CN111177798A - Data ownership transfer processing method and device, electronic equipment and storage medium - Google Patents

Data ownership transfer processing method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN111177798A
CN111177798A CN201911415888.4A CN201911415888A CN111177798A CN 111177798 A CN111177798 A CN 111177798A CN 201911415888 A CN201911415888 A CN 201911415888A CN 111177798 A CN111177798 A CN 111177798A
Authority
CN
China
Prior art keywords
current
target data
data
hash
last
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911415888.4A
Other languages
Chinese (zh)
Inventor
李佳
颜卿
袁一
潘晓良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Nonda Intelligent Technology Co ltd
Original Assignee
Shanghai Nonda Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Nonda Intelligent Technology Co ltd filed Critical Shanghai Nonda Intelligent Technology Co ltd
Priority to CN201911415888.4A priority Critical patent/CN111177798A/en
Publication of CN111177798A publication Critical patent/CN111177798A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The invention provides a processing method and device for data ownership transfer, electronic equipment and a storage medium, which are applied to any one current node of a block chain system, and the processing method for data ownership transfer comprises the following steps: when the current transfer occurs, acquiring a public key of the next node; the current transfer is the transfer of the target data from the current node to the next node; encrypting the target data according to the public key of the next node to obtain the current encrypted target data; performing hash operation on the current encrypted target data to obtain a current ciphertext hash; generating the current block in the blockchain, the block of the current block having the current ciphertext hash written therein, such that: the next node can firstly verify that the acquired current encrypted target data is true by using the current ciphertext hash, and then decrypt the current encrypted target data by using a private key of the next node to obtain the target data.

Description

Data ownership transfer processing method and device, electronic equipment and storage medium
Technical Field
The present invention relates to the field of data transfer, and in particular, to a method and an apparatus for processing data ownership transfer, an electronic device, and a storage medium.
Background
Data transfer is understood to be a process of transferring ownership of data from one party to another party for a fee or a fee, and in the conventional data transfer process, if data is to be delivered, the data may be transmitted to a buyer via a server.
However, in the related art, in order to realize online transfer of data, a seller is required to upload the data to a server and then send the data to a buyer through the server, and in the process, the data needs to be forwarded through the server, which is prone to cause potential safety hazards such as data leakage.
Disclosure of Invention
The invention provides a data ownership transfer processing method and device, electronic equipment and a storage medium, and aims to solve the problem of potential safety hazards such as data leakage and the like.
According to a first aspect of the present invention, there is provided a data ownership transfer processing method, applied to any one current node of a blockchain system, including:
when the current transfer occurs, acquiring a public key of the next node; the current transfer is the transfer of the target data from the current node to the next node;
encrypting the target data according to the public key of the next node to obtain the current encrypted target data;
performing hash operation on the current encrypted target data to obtain a current ciphertext hash;
generating the current block in the blockchain, the block of the current block having the current ciphertext hash written therein, such that: the next node can firstly verify that the acquired current encrypted target data is true by using the current ciphertext hash, and then decrypt the current encrypted target data by using a private key of the next node to obtain the target data.
Optionally, encrypting the target data according to the public key of the next node to obtain the current encrypted target data, including:
generating a current proxy re-encryption key according to the public key of the next node and the private key of the current node;
and encrypting the target data by using the current proxy re-encryption key to obtain the current encrypted target data.
Optionally, before the current transfer occurs, the method further comprises:
acquiring last encrypted target data, wherein the last encrypted target data is obtained by encrypting the target data by a last node in a last assignment, and the last assignment is an assignment of the last node for assigning the target data to the current node;
performing hash operation on the last encrypted target data to obtain a ciphertext hash to be verified;
and verifying the ciphertext hash to be verified by using the last ciphertext hash in the last block corresponding to the last transfer to verify that the obtained last encrypted target data is true.
Optionally, the first chunk of the blockchain system further has written a textual hash of the target data;
verifying the ciphertext hash to be verified by using the last ciphertext hash in the last block corresponding to the last assignment to verify that the obtained last encrypted target data is true, further comprising:
decrypting the last encrypted target data by using the key of the current node to obtain target data;
performing hash operation on the obtained target data to obtain corresponding original text hash to be verified;
and verifying the hash of the original text to be verified by using the hash of the original text written in the first block so as to verify that the obtained target data is true.
Optionally, after encrypting the target data according to the public key of the next node to obtain the current encrypted target data, the method further includes:
sending the current encrypted target data to the next node, or: and sending the current encrypted target data to a data storage device, so that the next node can acquire the current encrypted target data from the data storage device.
Optionally, the block body of each block is further written with the currently assigned assignment description information.
Optionally, at least one of the following is written in the block header of each block:
version information;
hash data of the last block;
a time stamp;
root hash data for all transferred merkel trees of the target data.
Optionally, the target data includes data in the form of at least one of: text, images, audio, video, compressed files, program files.
According to a second aspect of the present invention, there is provided a processing apparatus for data ownership transfer, applied to any one of current nodes in a blockchain system, comprising:
the public key acquisition module is used for acquiring the public key of the next node when the current transfer occurs; the current transfer is the transfer of the target data from the current node to the next node;
the encryption module is used for encrypting the target data according to the public key of the next node to obtain the current encrypted target data;
the ciphertext hash calculation module is used for carrying out hash operation on the current encrypted target data to obtain a current ciphertext hash;
a current block generation module configured to generate the current block in the blockchain, the block of the current block having the current ciphertext hash written therein, such that: the next node can firstly verify that the acquired current encrypted target data is true by using the current ciphertext hash, and then decrypt the current encrypted target data by using a private key of the next node to obtain the target data.
According to a third aspect of the invention, there is provided an electronic device comprising a memory and a processor,
the memory is used for storing codes;
the processor is configured to execute the codes in the memory to implement the processing method for data ownership transfer related to the first aspect and the optional aspects thereof.
According to a fourth aspect of the present invention, there is provided a storage medium having a program stored thereon, wherein the program is characterized by implementing, when executed by a processor, the processing method for data ownership transfer relating to the first aspect and its optional aspects.
In the processing method and device for data ownership transfer, the electronic device and the storage medium provided by the invention, the target data needs to be encrypted every time of transfer, and as the data is encrypted based on the public key of the node of the assigned data (specifically, the data can be encrypted based on the proxy re-encryption key generated by the public key and the private key of the assigned person), only the node of the assigned data can decrypt the corresponding encrypted data, thereby ensuring the security of the data in the data transfer process.
Meanwhile, the ciphertext Hash is obtained by carrying out Hash operation on the encrypted target data, and different assignments correspond to different ciphertext Hash, so that the invention can verify the authenticity of the obtained encrypted target data based on the different ciphertext Hash operations, thereby ensuring that the obtained encrypted data is really the data of the assignment.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a block chain system according to an embodiment of the present invention;
fig. 2 is a first flowchart illustrating a processing method for data ownership transfer according to an embodiment of the present invention;
FIG. 3 is a diagram illustrating blocks according to an embodiment of the present invention;
FIG. 4 is a flowchart illustrating step S12 according to an embodiment of the present invention;
FIG. 5 is a second flowchart illustrating a method for transferring ownership of data according to an embodiment of the present invention;
FIG. 6 is a third flowchart illustrating a processing method for data ownership transfer according to an embodiment of the present invention;
fig. 7 is a first program module diagram of a processing device for data ownership transfer according to an embodiment of the present invention.
FIG. 8 is a second block diagram illustrating process modules of a processing device for ownership transfer of data according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of an electronic device in an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The technical solution of the present invention will be described in detail below with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments.
The processing method and device for data ownership transfer according to the embodiment can be applied to any node in a blockchain system.
FIG. 1 is a block chain system according to an embodiment of the present invention;
taking fig. 1 as an example, the blockchain system may have a plurality of nodes 100, each of which may be an electronic device, and specifically, may be an electronic device with certain data processing capability and data storage capability. It may be a terminal, for example: the mobile phone, the computer, the tablet computer, and the like can also be a server, and meanwhile, a single node can be a single terminal or a server, or a combination of multiple terminals, a combination of multiple servers, or a combination of a terminal and a server.
Further, the nodes 100 in the blockchain system may be used to implement distributed data storage, point-to-point transmission, consensus mechanisms, encryption algorithms, and the like.
Fig. 2 is a flowchart illustrating a data ownership transfer processing method according to an embodiment of the present invention.
The processing method of data ownership transfer is applied to any current node of the blockchain system.
This current node can be understood as: the node in the blockchain system, which can implement the method according to the present embodiment, may be any node where data transfer needs to occur.
In one example, all nodes of the blockchain system may be configured to implement the method, and in another example, some nodes may not be configured to implement the method.
Referring to fig. 2, the data ownership transfer processing method includes:
s101: when the current transfer occurs, acquiring a public key of the next node;
s102: encrypting the target data according to the public key of the next node to obtain the current encrypted target data;
s103: performing hash operation on the current encrypted target data to obtain a current ciphertext hash;
s104: the current block is generated in the block chain.
The current transfer in step S101 may be understood as a transfer in which the current node transfers the target data to the next node.
The target data may be understood as a transfer target transferred in the blockchain, and may include data in the form of at least one of: text, images, audio, video, compressed files, program files. The image can be a picture, and can also be a two-dimensional or three-dimensional drawing which can be opened by other files; the compressed file may be, for example, compressed packet data, and the program file may be any file that can be opened directly by the matching program, and may be a program file for any purpose, without excluding other forms of data.
In one example, if the processing method is applied to the field of vehicles, the current target data may be vehicle data, which may be any data described with respect to vehicle hardware and/or software, such as data detected by vehicle hardware.
In other examples, the processing method according to this embodiment may be applied to any other fields, for example, the processing method may be running data of a device, data acquired by externally acquired information of the device, data generated by human-computer interaction, data generated by human-human interaction, and the like.
When the current assignment occurs, which is described in step S101, it may be when a data purchase request is acquired, for example, a next node may broadcast the data purchase request in a blockchain, and further, the current node may learn that the current assignment occurs, which is when the assignment occurs.
Meanwhile, the implementation of step S101 may be implemented based on the intelligent contract of the block chain.
In step S102 in the above scheme, data may be encrypted based on the public key of the node of the given data, and then only the node of the given data may decrypt the encrypted target data, thereby ensuring the security of the data in the data transfer process.
The current ciphertext hash is written in the block of the current block in step S103, so that: the next node can firstly verify that the acquired current encrypted target data is true by using the current ciphertext hash, and then decrypt the current encrypted target data by using a private key of the next node to obtain the target data.
Therefore, the ciphertext hashes are obtained by performing hash operation on the encrypted target data, and different assignments correspond to different ciphertext hashes, so that the embodiment can verify the authenticity of the obtained encrypted target data based on the ciphertext hashes, thereby ensuring that the obtained encrypted data is indeed the data of the assignment.
FIG. 3 is a diagram illustrating blocks according to an embodiment of the present invention.
Referring to fig. 3, each block 200 may include a block header 201 and a block body 202.
In one embodiment, the block body of each block is further written with the currently assigned transfer description information. For example, the transfer quantity of the transferred data, and other transfer details, which may include, for example, the identities of the parties of the transfer, other information associated with the identities, the transfer price, other information describing the target data, and so on.
In one embodiment, the block header of each block further has at least one of the following written therein:
version information, i.e., Version;
the Hash data of the previous block, namely the Hash of the previous block;
a time stamp;
root Hash data of all assigned merkel trees for the target data, i.e. root Hash of Merkle tree.
Therefore, in the blockchain system, the change of the ownership of the data can be recorded, and meanwhile, a new owner can decrypt and obtain the data, and the data conversion of the record on the blockchain can be used for tracing.
Fig. 4 is a flowchart illustrating step S12 according to an embodiment of the present invention.
Referring to fig. 4, step S12 may include:
s1021: generating a current proxy re-encryption key according to the public key of the next node and the private key of the current node;
s1022: and encrypting the target data by using the current proxy re-encryption key to obtain the current encrypted target data.
Because the current proxy re-encryption key used for encryption is encrypted according to the private key of the current node and the public key of the next node, the privacy and the security of the encrypted data can be further guaranteed. Specifically, because the data is encrypted by the proxy re-encryption key, the node which transfers the data cannot be unlocked by the private key of the node, so that the transfer of the ownership of the data is ensured. Meanwhile, after the proxy is re-encrypted, since the proxy is encrypted by using the private key of the node from which the data is transferred, the zero-knowledge proof can be used for verifying that the data to be transferred really comes from the node.
Fig. 5 is a flowchart illustrating a processing method for data ownership transfer according to an embodiment of the present invention.
Referring to fig. 5, step S11 may further include:
s105: acquiring the last encrypted target data;
s106: performing hash operation on the last encrypted target data to obtain a ciphertext hash to be verified;
s107: and verifying the ciphertext hash to be verified by using the last ciphertext hash in the last block corresponding to the last transfer to verify that the obtained last encrypted target data is true.
The last encrypted target data in step S105 is obtained by encrypting the target data by the last node in the last assignment, where the last assignment is an assignment in which the last node transfers the target data to the current node. Further, when the last assignment is the current assignment, the last encrypted target data is the current encrypted target data at that time, and the last node is the current node at that time, and the meaning and embodiments thereof can be understood with reference to the related description.
In step S105, the process of obtaining the last encrypted target data may be directly received from the last node, or may be obtained from the data storage device.
Therefore, the encrypted target data can be directly stored between the nodes, and centralized storage can also be realized by adopting data storage equipment. Which may be the steps shown in fig. 6.
In one embodiment, in addition to verifying the ciphertext hash, the original text may be verified after the target data is obtained through decryption, and in order to verify the original text, the original text hash of the target data is written in the first block of the block chain system.
After step S107, the method may further include:
s108: decrypting the last encrypted target data by using the key of the current node to obtain target data;
s109: performing hash operation on the obtained target data to obtain corresponding original text hash to be verified;
s110: and verifying the hash of the original text to be verified by using the hash of the original text written in the first block so as to verify that the obtained target data is true.
In the above process, the hash operation in step S109 is the same as the process of calculating the hash of the original text in the first node.
Through the implementation mode, the verification of the original text can be realized, and further, the authenticity of the acquired target data can be guaranteed through the verification of the ciphertext hash and the double verification of the original text hash.
Fig. 6 is a third flowchart illustrating a processing method for data ownership transfer according to an embodiment of the present invention.
Referring to fig. 6, after step S102, the method may further include:
s111: sending the current encrypted target data to the next node, or: and sending the current encrypted target data to a data storage device.
After sending the encrypted target data to the data storage device, the next node may be enabled to obtain the current encrypted target data from the data storage device.
In one example, the data storage device may iterate through the stored encrypted target data to store only the latest encrypted target data, i.e., each time a data ownership transfer occurs, the original data is automatically deleted. Further, each node can acquire the encrypted target data from the same storage location.
Meanwhile, the present embodiment does not completely exclude the situation that the data is not automatically deleted, and in another example, the data storage device may also store at least part of all encrypted target data, where the data storage device may partially iterate, for example, only stores encrypted target data obtained last several times, or stores all encrypted target data without iterating, at this time, different encrypted target data may be stored in different storage locations, and information of the storage locations may be learned by the transmission between the data storage device and the node and/or the transmission between the nodes.
The data storage device may be a server other than the blockchain system, or may be a node in the blockchain system.
In summary, in the processing method for data ownership transfer provided in this embodiment, the target data needs to be encrypted every time of transfer, and because the data is encrypted based on the public key of the node of the assigned data (specifically, the data is encrypted based on the proxy re-encryption key generated by the public key and the private key of the assignor), only the node of the assigned data can decrypt the corresponding encrypted data, thereby ensuring the security of the data in the data transfer process.
Meanwhile, the ciphertext Hash is obtained by carrying out Hash operation on the encrypted target data, and different assignments correspond to different ciphertext Hash, so that the invention can verify the authenticity of the obtained encrypted target data based on the different ciphertext Hash operations, thereby ensuring that the obtained encrypted data is really the data of the assignment.
FIG. 7 is a first block diagram illustrating a first process module of a processing device for ownership transfer of data according to an embodiment of the present invention; fig. 8 is a second block diagram of processing devices for data ownership transfer according to an embodiment of the present invention.
Referring to fig. 7 and 8, a processing apparatus 300 for data ownership transfer, applied to any one of current nodes of a blockchain system, includes:
a public key obtaining module 301, which obtains the public key of the next node when the current transfer occurs; the current transfer is the transfer of the target data from the current node to the next node;
an encryption module 302, configured to encrypt the target data according to the public key of the next node, to obtain current encrypted target data;
a ciphertext hash calculation module 303, configured to perform hash operation on the currently encrypted target data to obtain a current ciphertext hash;
a current block generation module 304, configured to generate the current block in the block chain, where the block of the current block is written with the current ciphertext hash, such that: the next node can firstly verify that the acquired current encrypted target data is true by using the current ciphertext hash, and then decrypt the current encrypted target data by using a private key of the next node to obtain the target data.
Optionally, the encryption module 302 is specifically configured to:
generating a current proxy re-encryption key according to the public key of the next node and the private key of the current node;
and encrypting the target data by using the current proxy re-encryption key to obtain the current encrypted target data.
Optionally, referring to fig. 8, the processing apparatus further includes:
a target data obtaining module 305, configured to obtain last encrypted target data, where the last encrypted target data is obtained by encrypting the target data by a last node in a last assignment, and the last assignment is an assignment in which the last node assigns the target data to the current node;
the first hash operation module 306 is configured to perform hash operation on the last encrypted target data to obtain a ciphertext hash to be verified;
and a ciphertext hash verification module 307, configured to verify the ciphertext hash to be verified by using the last ciphertext hash in the last block corresponding to the last assignment, so as to verify that the obtained last encrypted target data is true.
Optionally, the first chunk of the blockchain system further has written a textual hash of the target data;
the processing device further comprises:
a decryption module 308, configured to decrypt the last encrypted target data by using the key of the current node to obtain target data;
the second hash operation module 309 is configured to perform hash operation on the obtained target data to obtain a corresponding hash of the original text to be verified;
the original verification module 310 is configured to verify the original hash to be verified by using the original hash written in the first block, so as to verify that the obtained target data is true.
Optionally, referring to fig. 8, the processing apparatus further includes:
a sending module 311, configured to send the current encrypted target data to the next node, or: and sending the current encrypted target data to a data storage device, so that the next node can acquire the current encrypted target data from the data storage device.
Optionally, the block body of each block is further written with the currently assigned assignment description information.
Optionally, at least one of the following is written in the block header of each block:
version information;
hash data of the last block;
a time stamp;
root hash data for all transferred merkel trees of the target data.
Optionally, the target data includes data in the form of at least one of: text, images, audio, video, compressed files, program files.
In summary, in the processing apparatus for ownership transfer of data provided in this embodiment, each transfer is performed with the target data encrypted, because the data is encrypted based on the public key of the node of the assigned data (specifically, the data is encrypted based on the proxy re-encryption key generated by the public key and the private key of the assignor), only the node of the assigned data can decrypt the corresponding encrypted data, and the security of the data in the data transfer process is ensured.
Meanwhile, the ciphertext Hash is obtained by carrying out Hash operation on the encrypted target data, and different assignments correspond to different ciphertext Hash, so that the invention can verify the authenticity of the obtained encrypted target data based on the different ciphertext Hash operations, thereby ensuring that the obtained encrypted data is really the data of the assignment.
Fig. 9 is a schematic structural diagram of an electronic device in an embodiment of the present invention.
Referring to fig. 9, an electronic device 40 is provided, including:
a processor 41; and the number of the first and second groups,
a memory 42 for storing executable instructions of the processor;
wherein the processor 41 is configured to perform the above-mentioned method via execution of the executable instructions.
The processor 41 is capable of communicating with the memory 42 via the bus 43.
The present embodiments also provide a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the above-mentioned method.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (11)

1. A processing method for data ownership transfer is applied to any one current node of a blockchain system, and is characterized by comprising the following steps:
when the current transfer occurs, acquiring a public key of the next node; the current transfer is the transfer of the target data from the current node to the next node;
encrypting the target data according to the public key of the next node to obtain the current encrypted target data;
performing hash operation on the current encrypted target data to obtain a current ciphertext hash;
generating the current block in the blockchain, the block of the current block having the current ciphertext hash written therein, such that: the next node can firstly verify that the acquired current encrypted target data is true by using the current ciphertext hash, and then decrypt the current encrypted target data by using a private key of the next node to obtain the target data.
2. The processing method according to claim 1, wherein encrypting the target data according to the public key of the next node to obtain the currently encrypted target data comprises:
generating a current proxy re-encryption key according to the public key of the next node and the private key of the current node;
and encrypting the target data by using the current proxy re-encryption key to obtain the current encrypted target data.
3. The process of claim 1, wherein prior to the occurrence of the current assignment, further comprising:
acquiring last encrypted target data, wherein the last encrypted target data is obtained by encrypting the target data by a last node in a last assignment, and the last assignment is an assignment of the last node for assigning the target data to the current node;
performing hash operation on the last encrypted target data to obtain a ciphertext hash to be verified;
and verifying the ciphertext hash to be verified by using the last ciphertext hash in the last block corresponding to the last transfer to verify that the obtained last encrypted target data is true.
4. The processing method according to claim 3, wherein the first chunk of the blockchain system further has written therein a textual hash of the target data;
verifying the ciphertext hash to be verified by using the last ciphertext hash in the last block corresponding to the last assignment to verify that the obtained last encrypted target data is true, further comprising:
decrypting the last encrypted target data by using the key of the current node to obtain target data;
performing hash operation on the obtained target data to obtain corresponding original text hash to be verified;
and verifying the hash of the original text to be verified by using the hash of the original text written in the first block so as to verify that the obtained target data is true.
5. The processing method according to claim 1, wherein after encrypting the target data according to the public key of the next node to obtain the currently encrypted target data, the method further comprises:
sending the current encrypted target data to the next node, or: and sending the current encrypted target data to a data storage device, so that the next node can acquire the current encrypted target data from the data storage device.
6. The process according to any one of claims 1 to 5, wherein the block body of each block is further written with the currently assigned transfer description information.
7. The processing method according to any one of claims 1 to 5, wherein at least one of the following is further written in the block header of each block:
version information;
hash data of the last block;
a time stamp;
root hash data for all transferred merkel trees of the target data.
8. The processing method according to any one of claims 1 to 5, wherein the target data comprises data in the form of at least one of: text, images, audio, video, compressed files, program files.
9. A processing apparatus for data ownership transfer, applied to any one current node of a blockchain system, comprising:
the public key acquisition module is used for acquiring the public key of the next node when the current transfer occurs; the current transfer is the transfer of the target data from the current node to the next node;
the encryption module is used for encrypting the target data according to the public key of the next node to obtain the current encrypted target data;
the ciphertext hash calculation module is used for carrying out hash operation on the current encrypted target data to obtain a current ciphertext hash;
a current block generation module configured to generate the current block in the blockchain, the block of the current block having the current ciphertext hash written therein, such that: the next node can firstly verify that the acquired current encrypted target data is true by using the current ciphertext hash, and then decrypt the current encrypted target data by using a private key of the next node to obtain the target data.
10. An electronic device, comprising a memory and a processor,
the memory is used for storing codes;
the processor is configured to execute the codes in the memory to implement the data ownership transfer processing method according to any one of claims 1 to 8.
11. A storage medium having a program stored thereon, wherein the program, when executed by a processor, implements the data ownership transfer processing method according to any one of claims 1 to 8.
CN201911415888.4A 2019-12-31 2019-12-31 Data ownership transfer processing method and device, electronic equipment and storage medium Pending CN111177798A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911415888.4A CN111177798A (en) 2019-12-31 2019-12-31 Data ownership transfer processing method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911415888.4A CN111177798A (en) 2019-12-31 2019-12-31 Data ownership transfer processing method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111177798A true CN111177798A (en) 2020-05-19

Family

ID=70646517

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911415888.4A Pending CN111177798A (en) 2019-12-31 2019-12-31 Data ownership transfer processing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111177798A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108566395A (en) * 2018-04-20 2018-09-21 济南浪潮高新科技投资发展有限公司 A kind of document transmission method, apparatus and system based on block chain
CN108881262A (en) * 2018-07-02 2018-11-23 北京市天元网络技术股份有限公司 Restoring files methods, devices and systems based on block chain
CN109450648A (en) * 2018-12-27 2019-03-08 石更箭数据科技(上海)有限公司 Key generating device, data processing equipment and stream compression system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108566395A (en) * 2018-04-20 2018-09-21 济南浪潮高新科技投资发展有限公司 A kind of document transmission method, apparatus and system based on block chain
CN108881262A (en) * 2018-07-02 2018-11-23 北京市天元网络技术股份有限公司 Restoring files methods, devices and systems based on block chain
CN109450648A (en) * 2018-12-27 2019-03-08 石更箭数据科技(上海)有限公司 Key generating device, data processing equipment and stream compression system

Similar Documents

Publication Publication Date Title
CN109120639B (en) Data cloud storage encryption method and system based on block chain
CN108123800B (en) Key management method, key management device, computer equipment and storage medium
CN110881063B (en) Storage method, device, equipment and medium of private data
CN108028834B (en) Apparatus and method for secure file transfer
CN109474616B (en) Multi-platform data sharing method and device and computer readable storage medium
CN111970304A (en) Message processing method and device
WO2020082226A1 (en) Method and system for transferring data in a blockchain system
CN109039997B (en) Secret key obtaining method, device and system
CN112399392A (en) Communication connection method, device, equipment and storage medium of home care terminal
CN116032667A (en) Online trace query method, system and related equipment supporting efficient update
CN114142995B (en) Key security distribution method and device for block chain relay communication network
CN108846671B (en) Online secure transaction method and system based on block chain
CN114154181A (en) Privacy calculation method based on distributed storage
CN112801307B (en) Block chain-based federal learning method and device and computer equipment
CN107133517B (en) Data recovery method based on data encryption and calculation in memory
CN111865761B (en) Social chat information evidence storing method based on block chain intelligent contracts
CN113434474A (en) Flow auditing method, equipment and storage medium based on federal learning
CN111010283B (en) Method and apparatus for generating information
CN110598427B (en) Data processing method, system and storage medium
CN111553686A (en) Data processing method and device, computer equipment and storage medium
CN111177798A (en) Data ownership transfer processing method and device, electronic equipment and storage medium
CN115567203A (en) Method, device, equipment and storage medium for recovering secret information
CN113810421A (en) Block chain-based PRE Internet of things data sharing method and system
CN113342802A (en) Method and device for storing block chain data
CN111431846B (en) Data transmission method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200519