Home > News list > Data >> Blockchain

China Unicom Applies for "Data Secure Sharing" Patent Utilizing Blockchain Technology to Enhance Data Security

Blockchain 2025-01-28 15:22:33 Source:

China Unicom Applies for "Data Secure Sharing" Patent Utilizing Blockchain Technology to Enhance Data SecurityOn January 28, 2025, the State Intellectual Property Office of China revealed that China United Network Communications Group Co., Ltd

China Unicom Applies for "Data Secure Sharing" Patent Utilizing Blockchain Technology to Enhance Data Security

On January 28, 2025, the State Intellectual Property Office of China revealed that China United Network Communications Group Co., Ltd. (hereinafter referred to as "China Unicom") has applied for a patent titled "Data Secure Sharing Method, Apparatus, and Medium," with publication number CN119357289A and an application date of October 2024. The core of this patented technology lies in leveraging blockchain technology in conjunction with biometric identification and user behavior pattern recognition to significantly enhance the security of data sharing. This patent signifies a substantial step forward in China Unicom's technological innovation in data security and offers new possibilities for future, more secure and reliable data sharing models.

The patent abstract details the technical specifics of this method. The core idea is to build a dynamic and precise user access control system through multi-dimensional data collection and analysis. Specifically, the method first acquires at least one of the following: the user's real-time dynamic biometric characteristics, real-time continuous environmental factors, real-time behavioral parameters accessing blockchain data, real-time device information, real-time network parameters, real-time geographic location, and real-time timestamps. This information is then integrated to form a "user real-time access feature vector."

This "user real-time access feature vector" is not merely a simple collection of information but a carefully designed data structure that comprehensively reflects the user's current access status. It encompasses multi-dimensional data covering user identity, environment, and behavior, allowing for more accurate identification of user identity and access intent, effectively preventing unauthorized access. For example, real-time biometric information can effectively prevent identity theft; real-time device information can identify unusual access devices; and real-time geographic location can restrict the geographical scope of access permissions. The combined use of this information provides multiple layers of security for data.

Next, the method performs cluster analysis on this "user real-time access feature vector" against "user historical access feature vectors" pre-stored on the blockchain. Cluster analysis is a common data analysis method that groups data points with similar characteristics. By comparing the real-time access feature vector with historical access feature vectors through cluster analysis, the system can determine whether the current user's access behavior conforms to their past access patterns, thus judging the legitimacy of the access request.

This comparative analysis based on historical data effectively detects anomalous access behavior. If the user's real-time access feature vector differs significantly from the historical access feature vectors, the system flags it as an anomalous access, triggering corresponding security mechanisms, such as rejecting the access request or issuing an alert. This anomaly detection mechanism, based on machine learning, effectively improves the reliability of data security.

Based on the results of the cluster analysis, the system retrieves the "user access control policy" corresponding to the class containing the user's real-time access feature vector. The "user access control policy" is a predefined set of rules that specifies which data different types of users can access. By querying this policy, the system determines whether the user has permission to access the requested data. This policy-based access control mechanism effectively prevents data leakage and unauthorized access.

Finally, based on the determined "user access control policy," the system retrieves data from the blockchain and shares it with the user in real-time. The immutability and transparency of blockchain technology ensure the integrity and security of the data. Storing data on the blockchain effectively prevents data tampering or falsification.

In summary, China Unicom's applied patent for the "Data Secure Sharing Method, Apparatus, and Medium" cleverly combines blockchain technology, biometric identification, and user behavior pattern recognition to create a multi-layered, multi-dimensional data secure sharing system. It not only effectively prevents data leakage and unauthorized access but also improves the efficiency and security of data sharing, providing a new benchmark for future more secure and reliable data sharing models. The application of this technology will have a profound impact on data security management across various industries.

China United Network Communications Group Co., Ltd., established in 1994 and located in Beijing, is a large state-owned enterprise primarily engaged in telecommunications, broadcasting, television, and satellite transmission services. With registered capital and paid-in capital both amounting to RMB 10,481,551.957532 million, its strong financial backing provides a solid foundation for technological innovation. According to Tianyancha data, China Unicom has invested in 33 companies, participated in 3093 bidding projects, holds 3659 trademarks, 5000 patents, and 11 administrative licenses. This data fully reflects China Unicom's leading position and strong comprehensive strength in the telecommunications industry. This application for a "data secure sharing" patent is further strong evidence of China Unicom's continuous innovation and commitment to enhancing data security. The successful application of this patented technology will further consolidate China Unicom's competitive advantage in data security and provide strong technical support for its future development. It also provides valuable experience and reference for other companies exploring the field of data security. In the future, as the technology matures and its application deepens, this technology is expected to play a role in more fields, contributing to the creation of a more secure and reliable data sharing environment. This will not only promote the development of information technology but also help safeguard national information security.

Tag: Data China Unicom Applies for Secure Sharing Patent Utilizing


Disclaimer: The content of this article is sourced from the internet. The copyright of the text, images, and other materials belongs to the original author. The platform reprints the materials for the purpose of conveying more information. The content of the article is for reference and learning only, and should not be used for commercial purposes. If it infringes on your legitimate rights and interests, please contact us promptly and we will handle it as soon as possible! We respect copyright and are committed to protecting it. Thank you for sharing.

AdminSo

http://www.adminso.com

Copyright @ 2007~2025 All Rights Reserved.

Powered By AdminSo

Open your phone and scan the QR code on it to open the mobile version


Scan WeChat QR code

Follow us for more hot news

AdminSo Technical Support