Invented by Changzheng Wei, Ying Yan, Hui Zhang, Yujun Peng, Alibaba Group Holding Ltd, Advanced New Technologies Co Ltd
The Alibaba Group Holding Ltd, Advanced New Technologies Co Ltd invention works as follows
The present specification provides a method and apparatus for blockchain-based data authorisation. The method includes receiving by a blockchain, an authentication request from a privacy computing system, in which the authentication request queries whether the data owner has authorized a user to access target data. If the answer is yes, the blockchain can execute a smart contract invoked through the authentication to send an authorization token that instructs privacy computing to get the target information.Background for Blockchain based data authorization method
The blockchain technology, also known as distributed ledger technology, is a decentralized database technology. The blockchain technology has many characteristics, including decentralization, transparency, trustworthiness and non-tampering. It is suitable for a variety of scenarios that require high data reliability.
In light of this, one implementation or more of the present specification provides a method and apparatus for data authorization based on blockchain.
To achieve the previous goal, one or several implementations of this specification provide the following technological solutions:
The first aspect of one implementation of the present specification is a blockchain-based method of data authorization. This includes: receiving by a node on the blockchain an authentication transaction from a privacy computing system, which is used to query if a user of target data has obtained authorization; and executing by the node a smart contract for data authorization invoked by the authentication contract, in which the smart contract is used: to confirm that the user of target data has obtained authorization, to provide an authorization token to the privacy computing system to instruct
The privacy computing system obtains an authorization token based on an activation of a smart contract for data authorization invoked by an authentication transaction. It then retrieves the target information when the token indicates the data users has obtained authorization.
The third aspect of one implementation of the present specification is a blockchain-based authorization apparatus, which includes: a receiving module, configured to allow a blockchain to receive an authentication request from a privacy computing system, wherein the authentication request is used to determine whether a user of target data has been authorized by the data owner. An execution module, configured to allow the blockchain to execute the data authorization contract invoked by the authentication transaction.
The fourth aspect of one implementation of the present specification is a blockchain-based authorization apparatus, which includes: a receiving device, which enables a privacy computing system to receive an acquisition request from a user for target data that is held by a user; a querying unit, which enables the privacy platform to submit an authenticating transaction to a Blockchain, in order to determine whether the user has authorization for target data; an acquiring unit, designed to allow the privacy platform to acquire an authorization token based on an authorization smart
Accordingly to a fifth element of one or more implementations, an electronic device, which includes: a computer; and a storage unit, is configured to store an executable processor instruction. The processor then implements the method of the first aspect, by running the executable instructions.
Accordingly to a sixth element of one or multiple implementations of this specification, a computer-readable storage medium is presented.” The computer-readable storage medium stores a computer instruction. “When a processor executes an instruction, the steps according to the first element are implemented.
The seventh aspect of a particular implementation of the present specification is an electronic device, which includes: a computer; a memory configured to store an executable processor instruction. The processor then implements the method of the second aspect, by executing the executable instructions.
Accordingly to an eighth aspect, one or more implementations are provided with a computer-readable storage medium. The computer-readable storage medium stores a computer instruction. “When a processor executes an instruction, the steps according to the second part of the method are implemented.
BRIEF DESCRIPTION DES DRAWINGS
FIG. “FIG.
FIG. “FIG.
FIG. “FIG.
FIG. “FIG.
FIG. “FIG.
FIG. “FIG.
FIG. “FIG.
FIG. “FIG.
FIG. “FIG.