CN111881482B - User identity privacy encryption method based on block chain technology - Google Patents
User identity privacy encryption method based on block chain technology Download PDFInfo
- Publication number
- CN111881482B CN111881482B CN202010778798.8A CN202010778798A CN111881482B CN 111881482 B CN111881482 B CN 111881482B CN 202010778798 A CN202010778798 A CN 202010778798A CN 111881482 B CN111881482 B CN 111881482B
- Authority
- CN
- China
- Prior art keywords
- user
- exclusive
- block chain
- password
- graph
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- Bioethics (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a user identity privacy encryption method based on a block chain technology, which comprises the following steps: storing small figures with different shapes and endowing each small figure with a string of independent short digital codes; combining the short digital codes into a plurality of long digital codes with multi-bit independent digital codes; screening and deleting long digital codes of repeated combinations; combining the corresponding small graphs to form an independent and unique large graph according to the rule of each long digital code; uploading each large graph to a block chain, sending and displaying a user exclusive graph password randomly or appointed according to a protocol, binding the user exclusive graph password with a user identity for encryption, and indicating the user identity by an exclusive graph password record on the block chain. The invention separates the real identity information of the user from the exclusive graph containing the digital code, and the block chain only records the transaction information containing the digital code graph and does not record the real identity information of the user, thereby effectively protecting the privacy of the user under the condition of ensuring the real transaction information.
Description
Technical Field
The invention belongs to the technical field of traceability and anti-counterfeiting, and particularly relates to a user identity privacy encryption method based on a block chain technology.
Background
The block chain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like, is an important concept of the bit currency, is essentially a decentralized database, is simultaneously used as a bottom layer technology of the bit currency, is a series of data blocks which are produced by correlation through a cryptography method, and each data block contains information of a batch of bit currency network transactions and is used for verifying the validity (anti-counterfeiting) of the information and generating the next block.
In the existing traceability system formed by using the block chain and the two-dimensional code, an enterprise or a merchant chains information of a product, manufactures a non-falsifiable product traceability two-dimensional code through decentralized operation, and a user scans the two-dimensional code after purchasing the product, so that object traceability information can be inquired, and anti-counterfeit code information can be inquired. However, the uplink flow of the existing traceability system of the blockchain and the two-dimensional code is unreasonable, so that the traceability operation of a user after purchasing a product is complicated, the traceability interest of the user is reduced, and counterfeit and shoddy products are made to be more and more enjoyable. The incompleteness of the uplink main body of the traceability system of the block chain and the two-dimensional code leads to the fact that the privacy of a user cannot be effectively protected, and particularly in the online shopping field, the inconvenience of the life of the user is easily caused.
Disclosure of Invention
In view of the defects of the prior art, the technical problem to be solved by the present invention is to provide a user identity privacy encryption method based on a block chain technology, which can effectively protect the privacy of the user not only in a decentralized block chain but also in the transportation process of logistics under the condition of ensuring real transaction information.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows:
the user identity privacy encryption method based on the block chain technology comprises the following steps:
storing small figures with different shapes and endowing each small figure with a string of independent short digital codes;
combining the short digital codes into a plurality of long digital codes with multi-bit independent digital codes;
screening and deleting long digital codes of repeated combinations;
combining the corresponding small graphs to form an independent and unique large graph according to the rule of each long digital code;
uploading each large graph to a block chain, sending and displaying a user exclusive graph password randomly or appointed according to a protocol, binding the user exclusive graph password with a user identity for encryption, and indicating the user identity by an exclusive graph password record on the block chain.
Preferably, the short number corresponding to each small pattern is encoded as a 4-bit string and the long number corresponding to each large pattern is encoded as a 48-bit string.
Preferably, the unique graphic code is disposed in a coating on the subject matter wrapper or is disposed within the subject matter wrapper in a display on a carrier.
Preferably, after the exclusive graphic password is determined to be selected, the exclusive graphic password is not selected any more, and the unique relevance of the exclusive graphic password is ensured.
Preferably, the user purchases and retains 1-3 exclusive graphic passwords, but only one exclusive graphic password can be used as an exclusive online virtual identity for each product purchase.
Preferably, when the transaction is generated, the exclusive graphic password and the initial tracing two-dimensional code of the object are combined to form a brand-new object tracing two-dimensional code, and the brand-new object tracing two-dimensional code is linked.
Compared with the prior art, the invention has the following beneficial effects:
the invention separates the real identity information of the user from the exclusive graph containing the digital code, the block chain only records the transaction information containing the digital code graph, and does not record the real identity information of the user, and under the condition of ensuring the real transaction information, the privacy of the user can be effectively protected not only in the decentralized block chain, but also in the logistics transportation process.
Detailed Description
The embodiment provides a user identity privacy encryption method based on a block chain technology, which comprises the following steps: i, storing small figures with different shapes and endowing each small figure with a string of independent short digital codes; II, combining the short digital codes into a plurality of long digital codes with multi-bit independent digital codes; III, screening and deleting long digital codes of repeated combinations; IV, combining the corresponding small graphs to form an independent and unique large graph according to the rule of each long digital code; and V, uploading each large graph to a block chain, sending and displaying a special graph password of the user randomly or appointed according to a protocol, binding the special graph password with the user identity for encryption, and indicating the user identity by a special graph password record on the block chain.
In the step i, the block chain anti-counterfeiting traceability platform firstly entrusts a designer to design a plurality of small figures with different shapes, inputs the small figures into the block chain anti-counterfeiting traceability platform, then sets a string of independent short digital codes for each small figure through the block chain anti-counterfeiting traceability platform, the string of independent short digital codes is generally a 4-bit string (for example, the small figure 1 corresponds to 0237), one short digital code corresponds to 1 small figure and corresponds to one without repetition, and then stores the small figure and the corresponding short digital code thereof in the block chain anti-counterfeiting traceability platform.
In the step ii, the independent short digital codes are combined into a long digital code with multi-bit independent digital codes according to a certain rule through the block chain anti-counterfeiting traceability platform, which is generally a 48-bit string.
In the step iii, the block chain anti-counterfeiting traceability platform deletes the repeated long digital codes through the screening and deleting mechanism of the program, so as to ensure that the repeated long digital codes are not repeated. The screening and deleting procedures are prior art and will not be described herein.
In the step iv, the block chain anti-counterfeiting traceability platform calls the corresponding small graphs from the database according to the rule of the long digital code, and then combines to form an independent and unique large graph, that is, the large graph integrates a plurality of small graphs in one graph, and each small graph is distributed in the designated area of the large graph.
In the step v, the user may upload the identity information and register a member through the block chain anti-counterfeiting tracing platform, and then select to purchase the exclusive graphic password according to a protocol, such as a purchase protocol, and may purchase and reserve 1 to 3 exclusive graphic passwords, but only one exclusive graphic password may be used as an exclusive online virtual identity certificate when purchasing a product each time. In addition, the exclusive graphic password can also be randomly generated by the block chain anti-counterfeiting tracing platform and sent to the user for display. And after the exclusive graphic password is determined to be selected, the block chain anti-counterfeiting tracing platform carries out binding encryption processing on the exclusive graphic password and the user identity, and the exclusive graphic password is not selected any more, so that the unique relevance of the exclusive graphic password is ensured.
When a user purchases a product, the block chain anti-counterfeiting traceability platform combines a large graph containing a long digital code with an initial traceability two-dimensional code of a commodity to form a brand-new subject matter traceability two-dimensional code, the brand-new subject matter traceability two-dimensional code is linked and then sent to a merchant for display, the brand-new subject matter traceability two-dimensional code is used by the merchant on the commodity leaving a factory, and the brand-new subject matter traceability two-dimensional code is represented as a string of 80-bit character long codes on the background. The use mode can be directly printed on the surface of a commodity or the surface of a commodity package, so that a user can conveniently scan codes after receiving the commodity to perform source tracing inquiry and anti-counterfeiting inquiry, judge the source and authenticity of the commodity, and cannot directly see identity information of the user after scanning, but the user can only read the corresponding unique associated exclusive graphic password.
The exclusive graphic password is sent to the merchant when a brand-new object tracing two-dimensional code is sent, the exclusive graphic password is arranged on the commodity package in a coating mode by the merchant, the exclusive graphic password is displayed by scraping the coating after the commodity is received, and the user can visually judge whether the product is purchased according to the exclusive graphic password. In addition, the special graphic password can be arranged in the commodity package in a mode of being displayed on a carrier, such as a hang tag.
While there have been shown and described what are at present considered the fundamental principles and essential features of the invention and its advantages, it will be understood by those skilled in the art that the invention is not limited by the embodiments described above, which are merely illustrative of the principles of the invention, but that various changes and modifications may be made therein without departing from the spirit and scope of the invention as defined by the appended claims and their equivalents.
Claims (6)
1. A user identity privacy encryption method based on a block chain technology is characterized by comprising the following steps:
storing small figures with different shapes and endowing each small figure with a string of independent short digital codes;
combining the short digital codes into a plurality of long digital codes with multi-bit independent digital codes;
screening and deleting long digital codes of repeated combinations;
combining the corresponding small graphs to form independent and unique large graphs according to the rule of each long digital code;
uploading each large graph to a block chain, sending and displaying a user exclusive graph password randomly or appointed according to a protocol, binding the user exclusive graph password with a user identity for encryption, and indicating the user identity by an exclusive graph password record on the block chain.
2. The method of claim 1, wherein the short number corresponding to each small graphic is encoded as a 4-bit string and the long number corresponding to each large graphic is encoded as a 48-bit string.
3. The method of claim 1, wherein the unique graphical code is disposed on the subject packaging article in a coating or is disposed within the subject packaging article in a display on a carrier.
4. The method as claimed in claim 1, wherein the exclusive graphic password is no longer selected after the exclusive graphic password is determined to be selected, thereby ensuring the unique association of the exclusive graphic password.
5. The method as claimed in claim 4, wherein the user purchases and retains 1-3 exclusive graphical passwords, but only one exclusive graphical password is used as the exclusive virtual identity certificate on the network each time the user purchases the product.
6. The method of claim 1, wherein the private encryption method for user identity based on blockchain technology is further characterized in that a completely new tracing two-dimensional code of the object is formed by combining the dedicated graphic password and the initial tracing two-dimensional code of the object during transaction generation and chaining.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010778798.8A CN111881482B (en) | 2020-08-05 | 2020-08-05 | User identity privacy encryption method based on block chain technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010778798.8A CN111881482B (en) | 2020-08-05 | 2020-08-05 | User identity privacy encryption method based on block chain technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111881482A CN111881482A (en) | 2020-11-03 |
CN111881482B true CN111881482B (en) | 2023-03-28 |
Family
ID=73210839
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010778798.8A Active CN111881482B (en) | 2020-08-05 | 2020-08-05 | User identity privacy encryption method based on block chain technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111881482B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113064563A (en) * | 2021-04-12 | 2021-07-02 | 黄灿楠 | Printing method based on block chain |
CN113064562A (en) * | 2021-04-12 | 2021-07-02 | 黄灿楠 | Man-machine interaction printing method and system based on block chain |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015070562A1 (en) * | 2013-11-13 | 2015-05-21 | 华为技术有限公司 | Data management method and device |
CN108629164A (en) * | 2018-05-08 | 2018-10-09 | 西安华信宇诚信息科技有限责任公司 | The generation method for encrypting the page and the retroactive method after encryption page leakage |
US10102526B1 (en) * | 2017-03-31 | 2018-10-16 | Vijay K. Madisetti | Method and system for blockchain-based combined identity, ownership, integrity and custody management |
CN109712210A (en) * | 2018-12-17 | 2019-05-03 | 重庆长安汽车股份有限公司 | Image generation method based on block chain |
CN109845220A (en) * | 2016-09-30 | 2019-06-04 | 因特鲁斯特公司 | For providing the method and apparatus of block chain participant's identity binding |
WO2019164170A1 (en) * | 2018-02-22 | 2019-08-29 | ㈜티비스톰 | Product distribution and distribution history inquiry and management platform using blockchain |
CN110490604A (en) * | 2018-05-11 | 2019-11-22 | 陈小荣 | A kind of drinks of drinking based on data-link are traced to the source anti-counterfeiting information system and method |
CN110532323A (en) * | 2019-09-02 | 2019-12-03 | 腾讯科技(深圳)有限公司 | Pupilage information processing method, device, electronic equipment and storage medium in block chain network |
CN110866464A (en) * | 2019-10-29 | 2020-03-06 | 上海躲猫猫信息技术有限公司 | Commodity traceability anti-counterfeiting method and system based on texture partition |
CN111080185A (en) * | 2019-10-29 | 2020-04-28 | 长安大学 | Privacy protection express delivery and pickup system and method based on intelligent contract |
WO2020088109A1 (en) * | 2018-10-31 | 2020-05-07 | 阿里巴巴集团控股有限公司 | Blockchain-based private transactions and usage method and apparatus therefor |
CN111414429A (en) * | 2020-04-24 | 2020-07-14 | 远光软件股份有限公司 | Commodity information management method based on block chain, electronic device and storage medium |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7522751B2 (en) * | 2005-04-22 | 2009-04-21 | Daon Holdings Limited | System and method for protecting the privacy and security of stored biometric data |
US9635053B2 (en) * | 2013-02-21 | 2017-04-25 | Samsung Electronics Co., Ltd. | Computing system with protocol protection mechanism and method of operation thereof |
FR3058292B1 (en) * | 2016-10-31 | 2019-01-25 | Idemia Identity And Security | METHOD FOR PROVIDING SERVICE TO A USER |
US10965668B2 (en) * | 2017-04-27 | 2021-03-30 | Acuant, Inc. | Systems and methods to authenticate users and/or control access made by users based on enhanced digital identity verification |
US10742424B2 (en) * | 2018-08-29 | 2020-08-11 | International Business Machines Corporation | Trusted identity solution using blockchain |
-
2020
- 2020-08-05 CN CN202010778798.8A patent/CN111881482B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015070562A1 (en) * | 2013-11-13 | 2015-05-21 | 华为技术有限公司 | Data management method and device |
CN109845220A (en) * | 2016-09-30 | 2019-06-04 | 因特鲁斯特公司 | For providing the method and apparatus of block chain participant's identity binding |
US10102526B1 (en) * | 2017-03-31 | 2018-10-16 | Vijay K. Madisetti | Method and system for blockchain-based combined identity, ownership, integrity and custody management |
WO2019164170A1 (en) * | 2018-02-22 | 2019-08-29 | ㈜티비스톰 | Product distribution and distribution history inquiry and management platform using blockchain |
CN108629164A (en) * | 2018-05-08 | 2018-10-09 | 西安华信宇诚信息科技有限责任公司 | The generation method for encrypting the page and the retroactive method after encryption page leakage |
CN110490604A (en) * | 2018-05-11 | 2019-11-22 | 陈小荣 | A kind of drinks of drinking based on data-link are traced to the source anti-counterfeiting information system and method |
WO2020088109A1 (en) * | 2018-10-31 | 2020-05-07 | 阿里巴巴集团控股有限公司 | Blockchain-based private transactions and usage method and apparatus therefor |
CN109712210A (en) * | 2018-12-17 | 2019-05-03 | 重庆长安汽车股份有限公司 | Image generation method based on block chain |
CN110532323A (en) * | 2019-09-02 | 2019-12-03 | 腾讯科技(深圳)有限公司 | Pupilage information processing method, device, electronic equipment and storage medium in block chain network |
CN110866464A (en) * | 2019-10-29 | 2020-03-06 | 上海躲猫猫信息技术有限公司 | Commodity traceability anti-counterfeiting method and system based on texture partition |
CN111080185A (en) * | 2019-10-29 | 2020-04-28 | 长安大学 | Privacy protection express delivery and pickup system and method based on intelligent contract |
CN111414429A (en) * | 2020-04-24 | 2020-07-14 | 远光软件股份有限公司 | Commodity information management method based on block chain, electronic device and storage medium |
Non-Patent Citations (4)
Title |
---|
娄豪 ; 李晓东 ; 刘晶 ; 金鑫 ; .物流用户隐私信息保护系统.北京电子科技学院学报.2019,(04),第18-25页. * |
李凌 ; 李京 ; 徐琳 ; 王维维 ; .一种云计算环境中用户身份信息隐私保护方法.中国科学院研究生院学报.2013,(01),第101-108页. * |
翟社平 ; 陈思吉 ; 汪一景 ; .基于区块链的数字版权存证系统模型研究.计算机工程与应用.2020,(第19期),第18-26页. * |
许继平 ; 孙鹏程 ; 张新 ; 王小艺 ; 孔建磊 ; 赵峙尧 ; .基于区块链的粮油食品全供应链信息安全管理原型系统.农业机械学报.2020,(第02期),第348-356页. * |
Also Published As
Publication number | Publication date |
---|---|
CN111881482A (en) | 2020-11-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109345264B (en) | Wine product traceability anti-counterfeiting system and method based on block chain | |
CN108595980B (en) | Method and device for protecting commodity traceability information | |
US8245927B2 (en) | Method and system for deterring product counterfeiting, diversion and piracy | |
US20160098730A1 (en) | System and Method for Block-Chain Verification of Goods | |
WO2018107683A1 (en) | Method and device for preventing counterfeit and inferior merchandise from entering circulation field | |
CN104854642A (en) | Method and apparatus for marking manufactured items using physical characteristic | |
CN111881482B (en) | User identity privacy encryption method based on block chain technology | |
CN107292629A (en) | Anti-counterfeit tracking verification method based on block chain and the device using this method | |
JP5260795B2 (en) | Product distribution management method via the Internet | |
CN107506816A (en) | The method of two-dimension code label, commodity counterfeit prevention code label and commodity counterfeit prevention analysis | |
CN102007508A (en) | Goods processing method | |
CN105981061A (en) | Method and system for verifying of the authenticity of a consumer product | |
CN106940858A (en) | A kind of commodity tracking based on computer cloud platform | |
CN104182866A (en) | Product or object anti-counterfeiting system and method suitable for situations, such as switch transaction and the like | |
CN101553827A (en) | Marking processing system for article management code, code judging system, article management system, method for marking article management code, code judging method and information displaying object | |
CN108629603B (en) | Commodity anti-counterfeiting method based on two-dimensional code | |
CN110310130A (en) | A kind of method for anti-counterfeit and system | |
CN107644343A (en) | Article anti-counterfeit detection method and device based on Quick Response Code | |
CN113383332A (en) | Method for ensuring the authenticity and validity of the transfer of ownership of an item | |
CN109919280A (en) | Antiforge electronic code label, commodity and method for anti-counterfeit with Antiforge electronic code | |
CN111882335B (en) | Block chain-based target anti-counterfeiting tracing method and device | |
CN111242644A (en) | Commodity anti-counterfeiting and circulation management method, system and platform based on block chain | |
CN115409453A (en) | Commodity transaction data processing method and system based on online and offline combination | |
WO2015140643A2 (en) | Rfid based anti-counterfeiting, distribution enhancement and customer analysis system | |
Muzafar et al. | Counterfeit protection in supplychain using blockchain: A review |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |