CN116011033A - Personal data transaction method and system based on blockchain - Google Patents
Personal data transaction method and system based on blockchain Download PDFInfo
- Publication number
- CN116011033A CN116011033A CN202310056156.0A CN202310056156A CN116011033A CN 116011033 A CN116011033 A CN 116011033A CN 202310056156 A CN202310056156 A CN 202310056156A CN 116011033 A CN116011033 A CN 116011033A
- Authority
- CN
- China
- Prior art keywords
- data
- holder
- information
- encrypted
- proxy node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Storage Device Security (AREA)
Abstract
本发明公开一种基于区块链的个人数据交易方法,属于区块链、数据交易和数据确权领域;该方法包括:数据持有者对原始数据进行加密,得到加密数据并上传到数据代理节点;数据购买者上传数据征集需求到数据代理节点;数据代理节点生成候选数据列表,并将候选数据列表和数据评分发送给数据购买者;数据购买者根据候选数据列表和数据评分进行数据购买,生成购买信息;数据持有者根据购买信息,生成数据集加密密钥;数据购买者根据数据集加密密钥,下载原始数据。本发明还公开一种基于区块链的个人数据交易系统。本发明能保证数据的保密性、保证数据的完整性、保证数据交易的自主性以及保证数据交易的公平性。
The invention discloses a block chain-based personal data transaction method, which belongs to the fields of block chain, data transaction and data right confirmation; the method includes: the data holder encrypts the original data, obtains the encrypted data and uploads it to the data agent Node; data buyers upload data collection requirements to data proxy nodes; data proxy nodes generate candidate data lists, and send candidate data lists and data scores to data buyers; data buyers purchase data based on candidate data lists and data scores, Generate purchase information; data holders generate data set encryption keys based on purchase information; data buyers download original data according to data set encryption keys. The invention also discloses a blockchain-based personal data transaction system. The invention can guarantee the confidentiality of the data, the integrity of the data, the autonomy of the data transaction and the fairness of the data transaction.
Description
技术领域technical field
本发明涉及区块链、数据交易和数据确权等领域,具体涉及一种基于区块链的个人数据交易方法及系统。The present invention relates to the fields of block chain, data transaction, data right confirmation, etc., and in particular to a method and system for personal data transaction based on block chain.
背景技术Background technique
在信息技术的革新和新的产业变革下,数据已经与土地、劳动、资本等一样被列为生产要素,数据被誉为是当今数据经济时代的“石油”,如同在工业化时代的石油那样带动了社会的发展,数据也将驱动信息化和智能化时代的发展,对经济社会发展发挥着日益重要的作用;因此,数据的商品属性也日益凸显。Under the innovation of information technology and new industrial transformation, data has been listed as production factors like land, labor, capital, etc., and data is known as the "oil" in today's data economy era, just like oil in the industrialization era. With the development of society, data will also drive the development of the information and intelligence era, and play an increasingly important role in economic and social development; therefore, the commodity attribute of data is also becoming increasingly prominent.
随着互联网的普及,个人产生的数据量呈爆炸式增长,个人数据价值的不断增加,许多公司正在收集用户的数据,将海量的数据存放在中心化的数据库中,利用这些数据优化AI算法,挖掘潜在用户,分析用户市场,提升相应服务质量以获取相关利益。此外,用户越来越重视个人隐私和信息安全,将个人数据存放于第三方的平台中实现数据共享和交易存在诸多隐患;诸如用户信息失控、隐私泄露以及虚假信息泛滥等问题,现有的数据交易平台并不完全可信,数据持有者缺乏对数据交易权的控制。综上所述,要从根本上解决这些问题,亟待于利用变革性的技术解决,构建一个去中心化的数据交易平台,让用户掌握数据的主权,保护个人数据隐私并实现数据变现。With the popularization of the Internet, the amount of data generated by individuals is growing explosively, and the value of personal data is increasing. Many companies are collecting user data, storing massive amounts of data in centralized databases, and using these data to optimize AI algorithms. Tap potential users, analyze the user market, and improve the corresponding service quality to obtain relevant benefits. In addition, users are paying more and more attention to personal privacy and information security, and there are many hidden dangers in storing personal data on third-party platforms to achieve data sharing and transactions; such as loss of user information, privacy leaks, and the proliferation of false information. The trading platform is not completely credible, and data holders lack control over data trading rights. To sum up, in order to fundamentally solve these problems, it is urgent to use transformative technology to solve them, build a decentralized data trading platform, let users master the sovereignty of data, protect personal data privacy and realize data realization.
个人数据作为特殊的交易商品,将个人数据存放于第三方的平台中实现数据共享和交易存在诸多隐患。诸如:缺乏交易的透明度,缺乏对于数据交易控制权,用户数据泄露,虚假信息泛滥等问题。As personal data is a special trading commodity, there are many hidden dangers in storing personal data in third-party platforms to achieve data sharing and transactions. Such as: lack of transaction transparency, lack of control over data transactions, user data leakage, and the proliferation of false information.
发明内容Contents of the invention
本发明的目的在于提供一种能保证数据的保密性、保证数据的完整性、保证数据交易的自主性、保证数据交易的公平性的基于区块链的个人数据交易方法及系统。The purpose of the present invention is to provide a block chain-based personal data transaction method and system that can ensure the confidentiality of data, the integrity of data, the autonomy of data transactions, and the fairness of data transactions.
为解决上述技术问题,本发明提供一种基于区块链的个人数据交易方法,包括以下步骤:In order to solve the above technical problems, the present invention provides a blockchain-based personal data transaction method, comprising the following steps:
本发明提供一种基于区块链的个人数据交易方法,包括以下步骤:The present invention provides a block chain-based personal data transaction method, comprising the following steps:
数据持有者对原始数据进行加密,得到加密数据并上传到数据代理节点;The data holder encrypts the original data, obtains the encrypted data and uploads it to the data proxy node;
数据购买者上传数据征集需求到数据代理节点;Data buyers upload data collection requirements to data broker nodes;
数据代理节点根据数据征集需求和加密数据,生成候选数据列表,并将候选数据列表和数据评分发送给数据购买者;The data proxy node generates a candidate data list according to the data collection requirements and encrypted data, and sends the candidate data list and data scoring to the data buyer;
数据购买者根据候选数据列表和数据评分进行数据购买,生成购买信息,并通过数据代理节点发送给相应的数据持有者;Data buyers purchase data according to the candidate data list and data scoring, generate purchase information, and send it to the corresponding data holder through the data proxy node;
数据持有者根据购买信息,生成下载信息并通过数据代理节点发送给相应的数据购买者;According to the purchase information, the data holder generates download information and sends it to the corresponding data purchaser through the data proxy node;
数据购买者根据下载信息从数据代理节点下载加密数据并进行解密,得到原始数据。The data buyer downloads the encrypted data from the data proxy node according to the download information and decrypts it to obtain the original data.
优选地,数据持有者对原始数据进行加密,得到加密数据并上传到数据代理节点,具体包括以下步骤:Preferably, the data holder encrypts the original data, obtains the encrypted data and uploads it to the data proxy node, which specifically includes the following steps:
数据持有者生成数据持有者密钥Keyi,通过数据持有者密钥Keyi对原始数据加密,得到加密数据,并生成数据摘要信息;The data holder generates the data holder key Key i , encrypts the original data through the data holder key Key i , obtains encrypted data, and generates data summary information;
数据持有者将加密数据和数据摘要信息上传到数据代理节点。The data holder uploads the encrypted data and data summary information to the data broker node.
优选地,所述数据摘要信息为:Preferably, the data summary information is:
其中:DS是数据摘要信息,hash(Di)是原始数据的hash值,des是描述数据的信息,aci是数据持有者的账户,type是数据集类型,是数据持有者提供的数据签名。Among them: DS is the data summary information, hash(D i ) is the hash value of the original data, des is the information describing the data, ac i is the account of the data holder, type is the data set type, It is the data signature provided by the data holder.
优选地,数据持有者上传加密数据之后,还包括以下步骤:Preferably, after the data holder uploads the encrypted data, the following steps are further included:
对加密数据进行安全性检测;Perform security checks on encrypted data;
安全性检测通过之后,将数据摘要信息中的原始数据的hash值,与数据代理节点上的现有数据信息的hash值进行比对;After the security check is passed, compare the hash value of the original data in the data summary information with the hash value of the existing data information on the data proxy node;
如果存在相同数据,则拒绝上传加密数据;Refuse to upload encrypted data if the same data exists;
如果不存在相同数据,则上传成功,再根据相应的加密数据,生成唯一标识DIDi和存储证明。If the same data does not exist, the upload is successful, and then according to the corresponding encrypted data, a unique identifier DID i and a storage certificate are generated.
优选地,所述存储证明为:Preferably, the proof of storage is:
式中:是唯一标识DIDi的存储证明,hash(Di)是原始数据的hash值,用于和数据集的摘要信息DS关联;是使用数据代理节点的私钥对DIDi进行签名,是数据集的访问位置;In the formula: is the storage certificate that uniquely identifies DID i , and hash(D i ) is the hash value of the original data, which is used to associate with the summary information DS of the data set; is to use the private key of the data proxy node to sign DID i , is the access location of the dataset;
所述数据征集需求为:The data collection requirements are:
DR=(type,num,cnum,des,acj,dl,s,r)DR=(type,num,cnum,des,ac j ,dl,s,r)
式中:DR表示数据征集需求,type表示需要征集的数据类型,num表示数据购买者需要的数据量,cnum表示本次数据征集最大的候选数量,一般来说cnum≥num,des表示用途描述,dl表示本次数据征集的截止时间,acj是数据购买者的账户,s表示最低的数据质量评分,r表示本次数据征集完成之后,数据持有者可以获得报酬。In the formula: DR indicates the data collection requirement, type indicates the type of data to be collected, num indicates the amount of data required by the data buyer, cnum indicates the maximum number of candidates for this data collection, generally speaking cnum≥num, des indicates the use description, dl indicates the deadline for this data collection, ac j is the account of the data buyer, s indicates the lowest data quality score, and r indicates that the data holder can get paid after the data collection is completed.
优选地,数据代理节点根据数据征集需求和加密数据,生成候选数据列表,并将候选数据列表和数据评分发送给数据购买者,具体包括以下步骤:Preferably, the data proxy node generates a list of candidate data according to data collection requirements and encrypted data, and sends the list of candidate data and data scores to data buyers, specifically including the following steps:
数据代理节点将数据征集需求发送给数据持有者;The data proxy node sends the data collection request to the data holder;
数据持有者根据数据征集需求,决定是否将加密数据相应的唯一标识DIDi和存储证明加入到候选证明数据列表中;According to the data collection requirements, the data holder decides whether to add the corresponding unique identifier DID i and the storage certificate of the encrypted data to the candidate certificate data list;
在候选数据列表达到限定数量或者规定的时间期限之后,数据代理节点根据候选数据列表中的唯一标识DIDi和存储证明,获取相应的数据摘要信息及数据评分,加入到候选数据摘要列表中;After the candidate data list reaches the limited number or the specified time limit, the data proxy node obtains the corresponding data summary information and data scoring according to the unique identifier DID i and the storage certificate in the candidate data list, and adds it to the candidate data summary list;
数据代理节点以候选数据摘要列表作为候选数据列表,发送给数据购买者。The data proxy node sends the candidate data summary list to the data buyer as the candidate data list.
优选地,数据持有者根据购买信息,生成下载信息并通过数据代理节点发送给相应的数据购买者,具体包括以下步骤:Preferably, the data holder generates download information according to the purchase information and sends it to the corresponding data purchaser through the data proxy node, which specifically includes the following steps:
数据持有者根据购买信息,获取数据持有者密钥Keyi作为数据集加密密钥 According to the purchase information, the data holder obtains the data holder's key Key i as the data set encryption key
数据持有者根据购买信息中的数据购买者公钥PKj对数据集加密密钥进行加密,得到加密后数据集加密密钥以加密后数据集加密密钥作为下载信息通过数据代理节点发送给数据购买者。The data holder encrypts the data set key according to the data purchaser public key PK j in the purchase information Encrypt to get the encrypted data set encryption key Encryption key with encrypted data set As download information, it is sent to the data buyer through the data proxy node.
优选地,数据购买者根据下载信息从数据代理节点下载加密数据并进行解密,得到原始数据,具体包括以下步骤:Preferably, the data buyer downloads the encrypted data from the data proxy node according to the download information and decrypts it to obtain the original data, which specifically includes the following steps:
数据购买者通过数据购买者公钥PKj对下载信息中的加密后数据集加密密钥进行解密,得到数据集加密密钥 The data buyer encrypts the encrypted data set encryption key in the downloaded information through the data buyer's public key PK j Decrypt to get the data set encryption key
数据购买者根据数据集加密密钥从数据代理节点下载相应的加密数据并进行解密,得到原始数据。The data buyer encrypts the key according to the data set Download the corresponding encrypted data from the data proxy node and decrypt it to obtain the original data.
优选地,还包括以下步骤:Preferably, the following steps are also included:
数据购买者对购买的原始数据进行数据质量评估,得到数据评分并上传给数据代理节点。The data buyer evaluates the data quality of the purchased raw data, gets the data score and uploads it to the data proxy node.
本发明还提供一种基于区块链的个人数据交易系统,包括:The present invention also provides a blockchain-based personal data transaction system, including:
数据加密上传模块,用于数据持有者对原始数据进行加密,得到加密数据并上传到数据代理节点;The data encryption upload module is used for the data holder to encrypt the original data, obtain the encrypted data and upload it to the data proxy node;
需求上传模块,用于数据购买者上传数据征集需求到数据代理节点;The demand upload module is used for data buyers to upload data collection demands to the data agent node;
列表生成模块,用于数据代理节点根据数据征集需求和加密数据,生成候选数据列表,并将候选数据列表和数据评分发送给数据购买者;The list generation module is used for the data proxy node to generate a candidate data list according to the data collection requirements and encrypted data, and send the candidate data list and data scoring to the data buyer;
购买模块,用于数据购买者根据候选数据列表和数据评分进行数据购买,生成购买信息,并通过数据代理节点发送给相应的数据持有者;The purchase module is used for data purchasers to purchase data according to the candidate data list and data scoring, generate purchase information, and send it to the corresponding data holder through the data proxy node;
下载信息生成模块,用于数据持有者根据购买信息,生成下载信息并通过数据代理节点发送给相应的数据购买者;The download information generation module is used for data holders to generate download information according to the purchase information and send it to the corresponding data purchaser through the data proxy node;
下载模块,用于数据购买者根据下载信息从数据代理节点下载加密数据并进行解密,得到原始数据。The download module is used for the data buyer to download encrypted data from the data agent node according to the download information and decrypt it to obtain the original data.
与现有技术相比,本发明的有益效果为:Compared with prior art, the beneficial effect of the present invention is:
本发明旨在利用区块链技术构建一种个人数据交易方法:The present invention aims to use block chain technology to construct a personal data transaction method:
1)、保证数据的保密性。除了数据持有者和数据购买者之外,任何人都不会访问到原始的数据。1) To ensure the confidentiality of data. Except for data holders and data buyers, no one will have access to the original data.
2)、保证数据的完整性。一旦数据持有者将数据集提交到了交易系统,即在交易期间数据不会被修改。2), to ensure the integrity of the data. Once the data holder submits the data set to the transaction system, the data will not be modified during the transaction.
3)、保证数据交易的自主性。是否和数据购买者交易的决定权已经在数据交易者的手中。数据持有者需要明白自己的数据流向。3) Guarantee the autonomy of data transactions. The decision whether to trade with data buyers is already in the hands of data traders. Data holders need to understand the flow of their data.
4)、保证数据交易的公平性。数据持有者可能会对数据集进行不合理的定价,应该要确保数据质量越高的数据集可以获得到更多的回报。4) To ensure the fairness of data transactions. Data holders may price data sets unreasonably, and should ensure that data sets with higher data quality can get more rewards.
5)、不诚实的数据持有者可能会发布一些冗余数据的多个数据副本或无意义的数据集到数据交易平台上,来获取数据奖励。需要确保数据购买者的权益。5) Dishonest data holders may publish multiple data copies of redundant data or meaningless data sets to the data trading platform to obtain data rewards. The rights of data buyers need to be ensured.
6)、不诚实的数据购买可能会避免支付数据交易的报酬,此外数据购买者还可能在交易平台上转售数据。充分保障数据持有者的权益。6) Dishonest data purchases may avoid paying for data transactions, and data buyers may also resell data on trading platforms. Fully protect the rights and interests of data holders.
附图说明Description of drawings
下面结合附图对本发明的具体实施方式作进一步详细说明。The specific implementation manners of the present invention will be described in further detail below in conjunction with the accompanying drawings.
图1是本发明一种基于区块链的个人数据交易系统的模块框图;Fig. 1 is a block diagram of a block chain-based personal data transaction system of the present invention;
图2是本发明一种基于区块链的个人数据交易方法的流程示意图;Fig. 2 is a schematic flow chart of a personal data transaction method based on blockchain in the present invention;
图3是数据存储流程示意图。Fig. 3 is a schematic diagram of the data storage process.
具体实施方式Detailed ways
在下面的描述中阐述了很多具体细节以便于充分理解本发明。但是本发明能够以很多不同于在此描述的其它方式来实施,本领域技术人员可以在不违背本发明内涵的情况下做类似推广,因此本发明不受下面公开的具体实施的限制。In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, the present invention can be implemented in many other ways different from those described here, and those skilled in the art can make similar extensions without violating the connotation of the present invention, so the present invention is not limited by the specific implementations disclosed below.
在本说明书一个或多个实施例中使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本说明书一个或多个实施例。在本说明书一个或多个实施例和所附权利要求书中所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本说明书一个或多个实施例中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。Terms used in one or more embodiments of this specification are for the purpose of describing specific embodiments only, and are not intended to limit one or more embodiments of this specification. As used in one or more embodiments of this specification and the appended claims, the singular forms "a", "the", and "the" are also intended to include the plural forms unless the context clearly dictates otherwise. It should also be understood that the term "and/or" used in one or more embodiments of the present specification refers to and includes any or all possible combinations of one or more associated listed items.
应当理解,尽管在本说明书一个或多个实施例中可能采用术语第一、第二等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本说明书一个或多个实施例范围的情况下,第一也可以被称为第二,类似地,第二也可以被称为第一。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。It should be understood that although the terms first, second, etc. may be used to describe various information in one or more embodiments of the present specification, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from one another. For example, the first may also be referred to as the second, and similarly, the second may also be referred to as the first without departing from the scope of one or more embodiments of the present specification. Depending on the context, the word "if" as used herein may be interpreted as "at" or "when" or "in response to a determination."
下面结合附图对本发明做进一步的详细描述:Below in conjunction with accompanying drawing, the present invention is described in further detail:
本发明提供一种基于区块链的个人数据交易方法,包括以下步骤:The present invention provides a block chain-based personal data transaction method, comprising the following steps:
数据持有者对原始数据进行加密,得到加密数据并上传到数据代理节点;The data holder encrypts the original data, obtains the encrypted data and uploads it to the data proxy node;
数据购买者上传数据征集需求到数据代理节点;Data buyers upload data collection requirements to data broker nodes;
数据代理节点根据数据征集需求和加密数据,生成候选数据列表,并将候选数据列表和数据评分发送给数据购买者;The data proxy node generates a candidate data list according to the data collection requirements and encrypted data, and sends the candidate data list and data scoring to the data buyer;
数据购买者根据候选数据列表和数据评分进行数据购买,生成购买信息,并通过数据代理节点发送给相应的数据持有者;Data buyers purchase data according to the candidate data list and data scoring, generate purchase information, and send it to the corresponding data holder through the data proxy node;
数据持有者根据购买信息,生成下载信息并通过数据代理节点发送给相应的数据购买者;According to the purchase information, the data holder generates download information and sends it to the corresponding data purchaser through the data proxy node;
数据购买者根据下载信息从数据代理节点下载加密数据并进行解密,得到原始数据。The data buyer downloads the encrypted data from the data proxy node according to the download information and decrypts it to obtain the original data.
优选地,数据持有者对原始数据进行加密,得到加密数据并上传到数据代理节点,具体包括以下步骤:Preferably, the data holder encrypts the original data, obtains the encrypted data and uploads it to the data proxy node, which specifically includes the following steps:
数据持有者生成数据持有者密钥Keyi,通过数据持有者密钥Keyi对原始数据加密,得到加密数据,并生成数据摘要信息;The data holder generates the data holder key Key i , encrypts the original data through the data holder key Key i , obtains encrypted data, and generates data summary information;
数据持有者将加密数据和数据摘要信息上传到数据代理节点。The data holder uploads the encrypted data and data summary information to the data broker node.
优选地,所述数据摘要信息为:Preferably, the data summary information is:
其中:DS是数据摘要信息,hash(Di)是原始数据的hash值,des是描述数据的信息,aci是数据持有者的账户,type是数据集类型,是数据持有者提供的数据签名。Among them: DS is the data summary information, hash(D i ) is the hash value of the original data, des is the information describing the data, ac i is the account of the data holder, type is the data set type, It is the data signature provided by the data holder.
优选地,数据持有者上传加密数据之后,还包括以下步骤:Preferably, after the data holder uploads the encrypted data, the following steps are further included:
对加密数据进行安全性检测;Perform security checks on encrypted data;
安全性检测通过之后,将数据摘要信息中的原始数据的hash值,与数据代理节点上的现有数据信息的hash值进行比对;After the security check is passed, compare the hash value of the original data in the data summary information with the hash value of the existing data information on the data proxy node;
如果存在相同数据,则拒绝上传加密数据;Refuse to upload encrypted data if the same data exists;
如果不存在相同数据,则上传成功,再根据相应的加密数据,生成唯一标识DIDi和存储证明。If the same data does not exist, the upload is successful, and then according to the corresponding encrypted data, a unique identifier DID i and a storage certificate are generated.
优选地,所述存储证明为:Preferably, the proof of storage is:
式中:是唯一标识DIDi的存储证明,hash(Di)是原始数据的hash值,用于和数据集的摘要信息DS关联;是使用数据代理节点的私钥对DIDi进行签名,是数据集的访问位置;In the formula: is the storage certificate that uniquely identifies DID i , and hash(D i ) is the hash value of the original data, which is used to associate with the summary information DS of the data set; is to use the private key of the data proxy node to sign DID i , is the access location of the dataset;
所述数据征集需求为:The data collection requirements are:
DR=(type,num,cnum,des,acj,dl,s,r)DR=(type,num,cnum,des,ac j ,dl,s,r)
式中:DR表示数据征集需求,type表示需要征集的数据类型,num表示数据购买者需要的数据量,cnum表示本次数据征集最大的候选数量,一般来说cnum≥num,des表示用途描述,dl表示本次数据征集的截止时间,acj是数据购买者的账户,s表示最低的数据质量评分,r表示本次数据征集完成之后,数据持有者可以获得报酬。In the formula: DR indicates the data collection requirement, type indicates the type of data to be collected, num indicates the amount of data required by the data buyer, cnum indicates the maximum number of candidates for this data collection, generally speaking cnum≥num, des indicates the use description, dl indicates the deadline for this data collection, ac j is the account of the data buyer, s indicates the lowest data quality score, and r indicates that the data holder can get paid after the data collection is completed.
优选地,数据代理节点根据数据征集需求和加密数据,生成候选数据列表,并将候选数据列表和数据评分发送给数据购买者,具体包括以下步骤:Preferably, the data proxy node generates a list of candidate data according to data collection requirements and encrypted data, and sends the list of candidate data and data scores to data buyers, specifically including the following steps:
数据代理节点将数据征集需求发送给数据持有者;The data proxy node sends the data collection request to the data holder;
数据持有者根据数据征集需求,决定是否将加密数据相应的唯一标识DIDi和存储证明加入到候选证明数据列表中;According to the data collection requirements, the data holder decides whether to add the corresponding unique identifier DID i and the storage certificate of the encrypted data to the candidate certificate data list;
在候选数据列表达到限定数量或者规定的时间期限之后,数据代理节点根据候选数据列表中的唯一标识DIDi和存储证明,获取相应的数据摘要信息及数据评分,加入到候选数据摘要列表中;After the candidate data list reaches the limited number or the specified time limit, the data proxy node obtains the corresponding data summary information and data scoring according to the unique identifier DID i and the storage certificate in the candidate data list, and adds it to the candidate data summary list;
数据代理节点以候选数据摘要列表作为候选数据列表,发送给数据购买者。The data proxy node sends the candidate data summary list to the data buyer as the candidate data list.
优选地,数据持有者根据购买信息,生成下载信息并通过数据代理节点发送给相应的数据购买者,具体包括以下步骤:Preferably, the data holder generates download information according to the purchase information and sends it to the corresponding data purchaser through the data proxy node, which specifically includes the following steps:
数据持有者根据购买信息,获取数据持有者密钥Keyi作为数据集加密密钥 According to the purchase information, the data holder obtains the data holder's key Key i as the data set encryption key
数据持有者根据购买信息中的数据购买者公钥PKj对数据集加密密钥进行加密,得到加密后数据集加密密钥以加密后数据集加密密钥作为下载信息通过数据代理节点发送给数据购买者。The data holder encrypts the data set key according to the data purchaser public key PK j in the purchase information Encrypt to get the encrypted data set encryption key Encryption key with encrypted data set As download information, it is sent to the data buyer through the data proxy node.
优选地,数据购买者根据下载信息从数据代理节点下载加密数据并进行解密,得到原始数据,具体包括以下步骤:Preferably, the data buyer downloads the encrypted data from the data proxy node according to the download information and decrypts it to obtain the original data, which specifically includes the following steps:
数据购买者通过数据购买者公钥PKj对下载信息中的加密后数据集加密密钥进行解密,得到数据集加密密钥 The data buyer encrypts the encrypted data set encryption key in the downloaded information through the data buyer's public key PK j Decrypt to get the data set encryption key
数据购买者根据数据集加密密钥从数据代理节点下载相应的加密数据并进行解密,得到原始数据。The data buyer encrypts the key according to the data set Download the corresponding encrypted data from the data proxy node and decrypt it to obtain the original data.
优选地,还包括以下步骤:Preferably, the following steps are also included:
数据购买者对购买的原始数据进行数据质量评估,得到数据评分并上传给数据代理节点。The data buyer evaluates the data quality of the purchased raw data, gets the data score and uploads it to the data proxy node.
本发明还提供一种基于区块链的个人数据交易系统,包括:The present invention also provides a blockchain-based personal data transaction system, including:
数据加密上传模块,用于数据持有者对原始数据进行加密,得到加密数据并上传到数据代理节点;The data encryption upload module is used for the data holder to encrypt the original data, obtain the encrypted data and upload it to the data proxy node;
需求上传模块,用于数据购买者上传数据征集需求到数据代理节点;The demand upload module is used for data buyers to upload data collection demands to the data agent node;
列表生成模块,用于数据代理节点根据数据征集需求和加密数据,生成候选数据列表,并将候选数据列表和数据评分发送给数据购买者;The list generation module is used for the data proxy node to generate a candidate data list according to the data collection requirements and encrypted data, and send the candidate data list and data scoring to the data buyer;
购买模块,用于数据购买者根据候选数据列表和数据评分进行数据购买,生成购买信息,并通过数据代理节点发送给相应的数据持有者;The purchase module is used for data purchasers to purchase data according to the candidate data list and data scoring, generate purchase information, and send it to the corresponding data holder through the data proxy node;
下载信息生成模块,用于数据持有者根据购买信息,生成下载信息并通过数据代理节点发送给相应的数据购买者;The download information generation module is used for data holders to generate download information according to the purchase information and send it to the corresponding data purchaser through the data proxy node;
下载模块,用于数据购买者根据下载信息从数据代理节点下载加密数据并进行解密,得到原始数据。The download module is used for the data buyer to download encrypted data from the data agent node according to the download information and decrypt it to obtain the original data.
为了更好的说明本发明的技术效果,本发明提供如下具体实施例说明上述技术流程:In order to better illustrate the technical effects of the present invention, the present invention provides the following specific examples to illustrate the above technical process:
实施例1、针对传统中心化数据交易平台中存在的问题,本发明提供了一种基于区块链的个人数据交易的方法。该交易方法主要由四个实体组成,如图1所示,包括:Embodiment 1. Aiming at the problems existing in the traditional centralized data transaction platform, the present invention provides a method for personal data transaction based on blockchain. The transaction method mainly consists of four entities, as shown in Figure 1, including:
数据持有者:数据持有者可以是个人用户或者组织,他们可以根据数据购买者的数据交易需求决定是否出售自己持有的数据。Data holders: Data holders can be individual users or organizations, and they can decide whether to sell the data they hold according to the data transaction needs of data buyers.
数据购买者:数据购买者也可以是个人用户或者组织。他们可以启动智能合约,从数据持有者中获取到自己所需要的数据集。Data buyers: Data buyers can also be individual users or organizations. They can start smart contracts and obtain the data sets they need from data holders.
数据代理节点:数据代理节点是具有计算和存储的节点,主要负责数据存储,重新加密数据持有者的数据集,验证数据集和数据交易信息,并将相应的数据信息添加到区块链中。Data proxy node: The data proxy node is a node with computing and storage, mainly responsible for data storage, re-encrypting the data set of the data holder, verifying the data set and data transaction information, and adding the corresponding data information to the blockchain .
密钥发布中心:负责为数据持有者和数据购买者颁布证书。Key distribution center: Responsible for issuing certificates for data holders and data buyers.
本发明将基于区块链的个人数据交易方法分为以下几个部分:注册和存储数据,发布数据需求,参与数据征集,数据筛选,质量评分和奖励分配。具体流程交互如图2所示:The present invention divides the blockchain-based personal data transaction method into the following parts: registering and storing data, publishing data requirements, participating in data collection, data screening, quality scoring and reward distribution. The specific process interaction is shown in Figure 2:
1.数据持有者和数据购买者可以通过系统提供的注册程序获得匿名身份。通过使用ECC算法生成一对非对称密钥(PKi,SKi),并向密钥发布中心申请证书,之后对数据持有者公钥PKi做哈希运算得到该用户的账户aci,即aci=hash(PKi)。这个账户作为今后参与数据交易获得报酬的账户;1. Data holders and data buyers can obtain anonymous identities through the registration procedure provided by the system. Generate a pair of asymmetric keys (PK i , SK i ) by using the ECC algorithm, and apply for a certificate from the key issuing center, and then perform a hash operation on the data holder's public key PK i to obtain the user's account ac i , That is, ac i =hash(PK i ). This account will be used as an account to get paid for participating in data transactions in the future;
公钥是对系统中的所有用户公开的,在用户注册阶段密钥发布中心中会有数据持有者和数据购买者的公钥证书。The public key is open to all users in the system, and there will be public key certificates of data holders and data buyers in the key distribution center during the user registration phase.
2.数据持有者在储存个人数据集之前,需要在本地生成一个数据持有者密钥Keyi,对上传的数据加密,确保数据持有者的数据安全。在上传数据的同时需要填写相应的数据摘要信息对数据做出相应的描述,并使用数据持有者的私钥SKi对这份数据集进行签名。本发明要求的数据摘要信息格式具体如下:2. Before storing the personal data set, the data holder needs to generate a data holder key Key i locally to encrypt the uploaded data to ensure the data security of the data holder. When uploading data, it is necessary to fill in the corresponding data summary information to describe the data, and use the private key SK i of the data holder to sign the data set. The format of the data summary information required by the present invention is specifically as follows:
其中hash(Di)是原始数据的hash值,des是描述数据的信息,aci是数据持有者的账户,type是数据集类型,是数据持有者提供的数据签名。Where hash(D i ) is the hash value of the original data, des is the information describing the data, ac i is the account of the data holder, type is the type of data set, It is the data signature provided by the data holder.
3.当数据代理节点收到数据持有者上传的信息之后,如图3所示,会先做安全性检测,确保数据不含有危害系统的信息。之后对hash(Di)和区块链上现有的数据信息进行比对,如果存在相同数据,这说明存在交易平台中已经存在了相同的数据,则会拒绝数据持有者此次数据储存的请求。针对当前数据作为虚拟资产很容易进行复制传播的特性,导致数据很容易被复制交易,对数据持有者造成较大损失,因此,这一步检测非常有必要的。同时,在上传数据的同时,数据持有者支付一定的存储费用,和所占用的存储空间相关。3. After the data proxy node receives the information uploaded by the data holder, as shown in Figure 3, it will first perform a security test to ensure that the data does not contain information that endangers the system. Then compare the hash(D i ) with the existing data information on the blockchain. If the same data exists, it means that the same data already exists in the trading platform, and the data holder will be rejected for this data storage. request. In view of the fact that the current data is easy to copy and spread as a virtual asset, the data is easily copied and traded, causing great losses to the data holders. Therefore, this step of detection is very necessary. At the same time, while uploading data, the data holder pays a certain storage fee, which is related to the occupied storage space.
4.当数据比对通过之后,数据代理会对收到的数据集生成一个唯一标识DIDi,并生成存储证明。唯一标识DIDi的存储证明格式定义如下:4. After the data comparison is passed, the data agent will generate a unique identifier DID i for the received data set, and generate a storage certificate. The storage proof format that uniquely identifies DID i is defined as follows:
hash(Di)是原始数据的hash值,用于和数据集的摘要信息DS关联。是使用数据代理节点的私钥对DIDi进行签名,是数据集访问地址。针对区块链上区块大小容量有限的问题,本发明只把数据的摘要信息和存储证明上链储存,而对于原始的数据信息则存放在链下的数据库中。当数据被上链储存之后,数据持有者会收到唯一标识DIDi的存储证明并在智能合约上注册自己的唯一标识DIDi,方可参与数据交易。hash(D i ) is the hash value of the original data, which is used to associate with the summary information DS of the data set. is to use the private key of the data proxy node to sign DID i , is the data set access address. Aiming at the problem of limited block size and capacity on the block chain, the present invention only uses the summary information and storage certificate of the data It is stored on the chain, and the original data information is stored in the database under the chain. When the data is stored on the chain, the data holder will receive a storage certificate that uniquely identifies DID i And register your own unique ID DID i on the smart contract before you can participate in data transactions.
5.作为数据购买者可以在交易平台的智能合约,向交易平台内数据持有者发布自己的数据征集需求,本发明要求的数据征集需求格式定义如下:5. As a data buyer, the smart contract on the trading platform can publish its own data collection requirements to the data holders in the trading platform. The format of the data collection requirements required by the present invention is defined as follows:
DR=(type,num,cnum,des,acj,dl,s,r)DR=(type,num,cnum,des,ac j ,dl,s,r)
type表示需要征集的数据类型,num表示数据购买者需要的数据量,cnum表示本次数据征集最大的候选数量,一般来说cnum≥num,des表示用途描述,dl表示本次数据征集的截止时间,acj是数据购买者的账户,s表示最低的数据质量评分,r表示本次数据征集完成之后,数据持有者可以获得报酬。type indicates the type of data to be collected, num indicates the amount of data required by the data buyer, cnum indicates the maximum number of candidates for this data collection, generally speaking cnum≥num, des indicates the purpose description, and dl indicates the deadline for this data collection , ac j is the account of the data buyer, s means the lowest data quality score, and r means that after the data collection is completed, the data holder can get paid.
6.当是数据购买者的数据需求合约项在数据交易平台上发布之后,平台会向平台内的数据持有者进行一个消息推送,第一时间告知。此外,数据持有者也可以在交易平台上进行数据检索浏览到目前未截止的数据征求需求。6. When the data demand contract item of the data buyer is published on the data trading platform, the platform will push a message to the data holders in the platform, and inform them immediately. In addition, data holders can also perform data retrieval on the trading platform to browse the current unfinished data solicitation demand.
7.数据持有者通过可以查阅相关的数据征集需求DRi,可以通过判断数据类型type是否符合,目前还有多少可用参与名额,数据用途des是否可以接受,在截止时间dl之前是否还来得及,以及r奖励报酬是否符合自己的预期等诸多诸如因素共同考虑是否都要出售自己的数据。当数据持有者决定出售自己的数据集时,会把要出售的数据的唯一标识DIDi和存储证明添加到数据购买者发布的数据需求合约项的候选数据标识列表中。7. Data holders can check the relevant data collection requirements DR i , and can judge whether the data type type is in compliance, how many participation quotas are currently available, whether the data use des is acceptable, and whether it is still too late before the deadline dl, And many factors such as whether the r reward remuneration meets one's expectations and so on should be considered whether to sell one's own data. When the data holder decides to sell his own data set, he will send the unique identifier DID i and storage certificate of the data to be sold Added to the candidate data identification list of the data demand contract item released by the data buyer.
8.当某项数据征集需求的候选数据标识列表收到的数据量达到cnum所限定的数量,或者到dl所规定的时间期限。智能合约会根据候选数据标识列表中的唯一标识DIDi和存储证明检索到存储在区块链上的相应数据摘要信息,将返回给数据购买者一个候选数据摘要列表。8. When the amount of data received by the candidate data identification list for a certain data collection requirement reaches the quantity limited by cnum, or reaches the time limit specified by dl. The smart contract will be based on the unique identifier DID i in the candidate data identifier list and storage proof After retrieving the corresponding data abstract information stored on the blockchain, a list of candidate data abstracts will be returned to the data buyer.
9.当数据购买者收到数据集摘要列表之后,会查验数据的相关信息,主要看数据摘要和数据评价。对于之前从未参与过数据交易的数据集,可以通过查阅数据摘要信息,数据购买者决定是否要购买这份数据。针对有以往的数据评分S(DIDi)的数据集,数据购买者可以根据评分的高低决定是否要购买这份数据。9. After the data buyer receives the data set summary list, they will check the relevant information of the data, mainly looking at the data summary and data evaluation. For data sets that have never participated in data transactions before, data buyers can decide whether to purchase this data by consulting the data summary information. For the data set with previous data score S(DID i ), the data buyer can decide whether to buy this data according to the score.
10.当数据购买者从候选的数据集中确定所要购买的数据,会将要访问数据集列表返回给数据代理,要求查阅原始数据集信息,数据集访问请求定义为:10. When the data buyer determines the data to be purchased from the candidate data set, he will return the list of the data sets to be accessed to the data agent, requesting to consult the original data set information, and the data set access request is defined as:
request(datalist{DIDi,aci})request(datalist{DID i ,ac i })
其中datalist中是数据购买者所要请求访问的数据列表。数据代理会将DIDi,整理发给aci对应的数据持有者。数据持有者收到相关的数据集的DIDi之后,会检索到相关的数据集加密密钥(数据集加密密钥即为数据持有者密钥Keyi),之后用数据购买者公钥PKj加密,将加密公钥返回给数据代理。The datalist is the list of data that the data buyer requests to access. The data agent will arrange DID i and send it to the corresponding data holder of ac i . After the data holder receives the DID i of the relevant data set, it will retrieve the relevant data set encryption key (dataset encryption key It is the data holder’s key Key i ), and then encrypted with the data buyer’s public key PK j , and the encrypted public key Returned to the data agent.
当数据代理向数据持有者发起密钥授权申请时,即表明数据持有者参与某个数据购买者acj发布的数据征集被录用了,数据持有者可以从公钥证书中获取到数据购买者acj的公钥PKj,若是证书过期了,也可以向密钥发布中心获取其公钥证书。When the data agent initiates a key authorization application to the data holder, it means that the data holder has participated in the data collection issued by a data buyer ac j and has been hired, and the data holder can obtain the data from the public key certificate If the public key PK j of the purchaser ac j has expired, the public key certificate can also be obtained from the key distribution center.
11.数据代理将所有数据持有者的反馈汇总,将汇总信息交付给数据购买者。数据购买者得到数据访问列表数据购买者使用自己的私钥SKj对解密,得到对应数据集DIDi的数据集加密密钥并在相应的数据集访问地址下载加密数据,通过数据持有者的公钥PKi进行解密,得到原始数据。期间保证数据代理不会访问到数据的明文,确保数据的机密性。11. The data agent summarizes the feedback from all data holders and delivers the aggregated information to the data buyers. Data buyers get data access lists Data buyers use their own private key SK j pair Decrypt to get the data set encryption key corresponding to data set DID i And access the address in the corresponding dataset Download the encrypted data and decrypt it with the data holder's public key PK i to get the original data. During this period, it is guaranteed that the data agent will not access the plaintext of the data to ensure the confidentiality of the data.
12.数据购买者访问并使用收集到的数据,需要对所收到的数据进行数据质量评估。数据质量评估也会记录在区块链来上,对后面的数据购买者提供数据参考。质量评估主要从数据的完整性Si,准确性Sa,可用性Su,三个主要的方面对数据质量进行评分,数据购买者对数据集的评分定义为S=(Si,Sa,Su)∈((-s,s),(-s,s),(-s,s)),其中s是为了恶意数据购买者给予异常评价的阈值。因此某一个数据集DIDi的累计数据评分为:12. When data buyers access and use the collected data, they need to evaluate the data quality of the received data. The data quality assessment will also be recorded on the blockchain to provide data reference for subsequent data buyers. Quality assessment mainly evaluates data quality from three main aspects: data integrity S i , accuracy S a , and availability Su . S u ) ∈ ((-s, s), (-s, s), (-s, s)), where s is the threshold for abnormal evaluation given by malicious data buyers. Therefore, the cumulative data score of a certain data set DID i is:
S(DIDi)取得是累计数据评分的均值。S(DID i ) is the mean of the accumulated data scores.
13.当数据购买者完成了数据集评分之后,交易合约会进行奖励的分配,在所购买的数据集中可以通过DIDi关联到相应数据持有者的账户地址aci。对数据购买者在数据需求中所预付的奖励r进行分配。具体的奖励分配计算公式定义如下:13. After the data buyer completes the scoring of the data set, the transaction contract will distribute rewards, and the purchased data set can be linked to the account address ac i of the corresponding data holder through DID i . The reward r prepaid by the data buyer in the data demand is distributed. The specific reward distribution calculation formula is defined as follows:
其中Ni表示数据持有者提交的数据量。where N i represents the amount of data submitted by the data holder.
本发明一种基于区块链的个人数据交易的方法可达到以下优点:A block chain-based personal data transaction method of the present invention can achieve the following advantages:
1、在数据交易前,为数据持有者的数据确权,生成相应的数据存储证明,防止数据在平台上被转售。数据存储时需要进行加密,保证只有交易双方可以获得明文。1. Before the data transaction, confirm the data rights of the data holder and generate the corresponding data storage certificate to prevent the data from being resold on the platform. Data storage needs to be encrypted to ensure that only the parties to the transaction can obtain the plaintext.
2、作为数据提供的数据持有者,对数据是否会被参与交易,有着绝对的知情权和控制权。数据持有者自己决定自己的数据集会和那些数据购买者进行交易。2. As the data holder who provides the data, he has the absolute right to know and control whether the data will be involved in the transaction. Data holders decide for themselves whether their data sets will be traded with those data buyers.
3、要求数据购买者在发布数据征集时,需要预付款,保证数据持有者可以获得报酬。3. Data buyers are required to pay in advance when publishing data solicitation to ensure that data holders can get paid.
4、为数据购买者设计了选制的购买方式,提供足够多的数据选择,确保数据购买者可以获得到数据质量更好的数据集。4. An optional purchase method is designed for data buyers, providing enough data options to ensure that data buyers can obtain data sets with better data quality.
5、要求数据购买者需要对所收到的数据进行数据质量评估,为后面的数据购买者提供数据参考。5. Data buyers are required to evaluate the data quality of the received data and provide data reference for subsequent data buyers.
在本发明中,计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。而在本发明中,计算机可读的信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了计算机可读的程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。计算机可读的信号介质还可以是计算机可读存储介质以外的任何计算机可读介质,该计算机可读介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。计算机可读介质上包含的程序代码可以用任何适当的介质传输,包括但不限于:无线段、电线段、光缆、RF等等,或者上述的任意合适的组合。In the present invention, a computer-readable storage medium may be any tangible medium that contains or stores a program that can be used by or in conjunction with an instruction execution system, apparatus, or device. In the present invention, however, a computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, in which computer-readable program codes are carried. Such propagated data signals may take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing. A computer-readable signal medium may also be any computer-readable medium other than a computer-readable storage medium, which can send, propagate, or transmit a program for use by or in conjunction with an instruction execution system, apparatus, or device. . Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, optical cable, RF, etc., or any suitable combination of the foregoing.
在本发明所提供的几个实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述模块、模组或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元、模组或组件可以结合或者可以集成到另一个装置,或一些特征可以忽略,或不执行。In the several embodiments provided by the present invention, it should be understood that the disclosed devices and methods can be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of the modules, modules or units is only a logical function division. In actual implementation, there may be other division methods, such as multiple units , modules or components may be combined or may be integrated into another device, or some features may be omitted, or not implemented.
所述单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是一个物理单元或多个物理单元,即可以位于一个地方,或者也可以分布到多个不同地方。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units may or may not be physically separated, and a component displayed as a unit may be one physical unit or multiple physical units, that is, it may be located in one place, or may be distributed to multiple different places. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, each functional unit in each embodiment of the present invention may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit. The above-mentioned integrated units can be implemented in the form of hardware or in the form of software functional units.
特别地,根据本发明公开的实施例,上文参考流程图描述的过程可以被实现为计算机软件程序。例如,本公开的实施例包括一种计算机程序产品,其包括承载在计算机可读介质上的计算机程序,该计算机程序包含用于执行流程图所示的方法的程序代码。在这样的实施例中,该计算机程序可以通过通信部分从网络上被下载和安装,和/或从可拆卸介质被安装。在该计算机程序被中央处理单元(CPU)执行时,执行本发明的方法中限定的上述功能。需要说明的是,本发明上述的计算机可读介质可以是计算机可读信号介质或者计算机可读存储介质或者是上述两者的任意组合。计算机可读存储介质例如可以是但不限于电、磁、光、电磁、红外线段、或半导体的系统、装置或器件,或者任意以上的组合。In particular, according to the disclosed embodiments of the present invention, the processes described above with reference to the flowcharts can be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product, which includes a computer program carried on a computer-readable medium, where the computer program includes program codes for executing the methods shown in the flowcharts. In such an embodiment, the computer program can be downloaded and installed from a network via the communication part, and/or installed from a removable medium. When the computer program is executed by a central processing unit (CPU), the above-mentioned functions defined in the method of the present invention are performed. It should be noted that the computer-readable medium mentioned above in the present invention may be a computer-readable signal medium or a computer-readable storage medium or any combination of the two. A computer-readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, device, or device, or any combination thereof.
附图中的流程图和框图,图示了按照本发明各种实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段、或代码的一部分,该模块、程序段、或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个接连地表示的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或操作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in a flowchart or block diagram may represent a module, program segment, or portion of code that contains one or more logical functions for implementing specified executable instructions. It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or they may sometimes be executed in the reverse order, depending upon the functionality involved. It should also be noted that each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by a dedicated hardware-based system that performs the specified functions or operations , or may be implemented by a combination of dedicated hardware and computer instructions.
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何在本发明揭露的技术范围内的变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应以所述权利要求的保护范围为准。The above is only a specific embodiment of the present invention, but the protection scope of the present invention is not limited thereto, and any changes or replacements within the technical scope disclosed in the present invention shall be covered within the protection scope of the present invention . Therefore, the protection scope of the present invention should be determined by the protection scope of the claims.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202310056156.0A CN116011033A (en) | 2023-01-17 | 2023-01-17 | Personal data transaction method and system based on blockchain |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202310056156.0A CN116011033A (en) | 2023-01-17 | 2023-01-17 | Personal data transaction method and system based on blockchain |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN116011033A true CN116011033A (en) | 2023-04-25 |
Family
ID=86021013
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202310056156.0A Pending CN116011033A (en) | 2023-01-17 | 2023-01-17 | Personal data transaction method and system based on blockchain |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN116011033A (en) |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109462588A (en) * | 2018-11-13 | 2019-03-12 | 上海物融智能科技有限公司 | A kind of decentralization data trade method and system based on block chain |
| CN109657424A (en) * | 2018-12-11 | 2019-04-19 | 浙江大学 | A kind of remote sensing achievement copyright managing method based on block chain |
| CN109886812A (en) * | 2019-02-15 | 2019-06-14 | 航天恒星科技有限公司 | Blockchain-based data transaction system and method |
| CN111402055A (en) * | 2020-03-19 | 2020-07-10 | 合肥工业大学 | Decentralized data transaction method based on block chain |
-
2023
- 2023-01-17 CN CN202310056156.0A patent/CN116011033A/en active Pending
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109462588A (en) * | 2018-11-13 | 2019-03-12 | 上海物融智能科技有限公司 | A kind of decentralization data trade method and system based on block chain |
| CN109657424A (en) * | 2018-12-11 | 2019-04-19 | 浙江大学 | A kind of remote sensing achievement copyright managing method based on block chain |
| CN109886812A (en) * | 2019-02-15 | 2019-06-14 | 航天恒星科技有限公司 | Blockchain-based data transaction system and method |
| CN111402055A (en) * | 2020-03-19 | 2020-07-10 | 合肥工业大学 | Decentralized data transaction method based on block chain |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12107947B2 (en) | Multi-blockchain digital transaction information segregation system | |
| Zhang et al. | A design of digital rights management mechanism based on blockchain technology | |
| US8560456B2 (en) | System and method for an anonymous exchange of private data | |
| CN110766406B (en) | Resource transfer method, resource transfer device, storage medium and electronic equipment | |
| Zuo | Tokenizing renewable energy certificates (RECs)—A blockchain approach for REC issuance and trading | |
| US20110247029A1 (en) | Techniques for offering context to service providers utilizing incentives | |
| CN109493047A (en) | A kind of commission settlement method, device and terminal device based on block chain | |
| US20220012699A1 (en) | Distributed order book system | |
| KR20200077681A (en) | System for distribution of content files using smart contract based on block chain and method thereof | |
| US20110246213A1 (en) | Techniques for offering context to service providers utilizing an approval service and incentives utlizing online secure profile storage | |
| Truong et al. | Trust-free blockchain framework for AI-generated content trading and management in metaverse | |
| Liu et al. | A blockchain-based spatial data trading framework | |
| Liu et al. | Blockchain and mobile client privacy protection in e-commerce consumer shopping tendency identification application | |
| US20190294759A1 (en) | Digital Media Distribution Computer System | |
| Li et al. | Achieving fair and accountable data trading for educational multimedia data based on blockchain | |
| US20110246283A1 (en) | Approval service based techniques for offering context to service providers utilizing incentives | |
| CN116226532A (en) | Information recommendation method and related device based on federated learning | |
| US20110247030A1 (en) | Incentives based techniques for offering context to service providers utilizing syncronizing profile stores | |
| Müller et al. | DeCoCo: Blockchain-based decentralized compensation of digital content purchases | |
| Yue et al. | Jcdta: the data trading archtecture design in jointcloud computing | |
| CN116414875A (en) | Data processing device and data processing method | |
| Weber et al. | Trading user data: A Blockchain based approach | |
| CN116011033A (en) | Personal data transaction method and system based on blockchain | |
| CN117240605A (en) | Data transaction method, device, equipment and storage medium | |
| Li et al. | Achieving fair and accountable data trading scheme for educational multimedia data based on blockchain |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |