Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Blockchain privacy protection method based on asymmetric encryption

An asymmetric encryption and privacy protection technology, which is applied in user identity/authorization verification, digital transmission systems, electrical components, etc., can solve the problems of few third-party institutions and untrustworthiness, and achieve the effect of flexible user authorization data access mode

Active Publication Date: 2017-07-21
HANGZHOU YUNXIANG NETWORK TECH
View PDF8 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the current application and research, the data operation request sent by the user through the server is generally regarded as the same operation, and its security completely depends on the security service of network communication, and there is little untrustworthiness of the third-party organization that provides data operation service Therefore, in the scenario where a third-party untrusted organization provides data operation services, there is an urgent need for a privacy protection measure for the blockchain

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain privacy protection method based on asymmetric encryption
  • Blockchain privacy protection method based on asymmetric encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to describe the present invention more specifically, the technical solutions of the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0028] In this embodiment, for each encryption process, an encryption module is established. The encryption module involves the user object user, the untrusted object server providing data operation services, and the data storage object blockchain, so as to realize the authorization management mechanism when the server accesses user data.

[0029] In this embodiment, when the data operation service is provided by an untrusted third-party organization, a highly flexible user-authorized data access mode is established. The specific execution steps are as follows:

[0030] (1) Creation and cancellation of authorized operations.

[0031] 1-1. Generate corresponding public keys and private keys (PK_u, SK_u, PK_s, SK_s, PK_bc, SK_bc) for user, server and blockc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a blockchain privacy protection method based on asymmetric encryption. The blockchain privacy protection method based on asymmetric encryption comprises the steps of: (1), creating and cancelling authorized operation; and (2), verifying and accepting a data operation service, wherein the data operation service can be initiated by a user and automatically initiated by a server. By means of the technical scheme disclosed by the invention, in a scene that a third-party untrusted mechanism provides the data operation service, sending and response of the data operation request are realized; and a highly flexible user authorized data access mode is provided.

Description

technical field [0001] The invention belongs to the technical field of Internet privacy protection, and in particular relates to a blockchain privacy protection method based on asymmetric encryption. Background technique [0002] With the rise of Bitcoin technology and the deepening of its application, as the underlying core technology, blockchain technology has attracted widespread attention in the industry. Blockchain is a shared distributed database that records transactions between parties, enhancing transparency, security and efficiency. With the advantages of blockchain technology such as decentralization, credibility, transparency, security and efficiency, more and more departments in the industry have begun to explore the application of blockchain in their fields and seek effective solutions. As blockchain technology gradually becomes an important strategy for distributed storage, its application model will expand rapidly, and the provision of storage services and a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L63/0442H04L63/0892H04L63/10
Inventor 陈建海王津航黄步添王备刘振广俞之贝杨文龙
Owner HANGZHOU YUNXIANG NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products