CN110493220A - A kind of data sharing method based on block chain, equipment and storage medium - Google Patents

A kind of data sharing method based on block chain, equipment and storage medium Download PDF

Info

Publication number
CN110493220A
CN110493220A CN201910760147.3A CN201910760147A CN110493220A CN 110493220 A CN110493220 A CN 110493220A CN 201910760147 A CN201910760147 A CN 201910760147A CN 110493220 A CN110493220 A CN 110493220A
Authority
CN
China
Prior art keywords
user
block chain
login user
identity
login
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910760147.3A
Other languages
Chinese (zh)
Other versions
CN110493220B (en
Inventor
王强
申子熹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910760147.3A priority Critical patent/CN110493220B/en
Publication of CN110493220A publication Critical patent/CN110493220A/en
Application granted granted Critical
Publication of CN110493220B publication Critical patent/CN110493220B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

A kind of data sharing method based on block chain, it include: the login password for obtaining login user input, after being verified, the identity documents of login user are generated according to login user identity information and the first digital signature, the identity documents of login user are sent to client, receive the acquisition request message sent after the second node equipment in block chain is verified for identity documents, signature verification is carried out to the second digital signature, after being verified, it is sent to second node equipment and obtains response message, obtaining in response message includes the block chain address that matched file destination and file destination are identified with file destination.In this way, second node equipment can deposit card according to the file that block chain address obtains file destination, and the legitimacy of file destination is verified with this.On the one hand based on the authentication between block chain implementation mechanism, on the other hand, the tamper-resistance properties based on block chain can guarantee the security reliability of data sharing process, to guarantee business normal progression.

Description

A kind of data sharing method based on block chain, equipment and storage medium
Technical field
This application involves block chain technical field more particularly to a kind of data sharing method based on block chain, equipment and Storage medium.
Background technique
Nowadays can there are more institution cooperations and the credible demand recognized each other of data under many scenes, for example, public in tradition Multiple mechanisms combines are needed to provide business handling service for user in service system, this multiple inter-agency mutual identity of needs is recognized Card just can handle related service after authentication passes through to bid to host people, bid to host people and need during transacting business multiple Inter-agency to issue some proving data back and forth, a variety of materials are submitted in multiplicating, and Bid Process is extremely complex and inefficiency, this It is primarily due to cannot achieve safely and reliably data sharing between multiple mechanisms.
At present in order to improve efficiency simple flow in tradition public service system, in each inter-agency configuration authentication The heart realizes authentication to realizing data sharing, but each inter-agency Dynamic data exchange storage management will guarantee its safety, The investment of its hardware and software is huge, is nonetheless also difficult to prevent external or internal factor to having number in practical applications According to distort, distorting for data just will have a direct impact on business handling.
Except of course that except public service system, it is a lot of other that business side's participation data exchange scene is needed to equally exist Problem is stated, based on this situation, it is urgent to provide a kind of data sharing methods at present, improve the safety of data sharing process.
Summary of the invention
The embodiment of the present application provides a kind of data sharing method based on block chain, by being realized not using block chain With the data sharing between operation system, and the safety of shared procedure is ensured.Present invention also provides corresponding device, Equipment, medium and computer program product.
The application first aspect provides a kind of data sharing method based on block chain, which comprises
The login password for obtaining login user input is tested according to the login password of the registration user of local service system storage The legitimacy of the login password of the login user input is demonstrate,proved, the login that registration user is stored in the local service system is close Code and identity information;
After the login password authentication of login user input passes through, according to the identity information of the login user and the One digital signature generates the identity documents of the login user, and the client of Xiang Suoshu login user sends the login user Identity documents;
It receives after the second node equipment in the block chain is verified for the identity documents of the login user and sends out The acquisition request message sent includes user identifier, the file destination mark of the login user in the acquisition request message with And second digital signature;
Signature verification is carried out to second digital signature, after being verified, the transmission of Xiang Suoshu second node equipment is obtained Response message is taken, including that the login user is corresponding in the acquisition response message identifies matched mesh with the file destination Mark the block chain address of file and the file destination.
The application second aspect provides a kind of data sharing method based on block chain, which comprises
The identity documents of login user are obtained, include the identity of the login user in the identity documents of the login user Information and the first digital signature, first digital signature are first node equipment the stepping in the login user in block chain Record password authentification carries out signature generation to the identity information of the login user after passing through;
The identity that the login user is obtained from the block chain deposits card, deposits card pair according to the identity of the login user The identity documents of the login user are verified;It is stored with what each node device in block chain network uploaded in the block chain Identity information based on registration user generates identity and deposits card;
After being verified, Xiang Suoshu first node equipment sends acquisition request message, wraps in the acquisition request message Include the user identifier, file destination mark and the second digital signature of the login user;
Receive the acquisition response message that the first node equipment is sent after second digital signature authentication passes through, institute State in acquisition response message includes that the login user is corresponding and the file destination identifies matched file destination and institute State the block chain address of file destination;
The file that the file destination is obtained from the block chain according to the block chain address of the file destination deposits card, The legitimacy that results demonstrate,proves the file destination is deposited according to the file of the file destination;Block chain is also stored in the block chain The file for the file generated uploaded based on user that each node device uploads in network deposits card.
The application third aspect provides a kind of first node equipment, and the equipment includes:
First authentication module, for obtaining the login password of login user input, according to the note of local service system storage The legitimacy of the login password of the input of login user described in the login password authentication of volume user, stores in the local service system There are the login password and identity information of registration user;Sending module, the login password authentication for being inputted in the login user By rear, the identity documents of the login user are generated according to the identity information of the login user and the first digital signature, to The client of the login user sends the identity documents of the login user;
Receiving module, the identity documents for being directed to the login user for receiving the second node equipment in the block chain The acquisition request message sent after being verified includes user identifier, the mesh of the login user in the acquisition request message Mark file identification and the second digital signature;
Second authentication module, for carrying out signature verification to second digital signature, after being verified, to institute State second node equipment and send and obtain response message, in the acquisitions response message including the login user it is corresponding with it is described File destination identifies the block chain address of matched file destination and the file destination.
The application fourth aspect provides a kind of second node equipment, and the equipment includes:
Module is obtained, includes described in the identity documents of the login user for obtaining the identity documents of login user The identity information of login user and the first digital signature, first digital signature are that the first node equipment in block chain is being tested Demonstrate,prove the login user login password pass through after signature generation at least is carried out to the identity information of the login user;
First authentication module, the identity for obtaining the login user from the block chain are deposited card, are stepped on according to described The identity for employing family is deposited card and is verified to the identity documents of the login user;Block chain network is stored in the block chain In the identity information based on registration user that uploads of each node device generate identity and deposit card;
Sending module, for after being verified, Xiang Suoshu first node equipment to send acquisition request message, the acquisition User identifier, file destination mark and the second digital signature in request message including the login user;
Receiving module is obtained for receive that the first node equipment sends after second digital signature authentication passes through Response message is taken, including that the login user is corresponding in the acquisition response message identifies matched mesh with the file destination Mark the block chain address of file and the file destination;
Second authentication module, for obtaining the mesh from the block chain according to the block chain address of the file destination The file of mark file deposits card, deposits the legitimacy that results demonstrate,proves the file destination according to the file of the file destination;The block The file that the file generated uploaded based on user that each node device in block chain network uploads also is stored in chain deposits card.
The 5th aspect of the application provides a kind of node device, and the node device includes processor and memory:
The memory is for storing computer program;
The processor is used to execute the number as described in above-mentioned first aspect or second aspect according to the computer program The step of according to sharing method.
The 6th aspect of the application provides a kind of computer readable storage medium, and the computer readable storage medium is for depositing Computer program is stored up, the computer program is for executing data sharing method described in above-mentioned first aspect or second aspect.
The 7th aspect of the application provides a kind of computer program product including instruction, when run on a computer, So that the computer executes method described in above-mentioned first aspect or second aspect.
As can be seen from the above technical solutions, the embodiment of the present application has the advantage that
A kind of data sharing method based on block chain is provided in the embodiment of the present application, by operation system and block chain In conjunction with, in the login password and identity information of local service system storage registration user, and will be based on the identity letter of registration user The identity that breath generates, which deposits card and deposits card in the file of the file generated locally uploaded based on the registration user, is stored in area On block chain, when user is to a certain mechanism transacting business, the machine of other business can be handled before accessing by login password First node equipment corresponding to structure obtains the node device and is generated by the identity information of login user and the first digital signature Identity documents, the corresponding second node equipment of operational agency to be handled realizes that identity is recognized each other by verifying identity documents, testing After card passes through, acquisition request message is sent to first node equipment, to request the corresponding file destination of login user, first node After equipment passes through the second digital signature authentication in acquisition request message, file destination is carried to the transmission of second node equipment And its acquisition response message of block chain address, in this way, second node equipment can obtain file destination according to block chain address File deposit card, and the legitimacy of the file destination is verified with this.On the one hand recognized based on the identity between block chain implementation mechanism Card, on the other hand, the tamper-resistance properties based on block chain can guarantee the security reliability of data sharing process, to guarantee business just Often progress.
Detailed description of the invention
Fig. 1 is the scene framework figure of the data sharing method based on block chain in the embodiment of the present application;
Fig. 2A is the flow chart of the data sharing method based on block chain in the embodiment of the present application;
Fig. 2 B is the flow chart of the data sharing method based on block chain in the embodiment of the present application;
Fig. 3 is the flow chart of the data sharing method based on block chain in the embodiment of the present application;
Fig. 4 is the application scenarios schematic diagram of the data sharing method based on block chain in the embodiment of the present application;
Fig. 5 is the interaction diagrams of the data sharing method based on block chain in the embodiment of the present application;
Fig. 6 A is inter-agency authentication schematic diagram in the embodiment of the present application;
Fig. 6 B is user identity authentication schematic diagram in the embodiment of the present application;
Fig. 7 A is data sharing schematic diagram in the embodiment of the present application;
Fig. 7 B is alliance's chain schematic diagram of auditing in the embodiment of the present application;
Fig. 8 is a structural schematic diagram of first node equipment in the embodiment of the present application;
Fig. 9 is a structural schematic diagram of first node equipment in the embodiment of the present application;
Figure 10 is a structural schematic diagram of first node equipment in the embodiment of the present application;
Figure 11 is a structural schematic diagram of first node equipment in the embodiment of the present application;
Figure 12 is a structural schematic diagram of first node equipment in the embodiment of the present application;
Figure 13 is a structural schematic diagram of first node equipment in the embodiment of the present application;
Figure 14 is a structural schematic diagram of second node equipment in the embodiment of the present application;
Figure 15 is a structural schematic diagram of second node equipment in the embodiment of the present application;
Figure 16 is a structural schematic diagram of second node equipment in the embodiment of the present application;
Figure 17 is a structural schematic diagram of terminal in the embodiment of the present application.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only this Apply for a part of the embodiment, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art exist Every other embodiment obtained under the premise of creative work is not made, shall fall in the protection scope of this application.
The description and claims of this application and term " first ", " second ", " third ", " in above-mentioned attached drawing The (if present)s such as four " are to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should manage The data that solution uses in this way are interchangeable under appropriate circumstances, so that embodiments herein described herein for example can be to remove Sequence other than those of illustrating or describe herein is implemented.In addition, term " includes " and " having " and theirs is any Deformation, it is intended that cover it is non-exclusive include, for example, containing the process, method of a series of steps or units, system, production Product or equipment those of are not necessarily limited to be clearly listed step or unit, but may include be not clearly listed or for this A little process, methods, the other step or units of product or equipment inherently.
For in traditional public service system each inter-agency configuration authentication center come realize authentication to It realizes data sharing, but needs to put into a large amount of hardware and softwares to guarantee safety, and be also difficult to prevent in practical applications External or internal factor is to this problem of distorting of data with existing, sharing of the application based on block chain technology and anti-tamper Characteristic proposes a kind of data sharing method based on block chain, specifically, stores stepping on for registration user in local service system Password and identity information are recorded, the identity that the identity information based on registration user generates is stored in block chain and deposits card and based on institute It states registration user and deposits card in the file of the file generated locally uploaded, user can carry out identity by input login password and test Card, and the identity documents for the user that first node equipment is generated according to the identity information of user and the first digital signature are obtained, with Identity is recognized each other between this implementation mechanism, is recognized each other in identity by rear, can be by way of sending acquisition request message from first segment Point device obtains file destination and its block chain address, obtains the file voucher of file destination, based on the block chain address to test The legitimacy for demonstrate,proving file destination, to ensure the safety of file destination shared procedure.
It is appreciated that data sharing method provided by the present application can be applied to public services' business handling, such as exist When founding enterprise, the mechanisms such as industrial and commercial administration, public security subbureau, bank, tax may be implemented identity and recognize each other and secure data It is shared, therefore, for the data that has been filed on, user be not necessarily to it is multiple it is inter-agency issue and repeat to submit back and forth, substantially increase Business handling efficiency saves user time and energy.The data sharing method can also be applied to medical field, realize different doctors Patient data management between mechanism such as Different hospital and pharmacy is treated, or is applied to financial field, such as property transfer scene, Transaction Information is shared between realization bank, broker, government official, buyer and seller.In order to make it easy to understand, hereinafter to found This scene of enterprise illustrates.
Specifically, above-mentioned data sharing method can be applied to block chain network, and two are included at least in the block chain network A node device, specially the first node equipment of sharing data and the second node equipment for enjoying data.Above-mentioned node device It can be any calculating equipment with data-handling capacity, including terminal or server, wherein terminal specifically can be platform Formula machine, laptop, tablet computer or smart phone etc..
Data sharing method provided by the present application can be stored in the node of block chain network in the form of a computer program Equipment, first node equipment and second node equipment realize the data sharing method of the application by operation computer program.It needs It is noted that computer program can be independent, it is also possible to be integrated in the program on other equipment, such as can be Functional module, plug-in unit or small routine etc..
In practical application, the data sharing method provided by the present application based on block chain can be, but not limited to be applied to such as In application environment shown in FIG. 1.
As shown in Figure 1, including multiple node devices in block chain network 100, such as the first node equipment of corresponding A mechanism 101 and corresponding B mechanism second node equipment 102, user can input in the client that the terminal 200 that itself holds is run Login password accesses first node equipment 101, and first node equipment 101 obtains the login password of login user input, according to this The legitimacy of the login password of the login password authentication login user input of the registration user of ground operation system storage, is used logging in After the login password authentication of family input passes through, first node equipment 101 is according to the identity information of the login user and the first number Word signature generates the identity documents of the login user, and the client of Xiang Suoshu login user sends the identity of the login user Voucher, wherein identity documents can be presented with quick response code form, and such second node equipment 102 can scan the two-dimensional code acquisition and step on The identity documents at family are employed, then the identity documents of login user are verified, and after being verified, are set to first node Standby 101 send acquisition request message, then receive what first node equipment 101 was sent after passing through to the second digital signature authentication Response message is obtained, file destination is obtained from the block chain according to the block chain address for obtaining file destination in response message File deposit card, according to the file of file destination deposit results card file destination legitimacy.
In order to enable the technical solution of the application it is clearer, it can be readily appreciated that separately below from first node equipment and Data sharing method is described in detail in the angle of two node devices.
The flow chart of data sharing method based on block chain shown in A referring to fig. 2, this method comprises:
S201: obtaining the login password of login user input, according to the login of the registration user of local service system storage The legitimacy of the login password of the input of login user described in password authentification.
Specifically, each mechanism for carrying out data sharing has corresponding local service system, and in block chain Node device in network.Wherein, local service system is used to provide corresponding business handling service for user, referring to fig. 2 B, User registers in local service system, and file, such as body needed for locally uploading transacting business after succeeding in registration Part documentary evidence, various qualifications files etc. are user's transacting business so that local service system is based on above-mentioned file.
In the present embodiment, it is stored with the login password and identity information of registration user in local service system, logs in close Code specifically can be the text of user's artificial settings, pattern, can also be that the biological characteristics such as fingerprint, face, iris, vocal print are believed Breath, it is clear that login authentication is carried out as login password using biological information, on the one hand can simplify user's operation, Yong Huwu Need memory cipher that verifying can be realized, on the other hand, biological information can tamper it is lower, have higher reliability, identity Information then can be the information of user inputs in registration characterization user identity, including name, age, gender, occupation, institute Belong to unit, contact method, identification card number etc..
In view of data sharing demand, first node equipment is also by the body of the identity information generation based on the registration user Part deposits card and deposits card in the file of the file generated locally uploaded based on the registration user and is stored on block chain.Its In, identity is deposited card to first node equipment and file deposits card and is stored in the process of block chain and is properly termed as identity and deposits card cochain and text Part deposits card cochain.
Card cochain is deposited for identity, can specifically be accomplished in that the identity for obtaining the registration user input The identity information of the registration user is stored in the local service system, then to the identity of the registration user by information Information carries out Hash operation and obtains cryptographic Hash, deposits card, last first node for the cryptographic Hash as the identity of the registration user The identity of the registration user is deposited card broadcast to the block chain, to store the registration user on the block chain by equipment Identity deposit card.File, which deposits the upper chain process of card and may refer to identity, deposits the upper chain process of card, no longer relates herein.
It, can be by unified entrance such as dedicated programs or small when user is when another mechanism handles corresponding business Routine access first node equipment, specifically, user can input user in the login interface of dedicated programs or small routine Name and login password, in this way, the available user name of first node equipment and login password, it is stored with local service system Registration user user name and login password be compared, if unanimously, being verified, allow to log in, the table if inconsistent Bright user name or login password are wrong, and first node equipment can return to prompting message to client, and user is reminded to step on again Record.
S202: after the login password authentication of login user input passes through, believed according to the identity of the login user Breath and the first digital signature generate the identity documents of the login user, and the client of Xiang Suoshu login user sends the login The identity documents of user.
For first node equipment, the login password authentication of login user input passes through, then shows that login user is Believable, first node equipment can generate identity documents for the login user, so as to based between the voucher implementation mechanism Identity is recognized each other.
In specific implementation, first node equipment services CA application key pair (public key and private key) to digital certificate, can be with Understand, the corresponding node device of other mechanisms such as second node equipment knows the public key of first node equipment, first node equipment Signature meter can be carried out to the information including the identity information of the login user using signature algorithm according to its private key It calculates, generates the first digital signature, then be packaged to generate to log in by the identity information of the login user and the first digital signature and use The identity documents at family.
In some cases, user can also select to disclose according to different business oneself to need disclosed information, avoid quick Sense information is illegally revealed.Specifically, before the user identity voucher for generating the login user, first node equipment can be obtained Take the file destination mark that the login user is specified, wherein the target that file destination mark can be formulated with unique identification user File can be file name, number as an example, it is certainly contemplated that file type during some business handlings There is uniqueness, can also be identified using the type identification of file destination as file destination, such as identity card, business license Deng then it is specified to the identity information of the login user and the login user to can use local terminal private key for first node equipment File destination mark carry out signature and generate first digital signature, by the identity information of the login user and the login The file destination mark and first digital signature that user specifies are packaged the user identity voucher for generating the login user.
Wherein, the pattern of user identity voucher can be arranged according to actual needs, such as identity letter can be directly used The combination of breath and the first digital signature can also encode it as identity documents, as generated institute with quick response code form State the user identity voucher of login user.By two dimensional code, operation convenience on the one hand can be improved, on the other hand can ensure The safety of identity information, avoids information leakage.
S203: the second node equipment received in the block chain is verified for the identity documents of the login user The acquisition request message sent afterwards.
Specifically, the identity documents of the available login user of second node equipment, are such as obtained by scanning the two-dimensional code mode Identity documents are taken, then using the first digital signature in the public key verifications identity documents of first node equipment, to realize second Certification of the node device to authority identity shows that authority identity is credible, first node is set if the first digital signature authentication passes through The standby identity that the login user is obtained from the block chain deposits card, is deposited described in results demonstrate,proves according to the identity of the login user The legitimacy of the identity information in user identity voucher realizes certification of the second node equipment to user identity.If second Node device is verified for the identity documents of login user, then second node equipment can send to first node equipment and obtain Request message is taken, to obtain file destination from first node equipment.
User identifier, file destination mark and the second number in the acquisition request message including the login user Signature, wherein the second digital signature is second node equipment according to own private key, using signature algorithm to including login user Information including user identifier, file destination mark carries out signature calculation generation, and specific calculating process may refer to first The calculating process of digital signature.First node equipment is identified by carrying user identifier and file destination in acquisition request message It can indicate that second node equipment returns to file destination corresponding with user identifier characterization user.
S204: signature verification is carried out to second digital signature, after being verified, Xiang Suoshu second node is set Preparation send acquisition response message, and include that the login user is corresponding in the acquisition response message identifies with the file destination The block chain address of matched file destination and the file destination.
Specifically, first node equipment can be according to the public key of second node equipment, using signature algorithm to including logging in Information including the user identifier of user, file destination mark is locally carrying out signature calculation, by itself and the second number for receiving Word signature is compared, if unanimously, passing through for the second digital signature authentication, otherwise verifying and do not pass through.
When the second digital signature authentication passes through, show that the acquisition request message is credible, first node equipment can basis User identifier and file destination mark obtain that the login user is corresponding to identify matched file destination with the file destination, And obtaining the block chain address of the file destination, i.e. the file of file destination deposits the storage address demonstrate,proved in block chain network, so Afterwards file destination and its block chain address are packaged to generate and obtain response message, sent acquisition response to second node equipment and disappear Breath.In this way, second node equipment not only available file destination, can also obtain file according to block chain address and deposit card, so The cryptographic Hash of file destination can be obtained by carrying out Hash calculation to file destination afterwards, be compared by the way that it is deposited card with file Compared with to verify the legitimacy of file destination.
In some possible implementations, it is contemplated that Information Security and trackability, first node equipment can be with By the file acquisition behavior record cochain of user, so that record is checked for user maintenance file, to there is security incident When can be traced by the record.Specifically, described in first node equipment can be obtained for the second node equipment The behavior record of file destination, which generates, obtains user behaviors log, then carries out Hash operation to the acquisition user behaviors log and obtains Hash Value, as the reading voucher of the file destination, the reading voucher of the file destination is broadcasted to the block chain, with The reading voucher of the file destination is stored on the block chain.
In view of tracing integrality, local operation log can also also be carried out cochain by first node equipment, for audit Work provides data basis.Specifically, first node equipment can also be directed to the operation behavior log of the local service system It carries out Hash operation and obtains cryptographic Hash, as local operation voucher, then broadcast the local operation voucher to the block On chain, to store the local operation voucher of the file destination on the block chain.In this way, the use in the block chain network In the audit node device for realizing audit function when being audited for each mechanism, each mechanism can be obtained from block chain Operational credentials are verified with the authenticity of the operation log provided each mechanism itself, and each mechanism is based on after being verified Operation log audited, issue auditing result, to facilitate each mechanism to check in time.
From the foregoing, it will be observed that the embodiment of the present application provides a kind of data sharing method, by operation system and block chain combination, The login password and identity information of registration user are stored in local service system, and will be generated based on the identity information of registration user Identity deposit card and card is deposited in the file of the file generated locally uploaded based on the registration user be stored on block chain, When user is to a certain mechanism transacting business, can be handled corresponding to the mechanism of other business before being accessed by login password First node equipment, obtain identity that the node device is generated by the identity information of login user and the first digital signature with Card, the corresponding second node equipment of operational agency to be handled is recognized each other by verifying identity documents realization identity, after being verified, Acquisition request message is sent to first node equipment, to request the corresponding file destination of login user, first node equipment is to obtaining After taking the second digital signature authentication in request message to pass through, file destination and its block are carried to the transmission of second node equipment The acquisition response message of chain address, in this way, second node equipment can be deposited according to the file that block chain address obtains file destination It demonstrate,proves, and verifies the legitimacy of the file destination with this.On the one hand based on the authentication between block chain implementation mechanism, another party Face, the tamper-resistance properties based on block chain can guarantee the security reliability of data sharing process, to guarantee business normal progression.
Next, data sharing method provided by the embodiments of the present application is introduced from the angle of second node equipment.
The flow chart of data sharing method shown in Figure 3, this method comprises:
S301: the identity documents of login user are obtained.
It is described including the identity information and the first digital signature of the login user in the identity documents of the login user First digital signature be first node equipment in block chain after the login password authentication of the login user passes through to described The identity information of login user carries out signature generation.
In specific implementation, B, the unified entrance that user can be provided by client access first node and set referring to fig. 2 It is standby, the login password of login user described in first node device authentication pass through after to client return the identity of the login user with Card, in this way, second node equipment can obtain the identity documents of login user from client.Specifically, user identity voucher can To exist with quick response code form, in this way, second node equipment can obtain the identity documents of login user by barcode scanning mode.
S302: the identity that the login user is obtained from the block chain deposits card, according to the identity of the login user Card is deposited to verify the identity documents of the login user.
Specifically, the identity letter based on registration user that each node device in block chain network uploads is stored in block chain The identity that breath generates deposits card, and user can realize the double authentication of user identity and authority identity with identity-based voucher.Carry out It, can be first with the public key of the first node equipment to described in the identity documents of the login user when authentication One digital signature carries out signature verification, and after first digital signature authentication passes through, obtains institute from the block chain The identity for stating login user deposits card, deposits results according to the identity of the login user and demonstrate,proves the body in the user identity voucher The legitimacy of part information.
S303: after being verified, Xiang Suoshu first node equipment sends acquisition request message.
User identifier, file destination mark and the second number label in the acquisition request message including the login user Name.Wherein, the second digital signature is second node equipment according to own private key, using signature algorithm to the use including login user Information including family mark, file destination mark carries out signature calculation generation.
It is identified for file destination, can be user oneself specifies namely second node equipment and obtain the login The service scripts mark that user specifies, the service scripts is identified and is identified as the file destination, certain file destination mark Know be also possible to second node equipment automatically from operation system obtain, as mechanism in operation system customized file destination class Type, then second node equipment can obtain the specified service scripts mark of local terminal operation system automatically, i.e., make by oneself in operation system The type identification of adopted target file type, " identity card ", " business license " etc. then will be described in service scripts mark conducts File destination mark.
In practical application, can be by one side of sharing data such as first node equipment, it can also be by enjoying one side of data such as Second node equipment provides specified interface for user, and user oneself specifies interface by selecting control to choose file destination at this. That is, second node equipment can show user interface, root after the identity documents of the login user are verified According to the selection operation that the login user triggers on the user interface, the login user specified services file is determined Mark is identified as file destination.
In some possible implementations, second node equipment is also possible to test in the identity documents of the login user After card passes through, the specified service scripts mark of the login user is obtained from the specific field in the identity documents of the login user Know and is identified as file destination.
S304: it receives the acquisition response that the first node equipment is sent after second digital signature authentication passes through and disappears Breath.
Specifically, first node equipment can mark the user for including login user using signature algorithm according to its private key Knowledge, file destination mark carry out local signature calculation in interior information, and calculated result is compared with the second digital signature, if Unanimously, then passing through for the second digital signature authentication, first node equipment can send acquisition response message, if inconsistent, Do not pass through for the second digital signature authentication.
Including that the login user is corresponding in the acquisition response message identifies matched target with the file destination The block chain address of file and the file destination.Wherein, block chain address is specifically the area file Cun Zheng of file destination Address in block chain.
S305: the file of the file destination is obtained from the block chain according to the block chain address of the file destination Card is deposited, the legitimacy that results demonstrate,proves the file destination is deposited according to the file of the file destination.
It is raw that the file uploaded based on user that each node device in block chain network uploads also is stored in the block chain At file deposit card.Based on this, second node equipment can deposit the legal of results card file destination based on the file of file destination Property.
Specifically, second node equipment can calculate its cryptographic Hash for file destination, then by the cryptographic Hash and basis The file that the block chain address of the file destination obtains the file destination from the block chain is deposited card and is compared, if one It causes, it is determined that file destination is legal, otherwise determines that file destination is illegal.
In view of information trackability, second node equipment can also be by local operation log cochain, to provide for audit Believable data basis.Specifically, second node equipment carries out Hash for the operation behavior log of the local service system Operation obtains cryptographic Hash, as local operation voucher, then broadcasts the local operation voucher to the block chain, with The local operation voucher of the file destination is stored on the block chain.
From the foregoing, it will be observed that the embodiment of the present application provides a kind of data sharing method, by operation system and block chain combination, The login password and identity information of registration user are stored in local service system, and will be generated based on the identity information of registration user Identity deposit card and card is deposited in the file of the file generated locally uploaded based on the registration user be stored on block chain, When user is to a certain mechanism transacting business, can be handled corresponding to the mechanism of other business before being accessed by login password First node equipment, obtain identity that the node device is generated by the identity information of login user and the first digital signature with Card, the corresponding second node equipment of operational agency to be handled is recognized each other by verifying identity documents realization identity, after being verified, Acquisition request message is sent to first node equipment, to request the corresponding file destination of login user, first node equipment is to obtaining After taking the second digital signature authentication in request message to pass through, file destination and its block are carried to the transmission of second node equipment The acquisition response message of chain address, in this way, second node equipment can be deposited according to the file that block chain address obtains file destination It demonstrate,proves, and verifies the legitimacy of the file destination with this.On the one hand based on the authentication between block chain implementation mechanism, another party Face, the tamper-resistance properties based on block chain can guarantee the security reliability of data sharing process, to guarantee business normal progression.
It describes in detail below with reference to this concrete application scene of enterprise is founded to the data sharing method of the application.It is first First, the schematic diagram of a scenario of data sharing method shown in Figure 4 includes industrial and commercial administration, the tax, bank, public affairs in this scenario An Deng mechanism, industrial and commercial administration mechanism acquires the data such as industrial and commercial business license according to duty, and carries out related data convergence, taxation authority according to Duty shares company and individual and pays taxes data such as tax certificate, and unit official seal, finance seal, legal person's chapter and rent are shared according to the authority of office by bank It rents the data such as contract, a copy of house-owner certificate, for said mechanism by data sharing in block chain, public security organ can be according to the authority of office in area The shared data of said mechanism are consulted in block chain, facilitate supervision.
Wherein, block chain is safeguarded by each node device in block chain network, as shown in figure 3, each machine Structure can dispose alliance's chain service, form the node device 410 in block chain network, each node device is by shared data with area Block form is stored in database 420, and user can access block chain network by block browser 430 and check block data.
It is illustrated below using two inter-agency data sharings as data sharing process of the example to the application.In order to Facilitate description to refer to the mechanism in the mechanisms such as industrial and commercial administration, the tax, bank, public security with mechanism A, above-mentioned machine is referred to mechanism B Another mechanism in structure.The interaction diagrams of data sharing method shown in Figure 5, this method specifically comprise the following steps:
1, mechanism A, mechanism the B enrollment status in alliance's catenary system obtain identity (Identity, ID) and certificate text Part;
2, user registers full identity in mechanism A, makes a report on office worker/company information, specifically includes input user base letter Breath and biological information such as face, fingerprint etc., wherein biological information can be used as the login password of user, after succeeding in registration, User can such as upload qualification file AA and carry out business handling in the normal transacting business AA of mechanism A;
3, mechanism A stores relevant user information and qualification file AA;
4, user goes mechanism B with transacting business BB;
5, the client input login password of mobile phone operation is first passed through, the corresponding first node equipment of request mechanism A carries out Bio-identification, and to mechanism A request identity documents;
6, the login password that user inputs is compared by mechanism A with the login password of the registration user prestored, with verifying The legitimacy of the login password generates identity documents according to subscriber identity information and the first digital signature if being verified, and Identity documents are returned to client;
7, user shows identity documents to the corresponding second node equipment of mechanism B;
8, mechanism B reads the identity documents of user by working window using barcode scanning mode, based on the identity documents to machine Structure A and user identity are verified;
If 9, being verified, acquisition request message, request qualification file AA are sent to mechanism A;
10, mechanism B is called the calling log of qualification file AA and other audits to believe by the corresponding first node equipment of mechanism A Breath carries out cochain;
11, the corresponding first node equipment of mechanism A returns to the corresponding second node equipment of mechanism B and obtains response message, It include the block chain address of qualification file AA and qualification file AA in the acquisition response message;
12, the corresponding second node equipment of mechanism B obtains the text of qualification file AA according to block chain address from block chain Part deposits card, and qualification file AA progress Hash calculation is obtained cryptographic Hash, cryptographic Hash is then deposited card with file and is compared, to test Demonstrate,prove the legitimacy of qualification file AA;
13, if legal, then user can continue in mechanism B transacting business.
For inter-agency authentication, Fig. 6 A is referred to, each mechanism can registration body's identity, life in alliance's catenary system At Tencent's user security infrastructure mark (Tencent User Security Infrastructure Identity, TUSI-ID), then apply for public key certificate on the key management system of TUSI (Key Management System, KMS), and Private key privatization is deployed in SGX, so-called SGX is the security context of the data run under Intel Technical Architecture, will be to quick The operation of sense data (such as encryption key, password, user data) is encapsulated in one " small black box ", and Malware can not access These data, mechanism A is by public key cochain, and by the public key data between TUSI-ID index alliance chain mechanism, carry out it is inter-agency When identity validation, be by private key signature, then using public key verifications signature realize, such as mechanism A with load TUSI-ID with The message of action event is sent to mechanism B confirmation, and mechanism B is verified by TUSI-ID index public key.In this process, may be used also To increase completeness check code in messages, to realize completeness check, and increases timestamp in messages and realize anti-replay Attack.
For enterprise's clerical worker's authentication, Fig. 6 B is referred to, accredited personnel's identity first in alliance's catenary system is raw At TUSI-ID, subscriber identity information is carried out to deposit card cochain as identity after Hash calculation, while by user biological characteristic information If fingerprint be stored in operation system, in this way, user can by specified application program entry input biological information so that First node equipment verification biological information, and verification by when generate quick response code form identity documents, in this way, second Node device pulls user ID data by the identity documents that working window reads user in real time.
For data sharing process, Fig. 7 A specifically may refer to, when progress block chain service platform is built, needing to count According to it is shared it is inter-agency build alliance's chain, each structure can be used as a node access, and the mechanism of access is according to different power Limit can be assigned as write-in node and observe node (i.e. previously described audit node).Wherein, write-in node has initiation to hand over Easily/contract permission, it may be assumed that possess book keeping operation power, be suitble to alliance's chain data sharing mechanisms, bank as described above, industrial and commercial administration Etc. mechanisms, replaced with mechanism A, mechanism B, mechanism C and mechanism D in Fig. 7 A, observation node can have been synchronized with real time inspection Data, be suitble to regulatory agency and the third-party institution.
The mechanism namely data of shared data, which will hold mechanism such as mechanism A, will need number to be sharing with initiation protocol contract According to being packaged in the protocol, then the node device in block chain network determines book keeping operation section according to common recognition algorithm such as Byzantium's algorithm Point, accounting nodes can be packaged block according to agreement contract, be recorded in block chain, and pass through peer-to-peer network (Peer to Peer, P2P) realize that each internodal data is synchronous.
In addition, data synchronization, data sharing, push, access etc. that each node is initiated operate, can in the form of contract shape At audit log, it is sent to each node of alliance's chain, can not delete and distort.That is, being also based on block chain technology building number According to the audit alliance chain of sharing application system, unified stream compression service is realized.
Fig. 7 B is specifically referred to, accesses 4A system in alliance's chain network, wherein 4A system refers to offer certification The system of Authentication, authorization Authorization, book keeping operation Accounting and Audit service of auditing, pass through 4A system The identification authorization of the service node implementation mechanism of system promulgates number card using the CA management system that TUSI block platform chain carries Book has secure access to block platform chain for each service node, it is ensured that the legitimacy of record of the audit cochain.For mechanism A, between B Stream compression and great burst accident, be added the record of the audit of log, record of the audit include emergency event date and time, User, event type, whether event succeeds and other information relevant to audit, and data pick-up application node is as observation section Point, realize data pull and big data statistical fractals, data safety audit supervision as audit node access audit alliance Chain is realized and audits to the unified security of each system of large data center, carries out audit retrospect based on security incident.
It should be noted that in practical application, at least one node can also be reserved when disposing alliance's chain as can Expanding node, use when to extend new business.
The above are the specific implementation of data sharing method provided by the embodiments of the present application, the embodiment of the present application is also provided First node equipment, the second node equipment for realizing the above method, below will carry out in detail it from the angle of function modoularization It describes in detail bright.
The structural schematic diagram of first node equipment shown in Figure 8, the first node equipment 800 include:
First authentication module 810, for obtaining the login password of login user input, according to the storage of local service system The legitimacy of the login password of the input of login user described in the login password authentication of user is registered, is deposited in the local service system Contain the login password and identity information of registration user;
Sending module 820, for being used according to the login after the login password authentication that the login user inputs passes through The identity information at family and the first digital signature generate the identity documents of the login user, the client hair of Xiang Suoshu login user Send the identity documents of the login user;
Receiving module 830, the identity for being directed to the login user for receiving the second node equipment in the block chain The acquisition request message that credential verification is sent after passing through includes that the user of the login user marks in the acquisition request message Know, file destination identifies and the second digital signature;
Second authentication module 840, for carrying out signature verification to second digital signature, after being verified, to institute State second node equipment and send and obtain response message, in the acquisitions response message including the login user it is corresponding with it is described File destination identifies the block chain address of matched file destination and the file destination.
It optionally, is a structural schematic diagram of first node equipment provided by the embodiments of the present application, In referring to Fig. 9, Fig. 9 On the basis of structure shown in Fig. 8, the first node equipment 800 further include:
Identity information acquisition module 851, for obtaining the identity information of the registration user input, by the registration user Identity information be stored in the local service system;
Computing module 852 carries out Hash operation for the identity information to the registration user and obtains cryptographic Hash, as institute The identity for stating registration user deposits card;
Identity deposits card module 853, for the identity of the registration user to be deposited card broadcast to the block chain, described The identity that the registration user is stored on block chain deposits card.
It optionally, is a structural schematic diagram of first node equipment provided by the embodiments of the present application referring to Figure 10, Figure 10, On the basis of structure shown in Fig. 8, the first node equipment 800 further include:
Acquisition module 860, for acquiring the biological characteristic of registration user's typing, using the biological characteristic as described in Register the login password of user.
It optionally, is a structural schematic diagram of first node equipment provided by the embodiments of the present application referring to Figure 11, Figure 11, On the basis of structure shown in Fig. 8, the first node equipment 800 further include:
Log generation module 871, the behavior record for obtaining the file destination for the second node equipment are raw At acquisition user behaviors log;
File deposits card module 872, cryptographic Hash is obtained for carrying out Hash operation to the acquisition user behaviors log, as described The reading voucher of file destination;The reading voucher of the file destination is broadcasted to the block chain, in the block chain The reading voucher of the upper storage file destination.
It optionally, is a structural schematic diagram of first node equipment provided by the embodiments of the present application referring to Figure 12, Figure 12, On the basis of structure shown in Fig. 8, the first node equipment 800 further include:
Operational credentials generation module 881 carries out Hash fortune for the operation behavior log for the local service system Calculation obtains cryptographic Hash, as local operation voucher;
Operational credentials deposit card module 882, for broadcasting the local operation voucher to the block chain, described The local operation voucher of the file destination is stored on block chain.
It optionally, is a structural schematic diagram of first node equipment provided by the embodiments of the present application referring to Figure 13, Figure 13, On the basis of structure shown in Fig. 8, the first node equipment 800 further include:
File destination identifier acquisition module 890, for obtaining the specified file destination mark of the login user;
Then the sending module 820 is specifically used for:
It is identified using the local terminal private key file destination specified to the identity information of the login user and the login user It carries out signature and generates first digital signature;
By the specified file destination mark and described first of the identity information of the login user and the login user Digital signature generates the user identity voucher of the login user.
Optionally, the sending module 820 generates the user identity voucher of the login user with quick response code form.
Next, the structural schematic diagram of second node equipment shown in Figure 14, second node equipment 1400 include:
Module 1410 is obtained for obtaining the identity documents of login user includes in the identity documents of the login user The identity information of the login user and the first digital signature, first digital signature are the first node equipment in block chain Signature generation is carried out to the identity information of the login user after the login password authentication of the login user passes through;
First authentication module 1420, the identity for obtaining the login user from the block chain deposits card, according to institute The identity for stating login user is deposited card and is verified to the identity documents of the login user;Block chain is stored in the block chain The identity information based on registration user that each node device uploads in network generates identity and deposits card;
Sending module 1430, for after being verified, Xiang Suoshu first node equipment to send acquisition request message, described User identifier, file destination mark and the second digital signature in acquisition request message including the login user;
Receiving module 1440 is sent after second digital signature authentication passes through for receiving the first node equipment Acquisition response message, include that corresponding identify with the file destination of the login user matches in the acquisition response message File destination and the file destination block chain address;
Second authentication module 1450, for obtaining institute from the block chain according to the block chain address of the file destination The file for stating file destination deposits card, deposits the legitimacy that results demonstrate,proves the file destination according to the file of the file destination;It is described The file that the file generated uploaded based on user that each node device in block chain network uploads also is stored in block chain deposits card.
It optionally, is a structural schematic diagram of second node equipment provided by the embodiments of the present application referring to Figure 15, Figure 15, On the basis of the structure shown in Figure 14, first authentication module 1420 includes:
Signature verification submodule 1421, for the public key using the first node equipment to the identity of the login user First digital signature in voucher carries out signature verification;
Identity information verifies submodule 1422, for after first digital signature authentication passes through, from the block chain The middle identity for obtaining the login user deposits card, deposits results according to the identity of the login user and demonstrate,proves in the user identity voucher The identity information legitimacy.
Optionally, the acquisition module 1410 is also used to:
The specified service scripts mark of local terminal operation system is obtained, the service scripts is identified and is used as the file destination Mark;Alternatively,
The specified service scripts mark of the login user is obtained, the service scripts is identified and is used as the file destination Mark.
Optionally, the acquisition module 1410 is also used to:
Designated word after the identity documents of the login user are verified, from the identity documents of the login user Section obtains the specified service scripts mark of the login user;Alternatively,
After the identity documents of the login user are verified, user interface is shown, according to the login user The selection operation triggered on the user interface determines the login user specified services file identification.
It optionally, is a structural schematic diagram of second node equipment provided by the embodiments of the present application referring to Figure 16, Figure 16, On the basis of the structure shown in Figure 14, the second node equipment 1400 further include:
Computing module 1460 carries out Hash operation for the operation behavior log for the local service system and is breathed out Uncommon value, as local operation voucher;
Card module 1470 is deposited, for broadcasting the local operation voucher to the block chain, in the block chain The local operation voucher of the upper storage file destination.
In order to make it easy to understand, below by from the angle of hardware entities to first node equipment provided by the embodiments of the present application It is introduced with second node equipment.
The embodiment of the present application provides a kind of node device, as shown in figure 17, for ease of description, illustrates only and this Shen Please the relevant part of embodiment, it is disclosed by specific technical details, please refer to the embodiment of the present application method part.The terminal can be with Being includes desktop computer, laptop, tablet computer, mobile phone, personal digital assistant (full name in English: Personal Digital Assistant, english abbreviation: PDA), any terminal device such as vehicle-mounted computer, by taking terminal is desktop computer as an example:
Figure 17 shows the block diagram of the part-structure of desktop computer relevant to terminal provided by the embodiments of the present application.With reference to Figure 17, desktop computer include: radio frequency (full name in English: Radio Frequency, english abbreviation: RF) circuit 1710, memory 1720, input unit 1730, display unit 1740, sensor 1750, voicefrequency circuit 1760, Wireless Fidelity (full name in English: Wireless fidelity, english abbreviation: WiFi) components such as module 1770, processor 1780 and power supply 1790.This field Technical staff is appreciated that desktop computer structure shown in Figure 17 does not constitute the restriction to desktop computer, may include than diagram More or fewer components perhaps combine certain components or different component layouts.
It is specifically introduced below with reference to each component parts of the Figure 17 to desktop computer:
RF circuit 1710 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station After downlink information receives, handled to processor 1780;In addition, the data for designing uplink are sent to base station.In general, RF circuit 1710 include but is not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (full name in English: Low Noise Amplifier, english abbreviation: LNA), duplexer etc..
Memory 1720 can be used for storing software program and module, and processor 1780 is stored in memory by operation 1720 software program and module, thereby executing the various function application and data processing of desktop computer.Memory 1720 can It mainly include storing program area and storage data area, wherein storing program area can be needed for storage program area, at least one function Application program (such as sound-playing function, image player function etc.) etc.;Storage data area can be stored to be made according to desktop computer With the data (such as audio data, phone directory etc.) etc. created.In addition, memory 1720 may include that high random access is deposited Reservoir can also include nonvolatile memory, for example, at least a disk memory, flush memory device or other volatibility Solid-state memory.
Input unit 1730 can be used for receiving the number or character information of input, and generate the user setting with desktop computer And the related key signals input of function control.Specifically, input unit 1730 may include touch panel 1731 and other are defeated Enter equipment 1732.Touch panel 1731, collect user on it or nearby touch operation (such as user using finger, touching The operations of any suitable object or attachment on touch panel 1731 or near touch panel 1731 such as pen), and according to pre- The formula first set drives corresponding attachment device.In addition to touch panel 1731, input unit 1730 can also include that other are defeated Enter equipment 1732.Specifically, other input equipments 1732 can include but is not limited to physical keyboard, function key (such as volume control Key processed, switch key etc.), trace ball, mouse, one of operating stick etc. or a variety of.
Display unit 1740 can be used for showing information input by user or the information and desktop computer that are supplied to user Various menus.Display unit 1740 may include display panel 1741, optionally, can using liquid crystal display (full name in English: Liquid Crystal Display, english abbreviation: LCD), Organic Light Emitting Diode (full name in English: Organic Light- Emitting Diode, english abbreviation: OLED) etc. forms configure display panel 1741.Further, touch panel 1731 can Covering display panel 1741 sends processor to after touch panel 1731 detects touch operation on it or nearby 1780, to determine the type of touch event, are followed by subsequent processing device 1780 and are provided on display panel 1741 according to the type of touch event Corresponding visual output.Although touch panel 1731 and display panel 1741 are come as two independent components in Figure 17 Realize the input and input function of desktop computer, but in some embodiments it is possible to by touch panel 1731 and display panel 1741 is integrated and that realizes desktop computer output and input function.
Desktop computer may also include at least one sensor 1750, such as optical sensor and other sensors.Specifically, light Sensor may include ambient light sensor, and ambient light sensor can adjust display panel 1741 according to the light and shade of ambient light Brightness;Other sensings such as gyroscope, barometer, hygrometer, thermometer, infrared sensor for can also configure as desktop computer Device, details are not described herein.
Voicefrequency circuit 1760, loudspeaker 1761, microphone 1762 can provide the audio interface between user and desktop computer.Sound Electric signal after the audio data received conversion can be transferred to loudspeaker 1761, by 1761 turns of loudspeaker by frequency circuit 1760 It is changed to voice signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 1762, by voicefrequency circuit 1760 receive after be converted to audio data, then by after the processing of audio data output processor 1780, through RF circuit 1710 to send It exports to memory 1720 to such as another desktop computer, or by audio data to be further processed.
WiFi belongs to short range wireless transmission technology, and desktop computer can help user's transceiver electronics by WiFi module 1770 Mail, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Figure 17 is shown WiFi module 1770, but it is understood that, and it is not belonging to must be configured into for desktop computer, it can according to need completely Do not change in the range of the essence of invention and omits.
Processor 1780 is the control centre of desktop computer, utilizes each portion of various interfaces and the entire desktop computer of connection Point, by running or execute the software program and/or module that are stored in memory 1720, and calls and be stored in memory Data in 1720 execute the various functions and processing data of desktop computer, to carry out integral monitoring to desktop computer.Optionally, Processor 1780 may include one or more processing units;Preferably, processor 1780 can integrate application processor and modulatedemodulate Adjust processor, wherein the main processing operation system of application processor, user interface and application program etc., modem processor Main processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 1780.
Desktop computer further includes the power supply 1790 (such as battery) powered to all parts, it is preferred that power supply can pass through electricity Management system and processor 1780 are logically contiguous, to realize management charging, electric discharge and power consumption by power-supply management system The functions such as management.
Although being not shown, desktop computer can also include camera, bluetooth module etc., and details are not described herein.
In the embodiment of the present application, when the terminal is as first node equipment, included by processor 1780 also have Following functions:
The login password for obtaining login user input is tested according to the login password of the registration user of local service system storage The legitimacy of the login password of the login user input is demonstrate,proved, the login that registration user is stored in the local service system is close Code and identity information;
After the login password authentication of login user input passes through, according to the identity information of the login user and the One digital signature generates the identity documents of the login user, and the client of Xiang Suoshu login user sends the login user Identity documents;
It receives after the second node equipment in the block chain is verified for the identity documents of the login user and sends out The acquisition request message sent includes user identifier, the file destination mark of the login user in the acquisition request message with And second digital signature;
Signature verification is carried out to second digital signature, after being verified, the transmission of Xiang Suoshu second node equipment is obtained Response message is taken, including that the login user is corresponding in the acquisition response message identifies matched mesh with the file destination Mark the block chain address of file and the file destination.
Optionally, the processor 1780 is also used to execute any one of data sharing method provided by the embodiments of the present application The step of kind implementation.
The terminal when as second node equipment, included by processor 1780 it is also with the following functions:
The identity documents of login user are obtained, include the identity of the login user in the identity documents of the login user Information and the first digital signature, first digital signature are first node equipment the stepping in the login user in block chain Record password authentification carries out signature generation to the identity information of the login user after passing through;
The identity that the login user is obtained from the block chain deposits card, deposits card pair according to the identity of the login user The identity documents of the login user are verified;It is stored with what each node device in block chain network uploaded in the block chain Identity information based on registration user generates identity and deposits card;
After being verified, Xiang Suoshu first node equipment sends acquisition request message, wraps in the acquisition request message Include the user identifier, file destination mark and the second digital signature of the login user;
Receive the acquisition response message that the first node equipment is sent after second digital signature authentication passes through, institute State in acquisition response message includes that the login user is corresponding and the file destination identifies matched file destination and institute State the block chain address of file destination;
The file that the file destination is obtained from the block chain according to the block chain address of the file destination deposits card, The legitimacy that results demonstrate,proves the file destination is deposited according to the file of the file destination;Block chain is also stored in the block chain The file for the file generated uploaded based on user that each node device uploads in network deposits card.
Optionally, the processor 1780 is also used to execute any one of data sharing method provided by the embodiments of the present application The step of kind implementation.
The embodiment of the present application also provides a kind of computer readable storage medium, for storing program code, the program code For executing any one embodiment in a kind of data sharing method described in foregoing individual embodiments.
The embodiment of the present application also provides a kind of computer program product including instruction, when run on a computer, So that computer executes any one embodiment in a kind of data sharing method described in foregoing individual embodiments.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit It closes or communicates to connect, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the application Portion or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (full name in English: Read-Only Memory, english abbreviation: ROM), random access memory (full name in English: Random Access Memory, english abbreviation: RAM), the various media that can store program code such as magnetic or disk.
The above, above embodiments are only to illustrate the technical solution of the application, rather than its limitations;Although referring to before Embodiment is stated the application is described in detail, those skilled in the art should understand that: it still can be to preceding Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these It modifies or replaces, the spirit and scope of each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution.

Claims (16)

1. a kind of data sharing method based on block chain characterized by comprising
The login password for obtaining login user input, according to the login password authentication institute of the registration user of local service system storage The legitimacy for stating the login password of login user input, be stored in the local service system registration user login password and Identity information;
After the login password authentication of login user input passes through, according to the identity information of the login user and the first number Word signature generates the identity documents of the login user, and the client of Xiang Suoshu login user sends the identity of the login user Voucher;
It receives and sends after second node equipment in the block chain is verified for the identity documents of the login user Acquisition request message includes the user identifier of the login user, file destination mark and the in the acquisition request message Two digital signature;Signature verification is carried out to second digital signature, after being verified, Xiang Suoshu second node equipment is sent Response message is obtained, includes that the login user is corresponding matched with file destination mark in the acquisition response message The block chain address of file destination and the file destination.
2. the data sharing method according to claim 1 based on block chain, which is characterized in that the method also includes:
The identity information of the registration user is stored in the local service by the identity information for obtaining the registration user input System;
Hash operation is carried out to the identity information of the registration user and obtains cryptographic Hash, the identity as the registration user is deposited Card;
The identity of the registration user is deposited into card broadcast to the block chain, to store the registration user on the block chain Identity deposit card.
3. the data sharing method according to claim 1 based on block chain, which is characterized in that the method also includes:
The biological characteristic for acquiring registration user's typing, using the biological characteristic as the login password of the registration user.
4. the data sharing method according to any one of claims 1 to 3 based on block chain, which is characterized in that institute It states in block chain after second node equipment transmission acquisition response message, the method also includes:
It is generated for the behavior record that the second node equipment obtains the file destination and obtains user behaviors log;
Hash operation is carried out to the acquisition user behaviors log and obtains cryptographic Hash, the reading voucher as the file destination;By institute The reading voucher for stating file destination is broadcasted to the block chain, to store the reading of the file destination on the block chain Voucher.
5. the data sharing method according to any one of claims 1 to 3 based on block chain, which is characterized in that the side Method further include:
For the local service system operation behavior log carry out Hash operation obtain cryptographic Hash, as local operation with Card;
The local operation voucher is broadcasted to the block chain, to store the sheet of the file destination on the block chain Ground operational credentials.
6. the data sharing method according to claim 1 based on block chain, which is characterized in that described according to the login Before the identity information of user and the first digital signature generate the user identity voucher of the login user, the method is also wrapped It includes:
Obtain the specified file destination mark of the login user;
The then user identity that the login user is generated according to the identity information and the first digital signature of the login user Voucher includes:
It is identified and is carried out using the local terminal private key file destination specified to the identity information of the login user and the login user Signature generates first digital signature;
By the specified file destination mark of the identity information of the login user and the login user and first number Signature generates the user identity voucher of the login user.
7. the data sharing method according to any one of the claim 1 to 3 based on block chain, which is characterized in that with two dimensional code Form generates the user identity voucher of the login user.
8. a kind of data sharing method based on block chain characterized by comprising
The identity documents of login user are obtained, include the identity information of the login user in the identity documents of the login user With the first digital signature, first digital signature is that the first node equipment in block chain is close in the login of the login user Code at least carries out signature generation to the identity information of the login user after being verified;
The identity that the login user is obtained from the block chain deposits card, deposits card to described according to the identity of the login user The identity documents of login user are verified;Be stored with that each node device in block chain network uploads in the block chain based on The identity information of registration user generates identity and deposits card;After being verified, Xiang Suoshu first node equipment sends acquisition request and disappears It ceases, includes the user identifier, file destination mark and the second digital signature of the login user in the acquisition request message;
The acquisition response message that the first node equipment is sent after second digital signature authentication passes through is received, it is described to obtain Take in response message includes that the login user is corresponding and the file destination identifies matched file destination and the mesh Mark the block chain address of file;
The file that the file destination is obtained from the block chain according to the block chain address of the file destination deposits card, according to The file of the file destination deposits the legitimacy that results demonstrate,proves the file destination;Block chain network is also stored in the block chain In the file of the file generated uploaded based on user that uploads of each node device deposit card.
9. data sharing method according to claim 8, which is characterized in that it is described from alliance's block chain obtain described in The identity of login user deposits card, deposits card according to the identity of the login user and tests the identity documents of the login user Card, comprising:
Using the first node equipment public key to first digital signature in the identity documents of the login user into Row signature verification;
After first digital signature authentication passes through, the identity that the login user is obtained from the block chain deposits card, root The legitimacy for the identity information that results is demonstrate,proved in the user identity voucher is deposited according to the identity of the login user.
10. data sharing method according to claim 8, which is characterized in that determine the file destination in the following manner Mark:
The specified service scripts mark of local terminal operation system is obtained, the service scripts is identified and is used as the file destination mark Know;Alternatively,
The specified service scripts mark of the login user is obtained, the service scripts is identified and is used as the file destination mark Know.
11. data sharing method according to claim 10, which is characterized in that described to obtain the specified industry of the login user Business file identification include:
After the identity documents of the login user are verified, obtained from the specific field in the identity documents of the login user Take the service scripts mark that the login user is specified;Alternatively,
After the identity documents of the login user are verified, user interface is shown, according to the login user in institute The selection operation triggered on user interface is stated, determines the login user specified services file identification.
12. according to any one of claim 8 to 11 data sharing method, which is characterized in that the method also includes:
For the local service system operation behavior log carry out Hash operation obtain cryptographic Hash, as local operation with Card;
The local operation voucher is broadcasted to the block chain, to store the sheet of the file destination on the block chain Ground operational credentials.
13. a kind of first node equipment characterized by comprising
First authentication module is used for obtaining the login password of login user input according to the registration of local service system storage The legitimacy of the login password of the input of login user described in the login password authentication at family, is stored with note in the local service system The login password and identity information of volume user;Sending module, the login password authentication for inputting in the login user pass through Afterwards, the identity documents of the login user, Xiang Suoshu are generated according to the identity information of the login user and the first digital signature The client of login user sends the identity documents of the login user;
Receiving module is verified for receiving the second node equipment in the block chain for the identity documents of the login user User identifier, target text by the acquisition request message of rear transmission, in the acquisition request message including the login user Part mark and the second digital signature;
Second authentication module, for carrying out signature verification to second digital signature, after being verified, Xiang Suoshu the Two node devices, which are sent, obtains response message, includes that the login user is corresponding and the target in the acquisitions response message The block chain address of the matched file destination of file identification and the file destination.
14. a kind of second node equipment characterized by comprising
Module is obtained, includes the login in the identity documents of the login user for obtaining the identity documents of login user The identity information of user and the first digital signature, first digital signature are that the first node equipment in block chain is verifying institute State login user login password pass through after signature generation at least is carried out to the identity information of the login user;
First authentication module, the identity for obtaining the login user from the block chain deposit card, are used according to the login The identity at family is deposited card and is verified to the identity documents of the login user;It is stored in the block chain in block chain network each The identity information based on registration user that node device uploads generates identity and deposits card;
Sending module, for after being verified, Xiang Suoshu first node equipment to send acquisition request message, the acquisition request User identifier, file destination mark and the second digital signature in message including the login user;
Receiving module is rung for receiving the acquisition that the first node equipment is sent after second digital signature authentication passes through Message is answered, including that the login user is corresponding in the acquisition response message identifies matched target text with the file destination The block chain address of part and the file destination;
Second authentication module obtains the target text for the block chain address according to the file destination from the block chain The file of part deposits card, deposits the legitimacy that results demonstrate,proves the file destination according to the file of the file destination;In the block chain The file for being also stored with the file generated uploaded based on user that each node device in block chain network uploads deposits card.
15. a kind of node device, which is characterized in that the node device includes processor and memory;
The memory is for storing computer program;
The processor requires 1 to 12 described in any item data sharing sides for running the computer program with perform claim Method.
16. a kind of computer readable storage medium, which is characterized in that the computer readable storage medium is for storing computer Program, the computer program require 1 to 12 described in any item data sharing methods for perform claim.
CN201910760147.3A 2019-08-16 2019-08-16 Data sharing method and device based on block chain and storage medium Active CN110493220B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910760147.3A CN110493220B (en) 2019-08-16 2019-08-16 Data sharing method and device based on block chain and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910760147.3A CN110493220B (en) 2019-08-16 2019-08-16 Data sharing method and device based on block chain and storage medium

Publications (2)

Publication Number Publication Date
CN110493220A true CN110493220A (en) 2019-11-22
CN110493220B CN110493220B (en) 2021-05-25

Family

ID=68551811

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910760147.3A Active CN110493220B (en) 2019-08-16 2019-08-16 Data sharing method and device based on block chain and storage medium

Country Status (1)

Country Link
CN (1) CN110493220B (en)

Cited By (56)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110868424A (en) * 2019-11-26 2020-03-06 深圳市信联征信有限公司 Data sharing method and device based on block chain, computer equipment and storage medium
CN111212074A (en) * 2020-01-02 2020-05-29 腾讯科技(深圳)有限公司 Qualification determination method, device, equipment and storage medium based on block chain
CN111241592A (en) * 2019-12-30 2020-06-05 航天信息股份有限公司 Business registration method and system based on block chain technology
CN111343249A (en) * 2020-02-14 2020-06-26 哈希未来(北京)科技有限公司 Data sharing method and device based on block chain system and storage medium
CN111404896A (en) * 2020-03-06 2020-07-10 杭州云象网络技术有限公司 Non-central identity authentication method based on SGX
CN111415162A (en) * 2020-04-29 2020-07-14 陈议尊 Transaction method and system based on block chain public chain
CN111429250A (en) * 2020-03-16 2020-07-17 普洛斯科技(重庆)有限公司 Data management method and device in escort scene
CN111448565A (en) * 2020-02-14 2020-07-24 支付宝(杭州)信息技术有限公司 Data authorization based on decentralized identity
CN111459899A (en) * 2020-03-27 2020-07-28 中国平安人寿保险股份有限公司 Log sharing method and device and terminal equipment
CN111475582A (en) * 2020-05-07 2020-07-31 广州欧科信息技术股份有限公司 Terminal device and cultural relic information processing method for accessing block chain
CN111523862A (en) * 2020-04-27 2020-08-11 广东电网有限责任公司培训与评价中心 Method for acquiring talent data and related equipment
CN111552676A (en) * 2020-04-26 2020-08-18 北京众享比特科技有限公司 Block chain based evidence storing method, device, equipment and medium
CN111769941A (en) * 2020-07-15 2020-10-13 北京金山云网络技术有限公司 Business processing method and device and integrated business service system
CN111783154A (en) * 2020-07-03 2020-10-16 福建正孚软件有限公司 Method and system for generating electronic license of old people
CN111861686A (en) * 2020-06-12 2020-10-30 方欣科技有限公司 Finance and tax accounting method and system based on block chain
CN111861688A (en) * 2020-06-12 2020-10-30 方欣科技有限公司 Block chain-based electronic tax registration method and system
CN111985399A (en) * 2020-08-20 2020-11-24 重庆中科云从科技有限公司 Area monitoring method, system, machine readable medium and equipment based on biological feature recognition
CN112052434A (en) * 2020-07-30 2020-12-08 中国建设银行股份有限公司 Electronic file verification method and device, electronic equipment and readable storage medium
CN112163191A (en) * 2020-09-15 2021-01-01 广东工业大学 Education resource sharing method and system based on national secret block chain
CN112261112A (en) * 2020-10-16 2021-01-22 华人运通(上海)云计算科技有限公司 Information sharing method, device and system, electronic equipment and storage medium
CN112287361A (en) * 2020-09-11 2021-01-29 杭州鸽子蛋网络科技有限责任公司 Data governance method, system, electronic device and storage medium
CN112307455A (en) * 2020-12-28 2021-02-02 支付宝(杭州)信息技术有限公司 Identity authentication method and device based on block chain and electronic equipment
CN112380269A (en) * 2020-10-28 2021-02-19 杭州链城数字科技有限公司 Identity card information inquiry and evidence fixing and obtaining method based on block chain
CN112463749A (en) * 2020-12-03 2021-03-09 平安普惠企业管理有限公司 File sharing method, device, medium and electronic equipment
CN112491914A (en) * 2020-12-04 2021-03-12 山西特信环宇信息技术有限公司 Block chain bidirectional authentication method, communication method and system
CN112508578A (en) * 2021-02-04 2021-03-16 支付宝(杭州)信息技术有限公司 Resource transfer request verification and sending method and device based on block chain
CN112507352A (en) * 2020-11-30 2021-03-16 中国联合网络通信集团有限公司 Data sharing method and system based on block chain
CN112560093A (en) * 2020-12-17 2021-03-26 杭州趣链科技有限公司 File management method, device, equipment and storage medium based on block chain
CN112580075A (en) * 2020-12-17 2021-03-30 杭州趣链科技有限公司 Data sharing method, device, equipment and storage medium
CN112685721A (en) * 2020-12-23 2021-04-20 深圳供电局有限公司 Electric energy meter authority authentication method and device, computer equipment and storage medium
CN112765622A (en) * 2021-01-13 2021-05-07 中国外运股份有限公司 Digital certificate management method, device, equipment and medium for electronic bill of lading
CN112784228A (en) * 2021-01-05 2021-05-11 中交智运有限公司 Identity authentication method and system based on block chain
CN112861090A (en) * 2021-03-18 2021-05-28 深圳前海微众银行股份有限公司 Information processing method, device, equipment, storage medium and computer program product
CN112862589A (en) * 2021-01-08 2021-05-28 北京金山云网络技术有限公司 Identity verification method, device and system in financial scene
CN112884562A (en) * 2019-11-30 2021-06-01 腾讯科技(深圳)有限公司 Block chain-based mortgage processing method and device and readable storage medium
CN112966304A (en) * 2021-03-15 2021-06-15 陕煤集团榆林化学有限责任公司 Method and device for preventing process document from being tampered, computer equipment and medium
CN112989300A (en) * 2021-03-15 2021-06-18 京东数科海益信息科技有限公司 Digital identity information processing method and device and electronic equipment
CN113297625A (en) * 2021-07-23 2021-08-24 北京笔新互联网科技有限公司 Data sharing system and method based on block chain and electronic equipment
CN113469854A (en) * 2021-06-22 2021-10-01 光载互联(杭州)科技有限公司 Information sharing system and method, medium and electronic device
CN113468600A (en) * 2021-06-30 2021-10-01 建信金融科技有限责任公司 Data authorization method, device and equipment
CN113676492A (en) * 2021-09-26 2021-11-19 东南大学 Multi-protocol access airport internet of things data forwarding system
CN113765674A (en) * 2021-09-02 2021-12-07 杭州溪塔科技有限公司 Cross-platform registration method and device based on block chain
CN114079578A (en) * 2020-08-21 2022-02-22 腾讯科技(深圳)有限公司 Method and device for processing login information, storage medium and electronic equipment
CN114338232A (en) * 2022-02-25 2022-04-12 中国人民解放军国防科技大学 Edge data sharing method and device and computer equipment
CN114430329A (en) * 2020-10-15 2022-05-03 中国移动通信集团浙江有限公司 Data authentication method, authentication side chain node and system
CN114760111A (en) * 2022-03-24 2022-07-15 标信智链(杭州)科技发展有限公司 File security method and file security device based on block chain
CN114866249A (en) * 2022-04-19 2022-08-05 立芯科技股份有限公司 Block chain-based lead sealing lock system with multiple groups of electronic tags and interaction method
CN115022820A (en) * 2022-05-31 2022-09-06 微位(深圳)网络科技有限公司 5G message verification method, terminal and system
CN115189928A (en) * 2022-06-25 2022-10-14 中国人民解放军战略支援部队信息工程大学 Dynamic safe migration method and system for password service virtual machine
CN115499138A (en) * 2022-11-16 2022-12-20 成都同步新创科技股份有限公司 High-performance storage tamper-proof verification method and storage system combined with block chain
CN115580495A (en) * 2022-12-09 2023-01-06 北京邮电大学 Data auditing method and device, electronic equipment and storage medium
CN115801815A (en) * 2023-02-03 2023-03-14 安徽中科晶格技术有限公司 Block chain-based plant growth condition sharing method and device and storage medium
CN115964733A (en) * 2023-03-15 2023-04-14 中国信息通信研究院 Data sharing method and device based on block chain, electronic equipment and storage medium
WO2023093312A1 (en) * 2021-11-25 2023-06-01 华为技术有限公司 Information processing system and method, device and storage medium
WO2023142437A1 (en) * 2022-01-28 2023-08-03 中国银联股份有限公司 Identity authentication method and apparatus, device, and computer readable storage medium
CN111459899B (en) * 2020-03-27 2024-06-07 中国平安人寿保险股份有限公司 Log sharing method and device and terminal equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106936585A (en) * 2017-03-09 2017-07-07 布比(北京)网络技术有限公司 Method and system that a kind of information voucher to distributed data is split and combined
WO2018153378A1 (en) * 2017-02-27 2018-08-30 腾讯科技(深圳)有限公司 Account processing method and apparatus in block chain, storage medium, and computer device
CN108712259A (en) * 2018-05-02 2018-10-26 西南石油大学 Identity-based acts on behalf of the efficient auditing method of cloud storage for uploading data
CN108805573A (en) * 2018-04-21 2018-11-13 深圳市元征科技股份有限公司 A kind of Information Authentication method, server and storage medium
US20180374091A1 (en) * 2017-03-31 2018-12-27 Vijay K. Madisetti Method and System for Blockchain-Based Combined Identity, Ownership, Integrity and Custody Management
US20190140822A1 (en) * 2016-12-30 2019-05-09 Cloudminds (Shenzhen) Robotics Systems Co., Ltd. Block chain permission control method, device, and node apparatus
US20190228133A1 (en) * 2018-01-19 2019-07-25 Nasdaq, Inc. Systems and methods of digital content certification and verification using cryptography and blockchain
CN110060037A (en) * 2019-04-24 2019-07-26 上海能链众合科技有限公司 A kind of distributed digital identification system based on block chain

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190140822A1 (en) * 2016-12-30 2019-05-09 Cloudminds (Shenzhen) Robotics Systems Co., Ltd. Block chain permission control method, device, and node apparatus
WO2018153378A1 (en) * 2017-02-27 2018-08-30 腾讯科技(深圳)有限公司 Account processing method and apparatus in block chain, storage medium, and computer device
CN106936585A (en) * 2017-03-09 2017-07-07 布比(北京)网络技术有限公司 Method and system that a kind of information voucher to distributed data is split and combined
US20180374091A1 (en) * 2017-03-31 2018-12-27 Vijay K. Madisetti Method and System for Blockchain-Based Combined Identity, Ownership, Integrity and Custody Management
US20190228133A1 (en) * 2018-01-19 2019-07-25 Nasdaq, Inc. Systems and methods of digital content certification and verification using cryptography and blockchain
CN108805573A (en) * 2018-04-21 2018-11-13 深圳市元征科技股份有限公司 A kind of Information Authentication method, server and storage medium
CN108712259A (en) * 2018-05-02 2018-10-26 西南石油大学 Identity-based acts on behalf of the efficient auditing method of cloud storage for uploading data
CN110060037A (en) * 2019-04-24 2019-07-26 上海能链众合科技有限公司 A kind of distributed digital identification system based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
周致成: "基于区块链技术的高效跨域认证方案", 《计算机应用》 *

Cited By (85)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110868424A (en) * 2019-11-26 2020-03-06 深圳市信联征信有限公司 Data sharing method and device based on block chain, computer equipment and storage medium
CN112884562A (en) * 2019-11-30 2021-06-01 腾讯科技(深圳)有限公司 Block chain-based mortgage processing method and device and readable storage medium
CN112884562B (en) * 2019-11-30 2024-03-19 腾讯科技(深圳)有限公司 Mortgage processing method and device based on blockchain and readable storage medium
CN111241592A (en) * 2019-12-30 2020-06-05 航天信息股份有限公司 Business registration method and system based on block chain technology
CN111212074A (en) * 2020-01-02 2020-05-29 腾讯科技(深圳)有限公司 Qualification determination method, device, equipment and storage medium based on block chain
CN111212074B (en) * 2020-01-02 2024-03-01 腾讯科技(深圳)有限公司 Blockchain-based qualification identification method, device, equipment and storage medium
CN111343249A (en) * 2020-02-14 2020-06-26 哈希未来(北京)科技有限公司 Data sharing method and device based on block chain system and storage medium
CN111448565B (en) * 2020-02-14 2024-04-05 支付宝(杭州)信息技术有限公司 Data authorization based on decentralised identification
CN111448565A (en) * 2020-02-14 2020-07-24 支付宝(杭州)信息技术有限公司 Data authorization based on decentralized identity
CN111404896A (en) * 2020-03-06 2020-07-10 杭州云象网络技术有限公司 Non-central identity authentication method based on SGX
CN111404896B (en) * 2020-03-06 2022-03-04 杭州云象网络技术有限公司 Non-central identity authentication method based on SGX
CN111429250A (en) * 2020-03-16 2020-07-17 普洛斯科技(重庆)有限公司 Data management method and device in escort scene
CN111459899A (en) * 2020-03-27 2020-07-28 中国平安人寿保险股份有限公司 Log sharing method and device and terminal equipment
CN111459899B (en) * 2020-03-27 2024-06-07 中国平安人寿保险股份有限公司 Log sharing method and device and terminal equipment
CN111552676A (en) * 2020-04-26 2020-08-18 北京众享比特科技有限公司 Block chain based evidence storing method, device, equipment and medium
CN111523862A (en) * 2020-04-27 2020-08-11 广东电网有限责任公司培训与评价中心 Method for acquiring talent data and related equipment
CN111523862B (en) * 2020-04-27 2024-02-23 广东电网有限责任公司培训与评价中心 Method and related equipment for acquiring talent data
CN111415162A (en) * 2020-04-29 2020-07-14 陈议尊 Transaction method and system based on block chain public chain
CN111475582A (en) * 2020-05-07 2020-07-31 广州欧科信息技术股份有限公司 Terminal device and cultural relic information processing method for accessing block chain
CN111475582B (en) * 2020-05-07 2023-05-09 广州欧科信息技术股份有限公司 Terminal equipment and cultural relic information processing method for accessing blockchain
CN111861688A (en) * 2020-06-12 2020-10-30 方欣科技有限公司 Block chain-based electronic tax registration method and system
CN111861688B (en) * 2020-06-12 2024-01-12 金财互联智链研究院(青岛)有限公司 Electronic tax registration method and system based on blockchain
CN111861686A (en) * 2020-06-12 2020-10-30 方欣科技有限公司 Finance and tax accounting method and system based on block chain
CN111783154A (en) * 2020-07-03 2020-10-16 福建正孚软件有限公司 Method and system for generating electronic license of old people
CN111783154B (en) * 2020-07-03 2023-05-16 福建正孚软件有限公司 Old people electronic license generation method and system
CN111769941A (en) * 2020-07-15 2020-10-13 北京金山云网络技术有限公司 Business processing method and device and integrated business service system
CN111769941B (en) * 2020-07-15 2022-11-04 北京金山云网络技术有限公司 Business processing method and device and integrated business service system
CN112052434A (en) * 2020-07-30 2020-12-08 中国建设银行股份有限公司 Electronic file verification method and device, electronic equipment and readable storage medium
CN111985399A (en) * 2020-08-20 2020-11-24 重庆中科云从科技有限公司 Area monitoring method, system, machine readable medium and equipment based on biological feature recognition
CN114079578B (en) * 2020-08-21 2023-05-16 腾讯科技(深圳)有限公司 Login information processing method and device, storage medium and electronic equipment
CN114079578A (en) * 2020-08-21 2022-02-22 腾讯科技(深圳)有限公司 Method and device for processing login information, storage medium and electronic equipment
CN112287361A (en) * 2020-09-11 2021-01-29 杭州鸽子蛋网络科技有限责任公司 Data governance method, system, electronic device and storage medium
CN112163191A (en) * 2020-09-15 2021-01-01 广东工业大学 Education resource sharing method and system based on national secret block chain
CN114430329B (en) * 2020-10-15 2024-03-19 中国移动通信集团浙江有限公司 Data authentication method, authentication side chain node and system
CN114430329A (en) * 2020-10-15 2022-05-03 中国移动通信集团浙江有限公司 Data authentication method, authentication side chain node and system
CN112261112B (en) * 2020-10-16 2023-04-18 华人运通(上海)云计算科技有限公司 Information sharing method, device and system, electronic equipment and storage medium
CN112261112A (en) * 2020-10-16 2021-01-22 华人运通(上海)云计算科技有限公司 Information sharing method, device and system, electronic equipment and storage medium
CN112380269A (en) * 2020-10-28 2021-02-19 杭州链城数字科技有限公司 Identity card information inquiry and evidence fixing and obtaining method based on block chain
CN112507352B (en) * 2020-11-30 2023-01-17 中国联合网络通信集团有限公司 Data sharing method and system based on block chain
CN112507352A (en) * 2020-11-30 2021-03-16 中国联合网络通信集团有限公司 Data sharing method and system based on block chain
CN112463749A (en) * 2020-12-03 2021-03-09 平安普惠企业管理有限公司 File sharing method, device, medium and electronic equipment
CN112491914A (en) * 2020-12-04 2021-03-12 山西特信环宇信息技术有限公司 Block chain bidirectional authentication method, communication method and system
CN112491914B (en) * 2020-12-04 2022-06-24 山西特信环宇信息技术有限公司 Block chain bidirectional authentication method, communication method and system
CN112560093B (en) * 2020-12-17 2023-03-14 杭州趣链科技有限公司 File management method, device, equipment and storage medium based on block chain
CN112580075B (en) * 2020-12-17 2024-02-27 杭州趣链科技有限公司 Data sharing method, device, equipment and storage medium
CN112560093A (en) * 2020-12-17 2021-03-26 杭州趣链科技有限公司 File management method, device, equipment and storage medium based on block chain
CN112580075A (en) * 2020-12-17 2021-03-30 杭州趣链科技有限公司 Data sharing method, device, equipment and storage medium
CN112685721A (en) * 2020-12-23 2021-04-20 深圳供电局有限公司 Electric energy meter authority authentication method and device, computer equipment and storage medium
CN112307455A (en) * 2020-12-28 2021-02-02 支付宝(杭州)信息技术有限公司 Identity authentication method and device based on block chain and electronic equipment
CN112784228A (en) * 2021-01-05 2021-05-11 中交智运有限公司 Identity authentication method and system based on block chain
CN112862589A (en) * 2021-01-08 2021-05-28 北京金山云网络技术有限公司 Identity verification method, device and system in financial scene
CN112862589B (en) * 2021-01-08 2024-04-23 北京金山云网络技术有限公司 Authentication method, device and system in financial scene
CN112765622B (en) * 2021-01-13 2024-04-16 中国外运股份有限公司 Digital certificate management method, device, equipment and medium for electronic bill of lading
CN112765622A (en) * 2021-01-13 2021-05-07 中国外运股份有限公司 Digital certificate management method, device, equipment and medium for electronic bill of lading
CN112508578A (en) * 2021-02-04 2021-03-16 支付宝(杭州)信息技术有限公司 Resource transfer request verification and sending method and device based on block chain
CN112508578B (en) * 2021-02-04 2021-06-04 支付宝(杭州)信息技术有限公司 Resource transfer request verification and sending method and device based on block chain
CN112966304A (en) * 2021-03-15 2021-06-15 陕煤集团榆林化学有限责任公司 Method and device for preventing process document from being tampered, computer equipment and medium
CN112966304B (en) * 2021-03-15 2024-04-19 陕煤集团榆林化学有限责任公司 Tamper-proof method and device for flow document, computer equipment and medium
CN112989300A (en) * 2021-03-15 2021-06-18 京东数科海益信息科技有限公司 Digital identity information processing method and device and electronic equipment
CN112861090A (en) * 2021-03-18 2021-05-28 深圳前海微众银行股份有限公司 Information processing method, device, equipment, storage medium and computer program product
CN112861090B (en) * 2021-03-18 2023-01-31 深圳前海微众银行股份有限公司 Information processing method, device, equipment, storage medium and computer program product
CN113469854A (en) * 2021-06-22 2021-10-01 光载互联(杭州)科技有限公司 Information sharing system and method, medium and electronic device
CN113468600A (en) * 2021-06-30 2021-10-01 建信金融科技有限责任公司 Data authorization method, device and equipment
CN113297625B (en) * 2021-07-23 2021-11-02 北京笔新互联网科技有限公司 Data sharing system and method based on block chain and electronic equipment
CN113297625A (en) * 2021-07-23 2021-08-24 北京笔新互联网科技有限公司 Data sharing system and method based on block chain and electronic equipment
CN113765674B (en) * 2021-09-02 2024-02-09 杭州溪塔科技有限公司 Cross-platform registration method and device based on blockchain
CN113765674A (en) * 2021-09-02 2021-12-07 杭州溪塔科技有限公司 Cross-platform registration method and device based on block chain
CN113676492B (en) * 2021-09-26 2022-06-07 东南大学 Multi-protocol access airport internet of things data forwarding system
CN113676492A (en) * 2021-09-26 2021-11-19 东南大学 Multi-protocol access airport internet of things data forwarding system
WO2023093312A1 (en) * 2021-11-25 2023-06-01 华为技术有限公司 Information processing system and method, device and storage medium
WO2023142437A1 (en) * 2022-01-28 2023-08-03 中国银联股份有限公司 Identity authentication method and apparatus, device, and computer readable storage medium
CN114338232A (en) * 2022-02-25 2022-04-12 中国人民解放军国防科技大学 Edge data sharing method and device and computer equipment
CN114760111A (en) * 2022-03-24 2022-07-15 标信智链(杭州)科技发展有限公司 File security method and file security device based on block chain
CN114866249A (en) * 2022-04-19 2022-08-05 立芯科技股份有限公司 Block chain-based lead sealing lock system with multiple groups of electronic tags and interaction method
CN114866249B (en) * 2022-04-19 2024-02-20 立芯科技股份有限公司 Block chain-based lead sealing lock system with multiple groups of electronic tags and interaction method
CN115022820B (en) * 2022-05-31 2023-11-14 微位(深圳)网络科技有限公司 Verification method, terminal and system of 5G message
CN115022820A (en) * 2022-05-31 2022-09-06 微位(深圳)网络科技有限公司 5G message verification method, terminal and system
CN115189928B (en) * 2022-06-25 2023-10-17 中国人民解放军战略支援部队信息工程大学 Dynamic security migration method and system for password service virtual machine
CN115189928A (en) * 2022-06-25 2022-10-14 中国人民解放军战略支援部队信息工程大学 Dynamic safe migration method and system for password service virtual machine
CN115499138A (en) * 2022-11-16 2022-12-20 成都同步新创科技股份有限公司 High-performance storage tamper-proof verification method and storage system combined with block chain
CN115580495B (en) * 2022-12-09 2023-03-10 北京邮电大学 Data auditing method and device, electronic equipment and storage medium
CN115580495A (en) * 2022-12-09 2023-01-06 北京邮电大学 Data auditing method and device, electronic equipment and storage medium
CN115801815A (en) * 2023-02-03 2023-03-14 安徽中科晶格技术有限公司 Block chain-based plant growth condition sharing method and device and storage medium
CN115964733B (en) * 2023-03-15 2023-05-12 中国信息通信研究院 Block chain-based data sharing method and device, electronic equipment and storage medium
CN115964733A (en) * 2023-03-15 2023-04-14 中国信息通信研究院 Data sharing method and device based on block chain, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN110493220B (en) 2021-05-25

Similar Documents

Publication Publication Date Title
CN110493220A (en) A kind of data sharing method based on block chain, equipment and storage medium
CN112733107B (en) Information verification method, related device, equipment and storage medium
CN110519062B (en) Identity authentication method, authentication system and storage medium based on block chain
RU2747947C2 (en) Systems and methods of personal identification and verification
CN101051908B (en) Dynamic cipher certifying system and method
US9892404B2 (en) Secure identity authentication in an electronic transaction
CN101414909B (en) System, method and mobile communication terminal for verifying network application user identification
CN108989346B (en) Third-party valid identity escrow agile authentication access method based on account hiding
CN1805339B (en) Digital signature supporting personal trusted device and its method for implementing signature
CN107430657A (en) Pass through the certification of agency
CN113495920B (en) Content auditing system, method and device based on blockchain and storage medium
CN108881167A (en) A kind of intelligent contract of finite field block catenary system
CN103516718A (en) Identity risk score generation and implementation
CN112115205B (en) Cross-chain trust method, device, equipment and medium based on digital certificate authentication
TW201835808A (en) Method and system for online ticket checking based on client interface, and intelligent equipment
CN101689994A (en) Multiple user authentications on a communications device
CN110247758A (en) The method, apparatus and code management device of Password Management
CN113515756B (en) High-credibility digital identity management method and system based on block chain
CN104079413A (en) Enhancement type one-time dynamic password authentication method and system
CN105681340A (en) Digital certificate use method and apparatus
CN101409622B (en) Digital signing system and method
Anand et al. Lightweight Technical Implementation of Single Sign‐On Authentication and Key Agreement Mechanism for Multiserver Architecture‐Based Systems
CN110148441A (en) A kind of clinical test electronic data acquisition management method and device based on block chain
WO2021137753A1 (en) Electronic authentication system and process using the same
CN109150880B (en) Data transmission method, device and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40016894

Country of ref document: HK

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant