CN112905698A - Data processing method of block chain - Google Patents

Data processing method of block chain Download PDF

Info

Publication number
CN112905698A
CN112905698A CN202110192026.0A CN202110192026A CN112905698A CN 112905698 A CN112905698 A CN 112905698A CN 202110192026 A CN202110192026 A CN 202110192026A CN 112905698 A CN112905698 A CN 112905698A
Authority
CN
China
Prior art keywords
data
link
key pair
blockchain
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110192026.0A
Other languages
Chinese (zh)
Inventor
余鸿忠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Block Power Guangzhou Technology Co Ltd
Original Assignee
Block Power Guangzhou Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Block Power Guangzhou Technology Co Ltd filed Critical Block Power Guangzhou Technology Co Ltd
Priority to CN202110192026.0A priority Critical patent/CN112905698A/en
Publication of CN112905698A publication Critical patent/CN112905698A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The invention is applicable to the technical field of block chain data processing, and provides a data processing method of a block chain, which comprises the following steps: generating a first key pair by the block chain nodes; generating base data of the target data using the first key pair; sending the basic data to another block chain node on the block chain network for storage; signing the target data and the data information of the public key of the first key pair of the block chain link point by using a private key of the first key pair to generate first signature data; the target data is processed by using the first key which is periodically updated and then uploaded to the block chain for storage, so that the safe processing of the data which needs to be stored/interacted at another block chain link point can be effectively guaranteed, the data interaction among the block chains is realized, the safety level of data storage in the block chain is improved, and the user experience is further improved.

Description

Data processing method of block chain
Technical Field
The invention belongs to the technical field of block chain data processing, and particularly relates to a data processing method of a block chain.
Background
When data interaction is performed between the blockchain system and the blockchain system, the blockchain generally needs to have the capability of authenticating another blockchain data link so as to ensure the security of data transmission between the blockchain systems and prevent the data of the blockchain from being tampered.
There are many kinds of network implementations of cross-link, such as a wave card chain (Polkadot), which is a technology for implementing cross-link communication, and a verifier (Validator) is designed, and this role will check whether data comes from a blockchain (data authentication logic using the blockchain), and the Validator will use rights and interests to prove that a POS (Proof of stamp) algorithm agrees on the verification result, and the data that is agreed on can be confirmed to come from one blockchain, and another blockchain can use the cross-link data.
When the existing relay chain authenticates the cross-link data, the cross-link data need to be commonly identified through the POS of the relay chain, the throughput of the common identification algorithm of the relay chain is the upper limit of the cross-link data flow, and the upper limit bottleneck of the throughput exists. Meanwhile, when the block chain authenticates data on the relay chain, multiple signatures need to be verified, for example, POS needs to verify hundreds of signatures, and the execution efficiency is low.
Disclosure of Invention
In view of the above-mentioned deficiencies of the prior art, an object of the present invention is to provide a data processing method for a blockchain, which aims to solve the problems of poor security and poor user experience of blockchain data transmission due to the failure of providing an effective data processing method for a blockchain in the prior art.
In one aspect, the present invention provides a data processing method for a block chain, including the following steps:
generating a first key pair by the block chain nodes;
generating base data of the target data using the first key pair;
and sending the basic data to another blockchain node on the blockchain network for storage.
Further preferably, the method further comprises:
sending a public key in the first key pair to another blockchain node;
and signing the target data and the data information of the public key of the first key pair of the block chain node by using a private key of the first key pair to generate first signature data.
Further preferably, the method further comprises:
encrypting the target data, a public key of a first key pair of the blockchain node and the first signature data by using a second key to generate encrypted data;
the block chain node signs the encrypted data by using a private key of a first key pair to generate second signature data;
the basic data includes: the second signature data, the public key of the first key pair of the blockchain node and data to be stored/interacted with.
Further preferably, the first key pair is updated based on one or more of another different blockchain node and target data, or an update period of the first key pair is preset.
Further preferably, the sending of the public key in the first key pair to another blockchain node is performed by an end-to-end encryption transmission channel; or the public key of the first key pair is preset in another blockchain node.
Further preferably, the sending the basic data to a block chain network includes:
the block link node sends a data link request to a link verifier;
the link verifying party acquires link data of another block link node after receiving the data link request, verifies the link data and returns a result to the block link node after the link verifying party successfully verifies the link data;
the block link node sends the base data to another block link node.
Further preferably, the returning a result to the block link point after the verification is successful includes:
after the link verification is passed, the link verifying party signs the link data by using a private key of a third key pair to generate third signature data, and after the signature is completed, the link verifying party returns the link data and the third signature data to the block chain node;
and after receiving the link data and the third signature data returned by the link verifier, the block link node verifies the received link data and the third signature data sent by the link verifier by using a public key of a third key pair, and if the verification is passed, the block link node determines that the link data is from the link verifier and is successfully verified by the link verifier.
Further preferably, the second key pair or the third key pair is preset by a block chain node;
the second key pair and the third key pair have a preset time period to be updated;
and encrypting the data to be stored.
In another aspect, the present invention also provides a non-transitory computer-readable storage medium storing computer-executable instructions, which, when executed by one or more processors, may cause the one or more processors to perform the above-mentioned data processing method of a block chain.
In another aspect, the present invention also provides a computer program product comprising a computer program stored on a non-volatile computer-readable storage medium, the computer program comprising program instructions which, when executed by a processor, cause the processor to carry out the above-mentioned data processing method of a blockchain.
The invention has the beneficial effects that: the target data is processed by using the first key which is periodically updated and then uploaded to the block chain for storage, so that the safe processing of the data which needs to be stored/interacted at another block chain link point can be effectively guaranteed, the data interaction among the block chains is realized, the safety level of data storage in the block chain is improved, and the user experience is further improved.
Drawings
Fig. 1 is a flowchart illustrating an implementation of a data processing method for a block chain according to an embodiment of the present invention;
fig. 2 is a flowchart of an implementation of a data processing method of a block chain according to a second embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The following detailed description of specific implementations of the present invention is provided in conjunction with specific embodiments:
the first embodiment is as follows:
fig. 1 shows an implementation flow of a data processing method for a block chain according to a first embodiment of the present invention, and for convenience of description, only parts related to the first embodiment of the present invention are shown, which are detailed as follows:
in step S101: generating a first key pair by the block chain nodes;
in an embodiment of the invention, the encryption level is increased.
In step S102: generating base data of the target data using the first key pair;
in the embodiment of the present invention, the target data includes software and hardware information and data to be processed or stored.
In step S103: and sending the basic data to another blockchain node on the blockchain network for storage.
Example two:
fig. 2 shows an implementation flow of a data processing method of a block chain according to a second embodiment of the present invention, where the second embodiment is different from the first embodiment in that the method further includes:
in step S201: sending the public key in the first key pair to another blockchain node;
in the embodiment of the present invention, the public key in the first key pair is sent to another blockchain node outside the local blockchain in the blockchain; sending the public key in the first key pair to another block chain node is completed by an end-to-end encryption transmission channel; or presetting a public key of the first key pair in another block chain node; and different use requirements are met.
In step S202: signing the target data and the data information of the public key of the first key pair of the block chain link point by using a private key of the first key pair to generate first signature data;
in the embodiment of the present invention, the first key pair is updated based on one or more of another different blockchain node and the target data, or an update period of the first key pair is preset; the first key pair is variable, and the safety is greatly improved.
In step S203: encrypting the target data, the public key of the first key pair of the block chain link point and the first signature data by using a second key to generate encrypted data;
in an embodiment of the invention, security is improved.
In step S204: the block chain node signs the encrypted data by using a private key of the first key pair to generate second signature data;
in an embodiment of the invention, security is improved.
Sending the basic data to the blockchain network comprises the steps 205, 206 and 207;
in step S205: the block link node sends a data link request to a link verifier;
in embodiments of the invention, the link verifier may be a further/further blockchain node.
In step S206: the link verifying party acquires link data of another block link node after receiving the data link request, verifies the link data and returns a result to the block link node after the verification is successful;
in an embodiment of the present invention, returning a result to the block link point after successful verification includes:
after the link verification party passes the verification, the link verification party signs the link data by using a private key of a third key pair to generate third signature data, and after the signature is completed, the link verification party returns the link data and the third signature data to the block link node;
and after receiving the link data and the third signature data returned by the link verifier, the blockchain node verifies the received link data and the third signature data sent by the link verifier by using the public key of the third key pair, and if the verification is passed, the blockchain node determines that the link data comes from the link verifier and is successfully verified by the link verifier.
In step S207: the block chain node sends the basic data to another block chain node, wherein the basic data includes: the second signature data, a public key of a first key pair of the block chain link points and data needing to be stored/interacted;
in the embodiment of the invention, the block chain node is preset with a second key pair or a third key pair; the second key pair and the third key pair have preset time periods to be updated; and encrypting the data to be stored.
The target data is processed by using the first key which is periodically updated and then uploaded to the block chain for storage, so that the safe processing of the data which needs to be stored/interacted at another block chain link point can be effectively guaranteed, the data interaction among the block chains is realized, the safety level of data storage in the block chain is improved, and the user experience is further improved.
Example three:
a third embodiment of the present invention provides a non-transitory computer-readable storage medium storing computer-executable instructions, which are executed by one or more processors, for example, to perform steps S201 to S207 of the method in fig. 2 described above.
By way of example, non-volatile storage media can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in many forms such as Synchronous RAM (SRAM), dynamic RAM, (DRAM), Synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The disclosed memory components or memory of the operating environment described herein are intended to comprise one or more of these and/or any other suitable types of memory.
Example four:
a fourth embodiment of the present invention provides a computer program product, where the computer program product includes a computer program stored on a non-volatile computer-readable storage medium, and the computer program includes program instructions, which, when executed by a processor, cause the processor to execute the data processing method of the block chain of the above-described method embodiment. For example, the method steps S201 to S207 in fig. 2 described above are performed.
The above-described embodiments are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the embodiment.
Through the above description of the embodiments, those skilled in the art will clearly understand that the embodiments may be implemented by software plus a general hardware platform, and may also be implemented by hardware. With this in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer electronic device (which may be a personal computer, a server, or a network electronic device, etc.) to execute the methods of the various embodiments or some parts of the embodiments.
Conditional language such as "can," "might," or "may" is generally intended to convey that a particular embodiment can include (yet other embodiments do not include) particular features, elements, and/or operations, among others, unless specifically stated otherwise or otherwise understood within the context as used. Thus, such conditional language is not generally intended to imply that features, elements, and/or operations are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without student input or prompting, whether such features, elements, and/or operations are included or are to be performed in any particular embodiment.
What has been described herein in the specification and drawings includes examples of data processing methods capable of providing blockchains. It will, of course, not be possible to describe every conceivable combination of components and/or methodologies for purposes of describing the various features of the disclosure, but it can be appreciated that many further combinations and permutations of the disclosed features are possible. It is therefore evident that various modifications can be made to the disclosure without departing from the scope or spirit thereof. In addition, or in the alternative, other embodiments of the disclosure may be apparent from consideration of the specification and drawings and from practice of the disclosure as presented herein. It is intended that the examples set forth in this specification and the drawings be considered in all respects as illustrative and not restrictive. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.

Claims (10)

1. A method for processing data in a blockchain, the method comprising the steps of:
generating a first key pair by the block chain nodes;
generating base data of the target data using the first key pair;
and sending the basic data to another blockchain node on the blockchain network for storage.
2. The method of data processing of a blockchain according to claim 1, the method further comprising:
sending a public key in the first key pair to another blockchain node;
and signing the target data and the data information of the public key of the first key pair of the block chain node by using a private key of the first key pair to generate first signature data.
3. The method of data processing of a blockchain according to claim 1, the method further comprising:
encrypting the target data, a public key of a first key pair of the blockchain node and the first signature data by using a second key to generate encrypted data;
the block chain node signs the encrypted data by using a private key of a first key pair to generate second signature data;
the basic data includes: the second signature data, the public key of the first key pair of the blockchain node and data to be stored/interacted with.
4. The blockchain data processing method according to claim 1, wherein the first key pair is updated based on one or more of a different another blockchain node, target data, or an update period of the first key pair is preset.
5. The blockchain data processing method according to claim 2, wherein the sending of the public key of the first key pair to another blockchain node is performed by an end-to-end encryption transmission channel; or the public key of the first key pair is preset in another blockchain node.
6. The method for processing blockchain data according to claim 1, wherein the sending the base data onto a blockchain network comprises:
the block link node sends a data link request to a link verifier;
the link verifying party acquires link data of another block link node after receiving the data link request, verifies the link data and returns a result to the block link node after the link verifying party successfully verifies the link data;
the block link node sends the base data to another block link node.
7. The method of data processing of a blockchain according to claim 6, wherein returning the result to the blockchain link point after the verification is successful comprises:
after the link verification is passed, the link verifying party signs the link data by using a private key of a third key pair to generate third signature data, and after the signature is completed, the link verifying party returns the link data and the third signature data to the block chain node;
and after receiving the link data and the third signature data returned by the link verifier, the block link node verifies the received link data and the third signature data sent by the link verifier by using a public key of a third key pair, and if the verification is passed, the block link node determines that the link data is from the link verifier and is successfully verified by the link verifier.
8. The method according to any of claims 3 or 7, wherein a block link node presets the second key pair or the third key pair;
the second key pair and the third key pair have a preset time period to be updated;
and encrypting the data to be stored.
9. A non-transitory computer-readable storage medium storing computer-executable instructions that, when executed by one or more processors, cause the one or more processors to perform the method of data processing for a blockchain of any one of claims 1-7.
10. A computer program product, characterized in that the computer program product comprises a computer program stored on a non-volatile computer-readable storage medium, the computer program comprising program instructions which, when executed by a processor, cause the processor to carry out the data processing method of a blockchain of any one of claims 1 to 7.
CN202110192026.0A 2021-02-19 2021-02-19 Data processing method of block chain Pending CN112905698A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110192026.0A CN112905698A (en) 2021-02-19 2021-02-19 Data processing method of block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110192026.0A CN112905698A (en) 2021-02-19 2021-02-19 Data processing method of block chain

Publications (1)

Publication Number Publication Date
CN112905698A true CN112905698A (en) 2021-06-04

Family

ID=76124066

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110192026.0A Pending CN112905698A (en) 2021-02-19 2021-02-19 Data processing method of block chain

Country Status (1)

Country Link
CN (1) CN112905698A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113824557A (en) * 2021-09-18 2021-12-21 广东稳峰电力科技有限公司 Transformation secondary three-dimensional digital construction method and device and transformation secondary three-dimensional system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113824557A (en) * 2021-09-18 2021-12-21 广东稳峰电力科技有限公司 Transformation secondary three-dimensional digital construction method and device and transformation secondary three-dimensional system

Similar Documents

Publication Publication Date Title
US10824763B2 (en) Integrity of communications between blockchain networks and external data sources
CN111970129B (en) Data processing method and device based on block chain and readable storage medium
CN108111314B (en) Method and equipment for generating and verifying digital certificate
CN110633963B (en) Electronic bill processing method, electronic bill processing device, computer readable storage medium and computer readable storage device
AU2019207310A1 (en) Anti-replay attack authentication protocol
CN111010382A (en) Method and apparatus for processing data requests in a blockchain network
AU2019204713A1 (en) Transferring digital tickets based on blockchain networks
KR102177794B1 (en) Distributed device authentication protocol in internet of things blockchain environment
CN109687965A (en) The real name identification method of subscriber identity information in a kind of protection network
CN111541551A (en) Threshold signature message processing method, system, storage medium and server
CN113422688B (en) Rapid auditing method for cloud storage data
CN111368340A (en) Block chain-based evidence-based security verification method and device and hardware equipment
CN108496323B (en) Certificate importing method and terminal
CN111737715A (en) Decentralized electronic contract online signing method and system
CN111314172A (en) Data processing method, device and equipment based on block chain and storage medium
CN105872848A (en) Credible two-way authentication method applicable to asymmetric resource environment
CN113328997A (en) Alliance chain cross-chain system and method
CN107453871A (en) Password generated method, password authentication method, method of payment and device
CN112905698A (en) Data processing method of block chain
CN111177265A (en) Block chain domain division method
CN113761578A (en) Document true checking method based on block chain
CN111953477B (en) Terminal equipment, generation method of identification token of terminal equipment and interaction method of client
CN112446782A (en) Method for downloading initial key, computer equipment and storage medium
CN112991058B (en) Verification method and system for conducting transaction based on blockchain
CN116881936A (en) Trusted computing method and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination