Data management method, device and system
A technology for data management and privacy data, applied in the field of information processing, it can solve the problem that privacy users cannot effectively manage privacy data, and achieve the effect of recording true and reliable
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0068] This embodiment provides a data management method for managing private data of private users. The execution subject of the data management method is a data management device, which can be set on a service terminal device, which can be any terminal device that can be implemented, such as a notebook computer, a mobile phone, a tablet, a server, and so on. Adopt blockchain technology on this terminal device. Blockchain is a decentralized distributed database system that is jointly maintained by all nodes in the blockchain network. The nodes in the blockchain network can be called blockchain nodes. The blockchain network is based on P2P (Peer to Peer). Network, the service terminal device can be used as a blockchain node in the blockchain network. The specific blockchain data writing is based on the prior art and is not limited here.
[0069] Such as figure 1 As shown, the flow diagram of the data management method provided by this embodiment includes:
[0070] Step 101: Rece...
Embodiment 2
[0081] This embodiment further supplements the data management method provided by the foregoing embodiment.
[0082] On the basis of the foregoing embodiment, after step 103, the method further includes:
[0083] Step 201: Receive a data access request of the accessing user sent by the accessing client. The data access request includes the data identifier corresponding to the private data to be accessed and the user public key of the accessing user.
[0084] Specifically, the data management device in the service terminal device may receive the data access request of the accessing user sent by the accessing user terminal, the data access request including the data identification corresponding to the private data to be accessed and the user public key of the accessing user. The accessing user terminal can be the user terminal device of the accessing user, or it can be an application in the user terminal device used by the accessing user. The user terminal device of the visiting user ...
Embodiment 3
[0092] This embodiment further supplements the data management method provided in the foregoing embodiment.
[0093] On the basis of the foregoing embodiment, before step 201, the method further includes:
[0094] Step 301: Receive an authorization message of a private user sent by a private client. The authorization message includes the message type with the authorization identifier, the user public key of the private user, the data identifier corresponding to the private data of the private user, and the user public key of the accessing user .
[0095] In step 302, the authorization message is verified according to the user public key of the private user, the user public key of the accessing user, and the registered public key list recorded in the end block in the blockchain.
[0096] Step 303: Record the authenticated authorization message in the access permission list to perform privacy data access permission registration.
[0097] Specifically, when the accessing user needs to acc...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com