Data privacy calculation method and system based on block chain

A technology of data privacy and calculation methods, applied in the field of data processing, can solve problems such as easy data tampering, technical feasibility, and data security reduction, and achieve the effects of eliminating technical feasibility, enhancing credibility, and avoiding dependence

Pending Publication Date: 2021-11-30
百保上海科技有限公司
View PDF16 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This leads to events such as data tampering and collusion prone to occur on the coordinating party, resulting in reduced technical feasibility and data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data privacy calculation method and system based on block chain
  • Data privacy calculation method and system based on block chain
  • Data privacy calculation method and system based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] In view of the above problems, the embodiment of the present application creatively proposes a new blockchain-based data privacy computing method, which is applied to a coordinator composed of blockchains, which includes multiple nodes, figure 1 It is a flow chart of a blockchain-based data privacy calculation method provided by an embodiment of the present invention. like figure 1 As shown, blockchain-based data privacy calculation methods generally include:

[0045]S10: After any node on the blockchain receives the data privacy calculation request from the data demander, it publishes a service node voting request in the blockchain;

[0046] S20: All nodes in the blockchain use the preset consensus algorithm to determine the target service node from all nodes in the blockchain according to the service node voting request;

[0047] S30: The target service node executes the data privacy calculation request.

[0048] The blockchain-based data privacy calculation method...

Embodiment 2

[0054] The second embodiment further refines the blockchain-based data privacy calculation method on the basis of the first embodiment. Specifically, after any node on the blockchain receives the data privacy calculation request sent by the data demander, it also includes :

[0055] Any node on the blockchain issues an authentication request in the blockchain according to the data privacy calculation request, and all nodes in the blockchain use the preset consensus algorithm to generate decision results based on the authentication request. As a better implementation, in the embodiment of this application, whether the participants of the privacy calculation (including but not limited to the data demander) can access a certain blockchain node, or whether the participants can apply for a certain data source To provide services, etc., all need to use voting to make decisions. During specific implementation, a binary decision of yes / no is generally adopted. When it needs to be ex...

Embodiment 3

[0066] On the basis of the above-mentioned embodiments, the third embodiment further refines the blockchain-based data privacy calculation method. Specifically, the method also includes:

[0067] Any node on the blockchain uses distributed accounting technology to write the data circulation and calling process into the blockchain.

[0068] Specifically, in this embodiment of the application, all nodes on the blockchain use distributed ledgers to record the data circulation and call process, and the data circulation and call include execution by the data demander and data provider. More specifically, after receiving the data privacy calculation request, the coordinator uploads the data and the request to the blockchain storage, uploads the blockchain storage after determining the target service node, and uploads the data circulation process such as authentication and auditing to the blockchain Block chain storage, that is to say, the coordinator basically uploads the whole proc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data privacy calculation method and system based on a block chain. The data privacy calculation method comprises the following steps: after any node on the block chain receives a data privacy calculation request sent by a data demander, issuing a service node voting request in the block chain, wherein all the nodes in the block chain determine a target service node from all the nodes of the block chain by using a preset consensus algorithm according to the service node voting request; and enabling the target service node to execute the data privacy calculation request. According to the invention, the security and credibility of data of the coordinator can be improved.

Description

technical field [0001] The present invention relates to the technical field of data processing, in particular to a blockchain-based data privacy computing method and system. Background technique [0002] With the development of technology, data as a factor of production has risen to the national strategy. The core of data marketization is how to process or analyze these data. At present, the common mode is to gather data together for centralized processing and analysis. This process of convergence and fusion may be more prone to the risk of privacy leakage. For such problems, privacy computing can currently be used to solve them. [0003] Privacy computing is a computing model that protects data privacy and can support data circulation and application services. The goal of privacy computing is "data available but not visible". Various technical schools have emerged in the industry, including federated learning, secure multi-party computing, and trusted execution environme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F21/62
CPCH04L63/10H04L67/10G06F21/6263H04L9/50
Inventor 李宏宇李雪峰梁亮
Owner 百保上海科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products