WO2019062511A1 - 一种基于加密的数据确权方法及系统 - Google Patents

一种基于加密的数据确权方法及系统 Download PDF

Info

Publication number
WO2019062511A1
WO2019062511A1 PCT/CN2018/104340 CN2018104340W WO2019062511A1 WO 2019062511 A1 WO2019062511 A1 WO 2019062511A1 CN 2018104340 W CN2018104340 W CN 2018104340W WO 2019062511 A1 WO2019062511 A1 WO 2019062511A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
ownership
owner
agent
protection
Prior art date
Application number
PCT/CN2018/104340
Other languages
English (en)
French (fr)
Inventor
苗放
解岩
杨文晖
Original Assignee
苗放
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 苗放 filed Critical 苗放
Publication of WO2019062511A1 publication Critical patent/WO2019062511A1/zh
Priority to US16/829,903 priority Critical patent/US11438157B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/006Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models

Definitions

  • the present invention relates to the field of information processing technologies, and in particular, to a data authentication method and system based on encryption.
  • Data application based on data ownership can be understood as a new data transaction mode, that is, data applications that need to consider data validation and protection.
  • the invention is based on a Public Key Infrastructure (PKI), in which the data owner already owns the CA identity and uses PKI to encrypt the data and data owners.
  • PKI Public Key Infrastructure
  • the present invention provides an encryption-based data confirmation method and system.
  • An encryption-based data validation method involving data owners, data agents, data producers, and data consumers, all of which are data owners, and can use encryption methods to determine ownership of data; Which data owners can use their public key to encrypt data to determine their ownership of the data and protect the data; they can also encrypt their data with their private key to declare their ownership of the data.
  • the method includes the following steps:
  • step B to determine whether the data is open, if the data can be opened, the data owner uses his private key to encrypt the data to complete the ownership declaration and end the process; if the data is not open, proceed to step B;
  • Open data refers to data that can be open to the public. It only requires data owner ownership declarations, no data protection is required; data that can be shared by data pointers to specific groups requires claims and data protection; non-shareable data refers to not open to the outside world.
  • the data is used by the data owner and requires data protection without a claims.
  • data owners can implement ownership confirmation and data protection for their data, technically guarantee the exclusiveness of data ownership, and realize the unique ownership of data by data owners. Separate and allocate the basis to ensure that the data has the main searchability, provide the basis for data transaction, and provide basic support for designing effective data security sharing methods.
  • said claim and protection steps are self-ownership declarations and protection steps, said self-ownership declaration and protection steps being:
  • said claim and protection steps are proxy claim and protection steps, said proxy claim and protection steps are:
  • step C1 determine whether the data owner needs to declare the data ownership, if not, proceed to step C2; if necessary, the data owner uses his private key to encrypt the data to complete the ownership declaration and proceeds to step C2;
  • the data agent uses his public key to encrypt the data
  • C3. Determine whether the third-party data agent needs to declare the data ownership. If not, the process ends; if necessary, the data agent encrypts the data with its own private key to complete the ownership declaration.
  • the tenure statement and protection steps involve two principals, one for the data owner and one for the data broker.
  • the ownership statement and the implementation of the protection are different.
  • the determination of the right can be divided into active confirmation and passive confirmation.
  • the active confirmation is completed by the data owner to confirm the data ownership and data protection. Different levels of data use are different, and the process of determining the rights is also different.
  • Passive assertion is done by the data agent to confirm the data ownership and data protection.
  • Data validation is designed to mobilize data, give data ownership characteristics, clarify the owner of the network virtual world data, and establish a safe, orderly access to data for open, shareable data. In the case that the agent is not needed, the data owner directly uses the public key and the private key to encrypt the data to actively confirm the right.
  • the method further includes:
  • the data owner encrypts the data with the data agent's public key and authorizes the data agent's data processing authority;
  • the data agent decrypts the data using the private key and asserts the data based on the proxy ownership declaration and protection steps.
  • the data agent sends the identity information encrypted by the private key to the data owner;
  • the data owner authenticates the data agent based on the identity information and stipulates the data agent's operational rights to the data.
  • the data owner encrypts the data that needs to be proxied using the data agent's public key
  • the data agent retrieves the data encrypted by its own public key
  • the data agent Upon completion of the authorization of the data agent, the data agent will perform the data agent operation in accordance with the content of the authorization contract.
  • the data agent manages the data.
  • the above authorization methods include active authorization mode and passive authorization mode, and the data agent restricts its own ownership according to the contract content.
  • K is a natural number greater than 1,
  • Ownership order confirmation step This step confirms that the order of the data owner is U 1 , U 2 , ..., U k ;
  • Active cascade confirmation step the data owner encrypts the data using the public key of the latter data owner after confirming according to the above method, and the latter data owner decrypts the data by using the private key and confirms the method according to the method of claim 1. ; Cycle through the steps until the K data owner is confirmed.
  • K is a natural number greater than 1, further includes
  • Ownership order confirmation step the order of the data owners confirmed in this step is U 1 , U 2 , ..., U k ;
  • Passive cascade confirmation step The data owner encrypts the data with his own public key in the above order, and the data agent encrypts the data by using the private key.
  • An encryption-based data validation system that includes:
  • the public key management module identifies and judges the identity of the data owner and the data agent, and confirms the correspondence between the data owner/data agent and the public key;
  • Confirmation module Data ownership confirmation and data protection are implemented by the above method.
  • system further comprises a confirmation contract management module, the confirmation contract management module confirming the order of the data owner's determination.
  • the present invention has the following advantages and beneficial effects:
  • the method of the invention realizes the data confirmation right, technically guarantees the exclusiveness of the data ownership, realizes the ownership of the data owner, the agent, the user and the producer, and establishes them and the data.
  • the relationship between the two provides operability for data validation.
  • the method of the invention realizes the ownership of the data by the data owner and the data agent, lays a foundation for the distribution of the data and responsibility, ensures that the data has the main searchability, and provides a technical basis for the data transaction.
  • Figure 1 is a flow chart of the method of the present invention.
  • FIG. 2 is a schematic diagram of active cascade confirmation of the present invention.
  • FIG. 3 is a schematic diagram of passive cascade confirmation of the present invention.
  • An encryption-based data validation method includes the following steps:
  • step B to determine whether the data is open, if the data can be opened, the data owner uses his private key to encrypt the data to complete the ownership declaration and end the process; if the data is not open, proceed to step B;
  • the tenure declaration and protection steps include self-ownership declaration and protection steps and proxy ownership declaration and protection steps, which are included as an active determination method and a passive determination method.
  • the above method is divided into multiple methods of determining the weight, and is described in detail in the following embodiments.
  • This embodiment is an active determining method using a self-ownership declaration and a protection step, and the method is specifically:
  • step B to determine whether the data is open, if the data can be opened, the data owner uses his private key to encrypt the data to complete the ownership declaration and end the process; if the data is not open, proceed to step B;
  • This embodiment is a passive confirmation method using a proxy ownership declaration and a protection step, and the method is specifically:
  • step B to determine whether the data is open, if the data can be opened, the data owner uses his private key to encrypt the data to complete the ownership declaration and end the process; if the data is not open, proceed to step B;
  • the data owner uses his public key to encrypt the data to complete the data protection; determine whether the data ownership needs to be declared, if not, terminate the process; if necessary, the data owner utilizes Your private key encrypts the data to complete the ownership declaration. If an agent is required, the data owner encrypts the data using the data agent's public key and authorizes the data agent's data processing authority; the data agent decrypts the data using the private key, and proceeds to step C1;
  • step C1 determine whether the data owner needs to declare the data ownership, if not, proceed to step C2; if necessary, the data owner uses his private key to encrypt the data to complete the ownership declaration and proceeds to step C2;
  • the data agent uses his public key to encrypt the data
  • C3. Determine whether the third-party data agent needs to declare the data ownership. If not, the process ends; if necessary, the data agent encrypts the data with its own private key to complete the ownership declaration.
  • the data owner manages the data delivery to the third party data agent.
  • the data owner needs to authorize the data agent's proxy authority.
  • Authorization can be implemented in a variety of ways as follows:
  • the data agent sends the identity information encrypted by the private key to the data owner;
  • the data owner confirms and authorizes the data agent according to the identity information, and stipulates the data agent's operation right on the data, and at the same time, the data owner and the agent form an agency contract with respect to the rights and responsibilities of both parties.
  • the data owner encrypts the data that needs to be proxied using the data agent's public key
  • the data agent retrieves the data encrypted by its own public key, and the data agent will exercise the data agent operation according to the content of the authorization contract.
  • the data agent After the above authorization, the data agent has the right to operate on the data.
  • This step confirms that the order of the data owner is U 1 , U 2 , ..., U k , and K is the number of data owners;
  • Active cascade confirming step the data owner encrypts the data by using the public key of the latter data owner according to the method of Embodiment 1 and Embodiment 2, and the latter data owner decrypts the data by using the private key and according to the embodiment
  • the method of 1 and Embodiment 2 performs the determination; the step is repeated until the K data owner is confirmed.
  • the data owner U 1 2 using the method of Example 1 is indeed the right active, and U 2 with the public key to encrypt the data; U 2 with the private key after the data is decrypted using the method of Example 1 Actively confirm the right, and use U 3 public key to encrypt the data; U 3 uses the private key to decrypt the data, and then adopts the method of Embodiment 1 to actively confirm the right, and ends the entire confirmation process.
  • the active cascade determination method is given above.
  • the passive cascade determination method can also be adopted. As shown in FIG. 3, the method is:
  • Ownership order confirmation step the order of the data owners confirmed in this step is U 1 , U 2 , ..., U k , and k is the number of data owners;
  • Passive cascading confirmation steps The data owner encrypts the data with his own public key in the above order, and the data agent uses the private key to encrypt the data for ownership declaration.
  • this embodiment discloses a system for implementing the foregoing method, where the system includes a public key management module, an authentication module, and an authorization contract management module; the public key management module pairs the data owner and the data agent. The identity is identified and judged, and the correspondence between the data owner and the public key is confirmed.
  • the identification of the identity information can ensure the identity of the data user according to the biological sign information; the authenticity module implements data ownership confirmation and data protection according to the methods of Embodiments 1 to 5.
  • the confirmation contract management module confirms the order of the data owner's determination.
  • the data is given the ownership, and the data owner can perform data confirmation by transforming the asymmetric encryption process, formally clarify the data ownership, and technically guarantee the exclusiveness of the data ownership.
  • the data owner has unique ownership of the data, realizes the user's use of the data according to the ownership, eliminates data leakage and forgery from the root cause, ensures the healthy development of the data ecological environment, and provides technical basis and guarantee for the state to formulate the data rights law.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Computing Systems (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Storage Device Security (AREA)

Abstract

一种基于加密的数据确权方法及系统,该方法包括以下步骤:A、判断数据是否开放,若数据可开放,则数据所有者利用自己的私钥加密数据完成权属声明并结束流程;若数据不可开放,则进入步骤B;B、判断数据是否共享,若数据不可共享,则数据所有者利用自己的公钥加密数据完成数据保护并结束流程;若数据可共享,则进入权属声明和保护步骤。通过上述方法实现了数据确权,从技术上保证数据权属的专有性,实现数据所有者对数据唯一所有权,为数据责权利分配奠定基础,确保数据有主可寻,为数据交易提供基础。

Description

一种基于加密的数据确权方法及系统 技术领域
本发明涉及信息处理技术领域,具体涉及一种基于加密的数据确权方法及系统。
背景技术
随着数据技术的不断发展,数据交易和基于权属的数据应用已成为数据应用的重要行为。目前的数据交易沿用了传统商品售卖的方式,由数据卖方、交易所协商确定待交易数据价格,挂牌出售。数据的可拷贝、可修改、可重复使用属性使得传统的商品售卖方式不能满足数据交易的需求,亟需新的数据模型与方法保证数据交易正常进行,不能较好的支撑数据开放、共享、应用。
而基于数据权属的数据应用,可以理解为新的数据交易模式,即需要考虑数据确权和保护的数据应用。
本发明基于公钥基础设施(PKI,Public Key Infrastructure),数据拥有者已经拥有CA身份,采用PKI对数据和数据拥有者进行加密确权。
发明内容
本发明为了解决上述技术问题提供一种基于加密的数据确权方法及系统。
本发明通过下述技术方案实现:
一种基于加密的数据确权方法,涉及数据所有者、数据代理者、数据生产者、数据使用者,他们都是数据的拥有者,都可以通过加密方法来确定对数据的拥有权;不论是哪种数据拥有者,都可以采用他们的公钥对数据加密,来确定他们对数据的拥有权并实现对数据的保护;也可以采用他们的私钥对数据加密,来声明他们对数据的拥有权,该方法包括以下步骤:
A、判断数据是否开放,若数据可开放,则数据所有者利用自己的私钥加密数据完成权属声明并结束流程;若数据不可开放,则进入步骤B;
B、判断数据是否共享,若数据不可共享,则数据所有者利用自己的公钥加密数据完成数据保护并结束流程;若数据可共享,则进入权属声明和保护步骤。
可开放数据指可对公共开放的数据,只需要数据所有者权属声明,无需数据保护;可共享数据指针对特定群体开放的数据,需要权属声明和数据保护;不可共享数据指不对外开放的数据,数据所有者自用,需要数据保护,无需权属声明。通过本方法实现数据确权,数据拥有者可对其数据实施权属确认和数据保护,从技术上保证数据权属的专有性,实现数据所有者对数据的唯一所有权,为数据责、权、利划分配奠定基础,确保数据有主可寻,为数据交易提供基础,为设计有效的数据安全共享方法提供基础支撑。
作为优选,所述权属声明和保护步骤为自我权属声明和保护步骤,所述自我权属声明和保护步骤为:
数据所有者利用自己的公匙加密数据完成数据保护;
判断是否需要声明数据权属,若不需要,则结束流程;若需要,则数据所有者利用自己的私钥加密数据完成权属声明。
作为优选,所述权属声明和保护步骤为代理权属声明和保护步骤,所述代理权属声明和保护步骤为:
判断数据是否需要代理,若不需要代理,则采用自我权属声明和保护步骤对数据进行权利声明和保护;若需要代理,则进入C1步骤;
C1、判断数据所有者是否需要声明数据权属,若不要,则进入步骤C2;若需要,则数据所有者利用自己的私钥加密数据完成权属声明并进入步骤C2;
C2、数据代理者利用自己的公钥加密数据;
C3、判断第三方数据代理者是否需要声明数据权属,若不需要,则结束流程;若需要,则数据代理者利用自己的私钥加密数据完成权属声明。
权属声明和保护步骤涉及两个主体,一个是数据所有者,另一个为数据代理者。根据数据使用需求状况,其权属声明和保护的实施主体不同。根据不同的实施主体可将确权分为主动确权和被动确权,主动确权由数据所有者完成数据权属确认和数据保护,不同级别的数据用途不同,其确权流程也存在差异。被动确权由数据代理者完成数据权属确认和数据保护。数据确权旨在将数据动态化,赋予数据权属特性,明确网络虚拟世界数据的主人,针对可开放、可共享数据,建立安全、有序访问数据的基础。在不需要代理的情况下,数据所有者直接利用公匙、私钥加密数据以主动确权。
进一步的,若数据需要代理,该方法还包括:
数据所有者利用数据代理者的公钥对数据加密并对数据代理者的数据处理权限进行授权;
数据代理者采用私钥对数据进行解密,并根据代理权属声明和保护步骤对数据进行确权。
进一步的,所述授权步骤的具体方法为:
数据代理者向数据所有者发送利用私钥加密的身份信息;
数据所有者根据该身份信息对数据代理者进行确认授权并约定数据代理者对数据的操作权利。
进一步的,数据所有者对数据代理者授权步骤的具体方法为:
数据所有者对需要代理的数据采用数据代理者公钥进行加密;
数据代理者取回经自己公钥加密的数据;
完成对数据代理者的授权,数据代理者将根据授权契约内容行使数据代理操作。
数据代理者作为数据所有者的代理人,对数据实现管理,上述授权方式包括主动授权方式、被动授权方式,数据代理者根据契约内容约束自身权属。
作为优选,若有K个数据所有者,K为大于1的自然数,则还包括,
权属顺序确认步骤:该步骤确认数据所有者的顺序为U 1、U 2、……、U k
主动级联确权步骤:数据所有者根据上述的方法进行确权后利用后一数据所有者的公钥加密数据,后一数据所有者采用私钥解密数据并根据权利要求1的方法进行确权;循环该步骤直至完成K个数据所有者确权。
作为优选,若数据所有者有K个,K为大于1的自然数,则还包括,
权属顺序确认步骤:该步骤确认的数据所有者的顺序为U 1、U 2、……、U k
被动级联确权步骤:数据所有者按上述顺序分别利用自己的公钥对数据加密,数据代理者再利用私钥对数据进行加密。
一种基于加密的数据确权系统,包括:
公钥管理模块:对数据所有者和数据代理者的身份进行识别判断,确认数据所有者/数据代理者与公钥的对应关系;
确权模块:采用上述方法实现数据权属确认和数据保护。
作为优选,该系统还包括确权契约管理模块,所述确权契约管理模块确认数据所有者的确权顺序。
本发明与现有技术相比,具有如下的优点和有益效果:
1、通过本发明的方法实现了数据确权,从技术上保证数据权属的专有性,实现数据的所有者、代理者、使用者、生产者对数据的拥有权,建立了他们和数据之间的关系,为数据确权提供了可操作性。
2、通过本发明的方法,实现了数据所有者和数据代理者对数据的所有权,为数据责权利分配奠定基础,确保数据有主可寻,为数据交易提供了技术基础。
附图说明
此处所说明的附图用来提供对本发明实施例的进一步理解,构成本申请的一部分,并不构成对本发明实施例的限定。在附图中:
图1为本发明的方法流程图。
图2为本发明的主动级联确权的原理图。
图3为本发明的被动级联确权的原理图。
具体实施方式
为使本发明的目的、技术方案和优点更加清楚明白,下面结合实施例和附图,对本发明作进一步的详细说明,本发明的示意性实施方式及其说明仅用于解释本发明,并不作为对本发明的限定。
实施例1
一种基于加密的数据确权方法,包括以下步骤:
A、判断数据是否开放,若数据可开放,则数据所有者利用自己的私钥加密数据完成权属声明并结束流程;若数据不可开放,则进入步骤B;
B、判断数据是否共享,若数据不可共享,则数据所有者利用自己的公钥加密数据完成数据保护并结束流程;若数据可共享,则进入权属声明和保护步骤。
如图1所示,权属声明和保护步骤包括自我权属声明和保护步骤和代理权属声明和保护步骤,即包括为主动确权方法和被动确权方法。
即针对不同的数据,不同的使用情况,其上述方法分为多种确权方法,以下述实施例进行详细说明。
实施例2
本实施例为采用自我权属声明和保护步骤的主动确权方法,该方法具体为:
A、判断数据是否开放,若数据可开放,则数据所有者利用自己的私钥加密数据完成权属声明并结束流程;若数据不可开放,则进入步骤B;
B、判断数据是否共享,若数据不可共享,则数据所有者利用自己的公钥加密数据完成数据保护并结束流程;若数据可共享,数据所有者利用自己的公匙加密数据完成数据保护;
判断是否需要声明数据权属,若不需要,则结束流程;若需要,则数据所有者利用自己的私钥加密数据完成权属声明。
实施例3
本实施例为采用代理权属声明和保护步骤的被动确权方法,该方法具体为:
A、判断数据是否开放,若数据可开放,则数据所有者利用自己的私钥加密数据完成权属声明并结束流程;若数据不可开放,则进入步骤B;
B、判断数据是否共享,若数据不可共享,则数据所有者利用自己的公钥加密数据完成数据保护并结束流程;若数据可共享,进入是否代理的判断步骤;
判断数据是否需要代理,若不需要代理,则数据所有者利用自己的公匙加密数据完成数据保护;判断是否需要声明数据权属,若不需要,则结束流程;若需要,则数据所有者利用自 己的私钥加密数据完成权属声明。若需要代理,数据所有者利用数据代理者的公钥对数据加密并对数据代理者的数据处理权限进行授权;数据代理者采用私钥对数据进行解密,则进入C1步骤;
C1、判断数据所有者是否需要声明数据权属,若不要,则进入步骤C2;若需要,则数据所有者利用自己的私钥加密数据完成权属声明并进入步骤C2;
C2、数据代理者利用自己的公钥加密数据;
C3、判断第三方数据代理者是否需要声明数据权属,若不需要,则结束流程;若需要,则数据代理者利用自己的私钥加密数据完成权属声明。
实施例4
实施例3中,数据所有者将数据交付第三方数据代理者管理,为了保证数据所有者的权益,保障数据安全,数据所有者需对数据代理者的代理权限授权。授权可采用多种方法实现如下:
方法一、
数据代理者向数据所有者发送利用私钥加密的身份信息;
数据所有者根据该身份信息对数据代理者进行确认授权,并约定数据代理者对数据的操作权利,同时,数据所有者和代理者之间就双方的责权利形成代理契约。
方法二、
数据所有者对需要代理的数据采用数据代理者公钥进行加密;
数据代理者取回经自己公钥加密的数据,数据代理者将根据授权契约内容行使数据代理操作。
通过上述授权后,数据代理者对数据具有对数据约定的操作权利。
实施例5
在上述实施例的基础上,若数据所有者有多个,上述实施例的步骤则具体为:
权属顺序确认步骤:该步骤确认数据所有者的顺序为U 1、U 2、……、U k,K为数据所有者数量;
主动级联确权步骤:数据所有者根据实施例1和实施例2的方法进行确权后利用后一数据所有者的公钥加密数据,后一数据所有者采用私钥解密数据并根据实施例1和实施例2的方法进行确权;循环该步骤直至完成K个数据所有者确权。
以3个数据所有者对本方法进行详细说明。
如图2所示,数据所有者U 1采用实施例1的方法进行主动确权,并利用U 2的公钥对数据 进行加密;U 2利用私钥对数据解密后采用实施例1的方法进行主动确权,并利用U 3的公钥对数据进行加密;U 3利用私钥对数据解密后采用实施例1的方法进行主动确权,结束整个确权过程。
上述给出了主动级联确权方法,在实施例3的基础上也可采用被动级联确权方法,如图3所示,该方法为:
权属顺序确认步骤:该步骤确认的数据所有者的顺序为U 1、U 2、……、U k,k为数据所有者数量;
被动级联确权步骤:数据所有者按上述顺序分别利用自己的公钥对数据加密,数据代理人再利用私钥对数据进行加密进行权属声明。
实施例6
基于上述实施例的方法,本实施例公开一种实现上述方法的系统,该系统包括公钥管理模块、确权模块、确权契约管理模块;公钥管理模块对数据所有者和或数据代理者的身份进行识别判断,确认数据拥有者与公钥的对应关系,身份信息的识别可根据生物体征信息确保数据用户身份;确权模块根据实施例1至5的方法实现数据权属确认和数据保护;确权契约管理模块确认数据所有者的确权顺序。
通过该方案的方法和系统,数据被赋予权属,数据所有者能够通过变换非对称加密流程进行数据确权,从形式上明确数据权属,从技术上保证数据权属的专有性,实现数据拥有者对数据唯一所有权,实现用户按权属使用数据,从根源上杜绝数据泄露、伪造等问题,保证数据生态环境良性发展,为国家制定数据权法提供技术依据与保障。
以上所述的具体实施方式,对本发明的目的、技术方案和有益效果进行了进一步详细说明,所应理解的是,以上所述仅为本发明的具体实施方式而已,并不用于限定本发明的保护范围,凡在本发明的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。

Claims (10)

  1. 一种基于加密的数据确权方法,其特征在于,包括以下步骤:
    A、判断数据是否开放,若数据可开放,则数据所有者利用自己的私钥加密数据完成权属声明并结束流程;若数据不可开放,则进入步骤B;
    B、判断数据是否共享,若数据不可共享,则数据所有者利用自己的公钥加密数据完成数据保护并结束流程;若数据可共享,则进入权属声明和保护步骤。
  2. 根据权利要求1所述的一种基于加密的数据确权方法,其特征在于,所述权属声明和保护步骤为自我权属声明和保护步骤,所述自我权属声明和保护步骤为:
    数据所有者利用自己的公匙加密数据完成数据保护;
    判断是否需要声明数据权属,若不需要,则结束流程;若需要,则数据所有者利用自己的私钥加密数据完成权属声明。
  3. 根据权利要求2所述的一种基于加密的数据确权方法,其特征在于,所述权属声明和保护步骤为代理权属声明和保护步骤,所述代理权属声明和保护步骤为:
    判断数据是否需要代理,若不需要代理,则采用自我权属声明和保护步骤对数据进行权利声明和保护;若需要代理,则进入C1步骤;
    C1、判断数据所有者是否需要声明数据权属,若不要,则进入步骤C2;若需要,则数据所有者利用自己的私钥加密数据完成权属声明并进入步骤C2;
    C2、数据代理者利用自己的公钥加密数据;
    C3、判断第三方数据代理者是否需要声明数据权属,若不需要,则结束流程;若需要,则数据代理者利用自己的私钥加密数据完成权属声明。
  4. 根据权利要求3所述的一种基于加密的数据确权方法,其特征在于,若数据需要代理,该方法还包括:
    数据所有者利用数据代理者的公钥对数据加密并对数据代理者的数据处理权限进行授权;
    数据代理者采用私钥对数据进行解密,并根据代理权属声明和保护步骤对数据进行确权。
  5. 根据权利要求4所述的一种基于加密的数据确权方法,其特征在于,所述授权采用以下方法步骤:
    数据代理者向数据所有者发送利用私钥加密的身份信息;
    数据所有者根据该身份信息对数据代理者进行确认授权并约定数据代理者对数据的操作权利。
  6. 根据权利要求4所述的一种基于加密的数据确权方法,其特征在于,所述授权采 用以下方法步骤:
    数据所有者对需要代理的数据采用数据代理者公钥进行加密;
    数据代理者取回经自己公钥加密的数据,数据代理者将根据授权契约内容行使数据代理操作。
  7. 根据权利要求1所述的一种基于加密的数据确权方法,其特征在于,若数据所有者有K个,K为大于1的自然数,则还包括,
    权属顺序确认步骤:该步骤确认数据所有者的顺序为U 1、U 2、……、U k
    主动级联确权步骤:数据所有者根据权利要求1的方法进行确权后利用后一数据所有者的公钥加密数据,后一数据所有者采用私钥解密数据并根据权利要求1的方法进行确权;循环该步骤直至完成K个数据所有者确权。
  8. 根据权利要求1所述的一种基于加密的数据确权方法,其特征在于,若数据所有者有K个,K为大于1的自然数,则还包括,
    权属顺序确认步骤:该步骤确认的数据所有者的顺序为U 1、U 2、……、U k
    被动级联确权步骤:数据所有者按上述顺序分别利用自己的公钥对数据加密,数据代理人再利用私钥对数据进行加密来声明数据的权属。
  9. 一种基于加密的数据确权系统,其特征在于:包括
    公钥管理模块:对数据所有者和/或数据代理者的身份进行识别判断,确认数据拥有者与公钥的对应关系;
    确权模块:采用权利要求1至8的方法实现数据权属确认和数据保护。
  10. 根据权利要求9所述的一种基于加密的数据确权系统,其特征在于,还包括确权契约管理模块,所述确权契约管理模块确认数据所有者的确权顺序。
PCT/CN2018/104340 2017-09-26 2018-09-06 一种基于加密的数据确权方法及系统 WO2019062511A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/829,903 US11438157B2 (en) 2017-09-26 2020-03-25 Method and system for data ownership confirmation based on encryption

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710800793.9 2017-09-26
CN201710800793.9A CN107563869B (zh) 2017-09-26 2017-09-26 一种基于加密的数据确权方法及系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/829,903 Continuation-In-Part US11438157B2 (en) 2017-09-26 2020-03-25 Method and system for data ownership confirmation based on encryption

Publications (1)

Publication Number Publication Date
WO2019062511A1 true WO2019062511A1 (zh) 2019-04-04

Family

ID=60979552

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/104340 WO2019062511A1 (zh) 2017-09-26 2018-09-06 一种基于加密的数据确权方法及系统

Country Status (3)

Country Link
US (1) US11438157B2 (zh)
CN (1) CN107563869B (zh)
WO (1) WO2019062511A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107395649A (zh) * 2017-09-07 2017-11-24 成都密脉数据科技有限公司 一种基于权属的数据授权方法及系统
CN107563869B (zh) 2017-09-26 2021-01-26 苗放 一种基于加密的数据确权方法及系统
CN109918868A (zh) * 2018-12-20 2019-06-21 上海分布信息科技有限公司 数据确权方法及数据确权系统
CN116244376A (zh) * 2023-02-10 2023-06-09 上海尚象信息科技有限公司 一种基于区块链的数据确权方法及装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110202758A1 (en) * 1996-07-30 2011-08-18 James M Holden Apparatus for providing security over untrusted networks
CN105450669A (zh) * 2015-12-30 2016-03-30 成都大学 一种面向数据的安全体系方法及系统
CN107196762A (zh) * 2017-06-13 2017-09-22 贵州大学 一种面向大数据的确权方法
CN107563869A (zh) * 2017-09-26 2018-01-09 成都密脉数据科技有限公司 一种基于加密的数据确权方法及系统

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030101346A1 (en) * 2000-02-29 2003-05-29 Barron Austin Kesler Method for notarizing receipt of electronic communications and enabling electronic registered mail; method for verifying identity of account party
CN1980416B (zh) * 2005-12-01 2011-05-18 华为技术有限公司 媒体发送权处理方法及装置
US8190917B2 (en) * 2006-09-12 2012-05-29 International Business Machines Corporation System and method for securely saving and restoring a context of a secure program loader
CN101714195A (zh) * 2009-07-22 2010-05-26 北京创原天地科技有限公司 一种基于数字证书的新型数字版权保护方法和装置
US9563778B2 (en) * 2011-11-14 2017-02-07 St-Ericsson Sa Method for managing public and private data input at a device
CN103793660A (zh) * 2012-11-02 2014-05-14 哈尔滨国源火电节能技术有限公司 对电子文件数据保护的用户访问方法
CN103295169B (zh) * 2013-05-03 2014-05-28 广东裕通科技股份有限公司 房地产实人登记信息安全监管方法及系统
US9256881B2 (en) * 2013-11-08 2016-02-09 Vattaca, LLC Authenticating and managing item ownership and authenticity
EP3103089A1 (en) * 2014-02-04 2016-12-14 Dirk Helbing Interaction support processor
CN104980477B (zh) * 2014-04-14 2019-07-09 航天信息股份有限公司 云存储环境下的数据访问控制方法和系统
CN104618366B (zh) * 2015-01-27 2018-07-17 西安电子科技大学 一种基于属性的网络档案安全管理系统及方法
US10037436B2 (en) * 2015-12-11 2018-07-31 Visa International Service Association Device using secure storage and retrieval of data
CN105404999A (zh) * 2015-12-20 2016-03-16 北京民航信息科技有限公司 一种适用于航空领域的采购及资产管理平台
CN106815728A (zh) * 2017-01-03 2017-06-09 北京供销科技有限公司 一种基于区块链技术的大数据确权方法及系统
CN106991573A (zh) * 2017-04-07 2017-07-28 中链科技有限公司 基于区块链技术的艺术品保真方法和服务器

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110202758A1 (en) * 1996-07-30 2011-08-18 James M Holden Apparatus for providing security over untrusted networks
CN105450669A (zh) * 2015-12-30 2016-03-30 成都大学 一种面向数据的安全体系方法及系统
CN107196762A (zh) * 2017-06-13 2017-09-22 贵州大学 一种面向大数据的确权方法
CN107563869A (zh) * 2017-09-26 2018-01-09 成都密脉数据科技有限公司 一种基于加密的数据确权方法及系统

Also Published As

Publication number Publication date
CN107563869B (zh) 2021-01-26
US11438157B2 (en) 2022-09-06
CN107563869A (zh) 2018-01-09
US20200228334A1 (en) 2020-07-16

Similar Documents

Publication Publication Date Title
CN108830601B (zh) 基于区块链的智慧城市信息安全使用方法及系统
JP2022095918A (ja) ブロックチェーン上の交換を実施するためのトークン化方法及びシステム
WO2019062511A1 (zh) 一种基于加密的数据确权方法及系统
CN110086804A (zh) 一种基于区块链及可信硬件的物联网数据隐私保护方法
JP2020535543A (ja) コンプライアンス対応のトークン化及び資産価値の制御のための方法、装置、及びコンピュータ可読媒体
CN109478298A (zh) 区块链实现的方法和系统
US20130318619A1 (en) Encapsulated security tokens for electronic transactions
US20140331058A1 (en) Encapsulated security tokens for electronic transactions
CN111178880A (zh) 一种零信任和保护数据隐私的安全数据流通方法
CN111275443B (zh) 一种基于区块链的交易处理系统
US11334884B2 (en) Encapsulated security tokens for electronic transactions
CN112487103A (zh) 一种基于区块链智能合约的深度学习数据集可信共享系统
CN113347008B (zh) 一种加法同态加密的贷款信息存储方法
CN111357026A (zh) 基于区块链的可信保函
CN111429134A (zh) 基于区块链的数据交易方法和装置
TWI724667B (zh) 身份管理與授權系統及其方法
WO2019047888A1 (zh) 一种基于权属的数据授权方法及系统
US20240062301A1 (en) Secure and trustworthy computing environments for exchanges
CN112511309A (zh) 区块链上面向监管的信息定向共享方法、装置和电子设备
CN115147224A (zh) 基于联盟链的交易数据共享方法及装置
CN111433798A (zh) 基于区块链的可信保函
CN110766548A (zh) 基于区块链的信息处理方法、装置、存储介质及电子设备
CN111325548A (zh) 一种交换区块链系统及相应的通用区块链互操作方法和网络
TWM596924U (zh) 身份管理與授權裝置
CN115099820A (zh) 基于区块链的敏感数据交易系统及方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18862973

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18862973

Country of ref document: EP

Kind code of ref document: A1