.
The digital information includes but is not limited to name, identification card number, DNA, phone, fingerprint, geographical location, behavior portrait
Deng.
The third party includes but is not limited to: government and government offices, commercial organization, overseas institution, other people etc..
It is authorized the present invention is based on the user of block chain and really weighs method, can effectively guide third-party institution's use legitimate
Individual subscriber private data allows the user You Liao third-party institution to use the right to know of my private data purposes, to a certain degree
On promote individual digital assets and weigh problem really, prevent APP developer from abusing userspersonal information.The present invention is with reference to individual
Information security specification is that a technology of the specification is realized.By by personal authorization message data encryption, go markization, it is weak in
The technologies such as heart district block chain storage, realize the processing method for meeting personal information authorization specified in personal information security specification, protect
The safety of personal information is protected, it is therefore prevented that personal information is abused.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its
Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.
Claims (7)
1. a kind of user based on block chain authorizes and really weighs method, which is characterized in that the method for security protection is specific as follows:
When beginning, personal user logs in APP, and user information is filled in APP, and selection allows APP developer to believe its people
Breath is paid or is gratuitously shared with third party, and limits the scope of business that third party uses its personal information, to generate in APP
Personal information and associated user's authorization message;
Whether user authorizes:
A. no, authorized user message is not generated, i.e. user disagrees APP developer and userspersonal information is shared with third party;
It b. is to generate authorized user message, i.e., user agrees to or part agrees to that userspersonal information is shared with the by APP developer
Tripartite, APP encrypts personal user information and associated user's authorization message at this time;
(3) data encryption: personal information and user are encrypted to the information of the authorization of APP developer by encipheror, are formed and are added
Ciphertext data;
(4) go markization: authorized user message obtains information data by digital digest algorithm, i.e. authorized user message is made a summary,
It can be retrieved by third party after authorized user message abstract authorization, matching;
(5) region chain stores: after authorized user message goes markization by step (4), using general ledger technology, writing data into one
In a total account book that can not be distorted, i.e., stored by region chain technology;
(6) it protects alliance's chain: using the netted alliance's chain technology of multicenter, each account book is stored at least in three or more data
On heart node, when a point is tampered with attack, ensures that total account book will not be tampered, increase the fault-tolerance of system.
2. a kind of user based on block chain according to claim 1 authorizes and really weighs method, which is characterized in that described
People user or third party are when using data: by personal information digital digest, retrieving data, to use data, need a
People user and authorization message matching, and personal user and third party can recall corresponding data block from general ledger, be matched
Or analysis.
3. a kind of user based on block chain according to claim 1 authorizes and really weighs method, which is characterized in that the step
Suddenly irreversible to data encryption process in (3).
4. a kind of user based on block chain according to claim 1 authorizes and really weighs method, which is characterized in that the step
Suddenly the encipheror in the digital digest algorithm in (4) and step (3), which can be used, can be used a variety of digital hash algorithms.
5. a kind of user based on block chain according to claim 1 authorizes and really weighs method, which is characterized in that the step
Suddenly authorized user message abstract includes but is not limited to specific digital information, the information content, information source, information storage in (4)
Mode, information storage.
6. a kind of user based on block chain according to claim 1 authorizes and really weighs method, which is characterized in that the number
Word information includes but is not limited to name, identification card number, DNA, phone, fingerprint, geographical location, behavior portrait.
7. a kind of user's authorization based on block chain according to claim 1 and really weighing method, which is characterized in that described the
Tripartite includes but is not limited to: government and government offices, commercial organization, overseas institution, other people.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910699412.1A CN110535913A (en) | 2019-07-31 | 2019-07-31 | A kind of user's authorization based on block chain and really weigh method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910699412.1A CN110535913A (en) | 2019-07-31 | 2019-07-31 | A kind of user's authorization based on block chain and really weigh method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110535913A true CN110535913A (en) | 2019-12-03 |
Family
ID=68660751
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910699412.1A Pending CN110535913A (en) | 2019-07-31 | 2019-07-31 | A kind of user's authorization based on block chain and really weigh method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110535913A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111815395A (en) * | 2020-06-02 | 2020-10-23 | 郑州博雅讯科技有限公司 | Management method and management device of digital resources and computer equipment |
CN111831984A (en) * | 2019-04-23 | 2020-10-27 | 苏州白杨软件有限公司 | Method for determining and verifying digital information property in digital economy |
CN112052458A (en) * | 2020-07-28 | 2020-12-08 | 华控清交信息科技(北京)有限公司 | Information processing method, device, equipment and medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107181765A (en) * | 2017-07-25 | 2017-09-19 | 光载无限(北京)科技有限公司 | Network digital identity identifying method based on block chain technology |
US20180144153A1 (en) * | 2016-11-21 | 2018-05-24 | Adobe Systems Incorporated | Providing user control of shared personal information |
CN108632284A (en) * | 2018-05-10 | 2018-10-09 | 网易(杭州)网络有限公司 | User data authorization method, medium, device and computing device based on block chain |
CN108923908A (en) * | 2018-06-25 | 2018-11-30 | 百度在线网络技术(北京)有限公司 | authorization processing method, device, equipment and storage medium |
CN109063426A (en) * | 2018-09-20 | 2018-12-21 | 新华智云科技有限公司 | A kind of copyright based on alliance's block chain deposits card sharing method and system |
CN109391611A (en) * | 2018-08-17 | 2019-02-26 | 深圳壹账通智能科技有限公司 | Userspersonal information's encryption and authorization method, device, equipment and readable storage medium storing program for executing |
CN109741800A (en) * | 2018-12-20 | 2019-05-10 | 李秦豫 | The method for security protection of medical data intranet and extranet interaction based on block chain technology |
CN109961290A (en) * | 2017-12-26 | 2019-07-02 | 重庆云创科技有限公司 | A kind of user information safety management method based on block chain technology |
CN109981598A (en) * | 2019-03-04 | 2019-07-05 | 成都小步创想慧联科技有限公司 | Convenient processing method, device and the electronic equipment of personal information |
-
2019
- 2019-07-31 CN CN201910699412.1A patent/CN110535913A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180144153A1 (en) * | 2016-11-21 | 2018-05-24 | Adobe Systems Incorporated | Providing user control of shared personal information |
CN107181765A (en) * | 2017-07-25 | 2017-09-19 | 光载无限(北京)科技有限公司 | Network digital identity identifying method based on block chain technology |
CN109961290A (en) * | 2017-12-26 | 2019-07-02 | 重庆云创科技有限公司 | A kind of user information safety management method based on block chain technology |
CN108632284A (en) * | 2018-05-10 | 2018-10-09 | 网易(杭州)网络有限公司 | User data authorization method, medium, device and computing device based on block chain |
CN108923908A (en) * | 2018-06-25 | 2018-11-30 | 百度在线网络技术(北京)有限公司 | authorization processing method, device, equipment and storage medium |
CN109391611A (en) * | 2018-08-17 | 2019-02-26 | 深圳壹账通智能科技有限公司 | Userspersonal information's encryption and authorization method, device, equipment and readable storage medium storing program for executing |
CN109063426A (en) * | 2018-09-20 | 2018-12-21 | 新华智云科技有限公司 | A kind of copyright based on alliance's block chain deposits card sharing method and system |
CN109741800A (en) * | 2018-12-20 | 2019-05-10 | 李秦豫 | The method for security protection of medical data intranet and extranet interaction based on block chain technology |
CN109981598A (en) * | 2019-03-04 | 2019-07-05 | 成都小步创想慧联科技有限公司 | Convenient processing method, device and the electronic equipment of personal information |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111831984A (en) * | 2019-04-23 | 2020-10-27 | 苏州白杨软件有限公司 | Method for determining and verifying digital information property in digital economy |
CN111815395A (en) * | 2020-06-02 | 2020-10-23 | 郑州博雅讯科技有限公司 | Management method and management device of digital resources and computer equipment |
CN112052458A (en) * | 2020-07-28 | 2020-12-08 | 华控清交信息科技(北京)有限公司 | Information processing method, device, equipment and medium |
CN112052458B (en) * | 2020-07-28 | 2024-02-23 | 华控清交信息科技(北京)有限公司 | Information processing method, device, equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Froomkin | Metaphor is the key: cryptography, the clipper chip, and the constitution | |
CN108200079A (en) | Block chain method for secret protection and device based on symmetrical and asymmetric Hybrid Encryption | |
CN110326251A (en) | The system and method that the general dispersion solution of user is verified using cross validation feature are provided | |
CN110535913A (en) | A kind of user's authorization based on block chain and really weigh method | |
KR101923943B1 (en) | System and method for remitting crypto currency with enhanced security | |
Køien et al. | Aspects of Personal Privacy in Communications-Problems, Technology and Solutions | |
Lee et al. | A study of the security of Internet banking and financial private information in South Korea | |
Rotenberg | Communications privacy: Implications for network design | |
Kumar | An overview of cyber security in digital banking Sector | |
CN109087102A (en) | Transaction protection robot system based on block chain | |
Nowroozi et al. | Cryptocurrency wallets: assessment and security | |
WO2020233038A1 (en) | Blacklist cloud sharing verification method based on homomorphic encryption, and related apparatus | |
CN104518870A (en) | Encryption type communication safe earphones | |
Segal | China, Encryption Policy, and International Influence | |
CN106357413A (en) | Method for encrypting numbers with fingerprint and mobile terminal | |
Crowley et al. | Protecting corporate intellectual property: Legal and technical approaches | |
Orr et al. | Cryptocurrency and the blockchain: A discussion of forensic needs | |
Kim | US-UK Executive agreement: Case study of incidental collection of data under the CLOUD Act | |
Ishengoma | NFC-Blockchain Based COVID-19 Immunity Certificate: Proposed System and Emerging Issues. | |
CN105468939B (en) | Mobile terminal safety guard system | |
Islam | Protection of privacy in Bangladesh: issues, challenges and way forward | |
Ndung'u | Blockchain as a Solution of Information Security and Data Privacy Issues | |
Afriyie | Exploring Methods Cybersecurity Managers Need to Implement to Minimize Cyber-Frauds in Mobile Money Services in Ghana | |
Burum et al. | Apple v. FBI: Privacy vs. security? | |
Olanrewaju et al. | The impact of mobile information and communication technology on cybercrime in Nigeria |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191203 |
|
RJ01 | Rejection of invention patent application after publication |