WO2018124297A1 - Bcn(ブロックチェーンネットワーク)を使用したデータ利用方法、システムおよびそのプログラム - Google Patents
Bcn(ブロックチェーンネットワーク)を使用したデータ利用方法、システムおよびそのプログラム Download PDFInfo
- Publication number
- WO2018124297A1 WO2018124297A1 PCT/JP2017/047345 JP2017047345W WO2018124297A1 WO 2018124297 A1 WO2018124297 A1 WO 2018124297A1 JP 2017047345 W JP2017047345 W JP 2017047345W WO 2018124297 A1 WO2018124297 A1 WO 2018124297A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- information processing
- information
- individual
- processing apparatus
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/389—Keeping log of transactions for guaranteeing non-repudiation of a transaction
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/88—Medical equipments
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
Definitions
- the present invention relates to a data utilization method, a system, a program, and a recording medium storing the program using BCN (block chain network).
- BCN block chain network
- the information is diverse, for example, data on user health, personal medical data such as hospital treatment, drug administration, daily shopping history information, daily access information for searching favorite information, etc. .
- Such information is stored as data together with time information and can be handled as personal history data.
- the shopping information is stored in the form of purchase, that is, scattered in each service, such as shopping with credit, shopping with cash, shopping with a debit card, and the like.
- history data for each service may be very biased. Furthermore, even in today's highly developed information systems, historical data related to each other's services can be divided by the systems that provide the individual services and used as data that is related to each other. It is hindered.
- AI artificial intelligence
- the present invention has been made paying attention to such a problem.
- the present invention provides a data utilization system and utilization method that enables an individual to actively use and use his / her own personal data and further conceal the data. .
- the present invention does not limit the object and the object of data, but for example, medical data that is personal information is also an asset of an individual. Patients often receive treatment across multiple hospitals for a number of reasons, including multiple illnesses and / or changing places of residence.
- Treatment data from multiple different medical institutions is an important treatment asset for the patient, but if they can be integrated and managed as medical data, they can be used in various ways. On the other hand, if such medical data is divided by a medical institution or the like, the necessary treatment is overlooked.
- information about how a patient recovered or did not recover as a result of continuous treatment or drug administration for the purpose of treating a disease is not only for the patient but also for many medical institutions. This is important information, and it makes it possible to provide further improved healing methods for other patients with similar diseases.
- medical data is personal information and must be strictly managed. Furthermore, the reliability and confidentiality of authentic personal data, and the reliability and confidentiality of medical activity contents (for example, treatment methods, medication methods, etc.) between medical institutions and individuals are also very important.
- the present invention provides a new method for distributing genuine information by a genuine individual and provides a new method so that the important information can be utilized.
- the present invention provides a distribution base for appropriately processing existing personal data relating to medical care and health, etc., and safely utilizing it.
- the present invention provides a new method and system that can effectively use data in a person's life and contribute to an improvement in the quality of life of an individual.
- the present invention is widely applied not only to diseases that have already occurred, but also to provide appropriate answers that respond to individual changes in order to prevent the occurrence of diseases and improve the quality of personal life. It is intended to provide a new method and system capable of managing behavior pattern data in time series.
- a method for obtaining and utilizing data related to personal information by an information processing apparatus used by the individual wherein the data related to the address on the blockchain network used by the individual is A block chain of data for access (ACT) including data for specifying the location of the data provided from the data provider and the step of transmitting the data related to the information to the data provider via the network
- ACT A block chain of data for access
- a method comprising: registering on a network; and referring to the access data (ACT) to obtain data related to the personal information.
- the data provided from the provider includes at least one of identification information of the individual, identification information of the information processing apparatus used by the individual, and identification information of the provider. .
- the data provided from the provider includes information indicating the generation time of the data, and the temporal history of the data can be referred to.
- the data provided from the provider is a data set composed of data relating to each of a plurality of data items generated based on a plurality of data which is history data relating to an individual.
- each of the plurality of data items is configured to indicate the latest data in the data set of the history data, and can be provided as the latest latest information. it can.
- At least data related to personal information is hashed by a hash function and is registered in the block chain as a ledger.
- the present invention further provides a system for obtaining and utilizing data related to personal information by an information processing apparatus used by the individual.
- the information processing apparatus of the system has at least a memory or a storage device connected to the information processing apparatus, and relates data related to an address on a blockchain network used by an individual to the personal information.
- Data to be transmitted to the data provider side information processing apparatus via the network, and access data including data for specifying the location of the data provided from the data provider from the provider side information processing apparatus A function of referring to (ACT) and a function of acquiring data related to the personal information based on the access data (ACT).
- the data provided from the provider includes identification information of an individual authorized to use.
- the data provided from the provider includes at least identification information of the information processing apparatus used by the individual, identification information of the provider, and information indicating the data generation time.
- the data provided from the provider is a data set composed of data relating to each of a plurality of data items generated based on a plurality of data that is history data relating to an individual.
- each of the plurality of data items includes a history The latest data in the data set of data is shown.
- At least data related to personal information is hashed by a hash function.
- the present invention provides a program for acquiring data related to personal information stored in an information processing apparatus used by the individual and executed by the first information processing apparatus, and a storage medium storing the program.
- the program refers to access data (ACT) registered on the block chain network based on the block chain address provided from the information processing device, and at least the information processing device or other information.
- the information processing apparatus is configured to execute data so that data related to the personal information stored in a storage apparatus that can be used by the processing apparatus can be acquired.
- the data related to the personal information includes the personal identification information.
- the data related to the personal information includes at least identification information of an information processing apparatus used by the individual, identification information of the provider, and information indicating a data generation time.
- the method disclosed in the present application further includes generating processed data based on data related to personal information referred to by an access ticket (ACT) by an auxiliary system capable of communication by an information processing device used by the individual; A step of transmitting processed data and personal inquiry data to a third party information processing device or information processing system by at least one of the auxiliary system or an information processing device used by the individual; And obtaining or referencing response data from the processing system by an information processing apparatus used by an individual.
- ACT access ticket
- the auxiliary system refers to access data (ACT) on the blockchain network to acquire data related to personal information.
- the auxiliary system is operated by an expert related to the data, or is operated through an information processing device used by the individual, and processing data is generated from data related to the personal information according to the contents of the personal inquiry. It is configured to be possible.
- the auxiliary system is configured such that an expert system or artificial intelligence system associated with the data is implemented, and the processing data is generated by the expert system or artificial intelligence system.
- the system disclosed in the present application further includes an auxiliary system that can communicate with an information processing apparatus used by an individual, and the auxiliary system is related to personal information referred to by the access ticket (ACT).
- Processing data can be generated based on the data to be processed, and processing data and personal inquiry data are transmitted to a third party information processing device or information processing system by at least one of the auxiliary system or the information processing device used by the individual.
- response data from a third party information processing device or information processing system is acquired or referenced by the information processing device or auxiliary system used by the individual.
- the auxiliary system is configured to be able to obtain data related to personal information with reference to data for access (ACT) on the blockchain network, and is operated by an expert related to the data, Or, it may be operated via an information processing device used by the individual, and the processed data may be generated from the data related to the personal information according to the content of the personal inquiry, or the auxiliary system is related to the data.
- An expert system or an artificial intelligence system may be implemented, and the processing data may be generated by the expert system or the artificial intelligence system.
- the present application discloses a program or a storage medium for storing the program, and the program is stored in a block on a block chain network by an auxiliary system that can be communicated by an information processing apparatus used by an individual.
- Processing data is generated based on data related to personal information referenced by the data for access to the chain (ACT), and the processing data is transmitted to a third party information processing apparatus or information processing system.
- An auxiliary system that is communicable by an information processing apparatus used by an individual is configured to execute so that answer data from the information processing apparatus or the information processing system can be acquired or referred to.
- the program may execute an auxiliary system so that data related to the personal information can be acquired with reference to access data (ACT) on the block chain network.
- the program is operated by an auxiliary system operated by an expert related to data, or operated through an information processing device used by an individual, and processed from data related to personal information according to the content of the personal inquiry.
- the auxiliary system may be configured to run so that data can be generated, or the processing data is generated by an expert system or artificial intelligence system associated with the data implemented in the auxiliary system,
- the auxiliary system may be configured to execute.
- FIG. 2 is a conceptual diagram in the case where personal data is updated in the storage device serving as the information providing resource in FIG. 1 and the storage device used by the user.
- FIG. 1 shows an example of the data structure of an access ticket (“ACT” for short) issued as access data when personal data is provided to a system other than the system that manages the personal data in the storage device of FIG. ing.
- 3 shows an example of the data configuration of master data (MA) and transaction data (TR) related to personal information created in each storage device of FIG.
- FIG. 5 shows an example of the data configuration of a data portion that is a data component of master data (MA) and transaction data (TR) in FIG. 4.
- FIG. 1 shows an example of the data structure of an access ticket (“ACT” for short) issued as access data when personal data is provided to a system other than the system that manages the personal data in the storage device of FIG. ing.
- 3 shows an example of the data configuration of master data (MA) and transaction data (TR) related to personal information created in each storage device of
- FIG. 4 is a conceptual diagram showing the interrelationship between a user, a storage device that provides the data, and an access ticket in which issuance histories are chained in the block chain 50.
- bonds different types of master data (MA) are shown.
- FIG. 11 shows an example of a system configuration for concealing personal information to be concealed and providing it to the information processing apparatus 60 based on the configuration of FIG.
- the present invention uses a block chain which is a core technology such as bit coin which is a virtual currency.
- the block chain is a distributed ledger for recording records (blocks) of transactions that occur in the network as chain-like blocks. Each transaction block is recorded in the ledger as a legitimate block chained in a chain by storing the hash value of the previously generated block content in addition to the transaction content.
- mining by a minor is performed to ensure that a chain of verified blocks is formed.
- closed type (private type) block chains that limit participants are known as block chains.
- Any type of blockchain may be used in the present invention.
- the block chain has various forms, but the block chain is not limited as long as the present invention can be implemented.
- P2P communication can use, for example, the Internet, a mobile communication network, a dedicated communication line, or the like. However, this is merely an example, and communication other than P2P communication may be used.
- an information processing apparatus for performing a transaction an information processing apparatus such as a personal computer or a portable smartphone or tablet can be used, but the present invention is not limited to this.
- the technology using the block chain is used in bit coins, which are virtual currencies.
- the block of virtual currency transaction data (for example, the amount of virtual currency to be traded, the user The payment address of the virtual currency, the public key used to generate the payment address of the user, and the hash value of the basic resources of the currency, etc.) are created on the chain in the blockchain network Is recorded.
- the transaction data is secured by using the hash value and the public key cryptosystem.
- the transaction data is widely distributed in order to verify the validity by the minor, and the validity of the transaction data is monitored.
- the present invention uses the block chain to promote the use of data referenced by the block while utilizing the validity of the block recorded in the block chain ledger. For example, by using a blockchain, in order to ensure the secrecy of data while ensuring the legitimacy of the history of data transactions, a specific authorized specific user or a specific user and a specific user You may make it restrict
- the actual transaction target data does not exist in the block, and the block has a structure or data that can refer to the actual transaction target data, for example, a pointer. Can be.
- FIG. 1 shows an example of the configuration of an asset data utilization system 1 according to the present invention.
- the user uses or manages the information in the information processing apparatus 10 for the provider. It is necessary that an agreement for the provision of information is made.
- the information processing apparatus 10 provider can provide the user's activity data to the user.
- the information processing apparatus 20 used by the user has already been authenticated and registered in advance, and is assigned a user identifier (UID), which is user identification information, and information for the user.
- UID user identifier
- a terminal (device) identifier DID that is identification information of the processing device 20 is uniquely registered in the information processing device 20 for the user.
- the blockchain address (also referred to as “BCN address” or “BCN Add” for simplification) for registering the ledger on the blockchain (BCN50 in FIG. 1) is registered in advance to the user. Has been.
- Each of the user and the provider is set up so that data communication can be electronically performed by the information processing device 20 for the user and the information processing device 10 for the provider.
- the user can use his / her BCN address (BNC Ads) to disclose his / her address on the blockchain network (BCN50) to the provider.
- BNC Ads BCN address
- the information is transmitted from the user information processing device 20 to the provider information processing device 10 (step (1)).
- the storage device 90 is the storage location.
- User data is acquired by the information processing apparatus 10 for the provider (step (3)).
- a data set of actual values (data) corresponding to one or a plurality of data items is generated from the received data in accordance with a predetermined data format (step (2) -1), and the data set is The transaction data (TR) is stored (uploaded) in the storage device 30 (step (2) -2).
- What items are added as elements of the data set is appropriately determined according to the contents of the agreement between the user and the provider, or the conditions such as items that the provider can provide and items that the user desires.
- a selection application program for providing the data is stored in each other's memory, and each application program is executed by each processing apparatus. When executed, the data items to be added to the transaction data (TR) are selected. Then, according to the selection, data corresponding to the data item is dropped into transaction data (TR) corresponding to a predetermined format.
- the contents of the dropped actual data are described in a format that can be read in correspondence with the data item, so that the information processing apparatus 10 for the provider can be used. It can be read by an information processing device 20 for a person or a third party terminal.
- the format for example, the JSON format can be used.
- the information processing apparatus 10 for a provider further has a program for generating transaction data (TR) and generating master data (MA) from the transaction data (TR).
- the provider information processing apparatus 10 is a side that provides data to the user, and the user is a side that receives data. However, as will be described later, the user can be a side that can provide the received data. Therefore, the functions of the application program of the information processing apparatus 20 for the user and the information processing apparatus 10 for the provider may be different, but it is not always necessary to have an application program having a different function, and an application having the same function. A program or an application program for executing any of the functions described later may be included.
- the provider's information processing apparatus 10 and the data resource identifier (SID) for specifying the BCN address (BCN Add) and the data resource. ) Is transmitted to the storage apparatus 30, and the information processing apparatus 10 for the provider that receives it generates an access ticket (ACT).
- the data provider can be specified, the data resource identifier (SID) is not limited to the terminal (device) identifier DID of the information processing apparatus 20 for the user, but is the identifier of the storage apparatus 30. There may be.
- the data resource identifier (SID) is any identifier. There may be.
- This access ticket is data to be recorded on the user's block chain.
- FIG. 3 is a data configuration diagram of an access ticket (ACT) according to an embodiment of the present invention.
- the access ticket (ACT) is a hash value of predetermined data so as to conform to the block chain.
- the element data is a hash value of the user's BCN address (BCN Add), a data resource identifier (SID), and a secret character string corresponding to the data resource identifier (SID).
- Hash As a hash function, for example, MD5 is used to obtain a 128-bit hash value.
- ACT a fixed-length access ticket (ACT) is recorded in the block chain network (BCN).
- the information processing apparatus 10 for the provider may notify the information processing apparatus 20 for the user separately from issuing the access ticket (ACT). Further, registration to the block chain network (BCN) may be performed via the information processing apparatus 20 for the user.
- the user can use the access ticket (ACT) to access the transaction data (TR) in the storage device 30 managed by the provider information processing device 10 and the master data (MA) generated therefrom. It becomes possible.
- Transaction data (TR) and master data (MA) have a predetermined format to enable users to refer to and manipulate data, and to provide data to other third parties.
- the original data for providing data by the provider exists separately as activity data at different times of the user. Therefore, a plurality of transaction data (TR) corresponding to each original data may be prepared although the types are the same.
- the original data for providing data by the provider includes activity data of different types, and there are cases where the recorded items of the data are different. Therefore, other transaction data (TR) having the same basic format but different record length and different data items to be recorded may be prepared.
- the request for personal data from the information processing apparatus 20 for the user is not necessarily once, but for the provider at a time so that the personal data generated for each activity can be received.
- the information processing apparatus 10 may be requested a plurality of times.
- the transaction data (TR) generated in the storage device 30 can be generated as one or a plurality of transaction data (TR).
- FIG. 1 illustrates an example in which one master data (MA) is created from one transaction data (TR) and provided to a user for the sake of simplicity.
- MA master data
- TR transaction data
- the storage device 30 has a program or macro instruction stored in a memory (not shown), and the program or macro instruction is executed by the processing device of the storage device 30.
- the program includes a macro instruction, and here, only the macro instruction is used separately for the sake of convenience.
- An access ticket (ACT) is generated based on the information (step (4)).
- the storage apparatus 30 may generate master data (MA) based on the transaction data (TR) (step (5)). Then, the access ticket (ACT) is returned to the information processing apparatus 10 for the provider (step (4) -1).
- the access ticket (ACT) gives the authority for the user to refer to and download the data used or managed by the information processing apparatus 10 for the provider. It is issued through the processing device 10 (step (4) -2).
- the transmission destination of the access ticket (ACT) is the user's BCN address (BCN Add) provided from the information processing apparatus 20.
- the user can obtain an access ticket (ACT) through the user information processing device 20 by accessing the BCN 50 (step (6)).
- the user can store the information directly or via the information processing apparatus 10 for the provider based on the information.
- the master data (MA) can be downloaded to the memory 21 of the information processing device 20 for the user (step (7)).
- FIG. 2 shows a conceptual diagram in which master data MA (1) to MA (n) are generated by receiving a plurality of data requests R1 to Rn and generating corresponding G1 to Gn.
- Each of the generated master data MA (1) to MA (n) is provided to the user as an added asset, and an access ticket is provided according to the data request R1 to Rn so that the user can refer to and acquire it.
- (ACT) may be transmitted to the BCN address (BCN Add), and the user may be able to access each of the master data MA (1) to MA (n).
- a block chain of the token is formed as a ledger, and the blocks are chained in time series of the transaction.
- ACT access ticket
- FIG. 4 is a data configuration diagram of transaction data (TR) and master data (MA) according to an embodiment of the present invention.
- the components of the transaction data (TR) and master data (MA) include the contents of the access ticket (ACT) issued for the user to indicate that the data is generated in response to the user's request. It is.
- the user can obtain the access right of the master data (MA) by the access ticket (ACT) by the information processing apparatus 10 for the provider.
- the access ticket (ACT) includes data resource identifier (SID) information (see FIG. 3), and the information processing apparatus 20 for users can access the data by referring to the information. It becomes.
- the basic components of master data (MA) and transaction data (TR) have a data part and an additional data part in addition to the access ticket (ACT) (see FIG. 4).
- FIG. 5A shows the components of the data part.
- the data part can be divided into a data header part and a data body part.
- the data header part is composed of a user identifier (UID), a terminal (device) identifier DID, and a data resource identifier (SID).
- UID user identifier
- DID terminal (device) identifier
- SID data resource identifier
- the data body part is composed of data (values) of items of 1 to k individuals.
- the value of k is an arbitrary number, and therefore the data length of the data part does not need to be fixed.
- the data body portion is further provided with a time stamp indicating the date and time when the transaction data (TR) or master data (MA) was created.
- TR transaction data
- MA master data
- FIG. 5B further shows additional data.
- the additional data is composed of a transmission address indicating a data transmission destination (for example, a user's BCN address) and an ACL condition for defining a data browsing condition (access condition).
- the ACL condition includes “start time” indicating the first accessible time, “end time” indicating the last accessible time, and “number of times” limiting the number of times of browsing.
- This access condition is an example, and it may be configured from various access conditions or combinations thereof.
- the information processing apparatus may be provided with an application program that can provide an interface that can be input by the user so that the user can set these conditions.
- both transaction data (TR) and master data (MA) were demonstrated, both data do not necessarily need to be the same structure.
- a data type item for facilitating distinction between data indicating transaction data (TR) or data indicating master data (MA) may be added to each.
- the additional data may not be included in the data structure of the transaction data (TR) and the master data (MA), but may be separately separated and stored in the storage device 30. When the additional data is separated, the additional data is associated with the transaction data (TR) or the master data (MA) and managed by the program of the storage device 30 or the application program of the information processing device 10.
- the information processing apparatus 10 for a provider and the information processing apparatus 20 for a user are legitimate if a person who intends to use the terminal is authorized. It has a function to authenticate whether it is a user.
- the information processing apparatus 20 for a user has a biometric authentication function such as fingerprint, vocal cord authentication, or blood vessel authentication, and performs personal authentication by uniquely associating the authentication data with an individual.
- the application program installed in the information processing apparatus 20 is permitted to be executed when personal authentication is performed and it is specified that the user is a valid user.
- the asset data utilization system 1 uses an information processing apparatus 10 for a data provider and an information processing apparatus 20 for a user to transfer the information from the information processing apparatus 10 to the information processing apparatus 20. Data.
- the information processing apparatus 20 for the user when data is provided to the information processing apparatus 20 for the user, it has an information processing apparatus 60 for a third party for providing the data separately. Also good.
- the provision of data from the user information processing apparatus 20 to the third party information processing apparatus 60 is basically the same as the provision of data from the provider information processing apparatus 10 to the user information processing apparatus 20.
- the process does not change. If the data is simply provided, the BCN address (BCN Add) may be the BCN address (BCN Add) used by the user, and the access ticket (ACT) is the user storage device. This is the access ticket (ACT) created at 40.
- the BCN address (BCN Add) is generated by the application program of the information processing apparatus 20 for the user, and the access ticket (ACT) is obtained from the information of the terminal (device) identifier DID of the information processing apparatus 20 for the user. Can be generated. Specifically, a BCN address (BCN Add) and an access ticket (ACT) are generated as follows in a relatively early stage before providing data from the user.
- the local application program of the user information processing apparatus 20 transmits a user identifier (UID) to the user storage apparatus 40 and instructs generation of a secret key.
- the program or macro instruction stored in the user storage device 40 generates a public key and a secret key in response to the instruction.
- the application program of the information processing apparatus 20 for the user When receiving the generation of the public key and the private key, the application program of the information processing apparatus 20 for the user generates a BCN address (BCN Add).
- the user storage device 40 receives the generated BCN address (BCN Add) and hashes it, and the hash value and a data resource identifier (D) indicating the terminal (device) identifier DID of the information processing device 20 for the user.
- the data resource identifier (SID) is not necessarily the terminal (device) identifier DID of the information processing apparatus 20 itself. There is no need, and the identifier of the storage device itself may be used, or information that can identify data may be used according to the secret sharing storage.
- the access ticket (ACT) can be notified to the information processing device 60 for third parties.
- master data (MA) to be provided to the information processing apparatus 60 for a third party is generated from the transaction data (TR).
- the information processing device 60 for a third party can obtain the master data (MA) data in the user storage device 40 via the BCN address (BCN Add).
- a third party can store the data in a storage device used by the information processing device 60 as needed, and can share the data.
- FIG. 7 shows an access ticket (ACT) registered in the block chain 50, a terminal (device) identifier DID and a user identifier (UID) of the information processing apparatus 20 for the user, and master data ( MA) shows the relationship of mutual linking according to the content of MA.
- a data resource identifier is described in a plurality of access tickets (ACT) chained in a chain, which substantially specifies the storage device 30 managed by the information processing device 10 for the provider. Acts as a pointer. Further, in the master data (MA) recorded in the storage device 30, a user identifier (UID) and a terminal (device) identifier DID are described as elements of the data header portion. It functions as a pointer of the information processing apparatus 20. The information processing apparatus 20 authenticates the user with the user identifier (UID) and generates a BCN address (BCN Add) with the user identifier (UID), which is an access ticket (BCN Add) on the BCN address (BCN Add). ACT) pointer.
- ACT access ticket
- the storage device 30 and the storage device 40 for storing transaction data (TR) and master data (MA) are secret sharing storage devices. Sexuality is further maintained.
- the information processing apparatus 20 for users has already prepared an environment for providing data on the block chain 50, and every time data of a predetermined form based on the specifications is posted to the block chain 50, the block chain 50 In the above, a data chain is formed by the hash value, and the security of the data is ensured.
- the actual data corresponding to the data can be stored in the storage device 30 or the user storage device 40.
- FIG. 8 is a conceptual diagram of generating new master data (MA) by generating master data from different types of transaction data generated in time series, further identifying the different types of master data (MA). .
- the vertical axis shows the passage of time. This time can be, for example, when each transaction data (TR) and master data (MA) is generated, and is indicated by a time stamp that is a data element thereof.
- transaction data (TR) two types of transaction data TR_A (m) and TR_B (n) (m and n indicate numbers in order of elapsed time) are generated.
- master data MA_A (m) and MA_B (n) are generated.
- master data MA_C (h) h is a number in order of elapsed time). Is generated).
- the master data (MA) is also used as transaction data (TR) for generating the next master data (MA).
- the transaction data TR_A (m) and TR_B (n) may be generated in the storage apparatus 30 used by the information processing apparatus 10, but different storage apparatuses used by different information processing apparatuses. May also be generated. It depends on how user data is managed externally.
- master data MA_C named with the same user identifier (UID) in the same storage device. h
- the master data (MA) for example, MA_A (2) and MA_B (1)
- the master data (MA) stored in the storage device 40 used by the information processing device 20 for use in the information processing device 20 may be generated.
- the master data (MA) that has been identified is different from conventional data resources because the generated storage device side becomes a new resource. Therefore, the data resource identifier (SID) is changed to a data resource identifier (SID) that can refer to the newly generated master data (MA).
- a plurality of types of transaction data can be obtained from the same data resource or from a plurality of data resources.
- TR transaction data
- it can be used as new data that complements each other's data.
- the name identification rules differ depending on the type of data, and may be determined as appropriate according to the data items.
- new master data (MA) in which a new data item indicating another index is created from data items of a certain master data (MA) and another type of master data (MA) can be used.
- the generation of this new data item includes, for example, generating new data including calorie calculation by merging data from data resources related to exercise data and data resources related to meal data. .
- the application program of the information processing apparatus 20 for the user receives data from the information processing apparatus 10 for the provider (including the storage apparatus 30). And two major functions of providing data to third parties.
- the data is received by referring to the access ticket (ACT) transmitted from the provider information processing apparatus 10 via the block chain or the history of the access ticket (ACT), and processing information for the user. It is possible to acquire data from the device 10 or upload data held by the processing device to a storage device (preferably secret sharing storage, hereinafter the same) used by the processing device. It is.
- the user information processing apparatus 20 can also provide data in the same manner as the provider information processing apparatus 10, and there is simply a BCN address owned by itself.
- BCN Add BCN address
- BCN Add BCN address
- ⁇ It is not preferable to let normal users perform such detailed steps. Therefore, in order not to become complicated for the user, a series of procedures can be grouped on the display display screen of the information processing apparatus 20 for the user so that the user can perform it with a single button, or by a simple operation.
- a user interface is provided by the application program.
- FIG. 9 is a conceptual diagram of a medical information utilization system for utilizing medical data as one embodiment according to the present invention.
- a plurality of types of transaction data (TR) as shown in FIG. 8 are obtained from different institutions.
- the central part shows users, and the medical institution, medical data cloud, and healthcare business company on the left are medical organizations that users use (activate). Normally, each has different medical data, which is acquired in the secret sharing storage of the user, and new master data (MA) is generated by naming the data as necessary.
- MA master data
- medical data stored as an in-hospital database of a medical institution such as a hospital
- medical data stored in a medical data cloud accessed and used by a medical institution or a business company that performs personal healthcare (for example, mental health care)
- data stored by companies that provide services that support measures for health and lifestyle-related diseases There are a number of different types of medical data related to personal mind and body.
- medical data stored as an in-hospital database of a medical institution such as a hospital
- medical data stored in a medical data cloud accessed and used by a medical institution or a business company that performs personal healthcare (for example, mental health care)
- business company that performs personal healthcare (for example, mental health care)
- data stored by companies that provide services that support measures for health and lifestyle-related diseases for example, lifestyle-related diseases.
- the data stored in the secret shared storage based on the consent formation is agreed with the right medical institution or healthcare business company to provide data, and the required data is transferred from the user's secret shared storage to the medical institution or healthcare business. It can be provided to the company.
- a blockchain network is used to ensure authenticity and authenticity of legitimate individuals and to ensure the authenticity of data that has not been tampered with. Data reliability is ensured by making it impossible to tamper with data by chaining.
- the data to the blockchain is not actually medical data, and the medical data is indicated by a pointer recorded in the blockchain network, and the pointer destination is the secret distributed storage. Are distributed, ensuring confidentiality and difficulty of falsification, and even if data is partially damaged or lost, it is possible to cope with it.
- Data can be collected in units of data resource provision, and even if new data or data updates are added, it can be composed of one record by blockchain. Can be viewed.
- the regular examination data of Mr. A can be referred to by one record on the BCN, it is possible to browse retroactively from the latest examination to the past examination data.
- transaction data (TR) and master data (MA) generated therefrom will be described using medical data as an example.
- 10A and 10B show only the data body portions of transaction data (TR) and master data (MA).
- the data body part may be a single item, but usually there are a plurality of data items as in this example.
- transaction data TR_A and TR_B there are two types of transaction data TR_A and TR_B. Each is numbered in parentheses in order of time of occurrence for ease of understanding.
- transaction data TR_A is biodata obtained based on “physical measurement”
- transaction data TR_B is biodata obtained based on measurement of “vital”.
- each type of transaction data TR_A and TR_B is composed of different data items, and each data item has personal data (or value). A portion where personal data is not obtained is indicated by “null”. That is, the transaction data (TR) is a data set in which a plurality of items of data related to individuals are combined, and the plurality of transaction data (TR) indicates the history.
- What each item indicates and in what unit is managed by the application program installed in the information processing device or the memory or storage device of the information processing device.
- the data item data is associated with what item data indicates.
- the latest master data (MA) preferably indicates the latest data of the individual data, here, for each data item, the latest master data (MA) is the past transaction data (TR). ) Are ruled and programmed to show the latest data. However, the “null” part is ignored because the data is not obtained. That is, in a plurality of data sets (TR) that are histories about an individual, each item indicates the latest data in the data set of the history data. For example, in the first transaction data TR (1), master data MA (1) is generated using the data. In the next transaction data TR (2), MA (2) generated corresponding to the transaction data TR (2) is a combination of the transaction data TR (2) and the previous master data MA (1). The latest data is shown for each data item while ignoring the “null” part.
- FIG. 10A shows the data contents of the transaction data (TR) and master data (MA).
- the program In addition to updating to the master data (MA), the program has a name identification function, that is, a function for combining master data (MA). An example is shown in FIG. 10B.
- the “generated master data (MA)” in FIG. 10B is the master data (MA_A and MA_B) generated corresponding to each transaction data (TR) in the order of generation of the two types of transaction data TR_A and TR_B in FIG. 10A. ) Are arranged.
- newly generated master data MA_C is shown in the order of arrangement.
- the rule for generating the master data MA_C here is the same as in FIG. 10A.
- the plural types of master data (MA) may be obtained from different data resource identifiers, but by referring to the user identifier (UID) existing in the master data (MA), the master data of the same user is obtained. It is possible to generate new master data (MA) by combining only (MA).
- UID user identifier
- the join generation based on the master data (MA) may be programmed not only to read the contents (data) of the corresponding data item but also to be more advanced processing.
- the data items of transaction data (TR) are body fat weight (kg) and body weight (kg), and the combined generation program includes a calculation program of body fat weight (kg) ⁇ body weight (kg) ⁇ 100. It is good also as the data of the data item which provided and the body fat rate (%) which is the calculation result newly produced
- a combination generation program may be provided as appropriate according to the purpose, and by performing data combination generation from different user identifiers (UIDs), further advanced data utilization is possible. .
- UIDs user identifiers
- the user describes the identifier of the storage device used by the user or the processing device 20 managing the user in the content of the access ticket (ACT), and corresponds to the own BCN address. If it is recorded in the ledger, it is possible to refer to its latest data and past data from the storage device. In addition, it will be possible to provide its own data to a third party, so that the user can easily operate these processes, for example, "test result” button, "pass to the doctor” "past results", These buttons may be prepared on the operation screen as a user interface.
- the block chain address (BCN Add) is converted into a QR code (registered trademark) and the application
- the program may read the QR code (registered trademark) with a camera provided in the information processing apparatus and transmit it to the other party as a BCN address.
- a plurality of data at different times can be stored in the storage apparatus 30 for the user so that the user of the information processing apparatus 20 can use it. That is, an environment in which personal data such as health status can be centrally managed and stored electronically can be established, and data corresponding to the passage of time can be acquired.
- the data that can be managed in chronological order is not limited to medical data indicating a health condition such as a periodic medical examination result that changes over time, but may be general personal data that changes over time.
- this aggregated data from the past to the present is managed by a ledger by a chained access ticket (ACT) and can be referred to. Therefore, data from the past to the present may be distributed and stored in the plurality of storage devices 30.
- ACT chained access ticket
- the data of a legitimate user who has been personally authenticated by the information processing device 20 is stored in the storage device 30, and a chained access ticket (ACT) ledger on the blockchain network (BCN). Can be referred to.
- ACT chained access ticket
- FIGS. 1 and 6 personal data is created in the storage device 40 for the user, and the access ticket (ACT) on the block chain network (BCN) is referred to for the third party. It has been explained that the personal data can also be accessed by the information processing apparatus 60.
- the data in the user storage device 40 that can be accessed by the information processing device 60 for the third party can be used for new activities of the user of the information processing device 20, and the information for the third party can be used.
- the data in the user storage device 40 can be used for new activities of the user of the information processing device 20, and the information for the third party can be used.
- By providing data to the processing device 60 more useful information and services can be received from a third party of the information processing device 60.
- the user's consent is obtained, it can be effective information for other users' use, so that the range of effective use of the user's own data is expanded and the value of the data itself is improved.
- This information processing device 60 for a third party is an information processing system such as an AI (artificial intelligence) system based on machine learning that has been developed today, or a program or system that is executed on a block chain based on a contract of both parties. It can also include highly automated smart contracts for returning answers to queries.
- AI artificial intelligence
- the information processing apparatus 60 may be highly automated, or may be operated so as to reply to received data by an operation by a specialist.
- the information processing apparatus 60 is an AI (artificial intelligence) system
- the user can receive an AI response based on data provided by the user by asking the AI (artificial intelligence) system. is there.
- FIG. 11 shows the configuration of the basic system. 11 and FIG. 1 and FIG. 6 are basically different from each other in FIG. 11 in which an auxiliary system 100 is provided between the storage device 30 and the user storage device 40, and the information processing device. A storage device 120 for storing response data from 60 is provided.
- the auxiliary system 100 can communicate with the information processing device 20 for users and can be accessed by the user, and can be accessed from the storage device 30 according to the inquiry content from the information processing device 20 for users.
- the stored data is extracted and converted into processed data for processing in the information processing apparatus 60.
- the processed data can be generated according to the purpose of the user of the information processing apparatus 20.
- the auxiliary system 100 has a memory for storing an application program for executing the function described below. Among the functions of the application program stored in the auxiliary system 100 and the function of the application program stored in the memory of the information processing apparatus 20 in order to cooperate with the information processing apparatus 20 for the user, they are shared with each other. Possible functions may be appropriately selected as to which function is given.
- the generated processed data is stored in the user storage device 40, and can be provided to the information processing device 60 by a method similar to the method described with reference to FIG. 6, for example.
- data related to a user inquiry is also received from the information processing apparatus 20.
- the user's inquiry may be received directly from the information processing apparatus 20 or may be received from the auxiliary system 100.
- the processed data may also be received directly from the auxiliary system 100 or received from the information processing apparatus 20.
- the information processing device 60 generates response data from the received processed data according to the inquiry content of the user of the information processing device 20, and the response data is stored in the storage device 120.
- the storage device 120 may be the user storage device 40 or a separate storage device, and the history data is stored in the block chain 50 as a new access ticket (ACT) and the user of the information processing device 20 is used. It may be added to the ledger. Further, as already described, it may be a distributed storage.
- the information processing device 20 for the user may be able to refer to the response data obtained from the information processing device 60 as one of the transactions, Alternatively, the data may be acquired.
- the data stored in the storage device 120 may be transmitted to the auxiliary system 100 or referred to by the auxiliary system 100, or may be acquired.
- the auxiliary system 100 may also be set so as to be able to access data stored in the storage apparatus 120 with reference to the block chain for the user of the information processing apparatus 20.
- the auxiliary system 100 can verify the data sent from the user storage device 40 to the information processing device 60. For example, since the storage system 30 can store new data created after the data used by the auxiliary system 100 to create machining data, the auxiliary system 100 acquires subsequent data, The validity of the answer received from the information processing apparatus 60 can be verified. For example, in the case where the disease name of the user of the information processing device 20 to which the information processing device 60 has answered is the disease name A, when the actual disease name of the user stored in the storage device 30 later is the disease name B The answer for the wrong disease name was obtained. The auxiliary system 100 verifies this mistake and changes the selection of data to be extracted so that a more appropriate answer can be obtained thereafter. In some cases, the information processing apparatus 20 is requested to send insufficient data. You may make it do.
- the auxiliary system 100 analyzes the content of the inquiry from the information processing device 20, determines which data is extracted from the storage device 30, determines what data is processed, and the information processing device 60 A comparison can be made with the obtained answer data to verify whether the answer data is valid.
- the auxiliary system 100 may be an information processing apparatus or system configured to automatically perform these functions, or may be necessary depending on the operation of an expert related to the content of the data to be inquired. It may be configured to be operable so as to perform data processing, or may be configured to be remotely operable from a user through the information processing device 20, and is a combination of them. It may be. If the auxiliary system 100 and the information processing apparatus 60 implement the AI technology, an AI-AI dialogue is performed between the auxiliary system 100 and the information processing apparatus 60, and mutual deep Learning (deep learning) provides more appropriate data and answers.
- deep learning deep learning
- the user's personal data from one or a plurality of institutions can be stored in one or a plurality of storage devices 30.
- This data is personal data
- the access ticket (ACT) constituting the ledger on the block chain 50 also has information for identifying the individual.
- FIG. 12 discloses an example of a configuration for anonymizing personal information before providing the personal information to be concealed to the information processing apparatus 60 based on the basic configuration of FIG.
- the personal data for the user of the information processing apparatus 20 in the storage apparatus 30 can be referred to by the access ticket (ACT) on the block chain 50 shown in FIG.
- An application of the information processing apparatus 20 for a user can access personal data in the storage apparatus 30 with reference to a block chain (BC) made up of the access ticket (ACT).
- the distributed storage devices 30 (1) to 30 (m) (hereinafter simply referred to as “storage device 30”) have transaction data (TR) and master data (MA) generated over time. ) Is formed.
- FIG. 11 differs from FIG. 11 in that the personal data of the user of the information processing apparatus 20 is stored in the storage apparatus 40 as anonymized data (hereinafter referred to as anonymous data).
- the data is also stored in the storage device 120 as anonymous data. Therefore, a block chain based on an access ticket (ACT) for referring to the anonymous data of the user stored in the storage device 40 is separately provided on the BCN.
- ACT access ticket
- this anonymous data cannot identify an individual by its own information, it is unique data, and the individual is identified from the anonymous data on the application of the information processing apparatus 20 for the user who authenticates the individual user. I can do it.
- the auxiliary system 100 generates anonymous data as processed data to be provided to the information processing device 60 from personal data stored in the storage device 30.
- a block chain (ABC (anonymous BC)) composed of an anonymous access ticket (AACT (anonymous ACT)) is used instead of the block chain (BC). It is formed at an address on the BCN registered by 20 users.
- the anonymity access ticket (AACT) can be generated by the application of the information processing apparatus 20 for the user instead of the auxiliary system 100.
- the application can access the anonymized data in the storage device 40 with reference to the access ticket (AACT) of the block chain ABC (anonymous BC) on the anonymization area side.
- AACT access ticket
- AACT block chain ABC
- the anonymization region and the non-anonymization region do not need to physically exist, but are conceptually described in order to facilitate understanding of the present invention.
- the application manages personal authentication information, and on the condition that the user has been personally authenticated, the user can access the non-anonymity domain access ticket (ACT) described above, It is possible to refer to the access ticket (AACT) of the anonymity area.
- AACT access ticket
- the authentication number for activation etc. will be processed in advance for the user so that a legitimate individual can access their data using the application. You may make it show on the display of the apparatus 20. FIG. As a result, even if another information processing device has to be used, it is possible to use that application on a new information processing device by using a reserved activation authentication number. To do.
- the personal data of the user of the information processing apparatus 20 stored in the storage apparatuses 90 (i) to 90 (n) managed by a plurality of institutions is the relationship between the user and the plurality of institutions.
- a series of transaction data (TR) that can be used by the information processing apparatus 20 for the user in the storage apparatus 30 and master data (MA) generated from the transaction data (TR) are generated.
- the information processing apparatus 20 generates an access ticket (ACT) block chain ledger at an address on the block chain network that can be used by the user.
- ACT access ticket
- the plurality of access tickets (ACT) chained in a chain form have pointer information such as addresses indicating the location of transaction data (TR) and master data (MA) in the storage device 30 so that each user can refer to them. is doing.
- the pointer information may be any information as long as it indicates the location of the data and can refer to the data from the contents.
- the transaction data (TR) and the master data (MA) have time stamps as described above, the contents of the transaction data (TR) and the master data (MA) can be grasped in time series. It can be managed.
- the user information processing apparatus 20 and the auxiliary system 100 are configured to be able to communicate with each other, and the auxiliary system 100 receives the content of the inquiry desired by the user from the information processing apparatus 20.
- the auxiliary system 100 can refer to the access ticket (ACT) that constitutes the block chain from the information processing apparatus 20 for the user, and refers to the access ticket (ACT) to convert the data to the storage apparatus 30 into data. It is possible to access.
- the auxiliary system 100 extracts one or more necessary data from the data according to the content of the user's inquiry received from the information processing apparatus 20.
- a combination of one or a plurality of transaction data (TR) and master data (MA) may be used, or new master data (MA) is generated from a plurality of transaction data (TR) and stored in the storage apparatus 40.
- You may make it store. Which data is used can be appropriately determined according to the contents of the inquiry and the contents of the data.
- the important point here is that the data has time information, and a plurality of data at different times can be stored together with the time information, so that the data can be grasped as a personal time history. Therefore, in order to provide the information processing device 60 with personal data that changes over time rather than as current transient data, it is possible to determine the medical condition or medical condition of an individual who requires observation data over time. It becomes effective.
- the information processing apparatus 20 for the user newly forms an access ticket (ACT) block chain having a pointer for specifying the position so that the data stored in the storage apparatus 40 can be referred to. .
- access ticket (ACT) constituting the new anonymity blockchain
- AACT (1) to AACT are used.
- L A reference symbol of (anonymous ACT). As shown in FIG.
- the auxiliary system 100 does not directly refer to the non-anonymity access ticket (ACT) or the anonymity access ticket (AACT) more directly, but the information processing apparatus for the user.
- the application may be referred to via the 20 applications, and by the cooperation of the application and the auxiliary system 100, the functions are shared with each other so that data processing and storage in the user storage device 40 are performed. May be.
- the application of the information processing apparatus 20 sends the processing data in the storage apparatus 40 and information inquiries or questions to be asked as answers (collectively referred to as “inquiry”) to the information processing apparatus 60 via the network. To send. This inquiry may be made from the auxiliary system 100 instead of the application of the information processing apparatus 20.
- the auxiliary system 100 may be an information processing device or system that is operated by a specialist according to the content of data to be handled, such as medical treatment, an information processing device incorporating the expert system, or has artificial intelligence. It may be an information processing apparatus or system that is mounted. Furthermore, what compounded them may be used.
- the information processing apparatus 60 is an AI (artificial intelligence) system configured to perform automatic data processing so as to send back data that matches data from the user and inquiry content as an answer, It may also include a program or system running on a highly automated blockchain to return a matched answer to a query based on both contracts, or a highly specialized system.
- the information processing apparatus 60 and the auxiliary system 100 may function as an organic integral with each other, or the whole may function as an auxiliary system of the block chain technology.
- the information processing device 60 returns the answer data provided from the storage device 40 as a price in accordance with the received inquiry or question content and data.
- the reason for the consideration is that the data provided from the storage device 40 is valuable personal data, and by utilizing the data, it becomes a source for extracting useful information as an answer. The source can therefore have valuable value.
- the storage apparatus 120 which is a conventional data storage unit, is shown as an example.
- the information processing apparatus 60 may be able to reply to the user of the information processing apparatus 20 as a virtual currency on the BCN. In particular, by using a smart contract, acquisition of the consideration as the virtual currency is performed more smoothly.
- the answer data stored in the storage device 120 can be compared with the data sent from the storage device 40 by making it accessible by the auxiliary system 100. Therefore, it is possible to improve the data processing accuracy of the auxiliary system 100 by forming a feedback that can compare the given information with the obtained information.
- Anonymity access ticket (AACT) indicating the data may be further added to the anonymity block chain (ABC) so that the data stored in the storage device 120 can be referred to.
- AACT Anonymity access ticket
- the information processing apparatus 20 and the auxiliary system 100 can also access the answer data acquired from the information processing apparatus 60 for third parties from the anonymity block chain (ABC).
- the auxiliary system 100 may be an information processing device or system that is operated by a specialist according to the contents of data to be handled, such as a medical examination or medical treatment, or an information processing device in which a specialist system is incorporated, or It may be an information processing device or system that implements artificial intelligence, or the auxiliary system 100 is operated by an application programmed so that the implemented artificial intelligence or expert system performs the functions described above. It may be an information processing apparatus or system configured as described above.
- (Item 1) A method for acquiring and utilizing data related to personal information by an information processing device used by the individual, Transmitting data related to an address on the blockchain network used by the individual to a provider of data related to the personal information via the network; Issuing and registering access data (ACT) including data relating to the address and data for identifying a data provider from the provider to the address of the blockchain network; and Referring to the access data (ACT) from the address of the blockchain network, identifying a data provider, and obtaining data related to the personal information from the identified provider; Data utilization method consisting of (Item 2) The data utilization method according to Item 1, wherein the data provided from the provider includes identification information of an individual authorized to use the information processing apparatus. (Item 3) 3.
- the data utilization method according to any one of items 1 to 2, wherein the data provided from the provider includes identification information of an information processing apparatus used by the individual.
- the data (MA) provided from the provider is a data set composed of data relating to each of a plurality of data items generated based on a plurality of data (TR) which is history data relating to the individual.
- TR plurality of data
- a system for obtaining and utilizing data related to personal information by an information processing device used by the individual comprising the information processing device, The information processing device has at least a memory or a storage device connected to the information processing device, The information processing apparatus transmits data related to an address on the block chain network used by the individual to a provider side information processing apparatus having a storage device that is a source of data related to the personal information via the network.
- Function to Reference is made to access data (ACT) issued from the provider-side information processing apparatus to the address of the blockchain network, including data relating to the address and data for identifying the data provider.
- Data utilization system with (Item 10) 10 10.
- the data provided from the provider includes at least identification information of an information processing apparatus used by the individual, identification information of the provider, and information indicating data generation time, items 9 to 10
- the data (MA) provided from the provider is a data set composed of data relating to each of a plurality of data items generated based on a plurality of data (TR) which is history data relating to the individual.
- the data utilization system described in any of the above.
- (Item 13) 13 The data utilization system according to item 12, wherein each of the plurality of data items indicates the latest data in the history data set.
- (Item 14) 14 The data utilization system according to any one of items 9 to 13, wherein at least data related to the personal information is hashed by a hash function.
- (Item 15) A program for acquiring data related to personal information stored in an information processing apparatus used by an individual and executed by the first information processing apparatus, Providing a blockchain address to another information processing apparatus; Based on access data (ACT) including information on the block chain address transmitted from the other information processing device based on the block chain address, the other information processing device or a storage device used by the information processing device The program which acquires the data relevant to the said personal information produced
- (Item 16) 16 16.
- Items 15 to 16 include at least identification information of an information processing apparatus used by the individual, identification information of the provider, and information indicating a data generation time, in the data related to the personal information.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Power Engineering (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
例えば、最初のトランザクションデータTR(1)では、そのデータを使用してマスターデータMA(1)を生成する。次のトランザクションデータTR(2)では、そのトランザクションデータTR(2)に対応して生成されたMA(2)は、トランザクションデータTR(2)と、その前のマスターデータMA(1)を組み合わせて生成され、“null”の部分は無視しながら、各データ項目について、最新のデータを示すようにする。
時系列に管理できるデータは、年月を追って変化する定期検診結果などの健康状態を示す医療データに限らず、時間的経過によって変化する広く全般の個人のデータでもよい。
また、その利用者の同意を得れば、他の利用者の利用にも有効な情報ともなりうるため、利用者自身のデータの有効利用の幅が広がり、データそのものの価値も向上する。
図11と図1、図6とで基本的に異なる点は、図11では、ストレージ装置30と利用者用ストレージ装置40との間に介在して補助システム100が設けられ、さらに、情報処理装置60からの回答データを格納するストレージ装置120が設けられている点である。
ストレージ装置30内の情報処理装置20の利用者用の個人データは、図7で示したブロックチェーン50上のアクセスチケット(ACT)によって参照可能である。利用者用の情報処理装置20のアプリケーションは、そのアクセスチケット(ACT)からなるブロックチェーン(BC)を参照して、ストレージ装置30の個人データにアクセスすることができる。尚、この例では、分散型ストレージ装置30(1)~30(m)(以下単に「ストレージ装置30」と呼ぶ)に、時間経過に応じて生成されたトランザクションデータ(TR)とマスターデータ(MA)が形成されている例を示している。
(項目1)
個人の利用する情報処理装置によって当該個人の情報に関連するデータを取得し活用可能とするための方法であって、
前記個人の利用するブロックチェーンネットワーク上のアドレスに関するデータを、当該個人の情報に関連するデータの提供元にネットワークを介して送信するステップと、
前記提供者から、前記アドレスに関するデータと、データの提供元を識別するためのデータとを含んだアクセス用データ(ACT)を前記ブロックチェーンネットワークの前記アドレスに発行して登録するステップと、
前記ブロックチェーンネットワークの前記アドレスから前記アクセス用データ(ACT)を参照して、データの提供元を特定し、当該特定した提供元から前記個人の情報に関連するデータを取得するステップと、
からなるデータ活用方法。
(項目2)
前記提供元から提供されるデータには、情報処理装置に利用が認可された個人の識別情報が含まれている、項目1に記載のデータ活用方法。
(項目3)
前記提供元から提供されるデータには、前記個人が利用する情報処理装置の識別情報が含まれている、項目1乃至2のいずれかに記載のデータ活用方法。
(項目4)
前記提供元から提供されるデータには、前記提供元の識別情報が含まれている、項目1乃至3のいずれかに記載のデータ活用方法。
(項目5)
前記提供元から提供されるデータには、そのデータの生成時間を示す情報が含まれている、項目1乃至4のいずれかに記載のデータ活用方法。
(項目6)
前記提供元から提供されるデータ(MA)は、前記個人に関する履歴データである複数のデータ(TR)を基に生成された複数のデータ項目それぞれに関するデータからなるデータセットである、項目1乃至5のいずれかに記載のデータ活用方法。
(項目7)
項目6に記載のデータ活用方法において、前記複数のデータ項目の各々は、前記履歴データのデータセットの中の最新のデータを示している、データ活用方法。
(項目8)
少なくとも前記個人の情報に関連するデータは、ハッシュ関数のよってハッシュされている、項目1乃至7のいずれかに記載のデータ活用方法。
(項目9)
個人の利用する情報処理装置によって当該個人の情報に関連するデータを取得し活用可能とするためのシステムであって、当該システムは前記情報処理装置からなり、
前記情報処理装置は、少なくとも、メモリまたは当該情報処理装置と接続されたストレージ装置を有し、
前記情報処理装置は、前記個人の利用するブロックチェーンネットワーク上のアドレスに関するデータを、当該個人の情報に関連するデータの提供元となるストレージ装置を有する提供者側情報処理装置にネットワークを介して送信する機能と、
前記提供者側情報処理装置から、前記ブロックチェーンネットワークの前記アドレスに発行された、前記アドレスに関するデータと、データの提供元を識別するためのデータとを含んだアクセス用データ(ACT)を参照する機能と、
前記アクセス用データ(ACT)に基づき、前記個人の情報に関連するデータを前記提供側のストレージ装置から取得し、少なくとも前記個人のメモリまたはストレージ装置に格納する機能と、
を有するデータ活用システム。
(項目10)
前記提供元から提供されるデータには、情報処理装置に利用が認可された個人の識別情報が含まれている、項目9に記載のデータ活用システム。
(項目11)
前記提供元から提供されるデータには、少なくとも、前記個人が利用する情報処理装置の識別情報、前記提供元の識別情報、データの生成時間を示す情報、が含まれている、項目9乃至10のいずれかに記載のデータ活用システム。
(項目12)
前記提供元から提供されるデータ(MA)は、前記個人に関する履歴データである複数のデータ(TR)を基に生成された複数のデータ項目それぞれに関するデータからなるデータセットである、項目9乃至11のいずれかに記載のデータ活用システム。
(項目13)
項目12に記載のデータ活用システムにおいて、前記複数のデータ項目の各々は、前記履歴データのデータセットの中の最新のデータを示している、データ活用システム。
(項目14)
少なくとも前記個人の情報に関連するデータは、ハッシュ関数のよってハッシュされている、項目9乃至13のいずれかに記載のデータ活用システム。
(項目15)
個人の利用する情報処理装置に格納され、第1の情報処理装置によって実行される、当該個人の情報に関連するデータを取得するためのプログラムであって、
ブロックチェーンアドレスを他の情報処理装置に提供するステップと、
前記ブロックチェーンアドレスに基づき前記他の情報処理装置から送信された前記ブロックチェーンアドレスの情報を含んだアクセス用データ(ACT)に基づき、前記他の情報処理装置またはその情報処理装置が利用するストレージ装置に生成された前記個人の情報に関連するデータを取得する、プログラム。
(項目16)
前記個人の情報に関連するデータには、情報処理装置に利用が認可された個人の識別情報が含まれている、項目15に記載のプログラム。
(項目17)
前記個人の情報に関連するデータには、少なくとも、前記個人が利用する情報処理装置の識別情報、前記提供元の識別情報、データの生成時間を示す情報、が含まれている、項目15乃至16のいずれかに記載のプログラム。
10 提供者用の情報処理装置
20 利用者用の情報処理装置
30、40 ストレージ装置(秘密分散ストレージ装置)
50 ブロックチェーンネットワーク
100 補助システム
120 ストレージ装置
Claims (27)
- 個人の利用する情報処理装置によって当該個人の情報に関連するデータを取得し活用可能とするための方法であって、
前記個人の利用するブロックチェーンネットワーク上のアドレスに関するデータを、当該個人の情報に関連するデータの提供元にネットワークを介して送信するステップと、
当該データの提供元から提供されるデータの所在を特定するためのデータを含んだアクセス用データ(ACT)を前記ブロックチェーンネットワーク上に登録するステップと、
前記アクセス用データ(ACT)を参照して、前記個人の情報に関連するデータを取得するステップと、
からなる方法。 - 前記提供元から提供されるデータには、前記個人の識別情報が含まれている。請求項1に記載の方法。
- 前記提供元から提供されるデータには、少なくとも、前記個人が利用する情報処理装置の識別情報、前記提供元の識別情報、データの生成時間を示す情報、が含まれている。請求項1乃至2のいずれかに記載の方法。
- 前記提供元から提供されるデータ(MA)は、前記個人に関する履歴データである複数のデータ(TR)を基に生成された複数のデータ項目それぞれに関するデータからなるデータセットである、請求項1乃至3のいずれかに記載の方法。
- 請求項4に記載の方法において、前記複数のデータ項目の各々は、前記履歴データのデータセットの中の最新のデータを示している、方法。
- 少なくとも前記個人の情報に関連するデータは、ハッシュ関数によってハッシュされている、請求項1乃至5のいずれかに記載の方法。
- 個人の利用する情報処理装置からなり、当該情報処理装置によって当該個人の情報に関連するデータを取得し活用可能とするためのシステムであって、
前記情報処理装置は、少なくとも、メモリまたは当該情報処理装置と接続されたストレージ装置を有し、
前記情報処理装置は、前記個人の利用するブロックチェーンネットワーク上のアドレスに関するデータを、当該個人の情報に関連するデータの提供者側情報処理装置にネットワークを介して送信する機能と、
前記提供者側情報処理装置から、当該データの提供元から提供されるデータの所在を特定するためのデータと含んだアクセス用データ(ACT)を参照する機能と、
前記アクセス用データ(ACT)に基づき、前記個人の情報に関連するデータを取得する機能と、
を有するシステム。 - 前記提供元から提供されるデータには、利用が認可された個人の識別情報が含まれている。請求項7に記載のシステム。
- 前記提供元から提供されるデータには、少なくとも、前記個人が利用する情報処理装置の識別情報、前記提供元の識別情報、データの生成時間を示す情報、が含まれている。請求項7乃至8のいずれかに記載のシステム。
- 前記提供元から提供されるデータ(MA)は、前記個人に関する履歴データである複数のデータ(TR)を基に生成された複数のデータ項目それぞれに関するデータからなるデータセットである、請求項7乃至9のいずれかに記載のシステム。
- 請求項10に記載のシステムにおいて、前記複数のデータ項目の各々は、前記履歴データのデータセットの中の最新のデータを示している、システム。
- 少なくとも前記個人の情報に関連するデータは、ハッシュ関数のよってハッシュされている、請求項7乃至11のいずれかに記載のシステム。
- 個人の利用する情報処理装置に実行される、当該個人の情報に関連するデータを取得するためのプログラムを格納した記憶媒体であって、
当該プログラムは、前記情報処理装置から提供されたブロックチェーンアドレスに基づきブロックチェーンネットワーク上に登録されたアクセス用データ(ACT)を参照して、少なくとも前記情報処理装置または他の情報処理装置が利用可能なストレージ装置に格納された前記個人の情報に関連するデータを取得可能なように前記情報処理装置に実行させる、記憶媒体。 - 前記個人の情報に関連するデータには、前記個人の識別情報が含まれている、請求項13に記載の記憶媒体。
- 前記個人の情報に関連するデータには、少なくとも、前記個人が利用する情報処理装置の識別情報、前記提供元の識別情報、データの生成時間を示す情報、が含まれている、請求項13乃至14のいずれかに記載の記憶媒体。
- さらに、前記個人の利用する情報処理装置によって通信可能である補助システムによって前記アクセスチケット(ACT)によって参照される前記個人の情報に関連するデータに基づき加工データを生成するステップと、
前記補助システムまたは前記個人の利用する情報処理装置の少なくともいずれかによって前記加工データと前記個人の問い合わせデータを第三者の情報処理装置または情報処理システムに送信するステップと、
前記第三者の情報処理装置または情報処理システムからの回答データを前記個人の利用する前記情報処理装置によって取得または参照するステップと、
からなる請求項1乃至7のいずれかに記載の方法。 - 前記補助システムは、前記ブロックチェーンネットワーク上のアクセス用データ(ACT)を参照して、前記個人の情報に関連するデータを取得する、請求項16に記載の方法。
- 前記補助システムは、前記データに関連する専門化によって操作され、または前記個人の利用する情報処理装置を介して操作され、前記個人の問い合わせ内容に応じて前記個人の情報に関連するデータから前記加工データが生成される、請求項16乃至17のいずれかに記載の方法。
- 前記補助システムは、前記データに関連する専門化システムまたは人工知能システムが実装されて、その専門化システムまたは人工知能システムによって前記加工データが生成される、請求項16乃至17のいずれかに記載の方法。
- さらに、前記個人の利用する情報処理装置によって通信可能である補助システムからなり、
前記補助システムは、前記アクセスチケット(ACT)によって参照される前記個人の情報に関連するデータに基づき加工データを生成可能に構成され、
前記補助システムまたは前記個人の利用する情報処理装置の少なくともいずれかによって前記加工データと前記個人の問い合わせデータが第三者の情報処理装置または情報処理システムに送信されて、その問い合わせデータに応じて、前記第三者の情報処理装置または情報処理システムからの回答データが前記個人の利用する前記情報処理装置または前記補助システムによって取得または参照されるようにした、
請求項7乃至12のいずれかに記載のシステム。 - 前記補助システムは、前記ブロックチェーンネットワーク上のアクセス用データ(ACT)を参照して、前記個人の情報に関連するデータを取得可能とするように構成されている、請求項20に記載のシステム。
- 前記補助システムは、前記データに関連する専門化によって操作され、または前記個人の利用する情報処理装置を介して操作され、前記個人の問い合わせ内容に応じて前記個人の情報に関連するデータから前記加工データが生成される、請求項20乃至21のいずれかに記載のシステム。
- 前記補助システムは、前記データに関連する専門化システムまたは人工知能システムが実装されて、その専門化システムまたは人工知能システムによって前記加工データが生成される、請求項20乃至21のいずれかに記載のシステム。
- 個人の利用する情報処理装置によって通信可能である補助システムが、ブロックチェーンネットワーク上のブロックチェーンへのアクセス用データ(ACT)によって参照される個人の情報に関連するデータに基づき加工データを生成し、前記加工データを第三者の情報処理装置または情報処理システムに送信し、前記第三者の情報処理装置または情報処理システムからの回答データを取得または参照可能なように、前記個人の利用する情報処理装置によって通信可能である補助システムを実行させるプログラムを格納する記憶媒体。
- 前記プログラムは、前記ブロックチェーンネットワーク上のアクセス用データ(ACT)を参照して前記個人の情報に関連するデータを取得可能なように前記補助システムを実行させる、請求項24に記載の記憶媒体。
- 前記プログラムは、前記補助システムが、前記データに関連する専門化によって操作され、または前記個人の利用する情報処理装置を介して操作され、前記個人の問い合わせ内容に応じて前記個人の情報に関連するデータから前記加工データが生成可能なように前記補助システムを実行させる、請求項24乃至25のいずれかに記載の記憶媒体。
- 前記プログラムは、前記補助システムに実装された前記データに関連する専門化システムまたは人工知能システムによって前記加工データが生成されるように、前記補助システムを実行させる、請求項24乃至25のいずれかに記載の記憶媒体。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2018559646A JP7018557B2 (ja) | 2016-12-28 | 2017-12-28 | Bcn(ブロックチェーンネットワーク)を使用したデータ利用方法、システムおよびそのプログラム |
US16/473,671 US11636477B2 (en) | 2016-12-28 | 2017-12-28 | Data usage method, system, and program thereof employing blockchain network (BCN) |
EP17887374.1A EP3564845B1 (en) | 2016-12-28 | 2017-12-28 | Data usage method, system, and program thereof employing blockchain network (bcn) |
US18/127,860 US20230306425A1 (en) | 2016-12-28 | 2023-03-29 | Data usage method, system, and program thereof employing blockchain network (bcn) |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2016256339 | 2016-12-28 | ||
JP2016-256339 | 2016-12-28 |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/473,671 A-371-Of-International US11636477B2 (en) | 2016-12-28 | 2017-12-28 | Data usage method, system, and program thereof employing blockchain network (BCN) |
US18/127,860 Continuation US20230306425A1 (en) | 2016-12-28 | 2023-03-29 | Data usage method, system, and program thereof employing blockchain network (bcn) |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018124297A1 true WO2018124297A1 (ja) | 2018-07-05 |
Family
ID=62709472
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2017/047345 WO2018124297A1 (ja) | 2016-12-28 | 2017-12-28 | Bcn(ブロックチェーンネットワーク)を使用したデータ利用方法、システムおよびそのプログラム |
Country Status (4)
Country | Link |
---|---|
US (2) | US11636477B2 (ja) |
EP (1) | EP3564845B1 (ja) |
JP (4) | JP7018557B2 (ja) |
WO (1) | WO2018124297A1 (ja) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019072298A3 (en) * | 2018-12-19 | 2019-10-10 | Alibaba Group Holding Limited | Shared secret-based blockchain storage |
JP2020021048A (ja) * | 2018-08-03 | 2020-02-06 | パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカPanasonic Intellectual Property Corporation of America | データ流通方法、認証サーバ及びデータ構造 |
JP2020025232A (ja) * | 2018-08-08 | 2020-02-13 | 株式会社DataSign | パーソナルデータ管理システム |
CN110795721A (zh) * | 2018-08-03 | 2020-02-14 | 松下电器(美国)知识产权公司 | 数据流通方法、认证服务器以及数据结构 |
JP2020046993A (ja) * | 2018-09-19 | 2020-03-26 | 富士通株式会社 | 情報処理装置、情報処理プログラムおよび情報処理方法 |
WO2020122095A1 (ja) * | 2018-12-11 | 2020-06-18 | パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ | 制御方法、サーバ、プログラム、および、データ構造 |
JP2020155801A (ja) * | 2019-03-18 | 2020-09-24 | 株式会社野村総合研究所 | 情報管理システム及びその方法 |
WO2020209411A1 (ko) * | 2019-04-10 | 2020-10-15 | 주식회사 엘비엑스씨 | 블록체인 기반의 개인 의료 정보 관리 장치 및 방법 |
WO2021079925A1 (ja) * | 2019-10-23 | 2021-04-29 | 賢太郎 新井 | 情報処理方法、情報処理システムおよび情報処理プログラム |
US11106812B2 (en) | 2019-05-09 | 2021-08-31 | At&T Intellectual Property I, L.P. | Controlling access to datasets described in a cryptographically signed record |
WO2021171457A1 (ja) | 2020-02-27 | 2021-09-02 | 富士通株式会社 | 制御方法、情報処理装置及び制御プログラム |
JP2021149487A (ja) * | 2020-03-19 | 2021-09-27 | 日本電気株式会社 | 情報処理システム、情報処理方法及びプログラム |
JP2022035494A (ja) * | 2020-08-21 | 2022-03-04 | 富士通株式会社 | 通信プログラム、通信方法、及び通信装置 |
JPWO2022107337A1 (ja) * | 2020-11-20 | 2022-05-27 | ||
JPWO2022107336A1 (ja) * | 2020-11-20 | 2022-05-27 | ||
JP2022155539A (ja) * | 2021-03-30 | 2022-10-13 | 佳穂 藤澤 | スポーツチーム寄付特典付与システム、スポーツチーム寄付特典付与方法及びプログラム |
JP2023535927A (ja) * | 2020-07-20 | 2023-08-22 | レミュー,ビクトリア | デジタル台帳ベースのヘルスデータ共有および管理 |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11461455B2 (en) * | 2017-07-17 | 2022-10-04 | Cryptowerk Corp. | Method and system of secure configuration of at least one electronic device |
US10931457B2 (en) * | 2018-03-09 | 2021-02-23 | Igt Global Solutions Corporation | Systems and methods for blockchain-based digital lottery ticket generation and distribution |
JP7164333B2 (ja) * | 2018-06-27 | 2022-11-01 | 株式会社日立製作所 | 個人情報分析システム |
JP2022002351A (ja) * | 2018-09-20 | 2022-01-06 | ソニーグループ株式会社 | 情報処理装置、情報処理方法、およびプログラム |
US12099997B1 (en) | 2020-01-31 | 2024-09-24 | Steven Mark Hoffberg | Tokenized fungible liabilities |
US12143500B2 (en) * | 2020-07-06 | 2024-11-12 | The Samo Project | System and method for content storage and ownership verification |
US12061722B1 (en) * | 2020-07-28 | 2024-08-13 | United Services Automobile Association (Usaa) | Systems and methods for managing personal data using client ledgers |
US11113241B1 (en) * | 2020-08-22 | 2021-09-07 | Tyson York Winarski | Computer application for blockchaining files through a graphical user interface |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2012181728A (ja) * | 2011-03-02 | 2012-09-20 | Nec Corp | 安否確認システム、安否情報確認方法、安否情報確認用プログラム、及び記憶媒体 |
US20160260095A1 (en) * | 2015-03-02 | 2016-09-08 | Dell Products, Lp | Containerized Computational Task Execution Management Using a Secure Distributed Transaction Ledger |
US20160308855A1 (en) * | 2015-04-16 | 2016-10-20 | Trunomi Ltd. | Systems and Methods for Electronically Sharing Private Documents Using Pointers |
JP2016218633A (ja) | 2015-05-18 | 2016-12-22 | 株式会社Orb | 仮想通貨管理プログラム、及び仮想通貨管理方法 |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050160276A1 (en) * | 2004-01-16 | 2005-07-21 | Capital One Financial Corporation | System and method for a directory secured user account |
CN101632079A (zh) | 2007-03-02 | 2010-01-20 | 日本电气株式会社 | 信息公开控制系统、信息公开控制程序及信息公开控制方法 |
US8793509B1 (en) * | 2008-02-12 | 2014-07-29 | Google Inc. | Web authorization with reduced user interaction |
US9535967B2 (en) * | 2008-09-10 | 2017-01-03 | Salesforce.Com, Inc. | Method and system for providing efficient and complex database functionality to a mobile device |
US9635028B2 (en) * | 2011-08-31 | 2017-04-25 | Facebook, Inc. | Proxy authentication |
US9148429B2 (en) * | 2012-04-23 | 2015-09-29 | Google Inc. | Controlling access by web applications to resources on servers |
US8615794B1 (en) * | 2013-01-09 | 2013-12-24 | Ping Identity Corporation | Methods and apparatus for increased security in issuing tokens |
US8613055B1 (en) * | 2013-02-22 | 2013-12-17 | Ping Identity Corporation | Methods and apparatus for selecting an authentication mode at time of issuance of an access token |
CA2947936C (en) | 2013-05-04 | 2023-02-21 | Christopher Decharms | Mobile security technology |
WO2015077542A1 (en) * | 2013-11-22 | 2015-05-28 | The Trustees Of Columbia University In The City Of New York | Database privacy protection devices, methods, and systems |
US10726098B2 (en) | 2014-01-23 | 2020-07-28 | Dror Samuel Brama | Method, system and program product for transferring genetic and health data |
US9935934B1 (en) * | 2014-03-31 | 2018-04-03 | Microstrategy Incorporated | Token management |
US20170171744A1 (en) * | 2014-03-31 | 2017-06-15 | Deutsche Telekom Ag | Protecting and/or anonymizing a user identity and/or user data of a subscriber of a data protection service |
US10340038B2 (en) | 2014-05-13 | 2019-07-02 | Nant Holdings Ip, Llc | Healthcare transaction validation via blockchain, systems and methods |
US20160125149A1 (en) * | 2014-10-29 | 2016-05-05 | Marc Lauren Abramowitz | Dynamic analysis of health and medical data |
US9641522B1 (en) * | 2014-11-11 | 2017-05-02 | Amazon Technologies, Inc. | Token management in a managed directory service |
US10362058B2 (en) * | 2016-05-13 | 2019-07-23 | Vmware, Inc | Secure and scalable data transfer using a hybrid blockchain-based approach |
JP7005102B2 (ja) * | 2017-12-28 | 2022-01-21 | 高歩 中村 | Bcn(ブロックチェーンネットワーク)を使用したデータ利用方法、システムおよびそのプログラム |
-
2017
- 2017-12-28 JP JP2018559646A patent/JP7018557B2/ja active Active
- 2017-12-28 WO PCT/JP2017/047345 patent/WO2018124297A1/ja active IP Right Grant
- 2017-12-28 EP EP17887374.1A patent/EP3564845B1/en active Active
- 2017-12-28 US US16/473,671 patent/US11636477B2/en active Active
-
2021
- 2021-12-28 JP JP2021214819A patent/JP7335943B2/ja active Active
-
2023
- 2023-03-29 US US18/127,860 patent/US20230306425A1/en active Pending
- 2023-08-18 JP JP2023133220A patent/JP7615245B2/ja active Active
-
2024
- 2024-12-27 JP JP2024231940A patent/JP2025039613A/ja active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2012181728A (ja) * | 2011-03-02 | 2012-09-20 | Nec Corp | 安否確認システム、安否情報確認方法、安否情報確認用プログラム、及び記憶媒体 |
US20160260095A1 (en) * | 2015-03-02 | 2016-09-08 | Dell Products, Lp | Containerized Computational Task Execution Management Using a Secure Distributed Transaction Ledger |
US20160308855A1 (en) * | 2015-04-16 | 2016-10-20 | Trunomi Ltd. | Systems and Methods for Electronically Sharing Private Documents Using Pointers |
JP2016218633A (ja) | 2015-05-18 | 2016-12-22 | 株式会社Orb | 仮想通貨管理プログラム、及び仮想通貨管理方法 |
Cited By (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12073390B2 (en) | 2018-08-03 | 2024-08-27 | Panasonic Intellectual Property Corporation Of America | Data distribution method, authentication server, and data structure |
JP2020021048A (ja) * | 2018-08-03 | 2020-02-06 | パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカPanasonic Intellectual Property Corporation of America | データ流通方法、認証サーバ及びデータ構造 |
CN110795721A (zh) * | 2018-08-03 | 2020-02-14 | 松下电器(美国)知识产权公司 | 数据流通方法、认证服务器以及数据结构 |
JP7458150B2 (ja) | 2018-08-03 | 2024-03-29 | パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ | データ流通方法及び認証サーバ |
JP2024015177A (ja) * | 2018-08-03 | 2024-02-01 | パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ | データ流通方法、データ流通システム及びプログラム |
JP2020025232A (ja) * | 2018-08-08 | 2020-02-13 | 株式会社DataSign | パーソナルデータ管理システム |
JP7135646B2 (ja) | 2018-09-19 | 2022-09-13 | 富士通株式会社 | 情報処理装置、情報処理プログラムおよび情報処理方法 |
JP2020046993A (ja) * | 2018-09-19 | 2020-03-26 | 富士通株式会社 | 情報処理装置、情報処理プログラムおよび情報処理方法 |
CN112425119A (zh) * | 2018-12-11 | 2021-02-26 | 松下电器(美国)知识产权公司 | 控制方法、服务器、程序及数据结构 |
WO2020122095A1 (ja) * | 2018-12-11 | 2020-06-18 | パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ | 制御方法、サーバ、プログラム、および、データ構造 |
US12086283B2 (en) | 2018-12-11 | 2024-09-10 | Panasonic Intellectual Property Corporation Of America | Control method, server, recording medium, and data structure |
JP7514766B2 (ja) | 2018-12-11 | 2024-07-11 | パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ | 制御方法、情報管理システム、および、プログラム |
JPWO2020122095A1 (ja) * | 2018-12-11 | 2021-10-21 | パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカPanasonic Intellectual Property Corporation of America | 制御方法、サーバ、プログラム、および、データ構造 |
EP3574630A4 (en) * | 2018-12-19 | 2020-01-01 | Alibaba Group Holding Limited | STORING BLOCK CHAIN BASED ON A SHARED SECRET |
WO2019072298A3 (en) * | 2018-12-19 | 2019-10-10 | Alibaba Group Holding Limited | Shared secret-based blockchain storage |
JP7235941B2 (ja) | 2019-03-18 | 2023-03-09 | 株式会社野村総合研究所 | 情報管理システム及びその方法 |
JP2020155801A (ja) * | 2019-03-18 | 2020-09-24 | 株式会社野村総合研究所 | 情報管理システム及びその方法 |
US11856085B2 (en) | 2019-03-18 | 2023-12-26 | Nomura Research Institute, Ltd. | Information management system and method for the same |
WO2020209411A1 (ko) * | 2019-04-10 | 2020-10-15 | 주식회사 엘비엑스씨 | 블록체인 기반의 개인 의료 정보 관리 장치 및 방법 |
US11106812B2 (en) | 2019-05-09 | 2021-08-31 | At&T Intellectual Property I, L.P. | Controlling access to datasets described in a cryptographically signed record |
US12164659B2 (en) | 2019-05-09 | 2024-12-10 | At&T Intellectual Property I, L.P. | Controlling access to datasets described in a cryptographically signed record |
US11645408B2 (en) | 2019-05-09 | 2023-05-09 | At&T Intellectual Property I, L.P. | Controlling access to datasets described in a cryptographically signed record |
JP7660787B2 (ja) | 2019-10-23 | 2025-04-14 | 賢太郎 新井 | 情報処理方法、情報処理システムおよび情報処理プログラム |
JPWO2021079925A1 (ja) * | 2019-10-23 | 2021-04-29 | ||
WO2021079925A1 (ja) * | 2019-10-23 | 2021-04-29 | 賢太郎 新井 | 情報処理方法、情報処理システムおよび情報処理プログラム |
WO2021171457A1 (ja) | 2020-02-27 | 2021-09-02 | 富士通株式会社 | 制御方法、情報処理装置及び制御プログラム |
JP2021149487A (ja) * | 2020-03-19 | 2021-09-27 | 日本電気株式会社 | 情報処理システム、情報処理方法及びプログラム |
JP2023535927A (ja) * | 2020-07-20 | 2023-08-22 | レミュー,ビクトリア | デジタル台帳ベースのヘルスデータ共有および管理 |
JP7568898B2 (ja) | 2020-08-21 | 2024-10-17 | 富士通株式会社 | 通信プログラム、通信方法、及び通信装置 |
JP2022035494A (ja) * | 2020-08-21 | 2022-03-04 | 富士通株式会社 | 通信プログラム、通信方法、及び通信装置 |
JPWO2022107336A1 (ja) * | 2020-11-20 | 2022-05-27 | ||
JP7505578B2 (ja) | 2020-11-20 | 2024-06-25 | 富士通株式会社 | 情報処理プログラム、情報処理方法および情報処理装置 |
JP7487793B2 (ja) | 2020-11-20 | 2024-05-21 | 富士通株式会社 | 情報処理プログラム、情報処理方法および情報処理装置 |
WO2022107337A1 (ja) * | 2020-11-20 | 2022-05-27 | 富士通株式会社 | 情報処理プログラム、情報処理方法および情報処理装置 |
JPWO2022107337A1 (ja) * | 2020-11-20 | 2022-05-27 | ||
JP2022155539A (ja) * | 2021-03-30 | 2022-10-13 | 佳穂 藤澤 | スポーツチーム寄付特典付与システム、スポーツチーム寄付特典付与方法及びプログラム |
Also Published As
Publication number | Publication date |
---|---|
JP7615245B2 (ja) | 2025-01-16 |
JP2022046708A (ja) | 2022-03-23 |
JP7018557B2 (ja) | 2022-02-14 |
US11636477B2 (en) | 2023-04-25 |
EP3564845B1 (en) | 2025-08-13 |
US20230306425A1 (en) | 2023-09-28 |
EP3564845A4 (en) | 2020-08-05 |
JPWO2018124297A1 (ja) | 2019-11-14 |
US20200019963A1 (en) | 2020-01-16 |
JP2025039613A (ja) | 2025-03-21 |
JP2023156464A (ja) | 2023-10-24 |
JP7335943B2 (ja) | 2023-08-30 |
EP3564845A1 (en) | 2019-11-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7335943B2 (ja) | Bcn(ブロックチェーンネットワーク)を使用したデータ利用方法、システムおよびそのプログラム | |
JP7641348B2 (ja) | Bcn(ブロックチェーンネットワーク)を使用したデータ利用方法、システムおよびそのプログラム | |
US12100491B2 (en) | Transaction validation via blockchain, systems and methods | |
US11636776B2 (en) | Unified identification protocol in training and health | |
Firouzi et al. | AI-driven data monetization: The other face of data in IoT-based smart and connected health | |
US11983298B2 (en) | Computer system and method of operating same for handling anonymous data | |
CA2561551C (en) | A privacy preserving data-mining protocol | |
CN109947723A (zh) | 用于区块链网络的区块数据共享方法、存储介质、计算设备 | |
WO2012129265A1 (en) | Encrypted portable electronic medical record system | |
Thatcher et al. | RxBlock: Towards the design of a distributed immutable electronic prescription system | |
Chung et al. | Knowledge-based block chain networks for health log data management mobile service | |
JP2002149814A (ja) | 個人情報管理システム | |
Kovach et al. | MyMEDIS: a new medical data storage and access system | |
CN113555076A (zh) | 一种基于hyperledger fabric(联盟链)的电子病历系统 | |
Santos | Securing a health information system with a government issued digital identification card | |
JP2024137545A (ja) | 情報処理システム、サーバ、情報処理方法及びプログラム | |
Dara | Data Sharing and Consent Management of Electronic Health Record based on the Blockchain Technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17887374 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2018559646 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2017887374 Country of ref document: EP Effective date: 20190729 |
|
WWG | Wipo information: grant in national office |
Ref document number: 2017887374 Country of ref document: EP |