CN111881482B - User identity privacy encryption method based on block chain technology - Google Patents

User identity privacy encryption method based on block chain technology Download PDF

Info

Publication number
CN111881482B
CN111881482B CN202010778798.8A CN202010778798A CN111881482B CN 111881482 B CN111881482 B CN 111881482B CN 202010778798 A CN202010778798 A CN 202010778798A CN 111881482 B CN111881482 B CN 111881482B
Authority
CN
China
Prior art keywords
user
exclusive
block chain
password
graph
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010778798.8A
Other languages
Chinese (zh)
Other versions
CN111881482A (en
Inventor
黄灿楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010778798.8A priority Critical patent/CN111881482B/en
Publication of CN111881482A publication Critical patent/CN111881482A/en
Application granted granted Critical
Publication of CN111881482B publication Critical patent/CN111881482B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a user identity privacy encryption method based on a block chain technology, which comprises the following steps: storing small figures with different shapes and endowing each small figure with a string of independent short digital codes; combining the short digital codes into a plurality of long digital codes with multi-bit independent digital codes; screening and deleting long digital codes of repeated combinations; combining the corresponding small graphs to form an independent and unique large graph according to the rule of each long digital code; uploading each large graph to a block chain, sending and displaying a user exclusive graph password randomly or appointed according to a protocol, binding the user exclusive graph password with a user identity for encryption, and indicating the user identity by an exclusive graph password record on the block chain. The invention separates the real identity information of the user from the exclusive graph containing the digital code, and the block chain only records the transaction information containing the digital code graph and does not record the real identity information of the user, thereby effectively protecting the privacy of the user under the condition of ensuring the real transaction information.

Description

User identity privacy encryption method based on block chain technology
Technical Field
The invention belongs to the technical field of traceability and anti-counterfeiting, and particularly relates to a user identity privacy encryption method based on a block chain technology.
Background
The block chain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like, is an important concept of the bit currency, is essentially a decentralized database, is simultaneously used as a bottom layer technology of the bit currency, is a series of data blocks which are produced by correlation through a cryptography method, and each data block contains information of a batch of bit currency network transactions and is used for verifying the validity (anti-counterfeiting) of the information and generating the next block.
In the existing traceability system formed by using the block chain and the two-dimensional code, an enterprise or a merchant chains information of a product, manufactures a non-falsifiable product traceability two-dimensional code through decentralized operation, and a user scans the two-dimensional code after purchasing the product, so that object traceability information can be inquired, and anti-counterfeit code information can be inquired. However, the uplink flow of the existing traceability system of the blockchain and the two-dimensional code is unreasonable, so that the traceability operation of a user after purchasing a product is complicated, the traceability interest of the user is reduced, and counterfeit and shoddy products are made to be more and more enjoyable. The incompleteness of the uplink main body of the traceability system of the block chain and the two-dimensional code leads to the fact that the privacy of a user cannot be effectively protected, and particularly in the online shopping field, the inconvenience of the life of the user is easily caused.
Disclosure of Invention
In view of the defects of the prior art, the technical problem to be solved by the present invention is to provide a user identity privacy encryption method based on a block chain technology, which can effectively protect the privacy of the user not only in a decentralized block chain but also in the transportation process of logistics under the condition of ensuring real transaction information.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows:
the user identity privacy encryption method based on the block chain technology comprises the following steps:
storing small figures with different shapes and endowing each small figure with a string of independent short digital codes;
combining the short digital codes into a plurality of long digital codes with multi-bit independent digital codes;
screening and deleting long digital codes of repeated combinations;
combining the corresponding small graphs to form an independent and unique large graph according to the rule of each long digital code;
uploading each large graph to a block chain, sending and displaying a user exclusive graph password randomly or appointed according to a protocol, binding the user exclusive graph password with a user identity for encryption, and indicating the user identity by an exclusive graph password record on the block chain.
Preferably, the short number corresponding to each small pattern is encoded as a 4-bit string and the long number corresponding to each large pattern is encoded as a 48-bit string.
Preferably, the unique graphic code is disposed in a coating on the subject matter wrapper or is disposed within the subject matter wrapper in a display on a carrier.
Preferably, after the exclusive graphic password is determined to be selected, the exclusive graphic password is not selected any more, and the unique relevance of the exclusive graphic password is ensured.
Preferably, the user purchases and retains 1-3 exclusive graphic passwords, but only one exclusive graphic password can be used as an exclusive online virtual identity for each product purchase.
Preferably, when the transaction is generated, the exclusive graphic password and the initial tracing two-dimensional code of the object are combined to form a brand-new object tracing two-dimensional code, and the brand-new object tracing two-dimensional code is linked.
Compared with the prior art, the invention has the following beneficial effects:
the invention separates the real identity information of the user from the exclusive graph containing the digital code, the block chain only records the transaction information containing the digital code graph, and does not record the real identity information of the user, and under the condition of ensuring the real transaction information, the privacy of the user can be effectively protected not only in the decentralized block chain, but also in the logistics transportation process.
Detailed Description
The embodiment provides a user identity privacy encryption method based on a block chain technology, which comprises the following steps: i, storing small figures with different shapes and endowing each small figure with a string of independent short digital codes; II, combining the short digital codes into a plurality of long digital codes with multi-bit independent digital codes; III, screening and deleting long digital codes of repeated combinations; IV, combining the corresponding small graphs to form an independent and unique large graph according to the rule of each long digital code; and V, uploading each large graph to a block chain, sending and displaying a special graph password of the user randomly or appointed according to a protocol, binding the special graph password with the user identity for encryption, and indicating the user identity by a special graph password record on the block chain.
In the step i, the block chain anti-counterfeiting traceability platform firstly entrusts a designer to design a plurality of small figures with different shapes, inputs the small figures into the block chain anti-counterfeiting traceability platform, then sets a string of independent short digital codes for each small figure through the block chain anti-counterfeiting traceability platform, the string of independent short digital codes is generally a 4-bit string (for example, the small figure 1 corresponds to 0237), one short digital code corresponds to 1 small figure and corresponds to one without repetition, and then stores the small figure and the corresponding short digital code thereof in the block chain anti-counterfeiting traceability platform.
In the step ii, the independent short digital codes are combined into a long digital code with multi-bit independent digital codes according to a certain rule through the block chain anti-counterfeiting traceability platform, which is generally a 48-bit string.
In the step iii, the block chain anti-counterfeiting traceability platform deletes the repeated long digital codes through the screening and deleting mechanism of the program, so as to ensure that the repeated long digital codes are not repeated. The screening and deleting procedures are prior art and will not be described herein.
In the step iv, the block chain anti-counterfeiting traceability platform calls the corresponding small graphs from the database according to the rule of the long digital code, and then combines to form an independent and unique large graph, that is, the large graph integrates a plurality of small graphs in one graph, and each small graph is distributed in the designated area of the large graph.
In the step v, the user may upload the identity information and register a member through the block chain anti-counterfeiting tracing platform, and then select to purchase the exclusive graphic password according to a protocol, such as a purchase protocol, and may purchase and reserve 1 to 3 exclusive graphic passwords, but only one exclusive graphic password may be used as an exclusive online virtual identity certificate when purchasing a product each time. In addition, the exclusive graphic password can also be randomly generated by the block chain anti-counterfeiting tracing platform and sent to the user for display. And after the exclusive graphic password is determined to be selected, the block chain anti-counterfeiting tracing platform carries out binding encryption processing on the exclusive graphic password and the user identity, and the exclusive graphic password is not selected any more, so that the unique relevance of the exclusive graphic password is ensured.
When a user purchases a product, the block chain anti-counterfeiting traceability platform combines a large graph containing a long digital code with an initial traceability two-dimensional code of a commodity to form a brand-new subject matter traceability two-dimensional code, the brand-new subject matter traceability two-dimensional code is linked and then sent to a merchant for display, the brand-new subject matter traceability two-dimensional code is used by the merchant on the commodity leaving a factory, and the brand-new subject matter traceability two-dimensional code is represented as a string of 80-bit character long codes on the background. The use mode can be directly printed on the surface of a commodity or the surface of a commodity package, so that a user can conveniently scan codes after receiving the commodity to perform source tracing inquiry and anti-counterfeiting inquiry, judge the source and authenticity of the commodity, and cannot directly see identity information of the user after scanning, but the user can only read the corresponding unique associated exclusive graphic password.
The exclusive graphic password is sent to the merchant when a brand-new object tracing two-dimensional code is sent, the exclusive graphic password is arranged on the commodity package in a coating mode by the merchant, the exclusive graphic password is displayed by scraping the coating after the commodity is received, and the user can visually judge whether the product is purchased according to the exclusive graphic password. In addition, the special graphic password can be arranged in the commodity package in a mode of being displayed on a carrier, such as a hang tag.
While there have been shown and described what are at present considered the fundamental principles and essential features of the invention and its advantages, it will be understood by those skilled in the art that the invention is not limited by the embodiments described above, which are merely illustrative of the principles of the invention, but that various changes and modifications may be made therein without departing from the spirit and scope of the invention as defined by the appended claims and their equivalents.

Claims (6)

1. A user identity privacy encryption method based on a block chain technology is characterized by comprising the following steps:
storing small figures with different shapes and endowing each small figure with a string of independent short digital codes;
combining the short digital codes into a plurality of long digital codes with multi-bit independent digital codes;
screening and deleting long digital codes of repeated combinations;
combining the corresponding small graphs to form independent and unique large graphs according to the rule of each long digital code;
uploading each large graph to a block chain, sending and displaying a user exclusive graph password randomly or appointed according to a protocol, binding the user exclusive graph password with a user identity for encryption, and indicating the user identity by an exclusive graph password record on the block chain.
2. The method of claim 1, wherein the short number corresponding to each small graphic is encoded as a 4-bit string and the long number corresponding to each large graphic is encoded as a 48-bit string.
3. The method of claim 1, wherein the unique graphical code is disposed on the subject packaging article in a coating or is disposed within the subject packaging article in a display on a carrier.
4. The method as claimed in claim 1, wherein the exclusive graphic password is no longer selected after the exclusive graphic password is determined to be selected, thereby ensuring the unique association of the exclusive graphic password.
5. The method as claimed in claim 4, wherein the user purchases and retains 1-3 exclusive graphical passwords, but only one exclusive graphical password is used as the exclusive virtual identity certificate on the network each time the user purchases the product.
6. The method of claim 1, wherein the private encryption method for user identity based on blockchain technology is further characterized in that a completely new tracing two-dimensional code of the object is formed by combining the dedicated graphic password and the initial tracing two-dimensional code of the object during transaction generation and chaining.
CN202010778798.8A 2020-08-05 2020-08-05 User identity privacy encryption method based on block chain technology Active CN111881482B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010778798.8A CN111881482B (en) 2020-08-05 2020-08-05 User identity privacy encryption method based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010778798.8A CN111881482B (en) 2020-08-05 2020-08-05 User identity privacy encryption method based on block chain technology

Publications (2)

Publication Number Publication Date
CN111881482A CN111881482A (en) 2020-11-03
CN111881482B true CN111881482B (en) 2023-03-28

Family

ID=73210839

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010778798.8A Active CN111881482B (en) 2020-08-05 2020-08-05 User identity privacy encryption method based on block chain technology

Country Status (1)

Country Link
CN (1) CN111881482B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113064563A (en) * 2021-04-12 2021-07-02 黄灿楠 Printing method based on block chain
CN113064562A (en) * 2021-04-12 2021-07-02 黄灿楠 Man-machine interaction printing method and system based on block chain

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015070562A1 (en) * 2013-11-13 2015-05-21 华为技术有限公司 Data management method and device
CN108629164A (en) * 2018-05-08 2018-10-09 西安华信宇诚信息科技有限责任公司 The generation method for encrypting the page and the retroactive method after encryption page leakage
US10102526B1 (en) * 2017-03-31 2018-10-16 Vijay K. Madisetti Method and system for blockchain-based combined identity, ownership, integrity and custody management
CN109712210A (en) * 2018-12-17 2019-05-03 重庆长安汽车股份有限公司 Image generation method based on block chain
CN109845220A (en) * 2016-09-30 2019-06-04 因特鲁斯特公司 For providing the method and apparatus of block chain participant's identity binding
WO2019164170A1 (en) * 2018-02-22 2019-08-29 ㈜티비스톰 Product distribution and distribution history inquiry and management platform using blockchain
CN110490604A (en) * 2018-05-11 2019-11-22 陈小荣 A kind of drinks of drinking based on data-link are traced to the source anti-counterfeiting information system and method
CN110532323A (en) * 2019-09-02 2019-12-03 腾讯科技(深圳)有限公司 Pupilage information processing method, device, electronic equipment and storage medium in block chain network
CN110866464A (en) * 2019-10-29 2020-03-06 上海躲猫猫信息技术有限公司 Commodity traceability anti-counterfeiting method and system based on texture partition
CN111080185A (en) * 2019-10-29 2020-04-28 长安大学 Privacy protection express delivery and pickup system and method based on intelligent contract
WO2020088109A1 (en) * 2018-10-31 2020-05-07 阿里巴巴集团控股有限公司 Blockchain-based private transactions and usage method and apparatus therefor
CN111414429A (en) * 2020-04-24 2020-07-14 远光软件股份有限公司 Commodity information management method based on block chain, electronic device and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7522751B2 (en) * 2005-04-22 2009-04-21 Daon Holdings Limited System and method for protecting the privacy and security of stored biometric data
US9635053B2 (en) * 2013-02-21 2017-04-25 Samsung Electronics Co., Ltd. Computing system with protocol protection mechanism and method of operation thereof
FR3058292B1 (en) * 2016-10-31 2019-01-25 Idemia Identity And Security METHOD FOR PROVIDING SERVICE TO A USER
US10965668B2 (en) * 2017-04-27 2021-03-30 Acuant, Inc. Systems and methods to authenticate users and/or control access made by users based on enhanced digital identity verification
US10742424B2 (en) * 2018-08-29 2020-08-11 International Business Machines Corporation Trusted identity solution using blockchain

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015070562A1 (en) * 2013-11-13 2015-05-21 华为技术有限公司 Data management method and device
CN109845220A (en) * 2016-09-30 2019-06-04 因特鲁斯特公司 For providing the method and apparatus of block chain participant's identity binding
US10102526B1 (en) * 2017-03-31 2018-10-16 Vijay K. Madisetti Method and system for blockchain-based combined identity, ownership, integrity and custody management
WO2019164170A1 (en) * 2018-02-22 2019-08-29 ㈜티비스톰 Product distribution and distribution history inquiry and management platform using blockchain
CN108629164A (en) * 2018-05-08 2018-10-09 西安华信宇诚信息科技有限责任公司 The generation method for encrypting the page and the retroactive method after encryption page leakage
CN110490604A (en) * 2018-05-11 2019-11-22 陈小荣 A kind of drinks of drinking based on data-link are traced to the source anti-counterfeiting information system and method
WO2020088109A1 (en) * 2018-10-31 2020-05-07 阿里巴巴集团控股有限公司 Blockchain-based private transactions and usage method and apparatus therefor
CN109712210A (en) * 2018-12-17 2019-05-03 重庆长安汽车股份有限公司 Image generation method based on block chain
CN110532323A (en) * 2019-09-02 2019-12-03 腾讯科技(深圳)有限公司 Pupilage information processing method, device, electronic equipment and storage medium in block chain network
CN110866464A (en) * 2019-10-29 2020-03-06 上海躲猫猫信息技术有限公司 Commodity traceability anti-counterfeiting method and system based on texture partition
CN111080185A (en) * 2019-10-29 2020-04-28 长安大学 Privacy protection express delivery and pickup system and method based on intelligent contract
CN111414429A (en) * 2020-04-24 2020-07-14 远光软件股份有限公司 Commodity information management method based on block chain, electronic device and storage medium

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
娄豪 ; 李晓东 ; 刘晶 ; 金鑫 ; .物流用户隐私信息保护系统.北京电子科技学院学报.2019,(04),第18-25页. *
李凌 ; 李京 ; 徐琳 ; 王维维 ; .一种云计算环境中用户身份信息隐私保护方法.中国科学院研究生院学报.2013,(01),第101-108页. *
翟社平 ; 陈思吉 ; 汪一景 ; .基于区块链的数字版权存证系统模型研究.计算机工程与应用.2020,(第19期),第18-26页. *
许继平 ; 孙鹏程 ; 张新 ; 王小艺 ; 孔建磊 ; 赵峙尧 ; .基于区块链的粮油食品全供应链信息安全管理原型系统.农业机械学报.2020,(第02期),第348-356页. *

Also Published As

Publication number Publication date
CN111881482A (en) 2020-11-03

Similar Documents

Publication Publication Date Title
CN109345264B (en) Wine product traceability anti-counterfeiting system and method based on block chain
CN108595980B (en) Method and device for protecting commodity traceability information
US8245927B2 (en) Method and system for deterring product counterfeiting, diversion and piracy
US20160098730A1 (en) System and Method for Block-Chain Verification of Goods
WO2018107683A1 (en) Method and device for preventing counterfeit and inferior merchandise from entering circulation field
CN104854642A (en) Method and apparatus for marking manufactured items using physical characteristic
CN111881482B (en) User identity privacy encryption method based on block chain technology
CN107292629A (en) Anti-counterfeit tracking verification method based on block chain and the device using this method
JP5260795B2 (en) Product distribution management method via the Internet
CN107506816A (en) The method of two-dimension code label, commodity counterfeit prevention code label and commodity counterfeit prevention analysis
CN102007508A (en) Goods processing method
CN105981061A (en) Method and system for verifying of the authenticity of a consumer product
CN106940858A (en) A kind of commodity tracking based on computer cloud platform
CN104182866A (en) Product or object anti-counterfeiting system and method suitable for situations, such as switch transaction and the like
CN101553827A (en) Marking processing system for article management code, code judging system, article management system, method for marking article management code, code judging method and information displaying object
CN108629603B (en) Commodity anti-counterfeiting method based on two-dimensional code
CN110310130A (en) A kind of method for anti-counterfeit and system
CN107644343A (en) Article anti-counterfeit detection method and device based on Quick Response Code
CN113383332A (en) Method for ensuring the authenticity and validity of the transfer of ownership of an item
CN109919280A (en) Antiforge electronic code label, commodity and method for anti-counterfeit with Antiforge electronic code
CN111882335B (en) Block chain-based target anti-counterfeiting tracing method and device
CN111242644A (en) Commodity anti-counterfeiting and circulation management method, system and platform based on block chain
CN115409453A (en) Commodity transaction data processing method and system based on online and offline combination
WO2015140643A2 (en) Rfid based anti-counterfeiting, distribution enhancement and customer analysis system
Muzafar et al. Counterfeit protection in supplychain using blockchain: A review

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant