Data security tracing method and device based on block chain

A data security and blockchain technology, applied in the field of data security, can solve problems such as security risks and achieve the effect of ensuring non-tampering

Inactive Publication Date: 2019-10-22
智链万源(北京)数字科技有限公司
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a blockchain-based data security traceability method to solve the technical problem that existing data platforms cannot avoid potential safety hazards in the process of data storage, use, and sharing. The method includes: The operation log data of the data performing preset operations, wherein the preset operation includes at least one of the following: add, delete, modify, view; store the operation log data on the operation log chain of each node of the blockchain network, wherein the operation The hash value corresponding to the operation log data is stored on the log chain; the hash value corresponding to the operation log data is superimposed on the information display page displaying the target data; based on the hash value extracted from the information display page, query the blockchain network Stored operation log data that performs preset operations on target data
[0006] The embodiment of the present invention also provides a blockchain-based data security traceability device to solve the technical problem that existing data platforms cannot avoid potential safety hazards in the process of data storage, use, and sharing. The device includes: data operation The log collection module is used to collect operation log data that performs preset operations on the target data, wherein the preset operations include at least one of the following: add, delete, modify, and view; the block chain storage module is used to store the operation log data Stored on the operation log chain of each node in the blockchain network, wherein the hash value corresponding to the operation log data is stored on the operation log chain; the page operation log superposition processing module is used to superimpose the hash value corresponding to the operation log data Go to the information display page that displays the target data; the data operation log traceability module is used to query the operation log data stored on the blockchain network that performs preset operations on the target data based on the hash value extracted from the information display page
[0007] The embodiment of the present invention also provides a computer device to solve the technical problem that the existing data platform cannot avoid potential safety hazards in the process of data storage, use, and sharing. The computer device includes a memory, a processor, and And a computer program that can run on the processor, when the processor executes the computer program, the above-mentioned blockchain-based data security traceability method is realized

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security tracing method and device based on block chain
  • Data security tracing method and device based on block chain
  • Data security tracing method and device based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0016] In the description of this specification, the words "comprising", "comprising", "having", "containing" and so on are all open terms, meaning including but not limited to. A description referring to the terms "one embodiment," "a particular embodiment," "some embodiments," "for example," etc., means that a particular feature, structure, or characteristic described in connection with the embodiment or example is included in at least one of the present application. Examples or examples. In this specification, schematic representations of the above terms do not ne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data security tracing method and device based on a block chain, and the method comprises the steps: collecting operation log data for executing a preset operation on target data,wherein the preset operation comprises at least one of the following operations: adding, deleting, modifying and checking; storing the operation log data to an operation log chain of each node ofthe blockchain network, the operation log chain storing hash values corresponding to the operation log data; superposing the hash value corresponding to the operation log data to an information display page for displaying the target data; and based on the hash value extracted from the information display page, querying operation log data which is stored on the blockchain network and performs a preset operation on the target data. According to the invention, the data security of the data on the data platform in the storage, use and sharing processes can be ensured.

Description

technical field [0001] The present invention relates to the field of data security, in particular to a blockchain-based data security traceability method and device. Background technique [0002] This section is intended to provide a background or context to embodiments of the invention that are recited in the claims. The descriptions herein are not admitted to be prior art by inclusion in this section. [0003] With the rapid development of information technology, people pay more and more attention to data security. Especially with the emergence of big data technology, various big data processing platforms have emerged as the times require, and the amount of data has grown rapidly. How to ensure that these data are not leaked or tampered in the process of storage, use, and sharing is an urgent problem to be solved in the era of big data. [0004] At present, the existing data platform configures different permissions for different operators to achieve limited access or o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/22G06F16/27G06F21/16G06F21/62
CPCG06F16/2255G06F16/27G06F21/16G06F21/6218H04L9/50
Inventor 谢文杰李晓玲
Owner 智链万源(北京)数字科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products