CN110910110A - Data processing method and device and computer storage medium - Google Patents

Data processing method and device and computer storage medium Download PDF

Info

Publication number
CN110910110A
CN110910110A CN201911232259.8A CN201911232259A CN110910110A CN 110910110 A CN110910110 A CN 110910110A CN 201911232259 A CN201911232259 A CN 201911232259A CN 110910110 A CN110910110 A CN 110910110A
Authority
CN
China
Prior art keywords
information
target
user
work set
target work
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911232259.8A
Other languages
Chinese (zh)
Inventor
蔡弋戈
秦青
王乐庆
杨晨
李琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201911232259.8A priority Critical patent/CN110910110A/en
Publication of CN110910110A publication Critical patent/CN110910110A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • G06Q20/123Shopping for digital content
    • G06Q20/1235Shopping for digital content with control of digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Abstract

The embodiment of the application discloses a data processing method, a data processing device and a computer readable storage medium. The method comprises the following steps: and the node equipment in the block chain network receives the authorization information of the first user, maps the target token to the information of the second user according to the authorization information, generates transaction data and stores the transaction data into the block chain network. Therefore, the target token is mapped to the information of the second user, so that the first user can transfer the usage right of the work to the second user under the condition that the ownership of the work is reserved.

Description

Data processing method and device and computer storage medium
Technical Field
The present application relates to the field of computer networks, and in particular, to a data processing method and apparatus, and a computer storage medium.
Background
Data processing is often involved in many application scenarios, such as: in the trading of a work, it is common to transfer ownership of the work. The works can be specifically paintings, design drawings, articles, audio, video and the like. There are situations in practice where the owner of a work wishes to retain ownership of the work but transfers the usage rights for the work. Therefore, how to transfer the usage right of a work to other users while preserving the ownership of the work becomes a problem that needs to be particularly concerned and solved in the data processing process.
Disclosure of Invention
The embodiment of the application discloses a data processing method, a data processing device and a computer readable storage medium, which can transfer the usage right of a work to other users under the condition that the owner of the work reserves the ownership of the work.
In a first aspect, an embodiment of the present application provides a data processing method, where the method includes:
receiving authorization information of a first user, wherein the authorization information comprises a target token and information of a second user, and the authorization information is used for indicating the first user to authorize the use right of a target work set corresponding to the target token to the second user;
mapping the target token to information of the second user according to the authorization information to generate transaction data, wherein the transaction data comprises the information of the first user, the information of the second user, the target token and the authorization relation among the target work set;
storing the transaction data into a blockchain network.
In a second aspect, an embodiment of the present application provides a data processing apparatus, including:
the system comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for receiving authorization information of a first user, the authorization information comprises a target token and information of a second user, and the authorization information is used for indicating the first user to authorize the use right of a target work set corresponding to the target token to the second user;
and the processing unit is used for mapping the target token to the information of the second user according to the authorization information to generate transaction data, wherein the transaction data comprises the information of the first user, the information of the second user, the target token and the authorization relation among the target work set, and the transaction data is stored in a blockchain network.
In a third aspect, an embodiment of the present application provides a data processing apparatus, including a processor, a memory, and a communication interface, where the processor, the memory, and the communication interface are connected to each other, where the memory is used to store a computer program, and the computer program includes program instructions, and the processor is configured to call the program instructions to execute the method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium storing one or more instructions adapted to be loaded by a processor and execute the method of the first aspect.
In the embodiment of the application, node equipment in the block chain network receives authorization information of a first user, maps a target token to information of a second user according to the authorization information, generates transaction data, and stores the transaction data in the block chain network. Therefore, the target token is mapped to the information of the second user, so that the first user can transfer the usage right of the work to the second user under the condition that the ownership of the work is reserved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is an architecture diagram of a data processing system provided in an exemplary embodiment of the present application;
FIG. 2 is a flow chart of a data processing method provided by an exemplary embodiment of the present application;
FIG. 3 is a flow chart of yet another method of data processing provided by an exemplary embodiment of the present application;
FIG. 4 is a flow chart of yet another method of data processing provided by an exemplary embodiment of the present application;
FIG. 5 is a block diagram of a data processing apparatus according to an exemplary embodiment of the present application;
fig. 6 is a schematic structural diagram of a data processing apparatus according to an exemplary embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings.
The embodiment of the application relates to a Block Chain and a Block Chain network, wherein the Block Chain (Block Chain) is a Chain data structure formed by combining data blocks in a sequential connection mode according to a time sequence, and a distributed account book which can ensure data to be untrustable and unforgeable in a cryptographic mode is provided. The blockchain is essentially a decentralized database, which is a string of data blocks associated by using cryptography, each data block contains information of a batch of network transactions, and the information is used for verifying the validity (anti-counterfeiting) of the information and generating the next block. The blockchain may include a blockchain underlying platform, a platform product services layer, and an application services layer.
The blockchain underlying platform may include processing modules for user management, basic services, and intelligent contracts. The user management module is responsible for identity information management of all blockchain participants, and comprises public and private key generation maintenance (account management), key management, user real identity and blockchain address corresponding relation maintenance (authority management) and the like, and under the authorization condition, the user management module supervises and audits the transaction condition of certain real identities and provides rule configuration (wind control audit) of risk control; the basic service module is deployed on all block chain node equipment and used for verifying the validity of the service request, recording the service request to storage after consensus on the valid request is completed, for a new service request, the basic service firstly performs interface adaptation analysis and authentication processing (interface adaptation), then encrypts service information (consensus management) through a consensus algorithm, transmits the service information to a shared account (network communication) completely and consistently after encryption, and performs recording and storage; the intelligent contract module is responsible for registering and issuing contracts, contract triggering and contract execution, developers can define contract logic through a certain programming language, issue the contract logic onto a block chain (contract registration), and call keys or other event triggering execution according to the logic of contract terms to complete the contract logic.
The blockchain network is a distributed application architecture for distributing tasks and workloads among peers, and is a networking or network form formed by peer-to-peer computing models in an application layer. Generally, a blockchain network includes a plurality of computers connected to each other, and these computers are also called node devices of the blockchain network. In a blockchain network environment, a plurality of computers connected with each other are in an equivalent position, each computer has the same function and is not divided into a master computer and a slave computer, and one computer can be used as a server to set shared resources for other computers in the network to use; the network as a whole generally does not rely on a dedicated centralized server, and there are no dedicated workstations. Each computer in the network can both act as a requester of network services and provide resources, services and content in response to requests from other computers.
FIG. 1 illustrates an architecture diagram of a data processing system provided by an exemplary embodiment of the present application. As shown in fig. 1, the data processing system may include an authorizing device 101, an authorized device 102, and a plurality of node devices 103 in a blockchain network. The number and form of the devices in the data processing system shown in FIG. 1 are for example and do not constitute a limitation of the present application. For example: the number of authorized devices and authorized devices may be multiple, the number of node devices is determined by the actual networking structure of the blockchain network, and may be more than or equal to 3, and the application does not limit the number of devices.
The authorizing device 101 is a device used by a first user (i.e., the work owner) and may include, but is not limited to: smart phones (such as Android phones and iOS phones), tablet computers, portable personal computers, Mobile Internet Devices (MID), and the like, which are not limited in the embodiments of the present invention.
Authorized device 102 is a device used by a second user (i.e., a work authorization object), which may include, but is not limited to: smart phones (such as Android phones, iOS phones, and the like), tablet computers, portable personal computers, MID, and the like, which are not limited in the embodiments of the present invention.
The node device 103 in the blockchain network may specifically be a client or a server, which is not limited in this embodiment of the present application. Wherein, the client can be any one of the following: a terminal, a standalone Application, an Application Programming Interface (API), or a Software Development Kit (SDK). Among others, the terminal may include but is not limited to: smart phones (such as Android phones, iOS phones, and the like), tablet computers, portable personal computers, MID, and the like, which are not limited in the embodiments of the present invention. The type of node device may include, but is not limited to, a full node, a Simple Payment Verification (SPV) node, or other node types in a blockchain network. The full node is a node storing a complete block chain, can independently check all transactions on the block chain and update data in real time, and is mainly responsible for broadcasting and verifying the transactions of the block chain. A full node is typically a high performance computing device. SPV nodes may also be referred to as lightweight nodes. An SPV node is a node that stores only a portion of a blockchain; for example, the SPV node stores only all the block header information and the block information related to the self information in the block chain, and does not store the complete block chain. SPV nodes are nodes that rely on the existence of full nodes and do not provide computing power for blockchain networks. Therefore, the SPV nodes are mostly mobile terminals, such as smart phones, tablet computers, or mobile computers.
In one embodiment, the authorizing device 101 may be deployed in a blockchain network, i.e., the authorizing device may be a node device in the blockchain network. In another embodiment, the authorized device may be a device outside the blockchain network, which may be connected to a node device in the blockchain network for data communication. Similarly, the authorized device 102 may also be deployed in the blockchain network as a node device in the blockchain network; alternatively, the authorized device may be a device outside the blockchain network that may be in data communication with a node device in the blockchain network.
In this embodiment, a first user may send authorization information to a node device in a blockchain network through an authorization device 101, where the authorization information is used to instruct the first user to authorize the second user the usage right of a target work set. Under the condition that the node equipment receives the authorization information, transaction data can be generated according to the authorization information and stored in the blockchain network, so that the blockchain network can know that the first user authorizes the use right of the target work set to the second user. The authorization of the works is applied to the block chain network, so that the repeated authorization of the use rights of the works can be effectively prevented.
In order to enable a first user to transfer the usage right of a work to a second user while maintaining the ownership of the work, the embodiment of the present application provides a data processing method, which is described in detail below.
Fig. 2 is a flowchart of a data processing method according to an exemplary embodiment of the present application. As shown in fig. 2, the data processing method includes, but is not limited to, the following steps 201 to 203. Wherein:
201. the first user sends authorization information to the node device through the authorization device. Accordingly, the node device receives authorization information of the first user.
Wherein the first user is an owner or originator of the set of target works. Wherein the set of target works may be any set of works authored by the first user. A set of target works may include one or more works, with the same set of target works including works based on the same concept or belonging to the same series. For example, in the music piece set, the music piece 1 is background music, the written work 1 is lyrics corresponding to the music piece 1, and the music piece 2 is a music piece combining the background music and the lyrics. For another example, in the article collection, article 1 and article 2 are the same series of articles, and article 2 is a continuation of article 1.
The authorization information includes the target token and information of the second user. Tokens (tokens) can provide proof of authenticity for corresponding objects (e.g., digital assets, transaction information, etc.) and prevent third parties from modifying the data. The target token is used to indicate an object having ownership over the set of target works, and may be understood to indicate the originator of the set of target works. Specifically, the object mapped by the target token has the usage right of the work set corresponding to the target token. For example, the collection of works corresponding to the token 1 is a painting collection 1, the painting collection 1 includes a painting 1 and a painting 2, an owner or originator of the painting collection 1 is the user 1, that is, the user 1 has ownership of the painting collection 1; assuming that the object mapped by token 1 is user 2, it indicates that user 2 has the right to use drawing 1 and drawing 2. The second user is a mapping object of the target token in the authorization information (i.e. an authorization object of the usage rights). The information of the second user includes, but is not limited to, an address of the second user and identification information of the second user. The identity information can be a public key of the second user; the address may be an Internet Protocol (IP) address or a Media Access Control (MAC) address of an authorized device used by the second user, or the like.
Optionally, the authorization information further includes information of the first user, and the information of the first user may include, but is not limited to, an address and a public key of the first user. The information of the first user can be used for the node equipment to verify whether the first user is a legal user.
Assuming that the first user wants to authorize the right to use the work set 1 to the second user, the first user needs to send authorization information including the target token corresponding to the work set 1 and the information of the second user to the node device in the blockchain network.
The first user sends authorization information to the node device, which can be understood as a transaction in the blockchain network, and the node device receives the authorization information and can verify whether the transaction is legal or not according to the public key of the first user. Specifically, the node device performs hash calculation on the authorization information by using a hash algorithm to obtain a first digest, decrypts the digest of the authorization information sent by the first user by using a public key of the first user to obtain a second digest, and if the first digest is the same as the second digest, the authorization information is legal, otherwise, the authorization information is not legal. The first user adopts a Hash algorithm to carry out Hash calculation on the authorization information to obtain an abstract, and a private key of the first user is adopted to encrypt the abstract to obtain the abstract of the authorization information. The digest of the authorization information may be sent to the node device along with the authorization information. The node device and the first user adopt the same hash algorithm. And executing the step 202 when the node device determines that the authorization information has validity, otherwise, discarding the authorization information, and sending prompt information of validity verification failure to the first user.
202. And the node equipment maps the target token to the information of the second user according to the authorization information to generate transaction data.
The transaction data is used for recording the usage right authorization relation of the work set corresponding to the target token, and specifically includes information of a first user, information of a second user and the target token. In this embodiment, the authorization relationship is that the first user authorizes the usage right of the work set corresponding to the target token to the second user. And the node equipment maps the target token to the information of the second user according to the authorization information, and the use right of the work set corresponding to the target token is authorized to the second user. Specific implementations may include, but are not limited to: the target token is mapped to an address of the second user.
203. The node device stores the transaction data into the blockchain network.
In one embodiment, the node device stores the transaction data in the blockchain network, which is performed by the node device in the blockchain network for consensus, and if the blockchain network achieves consensus, the node device stores the transaction data in the blockchain network, that is, a block is generated according to the transaction data and added to the blockchain account book. The node device sends indication information to other node devices in the blockchain network, wherein the indication information is used for indicating the operation of storing the transaction data into the blockchain network, and if more than half of the node devices in the blockchain network approve the operation, the blockchain network achieves consensus. And if the block chain network does not achieve the consensus, sending a prompt message of the failure of the consensus to the first user.
In one embodiment, the node device transmits the transaction data to other node devices in the blockchain network. The other node devices can authorize the first user to authorize the usage right of the target work set corresponding to the target token to the second user according to the transaction data to verify the transaction. And other nodes send the verified result to the blockchain network, if the verified result of more than half of the node devices in the blockchain network passes, the nodes in the blockchain network achieve consensus, store the transaction data, and send prompt information of successful authorization to the first user and the second user. And if the verification results of more than half of the node devices in the blockchain network are failed, the nodes in the blockchain do not reach the consensus, the transaction data are not stored, and prompt information of consensus failure is sent to the first user.
In the embodiment of the application, node equipment in the block chain network receives authorization information of a first user, maps a target token to information of a second user according to the authorization information, generates transaction data, and stores the transaction data in the block chain network. Therefore, the target token is mapped to the information of the second user, so that the first user can transfer the usage right of the work to the second user under the condition that the ownership of the work is reserved.
Fig. 3 is a flowchart of another data processing method according to an exemplary embodiment of the present application. The data processing method can be realized by interaction between the authorization device 101 and the node device 103 shown in fig. 1; as shown in fig. 3, the data processing method includes, but is not limited to, the following steps 301 to 305. Wherein:
301. and the first user sends the information of the target work set and the certification message of the target work set to the node equipment through the authorization equipment. Correspondingly, the node equipment receives the information of the target work set of the first user and the certification information of the target work set.
The target work set is a work set with ownership of the first user, and the target work set comprises at least one work. Specifically, works may include, but are not limited to, paintings, design drawings, articles, audio, video, etc. intellectual works that are original in nature and are expressed in a tangible form. The information of the target work set includes the individual works in the target work set. For example, the information of the piece set 1 includes a musical piece 1 and a musical piece 2, and the musical piece 2 may be an improvement of the musical piece 1. The certification information of the target work set is used for certifying the target work set, and may include, but is not limited to: time of creation of the work, type of the work, description, concept, idea of creation, and the like. It will be appreciated that the certification information for the target work collection is used to describe information that the first user authored the target work collection, such as by authoring ideas to describe the target work collection.
In one embodiment, the node device performs hash calculation on the certification information of the target work set by using a hash algorithm to obtain a first hash value when receiving the information of the target work set and the certification information of the target work set of the first user. And then, decrypting the abstract of the certification information by adopting the public key of the first user to obtain decrypted information, and calculating the decrypted information to obtain a verification hash value. The first user adopts a Hash algorithm to carry out Hash calculation on the certification information to obtain an abstract, and adopts a private key of the first user to encrypt the abstract to obtain the abstract of the certification information. The digest of the attestation information may be sent to the node device along with the attestation information. And the node equipment checks and verifies whether the hash value is consistent with the first hash value. If the hash value is consistent with the first hash value, the verification is passed, and step 302 is continuously executed. And if the verification hash value is inconsistent with the first hash value, the verification fails, and prompt information of verification failure is sent to the first user.
302. And the node equipment establishes the association relation between the information of the target work set and the target evidence storing identification according to the evidence information of the target work set.
The target evidence storing identification is used for associating the target work set of the first user, and at least one corresponding target work can be determined through the target evidence storing identification. It can be understood that the target deposit certificate identification has a corresponding relationship with the target work set, and also has a corresponding relationship with the target work included in the target work set.
In one embodiment, each time a collection of works is received, a node device may generate a corresponding LC identifier. The target certificate of credit identification is a certificate of credit identification allocated to the target work set by the node device. For example, assume that a musical piece 1 and a musical piece 2 are included in a piece set 1. After receiving the work set 1, the node device generates a certificate storing identification 1, and associates the musical works 1 and 2 together according to the certificate storing identification 1.
In another embodiment, the target certificate identity has an association relationship with the first hash value, for example, the target certificate identity is the same as the first hash value, or the target certificate identity is obtained by performing a mathematical operation on the basis of the first hash value, and so on. It can be understood that the target work set associated with the target deposit certificate identifier is the same as the target work set corresponding to the certificate information of the target work set.
Optionally, the node device may associate each work in the target work set with the target deposit certificate identifier according to the certification information of the target work set. Specifically, each work in the target work set may be associated to the target deposit evidence identifier by the work creation time, the work category, and the like. For example, the proof identifier 1 has associated therein the musical piece 1 and the musical piece 2 created by the user 1, and the pieces corresponding to the proof information 1 are also the musical piece 1 and the musical piece 2 created by the user 1. Then, the node device receives the musical piece 3 created by the user 1, where the musical piece 3 is a combination of the musical piece 1 and the musical piece 2 (i.e., based on the same concept), and the node device may associate the musical piece 3 to the voucher identification 1.
In one embodiment, the node device performs hash calculation on the works in the target work set to obtain second hash values corresponding to the works, and then the node device associates the second hash values corresponding to the works based on the same creation thought to the target deposit evidence identifier through the work creation thought recorded in the certification information of the target work set. For example, the information of the first target work set of the first user includes musical works 1 and musical works 2, and the node device associates the hash value corresponding to the musical works 1 and the hash value corresponding to the musical works 2 to the first target evidence storing identification according to the certification information of the first target work set. The information of the second target work set of the first user comprises article work 1 and article work 2, the node device stores the hash value corresponding to the article work 1 and the hash value corresponding to the article work 2 into a second target evidence storing identification according to the certification information of the second target work set, namely, the article work 1 and the article work 2 are associated through the second target evidence storing identification.
303. And the node equipment stores the information of the target work set and the target certificate storing identification into the block chain network.
In one embodiment, the node device sends the information of the target work set and the target certificate of credit identification to other node devices in the blockchain network. And the other nodes verify whether the information of the target work set is matched with the target evidence storing identification, send the verified result to the block chain network, if the verification results of more than half of the node devices in the block chain network are matched, store the information of the target work set and the target evidence storing identification, and continue to execute the step 304. And if the verification results of more than half of the node devices in the block chain network are not matched, not storing the information of the target work set and the target evidence storing identification, and sending a prompt message that the information of the target work set is wrongly associated with the target evidence storing identification to the first user.
304. And the node equipment distributes a target token for the target certificate storage identification.
In one embodiment, the node device allocates a corresponding target token to the target credit identification according to an intelligent contract preset in the block chain network. At this time, the address of the newly allocated target token map is the information of the owner of the target work set corresponding to the target deposit certificate identifier, and in this embodiment, the address of the newly allocated target token map is the information of the first user.
Optionally, the address of the newly allocated target token map may also be null, that is, other users do not have the right to use the target work set except the owner of the target work set.
305. And the node equipment sends the target token and the target certificate storing identification to the first user.
The target token may be used when the first user needs to authorize the usage right of the target work set corresponding to the target token to other users, and a specific implementation method is the same as the data processing method described in fig. 2, and is not described here again. It will be appreciated that steps 301-305 are performed prior to step 201 in the embodiment shown in fig. 2.
The target deposit certificate identification may be used when the first user needs to add a new work to the target work set associated with the target deposit certificate identification. In one implementation, the first user sends information of the newly added work and the evidence storing identification to the node device. And the node equipment receives the information of the newly added works and the evidence storage identification sent by the first user. And the work corresponding to the evidence storing identification is the work which is expected to be associated with the newly added work. For example, the first user has sent article work 1 and article work 2 to the node device, and received the deposit certificate identifier 1 sent by the node device and corresponding to article work 1 and article work 2. Then, the first user wants to associate the newly added article 3 with the article 1 and the article 2, and the article 3, the article 1 and the article 2 may be articles based on the same concept. For example, article work 3 may be a continuation of article work 1 and article work 2. The first user sends article works 3 and evidence storage identification 1 to the node device. After receiving the article works 3 and the evidence storing identification 1 sent by the first user, the node equipment determines a corresponding work set according to the evidence storing identification 1 and stores the article works 3 into the work set.
It can be seen that, the embodiment of the present application adds a process of storing the work to the blockchain network by the first user on the basis of fig. 2. The evidence storing identification is generated in the process of storing the works, and the works of the first user can be associated according to requirements (such as classified management according to types, creation time and the like) through the evidence storing identification; and adding the newly added works into the associated work group according to the certificate storage identification. In addition, the work is subjected to hash calculation, and the obtained hash value is stored in the certificate storing identification. Compared with the mode that works are directly stored in the certificate storing identification, the storage space of the node equipment can be saved by only storing the hash value of the works.
Fig. 4 is a flowchart of another data processing method according to an exemplary embodiment of the present application. The data processing method can be realized by interaction among the authorization device 101, the authorized device 102 and the node device 103 shown in fig. 1; as shown in fig. 4, the data processing method includes, but is not limited to, the following steps 401 to 407. Wherein:
401. the first user sends authorization information to the node device through the authorization device. Accordingly, the node device receives authorization information of the first user.
The specific implementation of step 401 is the same as that in step 201 of fig. 2, and is not described herein again.
402. And the node equipment searches whether an authorization relation corresponding to the target work set exists or not according to the target token.
In one embodiment, the node device looks up and determines whether the address mapped by the target token is the first user's information or is null. If the address mapped by the target token is the information of the first user or is null, it is determined that the target work set does not have an authorization relationship, and step 403 is continuously executed. If the address mapped by the target token is the information of other users except the first user, it is determined that the target work set does not have an authorization relationship, and step 405 is continuously executed.
403. And the node equipment determines that the target work set does not have an authorization relation, maps the target token to the information of the second user according to the authorization information and generates transaction data.
404. The node device stores the transaction data into the blockchain network.
The specific implementation of steps 403 to 404 is the same as that of steps 202 to 203 in fig. 2, and is not described herein again.
405. And the node equipment determines that the target work set has an authorization relation and generates prompt information.
Wherein the prompt message is used to prompt that the usage right of the target work set is authorized to other users except the first user and the second user. For example, the authorization information sent by the user 1 to the node device includes information of the token 1 and the user 2. I.e. the user 2 is granted the right to use the collection of works corresponding to the token 1. And the address mapped in the token 1 is the information of the user 3, namely the usage right of the work set corresponding to the token 1 is authorized to the user 3. At this time, the node apparatus generates a prompt message for prompting that the usage right of the work set corresponding to the token 1 has been granted to the user 3 by the user 1 and the user 2.
Optionally, the node device may add information of the user currently owning the usage right of the target work set (i.e., information of the object mapped by the target token) to the hint information, so that the first user and the second user may negotiate with the user currently owning the usage right of the target work set with respect to the usage right of the target work set.
406. The node device sends a prompt message to the authorization device.
407. The node device sends a prompt message to the authorized device.
It should be noted that step 407 may be executed simultaneously with step 406, or may be executed before or after step 406.
Therefore, on the basis of fig. 2, the embodiment of the application verifies whether the usage right of the target work set is authorized to the first user and other users outside the second user through the target token, so that the situation that the first user repeatedly authorizes the same work set is avoided.
In an optional implementation manner, the node device receives information of a work to be checked, wherein the work to be checked is a work which needs to be queried whether the work is authorized. The information of the work to be checked may be transmitted by the first user or may be transmitted by the second user. The node equipment calculates the hash value of the work to be checked through a hash algorithm, and searches and confirms whether the corresponding certificate storing identification exists through the hash value. And if the corresponding evidence storing identification does not exist, the checked work is not disclosed in the block chain network. And if the corresponding certificate storing identification exists, searching and confirming the corresponding token through the corresponding certificate storing identification. And the node equipment searches and confirms whether the transaction data corresponding to the target token exists in the block chain network or not according to the target token. If the transaction data corresponding to the target token exists, the authorization relationship of the target work set already exists (namely the use right of the target work set is authorized to other users except the first user and the second user). And the node equipment sends prompt information to the first user and the second user, wherein the prompt information is used for prompting that the target work set of the first user and the second user is authorized to other users except the first user and the second user. If there is no transaction data corresponding to the target token, then usage rights indicating the set of target works may be granted to the second user.
While the method of the embodiments of the present application has been described in detail above, to facilitate better implementation of the above-described aspects of the embodiments of the present application, the apparatus of the embodiments of the present application is provided below accordingly.
Referring to fig. 5, fig. 5 is a schematic structural diagram of a data processing apparatus according to an exemplary embodiment of the present application, where the data processing apparatus may be mounted on a node device in the foregoing method embodiment. The data processing apparatus shown in fig. 5 may be used to perform some or all of the functions in the method embodiments described above with reference to fig. 2, 3 and 4. Wherein, the detailed description of each unit is as follows:
an obtaining unit 501, configured to receive authorization information of a first user, where the authorization information includes a target token and information of a second user, and the authorization information is used to instruct the first user to authorize the second user the usage right of a target work set corresponding to the target token;
a processing unit 502, configured to map the target token to the information of the second user according to the authorization information, generate transaction data, where the transaction data includes the information of the first user, the information of the second user, the target token, and an authorization relationship between the target work sets, and store the transaction data in a blockchain network.
In an embodiment, before generating the transaction data by mapping the token to the second user's information according to the authorization information, the processing unit 502 is further configured to:
searching whether an authorization relation corresponding to the target work set exists or not according to the target token;
and if the authorization relation corresponding to the target work set does not exist, executing the step of mapping the token to the information of the second user according to the authorization information to generate transaction data.
In an embodiment, the processing unit 502 is further configured to:
and if the authorization relationship corresponding to the target work set exists, sending prompt information to the first user and the second user, wherein the prompt information is used for indicating that the use right of the target work set is authorized to other users except the first user and the second user.
In an embodiment, the processing unit 502 is further configured to:
receiving information of the target work set of the first user and certification information of the target work set;
according to the certification information of the target work set, establishing an incidence relation between the information of the target work set and a target certificate storage identification;
storing the information of the target work set and the target evidence storing identification into the block chain network;
and distributing the target token for the target deposit certificate identification, and sending the target token and the target deposit certificate identification to the first user.
In an embodiment, the processing unit 502 is further configured to:
receiving information of the first user aiming at the newly added works of the target work set and the target evidence storing identification;
and storing the information of the newly added works into the information of the target work set according to the target evidence storing identification.
In an embodiment, the processing unit 502 is further configured to establish, according to the certification information of the target work set, an association relationship between the information of the target work set and a target certification storage identifier, and specifically configured to:
performing hash calculation on the certification information of the target work set by adopting a hash algorithm to obtain a first hash value;
and if the first hash value passes the verification, establishing an association relation between the information of the target work set and the target certificate storage identification.
In one embodiment, the information of the set of target works includes information of at least one target work; the processing unit 502 is further configured to establish an association relationship between the information of the target work set and the target deposit certificate identifier, and specifically configured to:
performing hash calculation on the information of the at least one target work by adopting a hash algorithm to obtain at least one second hash value;
and establishing an association relation between the at least one second hash value and the target certificate storage identification.
According to an embodiment of the present application, some steps involved in the data processing methods shown in fig. 2, 3 and 4 may be performed by various units in the data processing apparatus shown in fig. 5. For example, step 201 shown in fig. 2 may be performed by acquisition unit 501 shown in fig. 5, and steps 202 to 203 may be performed by processing unit 502 shown in fig. 5. Step 301 shown in fig. 3 may be performed by the acquisition unit 501 shown in fig. 5, and steps 302 to 305 may be performed by the processing unit 502 shown in fig. 5. Step 401 shown in fig. 4 may be performed by acquisition unit 501 shown in fig. 5, and steps 402 to 407 may be performed by processing unit 502 shown in fig. 5. The units in the data processing apparatus shown in fig. 5 may be respectively or entirely combined into one or several other units to form one or several other units, or some unit(s) may be further split into multiple functionally smaller units to form one or several other units, which may achieve the same operation without affecting the achievement of the technical effect of the embodiments of the present application. The units are divided based on logic functions, and in practical application, the functions of one unit can be realized by a plurality of units, or the functions of a plurality of units can be realized by one unit. In other embodiments of the present application, the data processing apparatus may also include other units, and in practical applications, the functions may also be implemented by being assisted by other units, and may be implemented by cooperation of a plurality of units.
According to another embodiment of the present application, the data processing apparatus as shown in fig. 5 may be constructed by running a computer program (including program codes) capable of executing the steps involved in the respective methods as shown in fig. 2, 3 and 4 on a general-purpose computing apparatus such as a computer including a processing element such as a Central Processing Unit (CPU), a random access storage medium (RAM), a read-only storage medium (ROM) and a storage element, and implementing the data processing method of the embodiment of the present application. The computer program may be recorded on a computer-readable recording medium, for example, and loaded and executed in the above-described computing apparatus via the computer-readable recording medium.
Based on the same inventive concept, the principle and the advantageous effect of the data processing apparatus provided in the embodiment of the present application for solving the problem are similar to the principle and the advantageous effect of the data processing apparatus in the embodiment of the method of the present application for solving the problem, and for brevity, the principle and the advantageous effect of the implementation of the method may be referred to, and are not described herein again.
Referring to fig. 6, fig. 6 is a schematic structural diagram of a data processing apparatus according to an exemplary embodiment of the present application, where the data processing apparatus includes at least a processor 601, a communication interface 602, and a memory 603. The processor 601, the communication interface 602, and the memory 603 may be connected by a bus or other means, and the embodiment of the present application is exemplified by being connected by a bus. The processor 601 (or Central Processing Unit, CPU) is a computing core and a control core of the terminal, and can analyze various instructions in the terminal and process various data of the terminal, for example: the CPU can be used for analyzing a power-on and power-off instruction sent to the terminal by a user and controlling the terminal to carry out power-on and power-off operation; the following steps are repeated: the CPU may transmit various types of interactive data between the internal structures of the terminal, and so on. The communication interface 602 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI, mobile communication interface, etc.), and may be controlled by the processor 601 to transmit and receive data; the communication interface 602 can also be used for transmission and interaction of data inside the terminal. A Memory 603(Memory) is a Memory device in the terminal for storing programs and data. It is understood that the memory 603 herein may comprise a built-in memory of the terminal, and may also comprise an extended memory supported by the terminal. The memory 603 provides storage space that stores the operating system of the terminal, which may include, but is not limited to: android system, iOS system, Windows Phone system, etc., which are not limited in this application.
In the embodiment of the present application, the processor 601 executes the executable program code in the memory 603 to perform the following operations:
receiving authorization information of a first user through a communication interface 602, where the authorization information includes a target token and information of a second user, and the authorization information is used to instruct the first user to authorize the second user with the usage right of a target work set corresponding to the target token;
mapping the target token to information of the second user according to the authorization information to generate transaction data, wherein the transaction data comprises the information of the first user, the information of the second user, the target token and the authorization relation among the target work set;
storing the transaction data into a blockchain network.
As an optional implementation manner, before generating the transaction data according to the information of mapping the token to the second user according to the authorization information, the processor 601 further performs the following operations:
searching whether an authorization relation corresponding to the target work set exists or not according to the target token;
and if the authorization relation corresponding to the target work set does not exist, executing the step of mapping the token to the information of the second user according to the authorization information to generate transaction data.
As an alternative implementation, the processor 601 further performs the following operations:
and if the authorization relationship corresponding to the target work set exists, sending prompt information to the first user and the second user, wherein the prompt information is used for indicating that the use right of the target work set is authorized to other users except the first user and the second user.
As an alternative embodiment, the processor 601 further performs the following operations by executing the memory 603:
receiving information of the target work set and certification information of the target work set of the first user through a communication interface 602;
according to the certification information of the target work set, establishing an incidence relation between the information of the target work set and a target certificate storage identification;
storing the information of the target work set and the target evidence storing identification into the block chain network;
and distributing the target token for the target deposit certificate identification, and sending the target token and the target deposit certificate identification to the first user.
As an alternative embodiment, the processor 601 further performs the following operations by executing the memory 603:
receiving information of the first user on newly added works of the target work set and the target evidence storing identification through a communication interface 602;
and storing the information of the newly added works into the information of the target work set according to the target evidence storing identification.
As an optional implementation manner, the specific implementation manner of the processor 601, according to the certification information of the target work set, establishing the association relationship between the information of the target work set and the target certification mark is as follows:
performing hash calculation on the certification information of the target work set by adopting a hash algorithm to obtain a first hash value;
and if the first hash value passes the verification, establishing an association relation between the information of the target work set and the target certificate storage identification.
As an optional implementation, the information of the target work set includes information of at least one target work; the specific implementation of the processor 601 for establishing the association relationship between the information of the target work set and the target deposit certificate identifier is as follows:
performing hash calculation on the information of the at least one target work by adopting a hash algorithm to obtain at least one second hash value;
and establishing an association relation between the at least one second hash value and the target certificate storage identification.
Based on the same inventive concept, the principle and the advantageous effect of the data processing apparatus provided in the embodiment of the present application for solving the problem are similar to the principle and the advantageous effect of the data processing apparatus in the embodiment of the method of the present application for solving the problem, and for brevity, the principle and the advantageous effect of the implementation of the method may be referred to, and are not described herein again.
The embodiment of the present application further provides a computer-readable storage medium, where one or more instructions are stored in the computer-readable storage medium, and the one or more instructions are adapted to be loaded by a processor and to execute the data processing method described in the foregoing method embodiment.
Embodiments of the present application further provide a computer program product containing instructions, which when run on a computer, cause the computer to execute the data processing method described in the above method embodiments.
It should be noted that, for simplicity of description, the above-mentioned embodiments of the method are described as a series of acts or combinations, but those skilled in the art should understand that the present application is not limited by the order of acts described, as some steps may be performed in other orders or simultaneously according to the present application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
The steps in the method of the embodiment of the application can be sequentially adjusted, combined and deleted according to actual needs.
The modules in the device can be merged, divided and deleted according to actual needs.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, which may include: flash disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
While the invention has been described with reference to a preferred embodiment, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A method of data processing, the method comprising:
receiving authorization information of a first user, wherein the authorization information comprises a target token and information of a second user, and the authorization information is used for indicating the first user to authorize the use right of a target work set corresponding to the target token to the second user;
mapping the target token to information of the second user according to the authorization information to generate transaction data, wherein the transaction data comprises the information of the first user, the information of the second user, the target token and the authorization relation among the target work set;
storing the transaction data into a blockchain network.
2. The method of claim 1, wherein prior to generating transaction data based on the token being mapped to the second user's information based on the authorization information, the method further comprises:
searching whether an authorization relation corresponding to the target work set exists or not according to the target token;
and if the authorization relation corresponding to the target work set does not exist, executing the step of mapping the token to the information of the second user according to the authorization information to generate transaction data.
3. The method of claim 2, further comprising:
and if the authorization relationship corresponding to the target work set exists, sending prompt information to the first user and the second user, wherein the prompt information is used for indicating that the use right of the target work set is authorized to other users except the first user and the second user.
4. The method of claim 1, further comprising:
receiving information of the target work set of the first user and certification information of the target work set;
according to the certification information of the target work set, establishing an incidence relation between the information of the target work set and a target certificate storage identification;
storing the information of the target work set and the target evidence storing identification into the block chain network;
and distributing the target token for the target deposit certificate identification, and sending the target token and the target deposit certificate identification to the first user.
5. The method of claim 4, further comprising:
receiving information of the first user aiming at the newly added works of the target work set and the target evidence storing identification;
and storing the information of the newly added works into the information of the target work set according to the target evidence storing identification.
6. The method of claim 4, wherein the establishing of the association between the information of the target work set and the target deposit certificate identifier according to the certification information of the target work set comprises:
performing hash calculation on the certification information of the target work set by adopting a hash algorithm to obtain a first hash value;
and if the first hash value passes the verification, establishing an association relation between the information of the target work set and the target certificate storage identification.
7. The method of claim 4 wherein the information on the set of target works includes information on at least one target work;
the establishing of the incidence relation between the information of the target work set and the target evidence storing identification comprises the following steps:
performing hash calculation on the information of the at least one target work by adopting a hash algorithm to obtain at least one second hash value;
and establishing an association relation between the at least one second hash value and the target certificate storage identification.
8. A data processing apparatus, comprising:
the system comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for receiving authorization information of a first user, the authorization information comprises a target token and information of a second user, and the authorization information is used for indicating the first user to authorize the use right of a target work set corresponding to the target token to the second user;
and the processing unit is used for mapping the token to the information of the second user according to the authorization information to generate transaction data, wherein the transaction data comprises the information of the first user, the information of the second user, the token and the authorization relation among the target work set, and the transaction data is stored in a blockchain network.
9. A data processing apparatus comprising a processor, a memory and a communication interface, the processor, the memory and the communication interface being interconnected, wherein the memory is for storing a computer program comprising program instructions, the processor being configured to invoke the program instructions to perform the method of any of claims 1 to 7.
10. A computer-readable storage medium having stored thereon one or more instructions adapted to be loaded by a processor and to perform the method of any of claims 1 to 7.
CN201911232259.8A 2019-12-04 2019-12-04 Data processing method and device and computer storage medium Pending CN110910110A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911232259.8A CN110910110A (en) 2019-12-04 2019-12-04 Data processing method and device and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911232259.8A CN110910110A (en) 2019-12-04 2019-12-04 Data processing method and device and computer storage medium

Publications (1)

Publication Number Publication Date
CN110910110A true CN110910110A (en) 2020-03-24

Family

ID=69822458

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911232259.8A Pending CN110910110A (en) 2019-12-04 2019-12-04 Data processing method and device and computer storage medium

Country Status (1)

Country Link
CN (1) CN110910110A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111683101A (en) * 2020-06-16 2020-09-18 铭数科技(青岛)有限公司 Autonomous cross-domain access control method based on block chain
CN111767527A (en) * 2020-07-07 2020-10-13 杭州云链趣链数字科技有限公司 Block chain-based data authority control method and device and computer equipment
CN116305219A (en) * 2023-05-18 2023-06-23 中国人民银行成都分行营业管理部 Controllable, credible and rotatable personal information authorization processing method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108810006A (en) * 2018-06-25 2018-11-13 百度在线网络技术(北京)有限公司 resource access method, device, equipment and storage medium
KR101983530B1 (en) * 2019-01-08 2019-05-29 김보언 Registration system for storing copyrighted works in blockchain
US20190340607A1 (en) * 2018-05-01 2019-11-07 Masterworks.io, LLC System for central authority-permissioned transfer of blockchain tokens
CN110457875A (en) * 2019-07-31 2019-11-15 阿里巴巴集团控股有限公司 Data grant method and device based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190340607A1 (en) * 2018-05-01 2019-11-07 Masterworks.io, LLC System for central authority-permissioned transfer of blockchain tokens
CN108810006A (en) * 2018-06-25 2018-11-13 百度在线网络技术(北京)有限公司 resource access method, device, equipment and storage medium
KR101983530B1 (en) * 2019-01-08 2019-05-29 김보언 Registration system for storing copyrighted works in blockchain
CN110457875A (en) * 2019-07-31 2019-11-15 阿里巴巴集团控股有限公司 Data grant method and device based on block chain

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111683101A (en) * 2020-06-16 2020-09-18 铭数科技(青岛)有限公司 Autonomous cross-domain access control method based on block chain
CN111767527A (en) * 2020-07-07 2020-10-13 杭州云链趣链数字科技有限公司 Block chain-based data authority control method and device and computer equipment
CN116305219A (en) * 2023-05-18 2023-06-23 中国人民银行成都分行营业管理部 Controllable, credible and rotatable personal information authorization processing method
CN116305219B (en) * 2023-05-18 2023-08-22 中国人民银行成都分行营业管理部 Controllable, credible and rotatable personal information authorization processing method

Similar Documents

Publication Publication Date Title
CN110912707B (en) Block chain-based digital certificate processing method, device, equipment and storage medium
CN112214780B (en) Data processing method and device, intelligent equipment and storage medium
US11651109B2 (en) Permission management method, permission verification method, and related apparatus
EP3732856B1 (en) System and method for decentralized-identifier authentication
CN110147994B (en) Instant execution method of block chain based on homomorphic encryption
US10924285B2 (en) Method and server for providing notary service with respect to file and verifying file recorded by the notary service
CN109819443B (en) Registration authentication method, device and system based on block chain
Omar et al. Identity management in IoT networks using blockchain and smart contracts
US20190312877A1 (en) Block chain mining method, device, and node apparatus
US20190220624A1 (en) Method and server for providing notary service for file and verifying file recorded by notary service
CN108769230B (en) Transaction data storage method, device, server and storage medium
CN107483509A (en) A kind of auth method, server and readable storage medium storing program for executing
CN112671720B (en) Token construction method, device and equipment for cloud platform resource access control
CN111767569A (en) Access authorization method and node of block chain
CN112152778B (en) Node management method and device and electronic equipment
CN110910110A (en) Data processing method and device and computer storage medium
CN111460400A (en) Data processing method and device and computer readable storage medium
CN110990790B (en) Data processing method and equipment
CN111314066B (en) Block chain-based data transfer method, terminal and computer-readable storage medium
CN116170144B (en) Smart power grid anonymous authentication method, electronic equipment and storage medium
CN110276693B (en) Insurance claim settlement method and system
Benrebbouh et al. Enhanced secure and efficient mutual authentication protocol in IoT-based energy internet using blockchain
CN117040930B (en) Resource processing method, device, product, equipment and medium of block chain network
CN116032494B (en) Data interaction method, blockchain predictor, device and medium
CN117061089B (en) Voting management method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination