Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data security calculation method and system, computer equipment, storage medium and terminal

A computing method and data security technology, applied in the field of information security, can solve the problems of lack of evidence chain in traditional solutions, raising the threshold of blockchain, and inability to guarantee the credibility of data sources, so as to ensure data privacy and not leak, and improve the security of multi-party computing. , The effect of simplifying the data flow process

Pending Publication Date: 2022-01-18
XIAN XIDIAN BLOCKCHAIN TECH CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] (1) The existing methods of participating in data privacy protection in the form of software and hardware integration mostly stay at the stage of data storage and hash chaining, and truly combined with blockchain technology to conduct credible privacy and security calculations is still exist challenges
[0010] (2) The existing method of using cryptography to solve the privacy protection problem in the process of data use, the data input into the smart contract from the external connection has not been processed and verified, and the source lacks credibility; the ownership registration process of the data subject is complicated and cumbersome, and The traditional solution lacks a chain of evidence, making it difficult to trace the source
[0011] (3) The existing method of using cryptography to solve the problem of privacy protection in the process of data use, users are using private data without knowing it, and it is difficult for the data subject to control their own data; in the process of multi-party joint computing, the data is easy to Leakage, and there are problems of fraud and unreliability in the joint calculation process
[0012] (4) Most of the current blockchain projects carry out data results on the chain, which cannot guarantee the safety and reliability of the calculation process, resulting in a decrease in the trust of the consensus process
[0013] (5) Blockchain nodes bring inconvenience to the deployment of nodes, increase the threshold for joining the blockchain, and cannot improve services and benefits for those who do not understand the network or blockchain, hindering the actual promotion of the blockchain
[0014] (6) The existing method of initiating transactions by calling the smart contract interface deployed on the blockchain through the user's own input data cannot guarantee the credibility of the data source
Although there are currently oracle contracts that can help smart contracts collect external data outside the chain, it still cannot guarantee whether the external information source is credible
[0015] (7) Existing solutions are generally centralized management, leading to privacy leakage, data control and other issues
Data is easily leaked during the multi-party joint calculation process, and there are problems of fraud and unreliability in the joint calculation process
In addition, most of the current blockchain projects carry out data results on the chain, which cannot guarantee the safety and reliability of the calculation process, resulting in a decrease in the trust of the consensus process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security calculation method and system, computer equipment, storage medium and terminal
  • Data security calculation method and system, computer equipment, storage medium and terminal
  • Data security calculation method and system, computer equipment, storage medium and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0109] Aiming at the problems existing in the existing technology, the present invention provides a solution, hardware equipment, devices, and edge terminals based on block chain chips, software and hardware integration for data right confirmation, encrypted storage, and private data security multi-party computing. Improve privacy protection during data transfer and use.

[0110] Blockchain anonymous computing hardware (platform) is an integrated product of blockchain software and hardware developed for data authentication, secure storage, joint computing and trusted execution under the background of data sharing and use. The present invention proposes a blockchain-based trust computing model, and relies on cryptography (such as secure multi-party, zero-knowledge proof, etc.) technologies to realize the manageability, usability and verifiability of data under privacy protection. At the same time, the present invention provides users with a trusted distributed plaintext computi...

Embodiment 2

[0165] Blockchain anonymous computing hardware can realize the integration of software and hardware, and realize trusted collection of data sources, encrypted storage, verification of rights, and joint use. The blockchain anonymous computing hardware has a built-in node public and private key and a node startup program, and can build a private blockchain chain or connect to a blockchain (Ethereum) network with one click.

[0166] In one embodiment, such as Figure 5 Shown is the general process of data collection and processing by the blockchain anonymous computing hardware. The blockchain anonymous computing hardware is embedded with IoT chips, which can collect automation data, status data, and file data through technologies such as wireless networks (WIFI, 4G / 5G), sensors, wired connections, and radio frequency identification. In addition, the node is embedded with a GPS chip, which can realize the location tracking of the data source. The block chain anonymous computing ...

Embodiment 3

[0182] Blockchain anonymous computing hardware can perform secure privacy computing between data owners and data demanders. In one embodiment, such as Image 6 Shown is the joint calculation process between the data owner and the data demander. Through blockchain anonymous computing hardware, data owners and data demanders can conduct secure joint computing under the condition of protecting the privacy of data subjects.

[0183] Before describing the specific process of calculation, the initialization description is given first. As described in the first aspect of the summary of the invention, the following process will be sent to the blockchain network in the form of a transaction, which will be consensused by other nodes. The data address generated by the box for this data calculation is 0xdata_x, the count of this calculation is initialized to 0, the dataRoot is empty, the balance is empty, and the proofChain is initialized as the head node of this calculation process, wh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information security, and discloses a data security calculation method and system, computer equipment, a storage medium and a terminal.The data security calculation method comprises the steps of performing a trust calculation model based on a block chain; proposing a plaintext calculation trusted space of distributed multimode trust based on the block chain; determining a real-time verifiable contract execution mechanism based on the hardware chip. The data security computing system comprises a data management module, a data processing module and an intelligent interaction module. According to the data security computing system provided by the invention, the data ownership is guaranteed through one-key data right confirmation and chain traceability; a barrier of data from a source to use is broken through by simplifying a data circulation process; through distributed encryption storage, privacy data is easily controlled; the data value is mined through secure multi-party calculation, and the data calculation process is ensured not to be leaked; the consensus of the calculation result is credible, and the on-chain result can be verified; and interaction between the hardware equipment and the physical world is controlled through an intelligent contract preset instruction.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a data security calculation method, system, computer equipment, storage medium and terminal. Background technique [0002] At present, people use data extremely frequently. While the processing and sharing of digital information has brought rapid economic development, it has also caused people's concerns about data abuse and privacy issues. Exploring solutions that can protect the privacy of personal data and maximize the use of data, which is in line with the interests of multiple parties, has become an urgent problem to be solved. Due to its characteristics of traceability, tamper resistance and distributed consensus, blockchain technology has attracted much attention in building a trust system and privacy protection, and it is a good solution to the above problems. However, since the blockchain technology and the real scene are still in the running-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06F21/62
CPCG06F21/64G06F21/6254
Inventor 裴庆祺吴志辉初金朝
Owner XIAN XIDIAN BLOCKCHAIN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products