CN106899412A - A kind of block chain method for secret protection, apparatus and system - Google Patents

A kind of block chain method for secret protection, apparatus and system Download PDF

Info

Publication number
CN106899412A
CN106899412A CN201710202846.7A CN201710202846A CN106899412A CN 106899412 A CN106899412 A CN 106899412A CN 201710202846 A CN201710202846 A CN 201710202846A CN 106899412 A CN106899412 A CN 106899412A
Authority
CN
China
Prior art keywords
information
merkel tree
verified
terminal
checking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710202846.7A
Other languages
Chinese (zh)
Inventor
赵晖
李东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Chain Silver Bo Technology Co Ltd
Original Assignee
Beijing Chain Silver Bo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Chain Silver Bo Technology Co Ltd filed Critical Beijing Chain Silver Bo Technology Co Ltd
Priority to CN201710202846.7A priority Critical patent/CN106899412A/en
Publication of CN106899412A publication Critical patent/CN106899412A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a kind of block chain method for secret protection, apparatus and system.Methods described, including:Information desensitization terminal receives the raw information that block chain link point sends;Information desensitizes terminal according to raw information, builds the first complete Merkel tree;Information desensitization terminal crops the privacy information in the first Merkel tree, and retains the checking information in the first Merkel tree, the second Merkel tree after being cut;Credit-verification terminal is verified to the second Merkel tree.Cutting treatment is carried out by the privacy information in the first Merkel tree, the second Merkel tree not comprising privacy information but comprising checking information can be obtained, so, during checking, credit-verification terminal can be avoided to obtain privacy information;Meanwhile, verified by the second Merkel tree comprising checking information, it is possible to achieve the checking to the raw information of block chain.In this way, it is possible to meet the checking and secret protection to block chain information simultaneously.

Description

A kind of block chain method for secret protection, apparatus and system
Technical field
The present invention relates to Internet technical field, and in particular to a kind of block chain method for secret protection, apparatus and system.
Background technology
Transaction data on current block chain be all disclose it is visible, for the industries such as security, bank, these data Exposure often do not meet business rule and regulatory requirements.In the framework of block chain basic agreement, searching can be in transaction It is very important to hold endorsement and do not allow the technical scheme that unauthorized personnel obtains transaction content.
Many information on block chain, such as transaction data is both the key message for needing distributed node to be witnessed, All it is again simultaneously privacy information.If open transaction information, dealer's privacy cannot be protected.If added to whole transaction contents Close, only counterparty can decrypt, then witness is only with transaction content ciphertext, it is impossible to which whether checking transaction is effective.Therefore, Prior art can not simultaneously meet the checking and secret protection to block chain information, Information Authentication and secret protection on block chain Between there is certain contradiction.
The content of the invention
For drawbacks described above of the prior art, the invention provides a kind of block chain method for secret protection, device and it is System, can simultaneously meet the checking and secret protection to block chain information, can solve the Information Authentication on block chain and privacy Contradiction between protection.
In a first aspect, a kind of block chain method for secret protection that the present invention is provided, including:
Information desensitization terminal receives the raw information that block chain link point sends;
Information desensitizes terminal according to the raw information, builds the first complete Merkel tree;
Information desensitization terminal crops the privacy information in the first Merkel tree, and retains first Merkel Checking information in tree, the second Merkel tree after being cut;
Credit-verification terminal is verified to the second Merkel tree.
Optionally, it is described according to the raw information, the first complete Merkel tree is built, including:
The raw information is divided into some data blocks;
The cryptographic Hash of each data block is calculated respectively;
The first complete Merkel tree is built according to some data blocks and the cryptographic Hash.
Optionally, the privacy information, including:Private data block and privacy node.
Optionally, the privacy information in the first Merkel tree is cropped in described information desensitization terminal, and is retained After the step of checking information in the first Merkel tree, the second Merkel tree after being cut, tested in described information Before second Merkel tree described in card terminal-pair carries out verification step, also include:
Second Merkel tree described in information desensitization terminal-pair is digitally signed, and obtains the first signed data;
Credit-verification terminal is verified using public signature key to first signed data;If checking not over, Output authentication denial information, terminates checking;
If being verified, the second Merkel tree is the step of verified described in execution information checking terminal-pair.
Optionally, it is described that the second Merkel tree is verified, including:
Step S1:The second Merkel tree is parsed, the data block of the second Merkel tree and described is obtained The cryptographic Hash of data block;
Step S2:The corresponding cryptographic Hash of the data block of the second Merkel tree in step S1 verifies, If checking is not over output authentication denial information terminates checking;
Step S3:Intermediate node and root node in the second Merkel tree for being verified in step S2 is tested Card, if checking is not over output authentication denial information terminates checking;
Step S4:Data block in the second Merkel tree for being verified in step S3 is verified, if checking Not over, then authentication denial information is exported, terminate checking;If being verified, the second Merkel tree is by checking.
Optionally, the intermediate node and root node to the second Merkel tree verify, including:
The 3rd Merkel tree is successively rebuild using the leaf node and intermediate node of the second Merkel tree, and by described Node in two Merkel trees carries out successively contrast verification with the node in the 3rd Merkel tree;If second Merkel Differed in the presence of at least one node in tree and the 3rd Merkel tree, then verified not over end checking;If described Two Merkel trees are identical with the node in the 3rd Merkel tree, then be verified.
Optionally, it is described the second Merkel tree is verified the step of after, also include:
The second Merkel tree to being verified is digitally signed, and obtains the second signed data;
According to the second Merkel tree and second signed data, generation is verified information, and is tested described in output Card terminates checking by information.
Second aspect, a kind of block chain privacy protection device that the present invention is provided, including:
Information receiving module, the raw information that block chain link point sends is received for information desensitization terminal;
First Merkel tree builds module, for information desensitization terminal according to the raw information, builds complete first Merkel tree;
Second Merkel tree builds module, cuts out the privacy information in the first Merkel tree for information desensitization terminal Cut, and retain the checking information in the first Merkel tree, the second Merkel tree after being cut;
Second Merkel's tree authentication module, verifies for credit-verification terminal to the second Merkel tree.
The third aspect, a kind of block chain intimacy protection system that the present invention is provided, including:
Information desensitization terminal and credit-verification terminal;
Desensitize terminal and credit-verification terminal of described information is intercoupled connection on block chain by P2P agreements;
Described information desensitization terminal, is deployed on the information sending node in block chain, the secret protection need according to node Will, the complete raw information that will be received is treated by after working process, retaining the checking information that credit-verification terminal needs, generation Checking information, and the information to be verified is sent to credit-verification terminal;
Credit-verification terminal, is deployed on the witness node in block chain, described the treating of receive information desensitization terminal transmission Checking information, and the information to be verified is verified, the information to be verified that verification passes through to be signed, generation checking is logical Information is crossed, and the information that is verified is sent to described information desensitization terminal, otherwise return to authentication denial information.
Optionally, described information desensitization terminal, including:Information receiving module, the first Merkel tree structure module, second are write from memory Ke Er trees build module, the first Digital Signature module and the first main control module;
Described information receiver module, the first Merkel tree build module, the second Merkel tree and build module and the first numeral Signature blocks are connected with first main control module;
Information receiving module, the raw information that block chain link point sends is received for information desensitization terminal;
The first Merkel tree builds module, for information desensitization terminal according to the raw information, builds complete First Merkel tree;
Second Merkel tree builds module, cuts out the privacy information in the first Merkel tree for information desensitization terminal Cut, and retain the checking information in the first Merkel tree, the second Merkel tree after being cut;
First Digital Signature module, is digitally signed for the second Merkel tree described in information desensitization terminal-pair, Obtain the first signed data;
The first master control module controls described information receiver module receives the raw information from block chain node, and assists Regulation and control system the first Merkel tree builds module, the second Merkel tree structure module and the first Digital Signature module, structure the One Merkel tree, the second Merkel tree, and complete digital signature work.
From above technical scheme, the present invention provides a kind of block chain method for secret protection, and the first step, information desensitization is whole End receives the raw information that block chain node sends;Second step, information desensitizes terminal according to the raw information, builds complete First Merkel tree;3rd step, information desensitization terminal crops the privacy information in the first Merkel tree, and retains institute The checking information in the first Merkel tree is stated, the second Merkel tree after being cut;4th step, credit-verification terminal is to described Second Merkel tree is verified.
Compared to a kind of block chain method for secret protection that prior art, the present invention are provided, by the original of block chain Information architecture the first Merkel tree, and cutting treatment is carried out to the privacy information in the first Merkel tree, to described first Checking information in Merkel tree carries out reservation process, can obtain not comprising privacy information but comprising checking information second and write from memory Ke Er trees, finally carry out Information Authentication for the second Merkel tree not comprising privacy information, so, during checking, Credit-verification terminal can be avoided to obtain the privacy information;Simultaneously as to the checking information in the first Merkel tree Carry out including checking information in reservation process, therefore the second Merkel tree, verified by the second Merkel tree, The checking of the raw information to the block chain can be realized.In this way, it is possible to meet simultaneously to the checking of block chain information and Secret protection, and then can solve the problem that the contradiction between Information Authentication and secret protection on block chain.
The present invention provide a kind of block chain privacy protection device and system, with above-mentioned block chain method for secret protection for Identical inventive concept, with identical beneficial effect.
Brief description of the drawings
In order to illustrate more clearly of the specific embodiment of the invention or technical scheme of the prior art, below will be to specific The accompanying drawing to be used needed for implementation method or description of the prior art is briefly described.In all of the figs, similar element Or the general reference by being similar in part is identified.In accompanying drawing, each element or part might not draw according to actual ratio.
Fig. 1 shows a kind of flow chart of block chain method for secret protection that first embodiment of the invention is provided;
Fig. 2 shows entering to first signed data and the second Merkel tree for first embodiment of the invention offer The flow chart of row checking;
Fig. 3 shows the schematic diagram of the first complete Merkel tree of 8 data blocks that second embodiment of the invention is provided;
Fig. 4 shows the showing containing 8 the second Merkel trees of data block after the cutting that second embodiment of the invention is provided It is intended to;
Fig. 5 shows a kind of schematic diagram of block chain privacy protection device that third embodiment of the invention is provided;
Fig. 6 shows a kind of information desensitization terminal of block chain intimacy protection system that fourth embodiment of the invention is provided Schematic diagram;
Fig. 7 shows a kind of credit-verification terminal of block chain intimacy protection system that fourth embodiment of the invention is provided Schematic diagram.
Specific embodiment
The embodiment of technical solution of the present invention is described in detail below in conjunction with accompanying drawing.Following examples are only used for Technical scheme is clearly illustrated, therefore is intended only as example, and protection of the invention can not be limited with this Scope.
It should be noted that unless otherwise indicated, technical term used in this application or scientific terminology should be this hair The ordinary meaning that bright one of ordinary skill in the art are understood.
The invention provides a kind of block chain method for secret protection, apparatus and system.Below in conjunction with the accompanying drawings to of the invention Embodiment is illustrated.
Fig. 1 shows a kind of flow chart of block chain method for secret protection that first embodiment of the invention is provided.Such as Fig. 1 Shown, a kind of block chain method for secret protection that first embodiment of the invention is provided is comprised the following steps:
Step S101:Information desensitization terminal receives the raw information that block chain link point sends.
Block chain is a kind of a kind of data block is combined into the way of order is connected chain type number sequentially in time According to structure, and the distributed account book that can not be distorted He can not forge ensured in cryptography mode.The block chain includes multiple Node, the raw information that the reception block chain link point sends is the original of one or more nodes transmission in reception block chain Information.The raw information refers to need to carry out the raw information of validation verification in block chain node.
The raw information can include:Transaction data, dealer's information etc..The raw information can include:Privacy Information and checking information.If for example, the raw information includes:Fund produces Business Name, financial administrator's name, payment conjunction Same, fund produces address, fund and is transferred to address, the amount of money, wherein, the fund produces Business Name, financial administrator's name, pays Money contract is exactly the privacy information in the raw information, and it is exactly described that the fund produces address, fund and is transferred to address, the amount of money Checking information in raw information.Wherein, the privacy information and checking information in the raw information are often according to block chain Specific business is gone up to determine.The privacy information is determined according to specific business demand on block chain.The checking information is Determined according to specific business scenario.For example:If the raw information is the relevant information transferred accounts, according to business scenario, just Need to verify account information, transfer amounts.
Step S102:Information desensitizes terminal according to the raw information, builds the first complete Merkel tree.
In this step, can include:The raw information is divided into some data blocks;Each described data is calculated respectively The cryptographic Hash of block;The first complete Merkel tree is built according to some data blocks and the cryptographic Hash.
Wherein, the Merkel tree (being called Hash tree) is a kind of binary tree, by a root node, one group of intermediate node and One group of leaf node composition.Nethermost leaf node includes data storage or its cryptographic Hash, and each intermediate node is its two children The cryptographic Hash of child node content, root node is also to be made up of the cryptographic Hash of its two sub- node contents.Further, Merkel Tree can be generalized to the situation of multiway tree.The characteristics of Merkel tree is that any variation of bottom data can all be delivered to its father Node, until tree root.
The specific configuration step of Merkel tree is as follows:
1) information of input is divided into some data blocks D0, D1, D2 ... Dn;
2) the cryptographic Hash H0=hash (D0) of D0 is calculated, the cryptographic Hash H1=hash (D1) of D1 ... the cryptographic Hash of Dn Hn=hash (Dn);
3) Hn+1=hash (H0+H1), Hn+2=hash (H2+H3) ... are calculated one by one;
4) cryptographic Hash is successively calculated according to method 3), binary tree is built, until calculating the Hash of last root node Value HRoot.
In this step, after the raw information being divided into some data blocks, whether the information in the data block is hidden Personal letter ceases or checking information can be pre-set, and the information being so assured that in which data block is privacy information Or checking information.Privacy information is put into the data block that can also be which numbering pre-set first, which is put into checking Information, then, by the privacy information in the data block it is corresponding with checking information insert the data block.By this two Kind of method can more easily determine the data it is fast in privacy information and checking information.
Step S103:Information desensitization terminal crops the privacy information in the first Merkel tree, and retains described Checking information in first Merkel tree, the second Merkel tree after being cut.
Wherein, the second Merkel tree, including:Data block, leaf node, intermediate node and root node.The data block, Leaf node, intermediate node and root node are all the information that checking need to be known, i.e. checking information.If the second Merkel tree only includes Data block or node, then can not complete to checking.The checking information can be the minimum checking information that need to be known.
The privacy information includes:Private data block and privacy node.The private data block refers to comprising privacy information Data block.The privacy node refers to the remaining node in addition to the node that checking need to be known.So, can protect to greatest extent Privacy information.
This step can make credit-verification terminal only obtain the information of its checking of needs by cutting the privacy information, Credit-verification terminal can be avoided to obtain privacy information, protect privacy information;Meanwhile, this step also retains first Merck Checking information in your tree, credit-verification terminal can be verified according to the checking information to the validity of whole piece information.
In this step, cutting treatment is carried out to privacy information in the first Merkel tree, can be included:To described Privacy information is encrypted or hides treatment in one Merkel tree, prevents credit-verification terminal from obtaining the privacy information, reaches To secrecy effect.To the privacy information cut treatment compared with the encryption and hiding treatment, the cutting treatment is The privacy information is directly deleted, more preferable secrecy effect can be played.
After this step, it is described the second Merkel tree is verified the step of before, can also include:Letter Second Merkel tree described in breath desensitization terminal-pair is digitally signed, and obtains the first signed data;
Credit-verification terminal is verified using public signature key to first signed data;If checking not over, Output authentication denial information, terminates checking;
If being verified, the second Merkel tree is the step of verified described in execution information checking terminal-pair.
Wherein, the second Merkel tree is digitally signed, it is possible to use the signature private key of itself carries out digital label Name, and then obtain the first signed data.Then, first signed data and the second Merkel tree are packaged, it is raw Into message to be verified, then the message to be verified is verified.The message to be verified, including first signed data and The second Merkel tree.
If described information desensitization terminal is not digitally signed to the second Merkel tree, silent according to described second Ke Er trees generate message to be verified, and the message to be verified is verified.The message to be verified, including second Merck You set.Two schemes are all within the scope of the present invention.
Before being verified to the message to be verified, described information desensitization terminal needs to send the message to be verified To credit-verification terminal.
Second Merkel tree described in described information desensitization terminal-pair is digitally signed, and is prevented from the information to be verified It is tampered during credit-verification terminal is sent to.
Step S104:Credit-verification terminal is verified to the second Merkel tree.
Wherein, on witness node of the described information checking terminal disposition in block chain, can be to the information to be verified Validity verified.
It is to institute in this step if be not digitally signed to the second Merkel tree before this step The second Merkel tree is stated to be verified;Before this step, if having carried out digital signature to the second Merkel tree, Need to verify first signed data and the second Merkel tree in this step.It is illustrated in figure 2 to described The flow chart that one signed data and the second Merkel tree are verified.
The second Merkel tree and first signed data are verified, can be included:Using public signature key pair First signed data is verified;If checking is not over output authentication denial information terminates checking;If checking is logical Cross, then the second Merkel tree is verified.So, the second Merkel tree can be sent into corresponding information to test Card terminal is verified that credit-verification terminal can carry out the identity of checking information desensitization terminal with this, be prevented from information desensitization The executor of terminal denies corresponding operation.
Wherein, the public signature key is matched with the signature private key in the step S103.
In this step, the second Merkel tree is verified, can includes:
Step S1:The second Merkel tree is parsed, the data block of the second Merkel tree and described is obtained The cryptographic Hash of data block;
Step S2:The corresponding cryptographic Hash of the data block of the second Merkel tree in step S1 verifies, If checking is not over output authentication denial information terminates checking;
Step S3:Intermediate node and root node in the second Merkel tree for being verified in step S2 is tested Card, if checking is not over output authentication denial information terminates checking;
Step S4:Data block in the second Merkel tree for being verified in step S3 is verified, if checking Not over, then authentication denial information is exported, terminate checking;If being verified, the second Merkel tree is by checking.
Wherein, to the data block verify to be that data block is tested according to the business rule on the block chain Card.
Verified in many aspects by the second Merkel tree, it is ensured that the correctness of the raw information, can be with Malice is avoided to conclude the business.
In step s 2, it is necessary to recalculate the data block when being verified to the corresponding cryptographic Hash of the data block Cryptographic Hash, the cryptographic Hash that then will be recalculated contrasted with the cryptographic Hash for parsing, it can be determined that information whether by Distort, and then ensure the correctness of information.
In this step, the intermediate node and root node to the second Merkel tree verify, can include:
The 3rd Merkel tree is successively rebuild using the leaf node and intermediate node of the second Merkel tree, and by described Node in two Merkel trees carries out successively contrast verification with the node in the 3rd Merkel tree;If second Merkel Differed in the presence of at least one node in tree and the 3rd Merkel tree, then verified not over end checking;If described Two Merkel trees are identical with the node in the 3rd Merkel tree, then be verified.
Wherein, the node in the node and the 3rd Merkel tree in the second Merkel tree carries out successively right It is that the leaf node and intermediate node in the checking information in using the second Merkel tree successively rebuild the 3rd during than checking Carry out contrast verification during Merkel tree, that is, calculate an intermediate node in the 3rd Merkel tree just with The corresponding node of second Merkel tree is verified.
Wherein, the checking information can include:Data block, leaf node, intermediate node, root node.The leaf node is just It is the cryptographic Hash of the data block.The intermediate node and root node are the cryptographic Hash calculated according to the leaf node.
Contrasted by the cryptographic Hash and the cryptographic Hash of the second Merkel tree of the node to recalculating, it can be determined that Whether it is tampered in message transmitting procedure, can be with the correctness of checking information.
In step s 4, the checking to the data block is carried out in described information checking terminal.In the present invention, Checking to the data block can also be that block chain witnesses node to verify.After step s 3, described information checking The second Merkel tree that terminal will can be verified is sent to the witness node of block chain, and the witness node is according to institute The business rule stated on block chain is verified to the data block in the second Merkel tree, if being verified, will checking The the second Merkel tree for passing through is sent to described information checking terminal;If checking is not over to described information checking Terminal sends unsanctioned information, after described information checking terminal receives the unsanctioned information, terminates checking.
After this step, can also include:The second Merkel tree to being verified is digitally signed, and obtains Second signed data;According to the second Merkel tree and second signed data, generation is verified information, and exports institute The information of being verified is stated, and terminates checking.
If before the step of being verified to the second Merkel tree, numeral has been carried out to the second Merkel tree Signature, then after being verified to first signed data and the second Merkel tree, can be to first signed data The information to be verified formed after being packaged with the second Merkel tree carries out second digital signature, obtains the second number of signature According to;Then, according to the information to be verified and second signed data, generation is verified information, and terminates checking.Also may be used To be only digitally signed to the second Merkel tree, the second signed data is obtained;According to the second Merkel tree and institute The second signed data is stated, generation is verified information, and terminates checking.
Finally, the information that is verified is sent to described information desensitization terminal by described information checking terminal.
The information that is verified can include:After first signed data and the second Merkel tree package The information to be verified for being formed and second signed data.The information that is verified can include:The second Merkel tree With second signed data.
By carrying out second digital signature, described being verified in information includes second signed data.Work as letter Breath desensitization terminal receives described when being verified information, can verify terminal come checking information according to second signed data Identity, prevent the executor of credit-verification terminal from denying corresponding operation.
Second embodiment of the invention provides a kind of concrete case of block chain method for secret protection.
In the second embodiment that the present invention is provided, the raw information of the block chain of acquisition is a record of transferring accounts.First, The raw information is divided into 8 data blocks, the D7 that D0, D1, D2 is designated as respectively ....Wherein, block chain witness node needs to know Address and the amount of money of the road fund receipt and payment both sides on block chain, it is not necessary to know other contents, storage is provided respectively in D5, D6, D7 Address and the amount of money of the golden receipt and payment both sides on block chain.Due to witness node of the described information checking terminal disposition in block chain On, therefore, described information verifies terminal when the validity to the information to be verified is verified, it is necessary to obtain D5, D6, D7 The content of data block.
Then, the cryptographic Hash of D0, D1, D2 ... D7 is calculated respectively.The cryptographic Hash H0=hash (D0) of D0 is calculated, The cryptographic Hash H1=hash (D1) of D1 ... the cryptographic Hash Hn=hash (D7) of D7, is as shown in table 18 information of data block Content and its corresponding cryptographic Hash.
The information content and its corresponding cryptographic Hash of 18 data blocks of table
Then, H8=hash (H0+H1), H9=hash (H2+H3) ... H11=hash (H6+H7) are calculated one by one;Most Afterwards, cryptographic Hash is successively calculated according to the method described above, binary tree is built, until calculating the cryptographic Hash Root of last root node. As shown in table 2, it is complete containing 8 cryptographic Hash of each node of Merkel tree of data block information.
Table 2 it is complete containing 8 cryptographic Hash of each node of Merkel tree of data block information
The complete Merkel tree built according to table 2 is the first Merkel tree, as shown in Figure 3.
Understood according to prespecified and table 1, the content information of D0, D1, D2, D3 and D4 is privacy information, corresponding H0, H1, H2, H3, H8, H9 node be also privacy information, it is necessary to crop, due to needing to guarantee to calculate checking root node Root, H4, H12 need to be retained, D5, D6, D7 are the data for needing checking, it is necessary to retained, at the same retain interdependent node H5, H6, H7, H10, H11, H13, Root, finally give a Merkel tree for cutting, are the second Merkel tree, as shown in Figure 4.
Next the second Merkel tree is digitally signed, generates the first signed data;Then, by described second Merkel tree and first signed data package, and generate message to be verified, then the message to be verified is verified.
During message to be verified is verified, first, using known public signature key to first number of signature According to being verified, if being verified, the second Merkel tree is verified.
In verification process is carried out to the second Merkel tree, first, the second Merkel tree is parsed, obtained Data block D5, D6, D7 and its cryptographic Hash H5, H6, H7 are taken, then, its Hash is recalculated using data block D5, D6, D7 Value, the cryptographic Hash that will be recalculated carries out contrast verification with cryptographic Hash H5, H6, H7, if checking is not over terminating to test Card;If being verified, the remaining node of the second Merkel tree is verified.
, it is necessary to successively rebuild the 3rd Merkel in verification process is carried out to the remaining node of the second Merkel tree Tree, during reconstruction, successively contrasts the second Merkel tree and the 3rd Merkel tree.Concretely comprise the following steps:Use Cryptographic Hash H4, H5, H6, H7, together with H10, H11, carry out calculating verification (H10=hash (H4+H5), H11=hash (H6+ H7));If being verified, H10, H11, H13 is recycled to calculate verification (H13=hash (H10+H11);It if is verified, then profit Verification (Root=hash (H12+H13)) is calculated with H12, H13, Root, if being verified, to the content information of D5, D6, D7 Verified.Do not pass through once there is a step to demonstrate,prove in said process, then terminate checking.
It is main to check money during the content information (i.e. the content information of data block) to D5, D6, D7 is verified Whether the state that gold produces address 01cHnsCSfEfXCL5u9wT8cVQGijb8JU7nB is normal, and whether remaining sum is more than gold of transferring accounts 5,000,000.00 yuan of volume RMB, the state that fund is transferred to address 1hvzSofGwT8cjb8JU7nBsCSfEVQX5u9CL is It is no normal, if checking is not over terminating checking;If being verified, the information to be verified is entered using signature private key Row digital signature, obtains the second signed data, then, second signed data and information group to be verified is bundled into and is verified Information, terminates checking.
In above-mentioned first embodiment, there is provided a kind of block chain method for secret protection, corresponding, the application A kind of block chain privacy protection device is also provided.Fig. 5 is refer to, it is hidden for a kind of block chain that third embodiment of the invention is provided The schematic diagram of private protection device.Because device embodiment is substantially similar to embodiment of the method, so describe fairly simple, it is related Part is illustrated referring to the part of embodiment of the method.Device embodiment described below is only schematical.
A kind of block chain privacy protection device that third embodiment of the invention is provided, including:
A kind of block chain privacy protection device, it is characterised in that including:
Information receiving module 101, the raw information that block chain link point sends is received for information desensitization terminal;
First Merkel tree builds module 102, for information desensitization terminal according to the raw information, builds complete the One Merkel tree;
Second Merkel tree builds module 103, believes the privacy in the first Merkel tree for information desensitization terminal Breath is cropped, and retains the checking information in the first Merkel tree, the second Merkel tree after being cut;
Second Merkel tree authentication module 104, verifies for credit-verification terminal to the second Merkel tree.
In one embodiment that the present invention is provided, the first Merkel tree builds module, including:
Data block generation unit, for the raw information to be divided into some data blocks;
Summary info generation unit, the cryptographic Hash for calculating each data block respectively;
First Merkel's tree construction unit, for building complete first according to some data blocks and the cryptographic Hash Merkel tree.
In one embodiment that the present invention is provided, the privacy information, including:Private data block and privacy node.
In one embodiment that the present invention is provided, described device also includes:
First Digital Signature module, is digitally signed for the second Merkel tree described in information desensitization terminal-pair, obtains First signed data;
First signed data authentication module, is entered using public signature key for credit-verification terminal to first signed data Row checking;If checking is not over output authentication denial information terminates checking;
If being verified, the second Merkel tree is the step of verified described in execution information checking terminal-pair.
In one embodiment that the present invention is provided, the second Merkel tree authentication module 104, including:
Resolution unit, for being parsed to the second Merkel tree, obtains the data block of the second Merkel tree With the cryptographic Hash of the data block;
Summary info authentication unit, the data block correspondence of the second Merkel tree for being exported to resolution unit Cryptographic Hash verified, if checking not over, export authentication denial information, terminate checking;
Second Merkel's tree authentication unit, for the second Merkel tree to being verified by summary info authentication unit In intermediate node and root node verified, if checking not over, export authentication denial information, terminate checking;
Data block authentication unit, in the second Merkel tree to being verified by the second Merkel tree authentication unit Data block verified, if checking not over, export authentication denial information, terminate checking;It is described if being verified Second Merkel tree is by checking.
In one embodiment that the present invention is provided, the second Merkel tree authentication unit, specifically for:
The 3rd Merkel tree is successively rebuild using the leaf node and intermediate node of the second Merkel tree, and by described Node in two Merkel trees carries out successively contrast verification with the node in the 3rd Merkel tree;If second Merkel Differed in the presence of at least one node in tree and the 3rd Merkel tree, then verified not over end checking;If described Two Merkel trees are identical with the node in the 3rd Merkel tree, then be verified.
In one embodiment that the present invention is provided, described device also includes:
Second Digital Signature module, for being digitally signed to the second Merkel tree being verified, obtains the Two signed datas;
Information generating module is verified, for according to the second Merkel tree and second signed data, generation Information is verified, and information is verified described in output, and terminate checking.
In above-mentioned first embodiment, there is provided a kind of block chain method for secret protection, corresponding, the application A kind of block chain intimacy protection system is also provided.Fig. 6, Fig. 7 are refer to, a kind of its block provided for fourth embodiment of the invention The schematic diagram of information desensitization terminal and credit-verification terminal in chain intimacy protection system.Because system embodiment is substantially similar to Embodiment of the method, so describing fairly simple, the relevent part can refer to the partial explaination of embodiments of method.Described below System embodiment is only schematical.
A kind of block chain intimacy protection system that fourth embodiment of the invention is provided, including:
Information desensitization terminal and credit-verification terminal;
Desensitize terminal and credit-verification terminal of described information is intercoupled connection on block chain by P2P agreements;
Described information desensitization terminal, is deployed on the information sending node in block chain, the secret protection need according to node Will, the complete raw information that will be received is treated by after working process, retaining the checking information that credit-verification terminal needs, generation Checking information, and the information to be verified is sent to credit-verification terminal;
Credit-verification terminal, is deployed on the witness node in block chain, described the treating of receive information desensitization terminal transmission Checking information, and the information to be verified is verified, the information to be verified that verification passes through to be signed, generation checking is logical Information is crossed, and the information that is verified is sent to described information desensitization terminal, otherwise return to authentication denial information.
In one embodiment that the present invention is provided, described information desensitization terminal, including:Information receiving module, first are write from memory Ke Er trees build module, the second Merkel tree and build module, the first Digital Signature module and the first main control module;
Described information receiver module, the first Merkel tree build module, the second Merkel tree and build module and the first numeral Signature blocks are connected with first main control module;
Information receiving module, the raw information that block chain link point sends is received for information desensitization terminal;
The first Merkel tree builds module, for information desensitization terminal according to the raw information, builds complete First Merkel tree;
Second Merkel tree builds module, cuts out the privacy information in the first Merkel tree for information desensitization terminal Cut, and retain the checking information in the first Merkel tree, the second Merkel tree after being cut;
First Digital Signature module, is digitally signed for the second Merkel tree described in information desensitization terminal-pair, Obtain the first signed data;
The first master control module controls described information receiver module receives the raw information from block chain node, and assists Regulation and control system the first Merkel tree builds module, the second Merkel tree structure module and the first Digital Signature module, structure the One Merkel tree, the second Merkel tree, and complete digital signature work.
In one embodiment that the present invention is provided, the first master control module controls described information receiver module reception area The raw information that block chain node sends, data block generation unit, summary info in calling the first Merkel tree to build module are given birth to The first Merkel tree is set up into unit, first Merkel's tree construction unit;First Merck described in first master control module controls Your tree builds module and the first Merkel tree is sent into the second Merkel tree structure module.
In one embodiment that the present invention is provided, the second Merkel tree builds module and crops first Merck Privacy information to be protected is needed in your tree, the Merkel tree for being desensitized, the Merkel tree of the desensitization is the second Merkel tree; The second Merkel tree builds module and the second Merkel tree is sent into first Digital Signature module, and it is carried out After data signature, information to be verified is generated, the information to be verified includes, the first signed data and the second Merkel tree.
In one embodiment that the present invention is provided, described information checking terminal, including:First signed data verifies mould Block, the second Merkel tree authentication module, the second Digital Signature module, it is verified information generating module and the second main control module;
The first signed data authentication module, the second Merkel tree authentication module, the second Digital Signature module, checking are logical Information generating module is crossed to be connected with second main control module;
Wherein, the second Merkel tree authentication module, including:Resolution unit, summary info authentication unit, the second Merck You set authentication unit, data block authentication unit.
In one embodiment that the present invention is provided, the first signed data checking mould described in second master control module controls Block receives the information to be verified;The information to be verified that the first signed data authentication module will be verified is sent to described Second Merkel's tree authentication module;Second main control module coordinates the parsing list in the second Merkel tree authentication module Unit, summary info authentication unit, the second Merkel tree authentication unit, data block authentication unit are carried out to the second Merkel tree Checking.
In one embodiment that the present invention is provided, institute of the summary info authentication unit to the second Merkel tree The corresponding cryptographic Hash of data block is stated to be verified;The second Merkel tree authentication unit according to the second Merkel tree and The cryptographic Hash that summary info authentication unit is calculated carries out the reconstruction of Merkel tree, the 3rd Merkel tree is generated, by second Merck You carry out contrast verification by tree with the 3rd Merkel tree, and result is exported to second main control module.
In one embodiment that the present invention is provided, second main control module will be by second Merkel's tree authentication unit Second Merkel tree of checking is sent to the data block authentication unit, and the data block authentication unit is to second Merkel Data block (business datum i.e. in data block) in tree is verified, and transmits verification result to the second main control module.
In one embodiment that the present invention is provided, the information to be verified that second main control module will be verified sends To the second Digital Signature module, second Digital Signature module carries out digital label to the information described to be verified being verified Name, and the second signed data is sent to second main control module;
Information generating module is verified described in second master control module controls by second signed data and checking The information group bag to be verified for passing through, generation is verified information.
More than, it is a kind of embodiment explanation of block chain intimacy protection system that fourth embodiment of the invention is provided.
A kind of block chain intimacy protection system that the present invention is provided is with a kind of above-mentioned block chain method for secret protection for phase Same inventive concept, with identical beneficial effect, here is omitted.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example " or " some show The description of example " etc. means that the specific features, structure, material or the feature that are described with reference to the embodiment or example are contained in the present invention At least one embodiment or example in.In this manual, the schematic representation to above-mentioned term is not required to be directed to Identical embodiment or example.And, the specific features of description, structure, material or feature can be in any one or more realities Apply and combine in an appropriate manner in example or example.Additionally, in the case of not conflicting, those skilled in the art can be by The feature of different embodiments or example and different embodiments or example described in this specification is combined and combines.Need Illustrate, the flow chart and block diagram in accompanying drawing of the present invention show the system of multiple embodiments of the invention, method and The architectural framework in the cards of computer program product, function and operation.At this point, each side in flow chart or block diagram Frame can represent a part for module, program segment or code, and a part for the module, program segment or code includes one Or multiple executable instructions for realizing the logic function of regulation.It should also be noted that in some are as the realization replaced, it is square The function of being marked in frame can also occur with different from the order marked in accompanying drawing.For example, two continuous square frame reality On can perform substantially in parallel, they can also be performed in the opposite order sometimes, and this is depending on involved function.Also It is noted that the combination of the square frame in each square frame and block diagram and/or flow chart in block diagram and/or flow chart, Ke Yiyong Perform the function of regulation or the special hardware based system of action to realize, or can be referred to computer with specialized hardware The combination of order is realized.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method, can be with Realize by another way.Device embodiment described above is only schematical, for example, the division of the unit, It is only a kind of division of logic function, there can be other dividing mode when actually realizing, but for example, multiple units or component can To combine or be desirably integrated into another system, or some features can be ignored, or not perform.
The unit that is illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit The part for showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be according to the actual needs selected to realize the mesh of this embodiment scheme 's.
In addition, during each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.
If the function is to realize in the form of SFU software functional unit and as independent production marketing or when using, can be with Storage is in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words The part contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, including some instructions are used to so that a computer machine (can be individual People's computer, server, or net machine etc.) perform all or part of step of each embodiment methods described of the invention. And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with the medium of store program codes.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent Pipe has been described in detail with reference to foregoing embodiments to the present invention, it will be understood by those within the art that:Its according to The technical scheme described in foregoing embodiments can so be modified, or which part or all technical characteristic are entered Row equivalent;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology The scope of scheme, it all should cover in the middle of the scope of claim of the invention and specification.

Claims (10)

1. a kind of block chain method for secret protection, it is characterised in that including:
Information desensitization terminal receives the raw information that block chain link point sends;
Information desensitizes terminal according to the raw information, builds the first complete Merkel tree;
Information desensitization terminal crops the privacy information in the first Merkel tree, and retains the first Merkel tree Checking information, the second Merkel tree after being cut;
Credit-verification terminal is verified to the second Merkel tree.
2. block chain method for secret protection according to claim 1, it is characterised in that described according to the raw information, The first complete Merkel tree is built, including:
The raw information is divided into some data blocks;
The cryptographic Hash of each data block is calculated respectively;
The first complete Merkel tree is built according to some data blocks and the cryptographic Hash.
3. block chain method for secret protection according to claim 2, it is characterised in that the privacy information, including:Privacy Data block and privacy node.
4. block chain method for secret protection according to claim 1, it is characterised in that in described information desensitization terminal by institute The privacy information stated in the first Merkel tree is cropped, and retains the checking information in the first Merkel tree, is cut After the step of rear the second Merkel tree, the second Merkel tree described in described information checking terminal-pair carry out verification step it Before, also include:
Second Merkel tree described in information desensitization terminal-pair is digitally signed, and obtains the first signed data;
Credit-verification terminal is verified using public signature key to first signed data;If checking is not over exporting Authentication denial information, terminates checking;
If being verified, the second Merkel tree is the step of verified described in execution information checking terminal-pair.
5. block chain method for secret protection according to claim 1, it is characterised in that described to the second Merkel tree Verified, including:
Step S1:The second Merkel tree is parsed, the data block and the data of the second Merkel tree is obtained The cryptographic Hash of block;
Step S2:The corresponding cryptographic Hash of the data block of the second Merkel tree in step S1 is verified, if testing Card is not over then output authentication denial information, terminates checking;
Step S3:Intermediate node and root node in the second Merkel tree for being verified in step S2 is verified, If checking is not over output authentication denial information terminates checking;
Step S4:Data block in the second Merkel tree for being verified in step S3 is verified, if checking does not have Pass through, then export authentication denial information, terminate checking;If being verified, the second Merkel tree is by checking.
6. block chain method for secret protection according to claim 5, it is characterised in that described to the second Merkel tree Intermediate node and root node verified, including:
The 3rd Merkel tree is successively rebuild using the leaf node and intermediate node of the second Merkel tree, and described second is write from memory Node in Ke Er trees carries out successively contrast verification with the node in the 3rd Merkel tree;If the second Merkel tree with Differed in the presence of at least one node in the 3rd Merkel tree, then verified not over end checking;If described second writes from memory Ke Er trees are identical with the node in the 3rd Merkel tree, then be verified.
7. block chain method for secret protection according to claim 1, it is characterised in that described to second Merkel After the step of tree is verified, also include:
The second Merkel tree to being verified is digitally signed, and obtains the second signed data;
According to the second Merkel tree and second signed data, generation is verified information, and it is logical to export the checking Information is crossed, and terminates checking.
8. a kind of block chain privacy protection device, it is characterised in that including:
Information receiving module, the raw information that block chain link point sends is received for information desensitization terminal;
First Merkel tree builds module, for information desensitization terminal according to the raw information, builds the first complete Merck You set;
Second Merkel tree builds module, cuts the privacy information in the first Merkel tree for information desensitization terminal Fall, and retain the checking information in the first Merkel tree, the second Merkel tree after being cut;
Second Merkel's tree authentication module, verifies for credit-verification terminal to the second Merkel tree.
9. a kind of block chain intimacy protection system, it is characterised in that including:Information desensitization terminal and credit-verification terminal;
Desensitize terminal and credit-verification terminal of described information is intercoupled connection on block chain by P2P agreements;
Described information desensitization terminal, is deployed on the information sending node in block chain, the secret protection needs according to node, will The complete raw information for receiving is generated to be verified by after working process, retaining the checking information that credit-verification terminal needs Information, and the information to be verified is sent to credit-verification terminal;
Credit-verification terminal, is deployed on the witness node in block chain, and it is described to be verified that receive information desensitization terminal sends Information, and the information to be verified is verified, the information to be verified that verification passes through to be signed, generation is verified letter Breath, and the information that is verified is sent to described information desensitization terminal, otherwise return to authentication denial information.
10. block chain intimacy protection system according to claim 9, it is characterised in that described information desensitizes terminal, bag Include:Information receiving module, the first Merkel tree build module, the second Merkel tree structure module, the first Digital Signature module and First main control module;
Described information receiver module, the first Merkel tree build module, the second Merkel tree and build module and the first digital signature Module is connected with the main control module;
Information receiving module, the raw information that block chain link point sends is received for information desensitization terminal;
The first Merkel tree builds module, for information desensitization terminal according to the raw information, builds complete first Merkel tree;
Second Merkel tree builds module, cuts the privacy information in the first Merkel tree for information desensitization terminal Fall, and retain the checking information in the first Merkel tree, the second Merkel tree after being cut;
First Digital Signature module, is digitally signed for the second Merkel tree described in information desensitization terminal-pair, obtains First signed data;
The first master control module controls described information receiver module receives the raw information from block chain node, and coordinates control Make the first Merkel tree and build module, the second Merkel tree structure module and the first Digital Signature module, build first and write from memory Ke Er trees, the second Merkel tree, and complete digital signature work.
CN201710202846.7A 2017-03-30 2017-03-30 A kind of block chain method for secret protection, apparatus and system Pending CN106899412A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710202846.7A CN106899412A (en) 2017-03-30 2017-03-30 A kind of block chain method for secret protection, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710202846.7A CN106899412A (en) 2017-03-30 2017-03-30 A kind of block chain method for secret protection, apparatus and system

Publications (1)

Publication Number Publication Date
CN106899412A true CN106899412A (en) 2017-06-27

Family

ID=59193534

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710202846.7A Pending CN106899412A (en) 2017-03-30 2017-03-30 A kind of block chain method for secret protection, apparatus and system

Country Status (1)

Country Link
CN (1) CN106899412A (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108347429A (en) * 2017-12-29 2018-07-31 北京世纪互联宽带数据中心有限公司 A kind of information eyewitness system, method and device
CN108696511A (en) * 2018-04-24 2018-10-23 深圳市元征科技股份有限公司 A kind of public notification of information method, apparatus and relevant device based on block chain
CN108848079A (en) * 2018-05-31 2018-11-20 腾讯科技(深圳)有限公司 Realize method, system, device and the computer system of Information Authentication
CN109040082A (en) * 2018-08-10 2018-12-18 阿里巴巴集团控股有限公司 Certification, verification method and the device of the identity content information of user
CN109636388A (en) * 2018-12-07 2019-04-16 深圳市智税链科技有限公司 Data processing method, device, medium and electronic equipment in block chain network
CN109767245A (en) * 2019-01-08 2019-05-17 中国联合网络通信集团有限公司 Consumption information checking method, equipment and storage medium
CN110033264A (en) * 2019-01-31 2019-07-19 阿里巴巴集团控股有限公司 Construct the corresponding Mei Keer tree of block, simple payment verification method and device
CN110119429A (en) * 2019-04-22 2019-08-13 矩阵元技术(深圳)有限公司 Data processing method, device, computer equipment and storage medium
WO2019072293A3 (en) * 2018-12-13 2019-10-10 Alibaba Group Holding Limited Data isolation in blockchain network
CN110336672A (en) * 2019-04-29 2019-10-15 山东工商学院 Method, system and the storage medium of citizen privacy protection based on zero-knowledge proof
CN110611661A (en) * 2019-08-23 2019-12-24 国网浙江省电力有限公司电力科学研究院 Acquired information sharing method and system based on double-authentication multiple-protection measures
WO2019101246A3 (en) * 2019-03-21 2020-01-23 Alibaba Group Holding Limited Data isolation in blockchain networks
CN110727644A (en) * 2019-09-29 2020-01-24 南京金宁汇科技有限公司 Method, system and storage medium for cutting block chain data
WO2020057196A1 (en) * 2018-09-20 2020-03-26 百度在线网络技术(北京)有限公司 Blockchain smart contract verification method and apparatus, and storage medium
CN111274612A (en) * 2018-12-04 2020-06-12 北京京东尚科信息技术有限公司 Practitioner trust verification method and system, witness service system and storage medium
CN111314374A (en) * 2020-03-11 2020-06-19 上海交通大学 Block chain structure for quick verification and generating system and verification method thereof
CN111783137A (en) * 2019-01-31 2020-10-16 阿里巴巴集团控股有限公司 Method and device for hiding transaction written into block chain
CN112328407A (en) * 2020-10-20 2021-02-05 北京空间飞行器总体设计部 Message transmission system suitable for coordination of development and management tasks of spacecraft
CN112491556A (en) * 2020-11-26 2021-03-12 中国电子科技集团公司第五十四研究所 Block chain agent blind signature generation method
CN113127493A (en) * 2021-06-16 2021-07-16 恒生电子股份有限公司 Method and device for cutting block chain state data, electronic equipment and storage medium
CN113177227A (en) * 2021-04-26 2021-07-27 中国联合网络通信集团有限公司 Information verification method and device based on block chain
WO2022262446A1 (en) * 2021-06-18 2022-12-22 中国科学技术大学 Method and apparatus for hierarchically clipping data in blockchain transaction, and device and medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140136847A1 (en) * 2007-05-31 2014-05-15 Bby Solutions, Inc Security and authentication systems and methods for personalized portable devices and associated systems
CN105610578A (en) * 2016-01-25 2016-05-25 杭州复杂美科技有限公司 Block chain information archiving and privacy protection method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140136847A1 (en) * 2007-05-31 2014-05-15 Bby Solutions, Inc Security and authentication systems and methods for personalized portable devices and associated systems
CN105610578A (en) * 2016-01-25 2016-05-25 杭州复杂美科技有限公司 Block chain information archiving and privacy protection method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ANDREAS M.ANTOMOPOULOS: "《Master bitcoin-unlocking digital cryptocurrencies》", 20 December 2014 *

Cited By (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108347429A (en) * 2017-12-29 2018-07-31 北京世纪互联宽带数据中心有限公司 A kind of information eyewitness system, method and device
CN108696511A (en) * 2018-04-24 2018-10-23 深圳市元征科技股份有限公司 A kind of public notification of information method, apparatus and relevant device based on block chain
CN110460588A (en) * 2018-05-31 2019-11-15 腾讯科技(深圳)有限公司 Realize method, apparatus, the computer system and storage medium of Information Authentication
CN108848079A (en) * 2018-05-31 2018-11-20 腾讯科技(深圳)有限公司 Realize method, system, device and the computer system of Information Authentication
CN110460588B (en) * 2018-05-31 2022-11-22 腾讯科技(深圳)有限公司 Method, device, computer system and storage medium for realizing information verification
CN108848079B (en) * 2018-05-31 2021-05-11 腾讯科技(深圳)有限公司 Method, system, device and computer system for realizing information verification
CN109040082A (en) * 2018-08-10 2018-12-18 阿里巴巴集团控股有限公司 Certification, verification method and the device of the identity content information of user
TWI703852B (en) * 2018-08-10 2020-09-01 香港商阿里巴巴集團服務有限公司 Authentication and verification method and device for user's identity content information
CN109040082B (en) * 2018-08-10 2020-04-21 阿里巴巴集团控股有限公司 Authentication and verification method and device for identity content information of user
KR20200095540A (en) * 2018-09-20 2020-08-10 바이두 온라인 네트웍 테크놀러지 (베이징) 캄파니 리미티드 Blockchain smart contract verification method, device and storage medium
KR102431459B1 (en) 2018-09-20 2022-08-11 바이두 온라인 네트웍 테크놀러지 (베이징) 캄파니 리미티드 Blockchain smart contract verification method, device and storage medium
WO2020057196A1 (en) * 2018-09-20 2020-03-26 百度在线网络技术(北京)有限公司 Blockchain smart contract verification method and apparatus, and storage medium
CN111274612A (en) * 2018-12-04 2020-06-12 北京京东尚科信息技术有限公司 Practitioner trust verification method and system, witness service system and storage medium
CN109636388A (en) * 2018-12-07 2019-04-16 深圳市智税链科技有限公司 Data processing method, device, medium and electronic equipment in block chain network
CN109636388B (en) * 2018-12-07 2024-02-23 深圳市智税链科技有限公司 Data processing method, device, medium and electronic equipment in block chain network
TWI706352B (en) * 2018-12-13 2020-10-01 香港商阿里巴巴集團服務有限公司 Computer-implemented method, non-transitory computer-readable storage medium and system for protecting sensitive data stored on blockchain maintained by blockchain network
RU2745518C2 (en) * 2018-12-13 2021-03-25 Алибаба Груп Холдинг Лимитед Data isolation in the blockchain network
WO2019072293A3 (en) * 2018-12-13 2019-10-10 Alibaba Group Holding Limited Data isolation in blockchain network
KR102258440B1 (en) * 2018-12-13 2021-06-02 어드밴스드 뉴 테크놀로지스 씨오., 엘티디. Data Isolation in Blockchain Networks
KR20200074909A (en) * 2018-12-13 2020-06-25 알리바바 그룹 홀딩 리미티드 Data isolation in blockchain networks
RU2745518C9 (en) * 2018-12-13 2021-05-26 Эдванст Нью Текнолоджиз Ко., Лтд. Data isolation in the blockchain network
JP2020516103A (en) * 2018-12-13 2020-05-28 アリババ・グループ・ホールディング・リミテッドAlibaba Group Holding Limited Data separation in blockchain networks
US11003646B2 (en) 2018-12-13 2021-05-11 Advanced New Technologies Co., Ltd. Data isolation in a blockchain network
CN109767245A (en) * 2019-01-08 2019-05-17 中国联合网络通信集团有限公司 Consumption information checking method, equipment and storage medium
CN110033264A (en) * 2019-01-31 2019-07-19 阿里巴巴集团控股有限公司 Construct the corresponding Mei Keer tree of block, simple payment verification method and device
CN111783137A (en) * 2019-01-31 2020-10-16 阿里巴巴集团控股有限公司 Method and device for hiding transaction written into block chain
TWI721691B (en) * 2019-03-21 2021-03-11 開曼群島商創新先進技術有限公司 A computer-implemented method, apparatus and system for isolating data stored on a blockchain maintained by a blockchain network
WO2019101246A3 (en) * 2019-03-21 2020-01-23 Alibaba Group Holding Limited Data isolation in blockchain networks
US11265322B2 (en) 2019-03-21 2022-03-01 Advanced New Technologies Co., Ltd. Data isolation in blockchain networks
US11228596B2 (en) 2019-03-21 2022-01-18 Advanced New Technologies Co., Ltd. Data isolation in blockchain networks
CN110119429A (en) * 2019-04-22 2019-08-13 矩阵元技术(深圳)有限公司 Data processing method, device, computer equipment and storage medium
CN110119429B (en) * 2019-04-22 2021-12-03 矩阵元技术(深圳)有限公司 Data processing method, data processing device, computer equipment and storage medium
CN110336672A (en) * 2019-04-29 2019-10-15 山东工商学院 Method, system and the storage medium of citizen privacy protection based on zero-knowledge proof
CN110611661A (en) * 2019-08-23 2019-12-24 国网浙江省电力有限公司电力科学研究院 Acquired information sharing method and system based on double-authentication multiple-protection measures
CN110727644A (en) * 2019-09-29 2020-01-24 南京金宁汇科技有限公司 Method, system and storage medium for cutting block chain data
CN110727644B (en) * 2019-09-29 2022-06-24 南京金宁汇科技有限公司 Method, system and storage medium for cutting block chain data
CN111314374A (en) * 2020-03-11 2020-06-19 上海交通大学 Block chain structure for quick verification and generating system and verification method thereof
CN112328407A (en) * 2020-10-20 2021-02-05 北京空间飞行器总体设计部 Message transmission system suitable for coordination of development and management tasks of spacecraft
CN112491556A (en) * 2020-11-26 2021-03-12 中国电子科技集团公司第五十四研究所 Block chain agent blind signature generation method
CN113177227A (en) * 2021-04-26 2021-07-27 中国联合网络通信集团有限公司 Information verification method and device based on block chain
CN113127493A (en) * 2021-06-16 2021-07-16 恒生电子股份有限公司 Method and device for cutting block chain state data, electronic equipment and storage medium
WO2022262446A1 (en) * 2021-06-18 2022-12-22 中国科学技术大学 Method and apparatus for hierarchically clipping data in blockchain transaction, and device and medium
GB2622343A (en) * 2021-06-18 2024-03-13 Univ Science & Technology China Method and apparatus for hierarchically clipping data in blockchain transaction, and device medium

Similar Documents

Publication Publication Date Title
CN106899412A (en) A kind of block chain method for secret protection, apparatus and system
CN106559211B (en) Privacy protection intelligent contract method in block chain
EP3449451B1 (en) Implementing logic gate functionality using a blockchain
KR101987692B1 (en) Registry and Automation Management Methods for Smart Contracts in Blockchain Enforcement
ES2957843T3 (en) Verification of data processes in a network of computing resources
CN107454114A (en) A kind of auction bidding method, server and readable storage medium storing program for executing
ES2917200T3 (en) Verification of data processes in a network of computing resources
DE69534490T2 (en) METHOD FOR THE SAFE APPLICATION OF DIGITAL SIGNATURES IN A COMMERCIAL ENCRYPTION SYSTEM
EP4184410A1 (en) Operating system for blockchain iot devices
KR20180114939A (en) Systems and methods for controlling asset-related activities through block chaining
US20130317990A1 (en) Secure transaction object creation, propagation and invocation
CN106161359A (en) The method and device of certification user, the method and device of registration wearable device
CN109658273B (en) Block chain-based rapid business insurance claim settlement method, storage medium and equipment
CN110932859B (en) User information processing method, device and equipment and readable storage medium
CN109547218B (en) Alliance link node key distribution and backup system for improving BIP (building information processing) protocol
US20170316479A1 (en) System for user authentication based on linking a randomly generated number to the user and a physical item
CN112567716B (en) Secure data transmission system and method
CN110751485A (en) Data processing method and equipment
CN109858904A (en) Data processing method and device based on block chain
CN109933987A (en) For the key generation method of block chain network, endorsement method, storage medium, calculate equipment
CN115001715B (en) Intelligent encryption contract detection method based on block chain and terminal
EP3552344B1 (en) Bidirectionally linked blockchain structure
CN113010861A (en) Identity verification method and system in financing transaction based on block chain
CN106503993A (en) Based on the method for payment and its system that pay labelling realization
CN110249358A (en) High value material is exported based on 1 evidences of title of ring

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned
AD01 Patent right deemed abandoned

Effective date of abandoning: 20210416