Invented by Changzheng Wei, Ying Yan, Hui Zhang, Yujun Peng, Alibaba Group Holding Ltd, Advanced New Technologies Co Ltd

The market for blockchain-based data authorization methods has been rapidly growing in recent years. With the increasing need for secure and transparent data management, blockchain technology has emerged as a promising solution. This article will explore the market trends, key players, and potential applications of blockchain-based data authorization methods. Blockchain technology, originally developed for cryptocurrencies like Bitcoin, has gained attention for its ability to create a decentralized and immutable ledger. This technology can be leveraged to secure and authorize data in various industries, including finance, healthcare, supply chain, and government. One of the key drivers of the market for blockchain-based data authorization methods is the growing concern over data breaches and privacy issues. Traditional centralized systems are vulnerable to hacking and unauthorized access, leading to data leaks and identity theft. Blockchain offers a decentralized and tamper-proof solution, where data is stored across a network of computers, making it extremely difficult for hackers to manipulate or access sensitive information. The market for blockchain-based data authorization methods is also fueled by the increasing demand for transparency and accountability. With blockchain, every transaction or change made to the data is recorded and verified by multiple participants in the network. This ensures that data cannot be altered or tampered with, providing a high level of transparency and trust. Several key players have emerged in the market, offering blockchain-based data authorization solutions. IBM, one of the leading technology companies, has developed the IBM Blockchain Platform, which enables organizations to build and deploy blockchain networks. Other notable players include Microsoft, Oracle, and Amazon Web Services, which offer blockchain-as-a-service (BaaS) platforms that simplify the adoption of blockchain technology. The potential applications of blockchain-based data authorization methods are vast. In the finance industry, blockchain can be used to secure and authorize transactions, eliminating the need for intermediaries and reducing costs. In healthcare, blockchain can ensure the integrity and privacy of patient records, enabling secure sharing of data between healthcare providers. In supply chain management, blockchain can track and verify the origin and authenticity of products, reducing counterfeiting and improving traceability. Despite the promising potential, the market for blockchain-based data authorization methods still faces challenges. The scalability of blockchain networks is a major concern, as the technology currently struggles to handle large volumes of data and transactions. Additionally, regulatory and legal frameworks surrounding blockchain are still evolving, which may hinder widespread adoption. In conclusion, the market for blockchain-based data authorization methods is experiencing significant growth as organizations seek secure and transparent data management solutions. With the ability to provide decentralized and tamper-proof data authorization, blockchain technology offers a promising solution to address the growing concerns over data breaches and privacy issues. As the market continues to evolve, it will be interesting to see how blockchain-based data authorization methods shape the future of data management across various industries.

The Alibaba Group Holding Ltd, Advanced New Technologies Co Ltd invention works as follows

The present specification provides a method and apparatus for blockchain-based data authorisation. The method includes receiving by a blockchain, an authentication request from a privacy computing system, in which the authentication request queries whether the data owner has authorized a user to access target data. If the answer is yes, the blockchain can execute a smart contract invoked through the authentication to send an authorization token that instructs privacy computing to get the target information.

Background for Blockchain based data authorization method

The blockchain technology, also known as distributed ledger technology, is a decentralized database technology. The blockchain technology has many characteristics, including decentralization, transparency, trustworthiness and non-tampering. It is suitable for a variety of scenarios that require high data reliability.

In light of this, one implementation or more of the present specification provides a method and apparatus for data authorization based on blockchain.

To achieve the previous goal, one or several implementations of this specification provide the following technological solutions:

The first aspect of one implementation of the present specification is a blockchain-based method of data authorization. This includes: receiving by a node on the blockchain an authentication transaction from a privacy computing system, which is used to query if a user of target data has obtained authorization; and executing by the node a smart contract for data authorization invoked by the authentication contract, in which the smart contract is used: to confirm that the user of target data has obtained authorization, to provide an authorization token to the privacy computing system to instruct

The privacy computing system obtains an authorization token based on an activation of a smart contract for data authorization invoked by an authentication transaction. It then retrieves the target information when the token indicates the data users has obtained authorization.

The third aspect of one implementation of the present specification is a blockchain-based authorization apparatus, which includes: a receiving module, configured to allow a blockchain to receive an authentication request from a privacy computing system, wherein the authentication request is used to determine whether a user of target data has been authorized by the data owner. An execution module, configured to allow the blockchain to execute the data authorization contract invoked by the authentication transaction.

The fourth aspect of one implementation of the present specification is a blockchain-based authorization apparatus, which includes: a receiving device, which enables a privacy computing system to receive an acquisition request from a user for target data that is held by a user; a querying unit, which enables the privacy platform to submit an authenticating transaction to a Blockchain, in order to determine whether the user has authorization for target data; an acquiring unit, designed to allow the privacy platform to acquire an authorization token based on an authorization smart

Accordingly to a fifth element of one or more implementations, an electronic device, which includes: a computer; and a storage unit, is configured to store an executable processor instruction. The processor then implements the method of the first aspect, by running the executable instructions.

Accordingly to a sixth element of one or multiple implementations of this specification, a computer-readable storage medium is presented.” The computer-readable storage medium stores a computer instruction. “When a processor executes an instruction, the steps according to the first element are implemented.

The seventh aspect of a particular implementation of the present specification is an electronic device, which includes: a computer; a memory configured to store an executable processor instruction. The processor then implements the method of the second aspect, by executing the executable instructions.

Accordingly to an eighth aspect, one or more implementations are provided with a computer-readable storage medium. The computer-readable storage medium stores a computer instruction. “When a processor executes an instruction, the steps according to the second part of the method are implemented.

BRIEF DESCRIPTION DES DRAWINGS

FIG. “FIG.

FIG. “FIG.

FIG. “FIG.

FIG. “FIG.

FIG. “FIG.

FIG. “FIG.

FIG. “FIG.

FIG. “FIG.

FIG. “FIG.

Click here to view the patent on Google Patents.